%PDF- %PDF-
Direktori : /proc/self/root/var/log/ |
Current File : //proc/self/root/var/log/secure-20230122 |
Jan 15 03:51:58 host sshd[13558]: Connection closed by 190.138.240.31 port 47024 [preauth] Jan 15 03:52:47 host sshd[13719]: Invalid user ef from 194.110.203.109 port 53076 Jan 15 03:52:47 host sshd[13719]: input_userauth_request: invalid user ef [preauth] Jan 15 03:52:47 host sshd[13719]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:52:47 host sshd[13719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 03:52:49 host sshd[13719]: Failed password for invalid user ef from 194.110.203.109 port 53076 ssh2 Jan 15 03:52:52 host sshd[13719]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:52:54 host sshd[13719]: Failed password for invalid user ef from 194.110.203.109 port 53076 ssh2 Jan 15 03:52:57 host sshd[13719]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:52:59 host sshd[13719]: Failed password for invalid user ef from 194.110.203.109 port 53076 ssh2 Jan 15 03:53:02 host sshd[13719]: Connection closed by 194.110.203.109 port 53076 [preauth] Jan 15 03:53:02 host sshd[13719]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 03:54:47 host sshd[14071]: User root from 211.114.214.37 not allowed because not listed in AllowUsers Jan 15 03:54:47 host sshd[14071]: input_userauth_request: invalid user root [preauth] Jan 15 03:54:47 host unix_chkpwd[14078]: password check failed for user (root) Jan 15 03:54:47 host sshd[14071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.114.214.37 user=root Jan 15 03:54:47 host sshd[14071]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 03:54:49 host sshd[14071]: Failed password for invalid user root from 211.114.214.37 port 43656 ssh2 Jan 15 03:54:50 host unix_chkpwd[14084]: password check failed for user (root) Jan 15 03:54:50 host sshd[14071]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 03:54:51 host sshd[14071]: Failed password for invalid user root from 211.114.214.37 port 43656 ssh2 Jan 15 03:54:52 host unix_chkpwd[14092]: password check failed for user (root) Jan 15 03:54:52 host sshd[14071]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 03:54:54 host sshd[14071]: Failed password for invalid user root from 211.114.214.37 port 43656 ssh2 Jan 15 03:54:55 host unix_chkpwd[14098]: password check failed for user (root) Jan 15 03:54:55 host sshd[14071]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 03:54:57 host sshd[14071]: Failed password for invalid user root from 211.114.214.37 port 43656 ssh2 Jan 15 03:55:48 host sshd[14406]: Invalid user dnsekakf2$$ from 182.220.185.60 port 59110 Jan 15 03:55:48 host sshd[14406]: input_userauth_request: invalid user dnsekakf2$$ [preauth] Jan 15 03:55:48 host sshd[14406]: pam_unix(sshd:auth): check pass; user unknown Jan 15 03:55:48 host sshd[14406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.220.185.60 Jan 15 03:55:49 host sshd[14406]: Failed password for invalid user dnsekakf2$$ from 182.220.185.60 port 59110 ssh2 Jan 15 03:55:50 host sshd[14406]: Failed password for invalid user dnsekakf2$$ from 182.220.185.60 port 59110 ssh2 Jan 15 03:55:50 host sshd[14406]: Connection closed by 182.220.185.60 port 59110 [preauth] Jan 15 03:56:15 host sshd[14466]: Connection closed by 190.138.240.31 port 45996 [preauth] Jan 15 04:00:28 host sshd[15359]: Connection closed by 190.138.240.31 port 44934 [preauth] Jan 15 04:00:58 host sshd[15495]: Did not receive identification string from 183.146.30.163 port 50429 Jan 15 04:02:41 host sshd[15932]: Connection reset by 123.60.48.155 port 53830 [preauth] Jan 15 04:02:44 host sshd[15934]: Connection reset by 123.60.48.155 port 53826 [preauth] Jan 15 04:04:50 host sshd[16309]: Connection closed by 190.138.240.31 port 43886 [preauth] Jan 15 04:09:08 host sshd[17250]: Connection closed by 190.138.240.31 port 42844 [preauth] Jan 15 04:12:19 host sshd[17842]: Invalid user user from 112.155.227.221 port 60979 Jan 15 04:12:19 host sshd[17842]: input_userauth_request: invalid user user [preauth] Jan 15 04:12:19 host sshd[17842]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:12:19 host sshd[17842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.155.227.221 Jan 15 04:12:21 host sshd[17842]: Failed password for invalid user user from 112.155.227.221 port 60979 ssh2 Jan 15 04:12:23 host sshd[17842]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:12:25 host sshd[17842]: Failed password for invalid user user from 112.155.227.221 port 60979 ssh2 Jan 15 04:12:25 host sshd[17842]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:12:27 host sshd[17842]: Failed password for invalid user user from 112.155.227.221 port 60979 ssh2 Jan 15 04:12:28 host sshd[17842]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:12:30 host sshd[17842]: Failed password for invalid user user from 112.155.227.221 port 60979 ssh2 Jan 15 04:12:30 host sshd[17842]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:12:32 host sshd[17842]: Failed password for invalid user user from 112.155.227.221 port 60979 ssh2 Jan 15 04:13:24 host sshd[18171]: Connection closed by 190.138.240.31 port 41794 [preauth] Jan 15 04:13:31 host sshd[18225]: User ftp from 122.117.100.124 not allowed because not listed in AllowUsers Jan 15 04:13:31 host sshd[18225]: input_userauth_request: invalid user ftp [preauth] Jan 15 04:13:31 host unix_chkpwd[18232]: password check failed for user (ftp) Jan 15 04:13:31 host sshd[18225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.100.124 user=ftp Jan 15 04:13:31 host sshd[18225]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 15 04:13:33 host sshd[18225]: Failed password for invalid user ftp from 122.117.100.124 port 40618 ssh2 Jan 15 04:13:34 host unix_chkpwd[18239]: password check failed for user (ftp) Jan 15 04:13:34 host sshd[18225]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 15 04:13:36 host sshd[18225]: Failed password for invalid user ftp from 122.117.100.124 port 40618 ssh2 Jan 15 04:13:37 host unix_chkpwd[18245]: password check failed for user (ftp) Jan 15 04:13:37 host sshd[18225]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 15 04:13:38 host sshd[18225]: Failed password for invalid user ftp from 122.117.100.124 port 40618 ssh2 Jan 15 04:13:39 host sshd[18225]: Connection reset by 122.117.100.124 port 40618 [preauth] Jan 15 04:13:39 host sshd[18225]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.100.124 user=ftp Jan 15 04:17:31 host sshd[18978]: Connection closed by 190.138.240.31 port 40762 [preauth] Jan 15 04:17:50 host sshd[19055]: User root from 218.161.16.245 not allowed because not listed in AllowUsers Jan 15 04:17:50 host sshd[19055]: input_userauth_request: invalid user root [preauth] Jan 15 04:17:50 host unix_chkpwd[19063]: password check failed for user (root) Jan 15 04:17:50 host sshd[19055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.161.16.245 user=root Jan 15 04:17:50 host sshd[19055]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 04:17:52 host sshd[19055]: Failed password for invalid user root from 218.161.16.245 port 33961 ssh2 Jan 15 04:17:52 host sshd[19055]: Connection reset by 218.161.16.245 port 33961 [preauth] Jan 15 04:19:01 host sshd[19256]: Invalid user roger from 209.141.56.48 port 33320 Jan 15 04:19:01 host sshd[19256]: input_userauth_request: invalid user roger [preauth] Jan 15 04:19:01 host sshd[19256]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:19:01 host sshd[19256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 15 04:19:03 host sshd[19256]: Failed password for invalid user roger from 209.141.56.48 port 33320 ssh2 Jan 15 04:19:03 host sshd[19256]: Connection closed by 209.141.56.48 port 33320 [preauth] Jan 15 04:21:52 host sshd[19867]: Invalid user yousef from 190.138.240.31 port 39718 Jan 15 04:21:52 host sshd[19867]: input_userauth_request: invalid user yousef [preauth] Jan 15 04:21:52 host sshd[19867]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:21:52 host sshd[19867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.138.240.31 Jan 15 04:21:54 host sshd[19867]: Failed password for invalid user yousef from 190.138.240.31 port 39718 ssh2 Jan 15 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 04:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 04:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 04:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 04:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=wwwrmswll user-3=wwwresourcehunte user-4=keralaholi user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=wwwkaretakers user-11=cochintaxi user-12=mrsclean user-13=wwwnexidigital user-14=kottayamcalldriv user-15=phmetals user-16=gifterman user-17=palco123 user-18=straightcurve user-19=wwwletsstalkfood user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=wwwtestugo user-24=shalinijames user-25=vfmassets user-26=wwwkapin user-27=woodpeck user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 04:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 04:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 04:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HEKH7c8ASzqiTZfH.~ Jan 15 04:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HEKH7c8ASzqiTZfH.~' Jan 15 04:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HEKH7c8ASzqiTZfH.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 04:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 04:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 04:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 04:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 04:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 04:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 04:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 04:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 04:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 04:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 04:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 04:32:53 host sshd[22280]: Invalid user admin from 195.226.194.142 port 33086 Jan 15 04:32:53 host sshd[22280]: input_userauth_request: invalid user admin [preauth] Jan 15 04:32:53 host sshd[22280]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:32:53 host sshd[22280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 15 04:32:55 host sshd[22280]: Failed password for invalid user admin from 195.226.194.142 port 33086 ssh2 Jan 15 04:32:55 host sshd[22280]: Received disconnect from 195.226.194.142 port 33086:11: Bye Bye [preauth] Jan 15 04:32:55 host sshd[22280]: Disconnected from 195.226.194.142 port 33086 [preauth] Jan 15 04:34:46 host sshd[22596]: Did not receive identification string from 149.129.220.222 port 61000 Jan 15 04:35:05 host sshd[22599]: Connection closed by 102.152.138.1 port 51428 [preauth] Jan 15 04:35:24 host sshd[22725]: Invalid user oracle from 114.25.31.4 port 55987 Jan 15 04:35:24 host sshd[22725]: input_userauth_request: invalid user oracle [preauth] Jan 15 04:35:24 host sshd[22725]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:35:24 host sshd[22725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.25.31.4 Jan 15 04:35:27 host sshd[22725]: Failed password for invalid user oracle from 114.25.31.4 port 55987 ssh2 Jan 15 04:35:27 host sshd[22725]: Connection reset by 114.25.31.4 port 55987 [preauth] Jan 15 04:41:45 host sshd[23948]: User root from 220.135.0.16 not allowed because not listed in AllowUsers Jan 15 04:41:45 host sshd[23948]: input_userauth_request: invalid user root [preauth] Jan 15 04:41:45 host unix_chkpwd[23956]: password check failed for user (root) Jan 15 04:41:45 host sshd[23948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.0.16 user=root Jan 15 04:41:45 host sshd[23948]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 04:41:48 host sshd[23948]: Failed password for invalid user root from 220.135.0.16 port 60226 ssh2 Jan 15 04:41:49 host unix_chkpwd[23965]: password check failed for user (root) Jan 15 04:41:49 host sshd[23948]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 04:41:51 host sshd[23948]: Failed password for invalid user root from 220.135.0.16 port 60226 ssh2 Jan 15 04:41:52 host unix_chkpwd[23973]: password check failed for user (root) Jan 15 04:41:52 host sshd[23948]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 04:41:55 host sshd[23948]: Failed password for invalid user root from 220.135.0.16 port 60226 ssh2 Jan 15 04:41:55 host sshd[23948]: Connection reset by 220.135.0.16 port 60226 [preauth] Jan 15 04:41:55 host sshd[23948]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.0.16 user=root Jan 15 04:43:23 host sshd[24332]: Invalid user dnsekakf2$$ from 114.33.2.29 port 44051 Jan 15 04:43:23 host sshd[24332]: input_userauth_request: invalid user dnsekakf2$$ [preauth] Jan 15 04:43:23 host sshd[24332]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:43:23 host sshd[24332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.2.29 Jan 15 04:43:25 host sshd[24332]: Failed password for invalid user dnsekakf2$$ from 114.33.2.29 port 44051 ssh2 Jan 15 04:43:25 host sshd[24332]: Connection reset by 114.33.2.29 port 44051 [preauth] Jan 15 04:43:29 host sshd[24348]: Invalid user admin from 211.20.56.215 port 43576 Jan 15 04:43:29 host sshd[24348]: input_userauth_request: invalid user admin [preauth] Jan 15 04:43:29 host sshd[24348]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:43:29 host sshd[24348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.20.56.215 Jan 15 04:43:31 host sshd[24348]: Failed password for invalid user admin from 211.20.56.215 port 43576 ssh2 Jan 15 04:43:31 host sshd[24348]: Failed password for invalid user admin from 211.20.56.215 port 43576 ssh2 Jan 15 04:43:31 host sshd[24348]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:43:34 host sshd[24348]: Failed password for invalid user admin from 211.20.56.215 port 43576 ssh2 Jan 15 04:43:34 host sshd[24348]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:43:37 host sshd[24348]: Failed password for invalid user admin from 211.20.56.215 port 43576 ssh2 Jan 15 04:43:37 host sshd[24348]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:43:38 host sshd[24348]: Failed password for invalid user admin from 211.20.56.215 port 43576 ssh2 Jan 15 04:43:39 host sshd[24348]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:43:40 host sshd[24348]: Failed password for invalid user admin from 211.20.56.215 port 43576 ssh2 Jan 15 04:43:40 host sshd[24348]: error: maximum authentication attempts exceeded for invalid user admin from 211.20.56.215 port 43576 ssh2 [preauth] Jan 15 04:43:40 host sshd[24348]: Disconnecting: Too many authentication failures [preauth] Jan 15 04:43:40 host sshd[24348]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.20.56.215 Jan 15 04:43:40 host sshd[24348]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 15 04:44:05 host sshd[24477]: Invalid user antonio from 107.189.30.59 port 48408 Jan 15 04:44:05 host sshd[24477]: input_userauth_request: invalid user antonio [preauth] Jan 15 04:44:05 host sshd[24477]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:44:05 host sshd[24477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 15 04:44:08 host sshd[24477]: Failed password for invalid user antonio from 107.189.30.59 port 48408 ssh2 Jan 15 04:44:09 host sshd[24477]: Connection closed by 107.189.30.59 port 48408 [preauth] Jan 15 04:55:22 host sshd[26846]: Invalid user usr from 99.156.183.174 port 35558 Jan 15 04:55:22 host sshd[26846]: input_userauth_request: invalid user usr [preauth] Jan 15 04:55:22 host sshd[26846]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:55:22 host sshd[26846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.156.183.174 Jan 15 04:55:24 host sshd[26846]: Failed password for invalid user usr from 99.156.183.174 port 35558 ssh2 Jan 15 04:55:25 host sshd[26846]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:55:26 host sshd[26892]: Invalid user gitlab-runner from 220.134.7.32 port 50148 Jan 15 04:55:26 host sshd[26892]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 15 04:55:26 host sshd[26892]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:55:26 host sshd[26892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.7.32 Jan 15 04:55:27 host sshd[26846]: Failed password for invalid user usr from 99.156.183.174 port 35558 ssh2 Jan 15 04:55:28 host sshd[26846]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:55:28 host sshd[26892]: Failed password for invalid user gitlab-runner from 220.134.7.32 port 50148 ssh2 Jan 15 04:55:29 host sshd[26892]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:55:30 host sshd[26846]: Failed password for invalid user usr from 99.156.183.174 port 35558 ssh2 Jan 15 04:55:32 host sshd[26892]: Failed password for invalid user gitlab-runner from 220.134.7.32 port 50148 ssh2 Jan 15 04:55:32 host sshd[26846]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:55:32 host sshd[26892]: Connection reset by 220.134.7.32 port 50148 [preauth] Jan 15 04:55:32 host sshd[26892]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.7.32 Jan 15 04:55:34 host sshd[26846]: Failed password for invalid user usr from 99.156.183.174 port 35558 ssh2 Jan 15 04:57:42 host sshd[27336]: Invalid user tangbo from 80.68.7.50 port 53510 Jan 15 04:57:42 host sshd[27336]: input_userauth_request: invalid user tangbo [preauth] Jan 15 04:57:42 host sshd[27336]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:57:42 host sshd[27336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.68.7.50 Jan 15 04:57:44 host sshd[27336]: Failed password for invalid user tangbo from 80.68.7.50 port 53510 ssh2 Jan 15 04:57:44 host sshd[27336]: Received disconnect from 80.68.7.50 port 53510:11: Bye Bye [preauth] Jan 15 04:57:44 host sshd[27336]: Disconnected from 80.68.7.50 port 53510 [preauth] Jan 15 04:58:43 host sshd[27658]: Invalid user jungwoo from 103.5.113.148 port 46522 Jan 15 04:58:43 host sshd[27658]: input_userauth_request: invalid user jungwoo [preauth] Jan 15 04:58:43 host sshd[27658]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:58:43 host sshd[27658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.5.113.148 Jan 15 04:58:45 host sshd[27658]: Failed password for invalid user jungwoo from 103.5.113.148 port 46522 ssh2 Jan 15 04:58:45 host sshd[27658]: Received disconnect from 103.5.113.148 port 46522:11: Bye Bye [preauth] Jan 15 04:58:45 host sshd[27658]: Disconnected from 103.5.113.148 port 46522 [preauth] Jan 15 04:58:57 host sshd[27692]: Invalid user ec2-user from 211.57.67.231 port 62303 Jan 15 04:58:57 host sshd[27692]: input_userauth_request: invalid user ec2-user [preauth] Jan 15 04:58:57 host sshd[27692]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:58:57 host sshd[27692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.57.67.231 Jan 15 04:58:59 host sshd[27692]: Failed password for invalid user ec2-user from 211.57.67.231 port 62303 ssh2 Jan 15 04:59:00 host sshd[27692]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:59:01 host sshd[27707]: Invalid user zhangwen from 158.69.48.204 port 48652 Jan 15 04:59:01 host sshd[27707]: input_userauth_request: invalid user zhangwen [preauth] Jan 15 04:59:01 host sshd[27707]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:59:01 host sshd[27707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.48.204 Jan 15 04:59:02 host sshd[27707]: Failed password for invalid user zhangwen from 158.69.48.204 port 48652 ssh2 Jan 15 04:59:02 host sshd[27692]: Failed password for invalid user ec2-user from 211.57.67.231 port 62303 ssh2 Jan 15 04:59:03 host sshd[27707]: Received disconnect from 158.69.48.204 port 48652:11: Bye Bye [preauth] Jan 15 04:59:03 host sshd[27707]: Disconnected from 158.69.48.204 port 48652 [preauth] Jan 15 04:59:03 host sshd[27692]: Connection reset by 211.57.67.231 port 62303 [preauth] Jan 15 04:59:03 host sshd[27692]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.57.67.231 Jan 15 04:59:47 host sshd[27852]: Invalid user admin from 118.37.193.14 port 54248 Jan 15 04:59:47 host sshd[27852]: input_userauth_request: invalid user admin [preauth] Jan 15 04:59:47 host sshd[27852]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:59:47 host sshd[27852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.37.193.14 Jan 15 04:59:49 host sshd[27852]: Failed password for invalid user admin from 118.37.193.14 port 54248 ssh2 Jan 15 04:59:52 host sshd[27852]: Failed password for invalid user admin from 118.37.193.14 port 54248 ssh2 Jan 15 04:59:53 host sshd[27852]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:59:55 host sshd[27852]: Failed password for invalid user admin from 118.37.193.14 port 54248 ssh2 Jan 15 04:59:56 host sshd[27852]: pam_unix(sshd:auth): check pass; user unknown Jan 15 04:59:58 host sshd[27852]: Failed password for invalid user admin from 118.37.193.14 port 54248 ssh2 Jan 15 05:01:41 host sshd[28214]: Invalid user soumyaray from 45.225.160.66 port 38580 Jan 15 05:01:41 host sshd[28214]: input_userauth_request: invalid user soumyaray [preauth] Jan 15 05:01:41 host sshd[28214]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:01:41 host sshd[28214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.160.66 Jan 15 05:01:43 host sshd[28214]: Failed password for invalid user soumyaray from 45.225.160.66 port 38580 ssh2 Jan 15 05:01:44 host sshd[28214]: Received disconnect from 45.225.160.66 port 38580:11: Bye Bye [preauth] Jan 15 05:01:44 host sshd[28214]: Disconnected from 45.225.160.66 port 38580 [preauth] Jan 15 05:02:46 host sshd[28386]: Invalid user admin from 195.226.194.142 port 43560 Jan 15 05:02:46 host sshd[28386]: input_userauth_request: invalid user admin [preauth] Jan 15 05:02:47 host sshd[28386]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:02:47 host sshd[28386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 15 05:02:48 host sshd[28386]: Failed password for invalid user admin from 195.226.194.142 port 43560 ssh2 Jan 15 05:02:49 host sshd[28386]: Received disconnect from 195.226.194.142 port 43560:11: Bye Bye [preauth] Jan 15 05:02:49 host sshd[28386]: Disconnected from 195.226.194.142 port 43560 [preauth] Jan 15 05:03:31 host sshd[28621]: Invalid user mahsa from 158.69.48.204 port 45199 Jan 15 05:03:31 host sshd[28621]: input_userauth_request: invalid user mahsa [preauth] Jan 15 05:03:31 host sshd[28621]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:03:31 host sshd[28621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.48.204 Jan 15 05:03:32 host sshd[28621]: Failed password for invalid user mahsa from 158.69.48.204 port 45199 ssh2 Jan 15 05:03:33 host sshd[28621]: Received disconnect from 158.69.48.204 port 45199:11: Bye Bye [preauth] Jan 15 05:03:33 host sshd[28621]: Disconnected from 158.69.48.204 port 45199 [preauth] Jan 15 05:03:44 host sshd[28649]: Invalid user liuliu from 80.68.7.50 port 55796 Jan 15 05:03:44 host sshd[28649]: input_userauth_request: invalid user liuliu [preauth] Jan 15 05:03:44 host sshd[28649]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:03:44 host sshd[28649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.68.7.50 Jan 15 05:03:46 host sshd[28649]: Failed password for invalid user liuliu from 80.68.7.50 port 55796 ssh2 Jan 15 05:03:46 host sshd[28649]: Received disconnect from 80.68.7.50 port 55796:11: Bye Bye [preauth] Jan 15 05:03:46 host sshd[28649]: Disconnected from 80.68.7.50 port 55796 [preauth] Jan 15 05:04:13 host sshd[28722]: Invalid user steam from 125.228.149.62 port 41129 Jan 15 05:04:13 host sshd[28722]: input_userauth_request: invalid user steam [preauth] Jan 15 05:04:13 host sshd[28722]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:04:13 host sshd[28722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.149.62 Jan 15 05:04:14 host sshd[28722]: Failed password for invalid user steam from 125.228.149.62 port 41129 ssh2 Jan 15 05:04:15 host sshd[28722]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:04:17 host sshd[28722]: Failed password for invalid user steam from 125.228.149.62 port 41129 ssh2 Jan 15 05:04:17 host sshd[28722]: Failed password for invalid user steam from 125.228.149.62 port 41129 ssh2 Jan 15 05:04:17 host sshd[28722]: Connection closed by 125.228.149.62 port 41129 [preauth] Jan 15 05:04:17 host sshd[28722]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.149.62 Jan 15 05:04:35 host sshd[28798]: Invalid user wanglanying from 158.69.48.204 port 58455 Jan 15 05:04:35 host sshd[28798]: input_userauth_request: invalid user wanglanying [preauth] Jan 15 05:04:35 host sshd[28798]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:04:35 host sshd[28798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.48.204 Jan 15 05:04:37 host sshd[28798]: Failed password for invalid user wanglanying from 158.69.48.204 port 58455 ssh2 Jan 15 05:04:37 host sshd[28798]: Received disconnect from 158.69.48.204 port 58455:11: Bye Bye [preauth] Jan 15 05:04:37 host sshd[28798]: Disconnected from 158.69.48.204 port 58455 [preauth] Jan 15 05:04:57 host sshd[28887]: Invalid user wanglanying from 80.68.7.50 port 53698 Jan 15 05:04:57 host sshd[28887]: input_userauth_request: invalid user wanglanying [preauth] Jan 15 05:04:57 host sshd[28887]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:04:57 host sshd[28887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.68.7.50 Jan 15 05:04:59 host sshd[28887]: Failed password for invalid user wanglanying from 80.68.7.50 port 53698 ssh2 Jan 15 05:04:59 host sshd[28887]: Received disconnect from 80.68.7.50 port 53698:11: Bye Bye [preauth] Jan 15 05:04:59 host sshd[28887]: Disconnected from 80.68.7.50 port 53698 [preauth] Jan 15 05:05:30 host sshd[29022]: Invalid user bigipuser3 from 118.36.222.108 port 54243 Jan 15 05:05:30 host sshd[29022]: input_userauth_request: invalid user bigipuser3 [preauth] Jan 15 05:05:30 host sshd[29022]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:05:30 host sshd[29022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.36.222.108 Jan 15 05:05:30 host sshd[29051]: User root from 1.20.154.11 not allowed because not listed in AllowUsers Jan 15 05:05:30 host sshd[29051]: input_userauth_request: invalid user root [preauth] Jan 15 05:05:30 host unix_chkpwd[29054]: password check failed for user (root) Jan 15 05:05:30 host sshd[29051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.20.154.11 user=root Jan 15 05:05:30 host sshd[29051]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 05:05:33 host sshd[29022]: Failed password for invalid user bigipuser3 from 118.36.222.108 port 54243 ssh2 Jan 15 05:05:33 host sshd[29051]: Failed password for invalid user root from 1.20.154.11 port 47844 ssh2 Jan 15 05:05:34 host unix_chkpwd[29062]: password check failed for user (root) Jan 15 05:05:34 host sshd[29051]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 05:05:36 host sshd[29051]: Failed password for invalid user root from 1.20.154.11 port 47844 ssh2 Jan 15 05:05:36 host unix_chkpwd[29069]: password check failed for user (root) Jan 15 05:05:36 host sshd[29051]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 05:05:38 host sshd[29051]: Failed password for invalid user root from 1.20.154.11 port 47844 ssh2 Jan 15 05:05:39 host unix_chkpwd[29076]: password check failed for user (root) Jan 15 05:05:39 host sshd[29051]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 05:05:40 host sshd[29051]: Failed password for invalid user root from 1.20.154.11 port 47844 ssh2 Jan 15 05:05:47 host sshd[29125]: Invalid user tangbo from 45.225.160.66 port 60308 Jan 15 05:05:47 host sshd[29125]: input_userauth_request: invalid user tangbo [preauth] Jan 15 05:05:47 host sshd[29125]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:05:47 host sshd[29125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.160.66 Jan 15 05:05:50 host sshd[29125]: Failed password for invalid user tangbo from 45.225.160.66 port 60308 ssh2 Jan 15 05:05:50 host sshd[29125]: Received disconnect from 45.225.160.66 port 60308:11: Bye Bye [preauth] Jan 15 05:05:50 host sshd[29125]: Disconnected from 45.225.160.66 port 60308 [preauth] Jan 15 05:07:20 host sshd[29384]: Invalid user ashka from 45.225.160.66 port 36816 Jan 15 05:07:20 host sshd[29384]: input_userauth_request: invalid user ashka [preauth] Jan 15 05:07:20 host sshd[29384]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:07:20 host sshd[29384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.160.66 Jan 15 05:07:22 host sshd[29384]: Failed password for invalid user ashka from 45.225.160.66 port 36816 ssh2 Jan 15 05:07:22 host sshd[29384]: Received disconnect from 45.225.160.66 port 36816:11: Bye Bye [preauth] Jan 15 05:07:22 host sshd[29384]: Disconnected from 45.225.160.66 port 36816 [preauth] Jan 15 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 05:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 05:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=bonifacegroup user-2=wwwevmhonda user-3=straightcurve user-4=wwwletsstalkfood user-5=gifterman user-6=palco123 user-7=phmetals user-8=kottayamcalldriv user-9=wwwnexidigital user-10=mrsclean user-11=wwwkmaorg user-12=disposeat user-13=remysagr user-14=wwwkapin user-15=woodpeck user-16=vfmassets user-17=wwwtestugo user-18=shalinijames user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=wwwrmswll user-23=wwwresourcehunte user-24=keralaholi user-25=ugotscom user-26=cochintaxi user-27=wwwkaretakers user-28=dartsimp user-29=a2zgroup user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 05:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 05:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 15 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 15 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 15 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 15 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Jan 15 05:22:03 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 15 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 15 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 15 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 15 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 15 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 15 05:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Jan 15 05:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user straightcurve Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user gifterman Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user phmetals Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user disposeat Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user remysagr Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user vfmassets Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 15 05:22:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 15 05:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user pmcresources Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user travelboniface Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-dZj7SnSyx5yfKQ7M.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-dZj7SnSyx5yfKQ7M.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user dartsimp Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-xQ8IudICqJCd3hNl.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-xQ8IudICqJCd3hNl.wp-toolkit-identifier Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Jan 15 05:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 05:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ShGSh4QpycOsaBCy.~ Jan 15 05:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ShGSh4QpycOsaBCy.~' Jan 15 05:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ShGSh4QpycOsaBCy.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 05:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 05:22:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 05:22:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 05:22:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 05:22:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 05:22:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 05:22:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 05:22:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 05:22:48 host sshd[553]: Invalid user guest from 103.186.99.250 port 59934 Jan 15 05:22:48 host sshd[553]: input_userauth_request: invalid user guest [preauth] Jan 15 05:22:49 host sshd[553]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:22:49 host sshd[553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.186.99.250 Jan 15 05:22:50 host sshd[553]: Failed password for invalid user guest from 103.186.99.250 port 59934 ssh2 Jan 15 05:22:51 host sshd[553]: Received disconnect from 103.186.99.250 port 59934:11: Bye Bye [preauth] Jan 15 05:22:51 host sshd[553]: Disconnected from 103.186.99.250 port 59934 [preauth] Jan 15 05:23:31 host sshd[710]: Invalid user admin from 59.126.62.69 port 59058 Jan 15 05:23:31 host sshd[710]: input_userauth_request: invalid user admin [preauth] Jan 15 05:23:31 host sshd[710]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:23:31 host sshd[710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.62.69 Jan 15 05:23:33 host sshd[710]: Failed password for invalid user admin from 59.126.62.69 port 59058 ssh2 Jan 15 05:23:34 host sshd[710]: Connection reset by 59.126.62.69 port 59058 [preauth] Jan 15 05:25:01 host sshd[933]: Connection reset by 60.251.181.68 port 46164 [preauth] Jan 15 05:29:11 host sshd[1785]: Invalid user zhangguirong from 103.186.99.250 port 44863 Jan 15 05:29:11 host sshd[1785]: input_userauth_request: invalid user zhangguirong [preauth] Jan 15 05:29:11 host sshd[1785]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:29:11 host sshd[1785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.186.99.250 Jan 15 05:29:13 host sshd[1785]: Failed password for invalid user zhangguirong from 103.186.99.250 port 44863 ssh2 Jan 15 05:29:13 host sshd[1785]: Received disconnect from 103.186.99.250 port 44863:11: Bye Bye [preauth] Jan 15 05:29:13 host sshd[1785]: Disconnected from 103.186.99.250 port 44863 [preauth] Jan 15 05:30:47 host sshd[2122]: Invalid user buhaoniman from 103.186.99.250 port 39359 Jan 15 05:30:47 host sshd[2122]: input_userauth_request: invalid user buhaoniman [preauth] Jan 15 05:30:47 host sshd[2122]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:30:47 host sshd[2122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.186.99.250 Jan 15 05:30:49 host sshd[2127]: Invalid user pi from 85.138.99.147 port 56588 Jan 15 05:30:49 host sshd[2127]: input_userauth_request: invalid user pi [preauth] Jan 15 05:30:50 host sshd[2129]: Invalid user pi from 85.138.99.147 port 56598 Jan 15 05:30:50 host sshd[2129]: input_userauth_request: invalid user pi [preauth] Jan 15 05:30:50 host sshd[2122]: Failed password for invalid user buhaoniman from 103.186.99.250 port 39359 ssh2 Jan 15 05:30:50 host sshd[2127]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:30:50 host sshd[2127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.138.99.147 Jan 15 05:30:50 host sshd[2129]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:30:50 host sshd[2129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.138.99.147 Jan 15 05:30:50 host sshd[2122]: Received disconnect from 103.186.99.250 port 39359:11: Bye Bye [preauth] Jan 15 05:30:50 host sshd[2122]: Disconnected from 103.186.99.250 port 39359 [preauth] Jan 15 05:30:52 host sshd[2127]: Failed password for invalid user pi from 85.138.99.147 port 56588 ssh2 Jan 15 05:30:52 host sshd[2129]: Failed password for invalid user pi from 85.138.99.147 port 56598 ssh2 Jan 15 05:30:52 host sshd[2127]: Connection closed by 85.138.99.147 port 56588 [preauth] Jan 15 05:30:52 host sshd[2129]: Connection closed by 85.138.99.147 port 56598 [preauth] Jan 15 05:42:35 host sshd[3876]: Invalid user eg from 194.110.203.109 port 41972 Jan 15 05:42:35 host sshd[3876]: input_userauth_request: invalid user eg [preauth] Jan 15 05:42:35 host sshd[3876]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:42:35 host sshd[3876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 05:42:37 host sshd[3876]: Failed password for invalid user eg from 194.110.203.109 port 41972 ssh2 Jan 15 05:42:40 host sshd[3876]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:42:42 host sshd[3876]: Failed password for invalid user eg from 194.110.203.109 port 41972 ssh2 Jan 15 05:42:45 host sshd[3876]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:42:47 host sshd[3876]: Failed password for invalid user eg from 194.110.203.109 port 41972 ssh2 Jan 15 05:42:50 host sshd[3876]: Connection closed by 194.110.203.109 port 41972 [preauth] Jan 15 05:42:50 host sshd[3876]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 05:47:43 host sshd[4540]: User root from 125.228.163.111 not allowed because not listed in AllowUsers Jan 15 05:47:43 host sshd[4540]: input_userauth_request: invalid user root [preauth] Jan 15 05:47:43 host unix_chkpwd[4545]: password check failed for user (root) Jan 15 05:47:43 host sshd[4540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.163.111 user=root Jan 15 05:47:43 host sshd[4540]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 05:47:44 host sshd[4540]: Failed password for invalid user root from 125.228.163.111 port 44069 ssh2 Jan 15 05:47:46 host unix_chkpwd[4556]: password check failed for user (root) Jan 15 05:47:46 host sshd[4540]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 05:47:47 host sshd[4540]: Failed password for invalid user root from 125.228.163.111 port 44069 ssh2 Jan 15 05:47:48 host unix_chkpwd[4559]: password check failed for user (root) Jan 15 05:47:48 host sshd[4540]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 05:47:50 host sshd[4540]: Failed password for invalid user root from 125.228.163.111 port 44069 ssh2 Jan 15 05:47:51 host unix_chkpwd[4580]: password check failed for user (root) Jan 15 05:47:51 host sshd[4540]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 05:47:53 host sshd[4540]: Failed password for invalid user root from 125.228.163.111 port 44069 ssh2 Jan 15 05:50:00 host sshd[4808]: Invalid user zefeng from 159.223.62.234 port 39262 Jan 15 05:50:00 host sshd[4808]: input_userauth_request: invalid user zefeng [preauth] Jan 15 05:50:00 host sshd[4808]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:50:00 host sshd[4808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.62.234 Jan 15 05:50:02 host sshd[4808]: Failed password for invalid user zefeng from 159.223.62.234 port 39262 ssh2 Jan 15 05:50:02 host sshd[4808]: Received disconnect from 159.223.62.234 port 39262:11: Bye Bye [preauth] Jan 15 05:50:02 host sshd[4808]: Disconnected from 159.223.62.234 port 39262 [preauth] Jan 15 05:51:06 host sshd[5094]: Invalid user xw from 196.179.231.103 port 35170 Jan 15 05:51:06 host sshd[5094]: input_userauth_request: invalid user xw [preauth] Jan 15 05:51:06 host sshd[5094]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:51:06 host sshd[5094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.231.103 Jan 15 05:51:09 host sshd[5094]: Failed password for invalid user xw from 196.179.231.103 port 35170 ssh2 Jan 15 05:51:09 host sshd[5094]: Received disconnect from 196.179.231.103 port 35170:11: Bye Bye [preauth] Jan 15 05:51:09 host sshd[5094]: Disconnected from 196.179.231.103 port 35170 [preauth] Jan 15 05:52:39 host sshd[5275]: User root from 146.190.63.8 not allowed because not listed in AllowUsers Jan 15 05:52:39 host sshd[5275]: input_userauth_request: invalid user root [preauth] Jan 15 05:52:39 host unix_chkpwd[5278]: password check failed for user (root) Jan 15 05:52:39 host sshd[5275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.63.8 user=root Jan 15 05:52:39 host sshd[5275]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 05:52:41 host sshd[5275]: Failed password for invalid user root from 146.190.63.8 port 56272 ssh2 Jan 15 05:52:42 host sshd[5275]: Received disconnect from 146.190.63.8 port 56272:11: Bye Bye [preauth] Jan 15 05:52:42 host sshd[5275]: Disconnected from 146.190.63.8 port 56272 [preauth] Jan 15 05:53:20 host sshd[5354]: User root from 146.190.63.8 not allowed because not listed in AllowUsers Jan 15 05:53:20 host sshd[5354]: input_userauth_request: invalid user root [preauth] Jan 15 05:53:20 host unix_chkpwd[5357]: password check failed for user (root) Jan 15 05:53:20 host sshd[5354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.63.8 user=root Jan 15 05:53:20 host sshd[5354]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 05:53:22 host sshd[5354]: Failed password for invalid user root from 146.190.63.8 port 47730 ssh2 Jan 15 05:53:38 host sshd[5438]: Invalid user an from 188.166.252.132 port 47814 Jan 15 05:53:38 host sshd[5438]: input_userauth_request: invalid user an [preauth] Jan 15 05:53:38 host sshd[5438]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:53:38 host sshd[5438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.252.132 Jan 15 05:53:39 host sshd[5438]: Failed password for invalid user an from 188.166.252.132 port 47814 ssh2 Jan 15 05:53:40 host sshd[5438]: Received disconnect from 188.166.252.132 port 47814:11: Bye Bye [preauth] Jan 15 05:53:40 host sshd[5438]: Disconnected from 188.166.252.132 port 47814 [preauth] Jan 15 05:54:06 host sshd[5496]: Invalid user sparky from 192.241.157.126 port 33904 Jan 15 05:54:06 host sshd[5496]: input_userauth_request: invalid user sparky [preauth] Jan 15 05:54:06 host sshd[5496]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:54:06 host sshd[5496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.157.126 Jan 15 05:54:09 host sshd[5496]: Failed password for invalid user sparky from 192.241.157.126 port 33904 ssh2 Jan 15 05:54:09 host sshd[5496]: Received disconnect from 192.241.157.126 port 33904:11: Bye Bye [preauth] Jan 15 05:54:09 host sshd[5496]: Disconnected from 192.241.157.126 port 33904 [preauth] Jan 15 05:54:23 host sshd[5515]: Invalid user mingming from 187.217.117.3 port 36304 Jan 15 05:54:23 host sshd[5515]: input_userauth_request: invalid user mingming [preauth] Jan 15 05:54:23 host sshd[5515]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:54:23 host sshd[5515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.217.117.3 Jan 15 05:54:24 host sshd[5515]: Failed password for invalid user mingming from 187.217.117.3 port 36304 ssh2 Jan 15 05:54:24 host sshd[5515]: Received disconnect from 187.217.117.3 port 36304:11: Bye Bye [preauth] Jan 15 05:54:24 host sshd[5515]: Disconnected from 187.217.117.3 port 36304 [preauth] Jan 15 05:56:10 host sshd[5853]: Invalid user zhjin from 196.179.231.103 port 59646 Jan 15 05:56:10 host sshd[5853]: input_userauth_request: invalid user zhjin [preauth] Jan 15 05:56:10 host sshd[5853]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:56:10 host sshd[5853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.231.103 Jan 15 05:56:12 host sshd[5853]: Failed password for invalid user zhjin from 196.179.231.103 port 59646 ssh2 Jan 15 05:56:12 host sshd[5853]: Received disconnect from 196.179.231.103 port 59646:11: Bye Bye [preauth] Jan 15 05:56:12 host sshd[5853]: Disconnected from 196.179.231.103 port 59646 [preauth] Jan 15 05:56:21 host sshd[5871]: Invalid user an from 159.223.62.234 port 42576 Jan 15 05:56:21 host sshd[5871]: input_userauth_request: invalid user an [preauth] Jan 15 05:56:21 host sshd[5871]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:56:21 host sshd[5871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.62.234 Jan 15 05:56:23 host sshd[5871]: Failed password for invalid user an from 159.223.62.234 port 42576 ssh2 Jan 15 05:56:23 host sshd[5871]: Received disconnect from 159.223.62.234 port 42576:11: Bye Bye [preauth] Jan 15 05:56:23 host sshd[5871]: Disconnected from 159.223.62.234 port 42576 [preauth] Jan 15 05:57:24 host sshd[5978]: Invalid user cvfinal from 196.179.231.103 port 58186 Jan 15 05:57:24 host sshd[5978]: input_userauth_request: invalid user cvfinal [preauth] Jan 15 05:57:24 host sshd[5978]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:57:24 host sshd[5978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.231.103 Jan 15 05:57:27 host sshd[5978]: Failed password for invalid user cvfinal from 196.179.231.103 port 58186 ssh2 Jan 15 05:57:43 host sshd[6049]: Invalid user woaimeinv from 188.166.252.132 port 59704 Jan 15 05:57:43 host sshd[6049]: input_userauth_request: invalid user woaimeinv [preauth] Jan 15 05:57:43 host sshd[6049]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:57:43 host sshd[6049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.252.132 Jan 15 05:57:43 host sshd[6051]: Invalid user tingtingchen from 159.223.62.234 port 39920 Jan 15 05:57:43 host sshd[6051]: input_userauth_request: invalid user tingtingchen [preauth] Jan 15 05:57:43 host sshd[6051]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:57:43 host sshd[6051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.62.234 Jan 15 05:57:45 host sshd[6049]: Failed password for invalid user woaimeinv from 188.166.252.132 port 59704 ssh2 Jan 15 05:57:45 host sshd[6049]: Received disconnect from 188.166.252.132 port 59704:11: Bye Bye [preauth] Jan 15 05:57:45 host sshd[6049]: Disconnected from 188.166.252.132 port 59704 [preauth] Jan 15 05:57:46 host sshd[6051]: Failed password for invalid user tingtingchen from 159.223.62.234 port 39920 ssh2 Jan 15 05:57:46 host sshd[6051]: Received disconnect from 159.223.62.234 port 39920:11: Bye Bye [preauth] Jan 15 05:57:46 host sshd[6051]: Disconnected from 159.223.62.234 port 39920 [preauth] Jan 15 05:57:59 host sshd[6097]: Invalid user zhangyue from 192.241.157.126 port 44948 Jan 15 05:57:59 host sshd[6097]: input_userauth_request: invalid user zhangyue [preauth] Jan 15 05:57:59 host sshd[6097]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:57:59 host sshd[6097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.157.126 Jan 15 05:58:01 host sshd[6097]: Failed password for invalid user zhangyue from 192.241.157.126 port 44948 ssh2 Jan 15 05:58:02 host sshd[6097]: Received disconnect from 192.241.157.126 port 44948:11: Bye Bye [preauth] Jan 15 05:58:02 host sshd[6097]: Disconnected from 192.241.157.126 port 44948 [preauth] Jan 15 05:58:46 host sshd[6186]: Invalid user an from 187.217.117.3 port 41028 Jan 15 05:58:46 host sshd[6186]: input_userauth_request: invalid user an [preauth] Jan 15 05:58:46 host sshd[6186]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:58:46 host sshd[6186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.217.117.3 Jan 15 05:58:48 host sshd[6186]: Failed password for invalid user an from 187.217.117.3 port 41028 ssh2 Jan 15 05:58:49 host sshd[6186]: Received disconnect from 187.217.117.3 port 41028:11: Bye Bye [preauth] Jan 15 05:58:49 host sshd[6186]: Disconnected from 187.217.117.3 port 41028 [preauth] Jan 15 05:59:02 host sshd[6219]: Invalid user mingming from 188.166.252.132 port 52982 Jan 15 05:59:02 host sshd[6219]: input_userauth_request: invalid user mingming [preauth] Jan 15 05:59:02 host sshd[6219]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:59:02 host sshd[6219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.252.132 Jan 15 05:59:04 host sshd[6219]: Failed password for invalid user mingming from 188.166.252.132 port 52982 ssh2 Jan 15 05:59:04 host sshd[6219]: Received disconnect from 188.166.252.132 port 52982:11: Bye Bye [preauth] Jan 15 05:59:04 host sshd[6219]: Disconnected from 188.166.252.132 port 52982 [preauth] Jan 15 05:59:09 host sshd[6256]: Invalid user hari from 192.241.157.126 port 39572 Jan 15 05:59:09 host sshd[6256]: input_userauth_request: invalid user hari [preauth] Jan 15 05:59:09 host sshd[6256]: pam_unix(sshd:auth): check pass; user unknown Jan 15 05:59:09 host sshd[6256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.157.126 Jan 15 05:59:11 host sshd[6256]: Failed password for invalid user hari from 192.241.157.126 port 39572 ssh2 Jan 15 05:59:11 host sshd[6256]: Received disconnect from 192.241.157.126 port 39572:11: Bye Bye [preauth] Jan 15 05:59:11 host sshd[6256]: Disconnected from 192.241.157.126 port 39572 [preauth] Jan 15 06:01:02 host sshd[6636]: Invalid user jesulayomi from 187.217.117.3 port 33702 Jan 15 06:01:02 host sshd[6636]: input_userauth_request: invalid user jesulayomi [preauth] Jan 15 06:01:02 host sshd[6636]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:01:02 host sshd[6636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.217.117.3 Jan 15 06:01:04 host sshd[6636]: Failed password for invalid user jesulayomi from 187.217.117.3 port 33702 ssh2 Jan 15 06:01:05 host sshd[6636]: Received disconnect from 187.217.117.3 port 33702:11: Bye Bye [preauth] Jan 15 06:01:05 host sshd[6636]: Disconnected from 187.217.117.3 port 33702 [preauth] Jan 15 06:21:29 host sshd[9320]: Invalid user pi from 201.110.150.212 port 51133 Jan 15 06:21:29 host sshd[9320]: input_userauth_request: invalid user pi [preauth] Jan 15 06:21:29 host sshd[9320]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:21:29 host sshd[9320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.110.150.212 Jan 15 06:21:30 host sshd[9320]: Failed password for invalid user pi from 201.110.150.212 port 51133 ssh2 Jan 15 06:21:32 host sshd[9320]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:21:34 host sshd[9320]: Failed password for invalid user pi from 201.110.150.212 port 51133 ssh2 Jan 15 06:21:35 host sshd[9320]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:21:37 host sshd[9320]: Failed password for invalid user pi from 201.110.150.212 port 51133 ssh2 Jan 15 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 06:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 06:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 06:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 06:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 06:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 06:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 06:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 06:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 06:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 06:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 06:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 06:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 06:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=wwwletsstalkfood user-4=straightcurve user-5=kottayamcalldriv user-6=phmetals user-7=palco123 user-8=gifterman user-9=wwwnexidigital user-10=mrsclean user-11=disposeat user-12=remysagr user-13=wwwkmaorg user-14=wwwkapin user-15=woodpeck user-16=shalinijames user-17=wwwtestugo user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=wwwresourcehunte user-24=keralaholi user-25=wwwrmswll user-26=cochintaxi user-27=wwwkaretakers user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 06:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 06:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 06:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OKTooq3lVoKvvSbG.~ Jan 15 06:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OKTooq3lVoKvvSbG.~' Jan 15 06:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OKTooq3lVoKvvSbG.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 06:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 06:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 06:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 06:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 06:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 06:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 06:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 06:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 06:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 06:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 06:22:38 host sshd[9652]: Connection closed by 172.104.11.34 port 64190 [preauth] Jan 15 06:22:39 host sshd[9658]: Connection closed by 172.104.11.34 port 64196 [preauth] Jan 15 06:22:41 host sshd[9662]: Connection closed by 172.104.11.34 port 64204 [preauth] Jan 15 06:31:07 host sshd[10819]: Did not receive identification string from 197.227.21.70 port 45426 Jan 15 06:31:08 host sshd[10821]: User root from 197.227.21.70 not allowed because not listed in AllowUsers Jan 15 06:31:08 host sshd[10821]: input_userauth_request: invalid user root [preauth] Jan 15 06:31:08 host sshd[10820]: Invalid user halo from 197.227.21.70 port 45494 Jan 15 06:31:08 host sshd[10820]: input_userauth_request: invalid user halo [preauth] Jan 15 06:31:08 host sshd[10825]: Invalid user steam from 197.227.21.70 port 45546 Jan 15 06:31:08 host sshd[10824]: Invalid user ansible from 197.227.21.70 port 45536 Jan 15 06:31:08 host sshd[10825]: input_userauth_request: invalid user steam [preauth] Jan 15 06:31:08 host sshd[10824]: input_userauth_request: invalid user ansible [preauth] Jan 15 06:31:08 host sshd[10833]: Invalid user ftpuser from 197.227.21.70 port 45474 Jan 15 06:31:08 host sshd[10833]: input_userauth_request: invalid user ftpuser [preauth] Jan 15 06:31:08 host sshd[10826]: Invalid user steam from 197.227.21.70 port 45552 Jan 15 06:31:08 host sshd[10826]: input_userauth_request: invalid user steam [preauth] Jan 15 06:31:08 host sshd[10832]: User root from 197.227.21.70 not allowed because not listed in AllowUsers Jan 15 06:31:08 host sshd[10832]: input_userauth_request: invalid user root [preauth] Jan 15 06:31:08 host sshd[10831]: User root from 197.227.21.70 not allowed because not listed in AllowUsers Jan 15 06:31:08 host sshd[10831]: input_userauth_request: invalid user root [preauth] Jan 15 06:31:08 host sshd[10835]: Invalid user user from 197.227.21.70 port 45550 Jan 15 06:31:08 host sshd[10828]: Invalid user esuser from 197.227.21.70 port 45558 Jan 15 06:31:08 host sshd[10838]: User root from 197.227.21.70 not allowed because not listed in AllowUsers Jan 15 06:31:08 host sshd[10828]: input_userauth_request: invalid user esuser [preauth] Jan 15 06:31:08 host sshd[10838]: input_userauth_request: invalid user root [preauth] Jan 15 06:31:08 host sshd[10830]: User root from 197.227.21.70 not allowed because not listed in AllowUsers Jan 15 06:31:08 host sshd[10830]: input_userauth_request: invalid user root [preauth] Jan 15 06:31:08 host sshd[10827]: User root from 197.227.21.70 not allowed because not listed in AllowUsers Jan 15 06:31:08 host sshd[10836]: User root from 197.227.21.70 not allowed because not listed in AllowUsers Jan 15 06:31:08 host sshd[10837]: Invalid user testuser from 197.227.21.70 port 45526 Jan 15 06:31:08 host sshd[10827]: input_userauth_request: invalid user root [preauth] Jan 15 06:31:08 host sshd[10836]: input_userauth_request: invalid user root [preauth] Jan 15 06:31:08 host sshd[10837]: input_userauth_request: invalid user testuser [preauth] Jan 15 06:31:08 host sshd[10835]: input_userauth_request: invalid user user [preauth] Jan 15 06:31:08 host sshd[10834]: Invalid user dmdba from 197.227.21.70 port 45522 Jan 15 06:31:08 host sshd[10844]: Invalid user admin from 197.227.21.70 port 45512 Jan 15 06:31:08 host sshd[10844]: input_userauth_request: invalid user admin [preauth] Jan 15 06:31:08 host sshd[10834]: input_userauth_request: invalid user dmdba [preauth] Jan 15 06:31:08 host sshd[10842]: Invalid user ftpuser from 197.227.21.70 port 45520 Jan 15 06:31:08 host sshd[10842]: input_userauth_request: invalid user ftpuser [preauth] Jan 15 06:31:08 host sshd[10843]: User root from 197.227.21.70 not allowed because not listed in AllowUsers Jan 15 06:31:08 host sshd[10839]: User root from 197.227.21.70 not allowed because not listed in AllowUsers Jan 15 06:31:08 host sshd[10843]: input_userauth_request: invalid user root [preauth] Jan 15 06:31:08 host sshd[10839]: input_userauth_request: invalid user root [preauth] Jan 15 06:31:08 host sshd[10841]: User root from 197.227.21.70 not allowed because not listed in AllowUsers Jan 15 06:31:08 host sshd[10841]: input_userauth_request: invalid user root [preauth] Jan 15 06:31:08 host sshd[10840]: Invalid user admin from 197.227.21.70 port 45500 Jan 15 06:31:08 host sshd[10840]: input_userauth_request: invalid user admin [preauth] Jan 15 06:31:08 host sshd[10847]: Invalid user admin from 197.227.21.70 port 45492 Jan 15 06:31:08 host sshd[10847]: input_userauth_request: invalid user admin [preauth] Jan 15 06:31:08 host sshd[10829]: Invalid user teamspeak from 197.227.21.70 port 45508 Jan 15 06:31:08 host sshd[10829]: input_userauth_request: invalid user teamspeak [preauth] Jan 15 06:31:08 host sshd[10820]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:31:08 host sshd[10820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 15 06:31:08 host unix_chkpwd[10871]: password check failed for user (root) Jan 15 06:31:08 host sshd[10821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 user=root Jan 15 06:31:08 host sshd[10821]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 06:31:08 host sshd[10825]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:31:08 host sshd[10825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 15 06:31:08 host sshd[10824]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:31:08 host sshd[10824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 15 06:31:08 host sshd[10826]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:31:08 host sshd[10826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 15 06:31:08 host sshd[10833]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:31:08 host sshd[10833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 15 06:31:08 host sshd[10828]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:31:08 host sshd[10828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 15 06:31:08 host sshd[10835]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:31:08 host sshd[10835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 15 06:31:08 host sshd[10837]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:31:08 host sshd[10837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 15 06:31:08 host sshd[10834]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:31:08 host sshd[10834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 15 06:31:08 host sshd[10844]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:31:08 host sshd[10844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 15 06:31:08 host unix_chkpwd[10872]: password check failed for user (root) Jan 15 06:31:08 host sshd[10842]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:31:08 host sshd[10842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 15 06:31:08 host sshd[10832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 user=root Jan 15 06:31:08 host sshd[10832]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 06:31:08 host unix_chkpwd[10873]: password check failed for user (root) Jan 15 06:31:08 host sshd[10831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 user=root Jan 15 06:31:08 host sshd[10831]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 06:31:08 host unix_chkpwd[10874]: password check failed for user (root) Jan 15 06:31:08 host sshd[10840]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:31:08 host sshd[10840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 15 06:31:08 host sshd[10847]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:31:08 host sshd[10847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 15 06:31:08 host sshd[10827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 user=root Jan 15 06:31:08 host sshd[10827]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 06:31:08 host unix_chkpwd[10877]: password check failed for user (root) Jan 15 06:31:08 host sshd[10838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 user=root Jan 15 06:31:08 host sshd[10838]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 06:31:08 host unix_chkpwd[10875]: password check failed for user (root) Jan 15 06:31:08 host sshd[10830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 user=root Jan 15 06:31:08 host sshd[10830]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 06:31:08 host unix_chkpwd[10876]: password check failed for user (root) Jan 15 06:31:08 host sshd[10836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 user=root Jan 15 06:31:08 host sshd[10836]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 06:31:08 host sshd[10829]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:31:08 host sshd[10829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 15 06:31:08 host unix_chkpwd[10880]: password check failed for user (root) Jan 15 06:31:08 host sshd[10841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 user=root Jan 15 06:31:08 host sshd[10841]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 06:31:08 host unix_chkpwd[10879]: password check failed for user (root) Jan 15 06:31:08 host sshd[10843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 user=root Jan 15 06:31:08 host sshd[10843]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 06:31:08 host unix_chkpwd[10878]: password check failed for user (root) Jan 15 06:31:08 host sshd[10839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 user=root Jan 15 06:31:08 host sshd[10839]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 06:31:09 host sshd[10869]: Invalid user ansadmin from 197.227.21.70 port 45554 Jan 15 06:31:09 host sshd[10869]: input_userauth_request: invalid user ansadmin [preauth] Jan 15 06:31:09 host sshd[10869]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:31:09 host sshd[10869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 15 06:31:10 host sshd[10820]: Failed password for invalid user halo from 197.227.21.70 port 45494 ssh2 Jan 15 06:31:10 host sshd[10821]: Failed password for invalid user root from 197.227.21.70 port 45540 ssh2 Jan 15 06:31:10 host sshd[10825]: Failed password for invalid user steam from 197.227.21.70 port 45546 ssh2 Jan 15 06:31:10 host sshd[10824]: Failed password for invalid user ansible from 197.227.21.70 port 45536 ssh2 Jan 15 06:31:10 host sshd[10826]: Failed password for invalid user steam from 197.227.21.70 port 45552 ssh2 Jan 15 06:31:10 host sshd[10833]: Failed password for invalid user ftpuser from 197.227.21.70 port 45474 ssh2 Jan 15 06:31:10 host sshd[10828]: Failed password for invalid user esuser from 197.227.21.70 port 45558 ssh2 Jan 15 06:31:10 host sshd[10835]: Failed password for invalid user user from 197.227.21.70 port 45550 ssh2 Jan 15 06:31:10 host sshd[10837]: Failed password for invalid user testuser from 197.227.21.70 port 45526 ssh2 Jan 15 06:31:10 host sshd[10834]: Failed password for invalid user dmdba from 197.227.21.70 port 45522 ssh2 Jan 15 06:31:10 host sshd[10844]: Failed password for invalid user admin from 197.227.21.70 port 45512 ssh2 Jan 15 06:31:10 host sshd[10842]: Failed password for invalid user ftpuser from 197.227.21.70 port 45520 ssh2 Jan 15 06:31:10 host sshd[10832]: Failed password for invalid user root from 197.227.21.70 port 45524 ssh2 Jan 15 06:31:10 host sshd[10831]: Failed password for invalid user root from 197.227.21.70 port 45504 ssh2 Jan 15 06:31:10 host sshd[10840]: Failed password for invalid user admin from 197.227.21.70 port 45500 ssh2 Jan 15 06:31:10 host sshd[10847]: Failed password for invalid user admin from 197.227.21.70 port 45492 ssh2 Jan 15 06:31:10 host sshd[10827]: Failed password for invalid user root from 197.227.21.70 port 45530 ssh2 Jan 15 06:31:10 host sshd[10838]: Failed password for invalid user root from 197.227.21.70 port 45542 ssh2 Jan 15 06:31:10 host sshd[10830]: Failed password for invalid user root from 197.227.21.70 port 45488 ssh2 Jan 15 06:31:10 host sshd[10836]: Failed password for invalid user root from 197.227.21.70 port 45532 ssh2 Jan 15 06:31:10 host sshd[10820]: Connection closed by 197.227.21.70 port 45494 [preauth] Jan 15 06:31:10 host sshd[10829]: Failed password for invalid user teamspeak from 197.227.21.70 port 45508 ssh2 Jan 15 06:31:10 host sshd[10841]: Failed password for invalid user root from 197.227.21.70 port 45556 ssh2 Jan 15 06:31:10 host sshd[10821]: Connection closed by 197.227.21.70 port 45540 [preauth] Jan 15 06:31:10 host sshd[10843]: Failed password for invalid user root from 197.227.21.70 port 45506 ssh2 Jan 15 06:31:10 host sshd[10839]: Failed password for invalid user root from 197.227.21.70 port 45476 ssh2 Jan 15 06:31:10 host sshd[10825]: Connection closed by 197.227.21.70 port 45546 [preauth] Jan 15 06:31:10 host sshd[10824]: Connection closed by 197.227.21.70 port 45536 [preauth] Jan 15 06:31:10 host sshd[10826]: Connection closed by 197.227.21.70 port 45552 [preauth] Jan 15 06:31:10 host sshd[10833]: Connection closed by 197.227.21.70 port 45474 [preauth] Jan 15 06:31:10 host sshd[10828]: Connection closed by 197.227.21.70 port 45558 [preauth] Jan 15 06:31:10 host sshd[10835]: Connection closed by 197.227.21.70 port 45550 [preauth] Jan 15 06:31:10 host sshd[10837]: Connection closed by 197.227.21.70 port 45526 [preauth] Jan 15 06:31:10 host sshd[10834]: Connection closed by 197.227.21.70 port 45522 [preauth] Jan 15 06:31:10 host sshd[10844]: Connection closed by 197.227.21.70 port 45512 [preauth] Jan 15 06:31:10 host sshd[10832]: Connection closed by 197.227.21.70 port 45524 [preauth] Jan 15 06:31:10 host sshd[10831]: Connection closed by 197.227.21.70 port 45504 [preauth] Jan 15 06:31:10 host sshd[10842]: Connection closed by 197.227.21.70 port 45520 [preauth] Jan 15 06:31:10 host sshd[10827]: Connection closed by 197.227.21.70 port 45530 [preauth] Jan 15 06:31:10 host sshd[10838]: Connection closed by 197.227.21.70 port 45542 [preauth] Jan 15 06:31:10 host sshd[10840]: Connection closed by 197.227.21.70 port 45500 [preauth] Jan 15 06:31:10 host sshd[10847]: Connection closed by 197.227.21.70 port 45492 [preauth] Jan 15 06:31:10 host sshd[10830]: Connection closed by 197.227.21.70 port 45488 [preauth] Jan 15 06:31:10 host sshd[10836]: Connection closed by 197.227.21.70 port 45532 [preauth] Jan 15 06:31:10 host sshd[10829]: Connection closed by 197.227.21.70 port 45508 [preauth] Jan 15 06:31:10 host sshd[10841]: Connection closed by 197.227.21.70 port 45556 [preauth] Jan 15 06:31:10 host sshd[10843]: Connection closed by 197.227.21.70 port 45506 [preauth] Jan 15 06:31:10 host sshd[10839]: Connection closed by 197.227.21.70 port 45476 [preauth] Jan 15 06:31:11 host sshd[10884]: Invalid user ftpuser from 197.227.21.70 port 45534 Jan 15 06:31:11 host sshd[10884]: input_userauth_request: invalid user ftpuser [preauth] Jan 15 06:31:11 host sshd[10883]: Invalid user admin from 197.227.21.70 port 45478 Jan 15 06:31:11 host sshd[10883]: input_userauth_request: invalid user admin [preauth] Jan 15 06:31:11 host sshd[10885]: User centos from 197.227.21.70 not allowed because not listed in AllowUsers Jan 15 06:31:11 host sshd[10885]: input_userauth_request: invalid user centos [preauth] Jan 15 06:31:11 host sshd[10884]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:31:11 host sshd[10884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 15 06:31:11 host sshd[10883]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:31:11 host sshd[10883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 15 06:31:11 host unix_chkpwd[10890]: password check failed for user (centos) Jan 15 06:31:11 host sshd[10885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 user=centos Jan 15 06:31:11 host sshd[10869]: Failed password for invalid user ansadmin from 197.227.21.70 port 45554 ssh2 Jan 15 06:31:11 host sshd[10869]: Connection closed by 197.227.21.70 port 45554 [preauth] Jan 15 06:31:13 host sshd[10884]: Failed password for invalid user ftpuser from 197.227.21.70 port 45534 ssh2 Jan 15 06:31:13 host sshd[10883]: Failed password for invalid user admin from 197.227.21.70 port 45478 ssh2 Jan 15 06:31:13 host sshd[10885]: Failed password for invalid user centos from 197.227.21.70 port 45496 ssh2 Jan 15 06:36:04 host sshd[11556]: Invalid user admin from 189.226.3.89 port 11371 Jan 15 06:36:04 host sshd[11556]: input_userauth_request: invalid user admin [preauth] Jan 15 06:36:04 host sshd[11556]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:36:04 host sshd[11556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.226.3.89 Jan 15 06:36:06 host sshd[11556]: Failed password for invalid user admin from 189.226.3.89 port 11371 ssh2 Jan 15 06:36:07 host sshd[11556]: Failed password for invalid user admin from 189.226.3.89 port 11371 ssh2 Jan 15 06:36:08 host sshd[11556]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:36:10 host sshd[11556]: Failed password for invalid user admin from 189.226.3.89 port 11371 ssh2 Jan 15 06:36:11 host sshd[11556]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:36:13 host sshd[11556]: Failed password for invalid user admin from 189.226.3.89 port 11371 ssh2 Jan 15 06:36:13 host sshd[11556]: Connection reset by 189.226.3.89 port 11371 [preauth] Jan 15 06:36:13 host sshd[11556]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.226.3.89 Jan 15 06:47:20 host sshd[13007]: Invalid user vadmin from 122.116.241.113 port 40309 Jan 15 06:47:20 host sshd[13007]: input_userauth_request: invalid user vadmin [preauth] Jan 15 06:47:20 host sshd[13007]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:47:20 host sshd[13007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.241.113 Jan 15 06:47:22 host sshd[13007]: Failed password for invalid user vadmin from 122.116.241.113 port 40309 ssh2 Jan 15 06:47:25 host sshd[13007]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:47:26 host sshd[13007]: Failed password for invalid user vadmin from 122.116.241.113 port 40309 ssh2 Jan 15 06:47:27 host sshd[13007]: Connection closed by 122.116.241.113 port 40309 [preauth] Jan 15 06:47:27 host sshd[13007]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.241.113 Jan 15 06:50:09 host sshd[13334]: Invalid user liuming from 23.242.51.26 port 58840 Jan 15 06:50:09 host sshd[13334]: input_userauth_request: invalid user liuming [preauth] Jan 15 06:50:09 host sshd[13334]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:50:09 host sshd[13334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.242.51.26 Jan 15 06:50:11 host sshd[13334]: Failed password for invalid user liuming from 23.242.51.26 port 58840 ssh2 Jan 15 06:50:12 host sshd[13334]: Received disconnect from 23.242.51.26 port 58840:11: Bye Bye [preauth] Jan 15 06:50:12 host sshd[13334]: Disconnected from 23.242.51.26 port 58840 [preauth] Jan 15 06:52:06 host sshd[13586]: Invalid user anthony from 43.156.114.14 port 59622 Jan 15 06:52:06 host sshd[13586]: input_userauth_request: invalid user anthony [preauth] Jan 15 06:52:06 host sshd[13586]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:52:06 host sshd[13586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.114.14 Jan 15 06:52:07 host sshd[13586]: Failed password for invalid user anthony from 43.156.114.14 port 59622 ssh2 Jan 15 06:52:07 host sshd[13586]: Received disconnect from 43.156.114.14 port 59622:11: Bye Bye [preauth] Jan 15 06:52:07 host sshd[13586]: Disconnected from 43.156.114.14 port 59622 [preauth] Jan 15 06:52:23 host sshd[13632]: Invalid user sunyanzi from 206.189.219.241 port 38898 Jan 15 06:52:23 host sshd[13632]: input_userauth_request: invalid user sunyanzi [preauth] Jan 15 06:52:23 host sshd[13632]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:52:23 host sshd[13632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.219.241 Jan 15 06:52:25 host sshd[13632]: Failed password for invalid user sunyanzi from 206.189.219.241 port 38898 ssh2 Jan 15 06:52:26 host sshd[13632]: Received disconnect from 206.189.219.241 port 38898:11: Bye Bye [preauth] Jan 15 06:52:26 host sshd[13632]: Disconnected from 206.189.219.241 port 38898 [preauth] Jan 15 06:53:53 host sshd[13900]: Invalid user liuming from 207.249.96.145 port 47830 Jan 15 06:53:53 host sshd[13900]: input_userauth_request: invalid user liuming [preauth] Jan 15 06:53:53 host sshd[13900]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:53:53 host sshd[13900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.249.96.145 Jan 15 06:53:55 host sshd[13900]: Failed password for invalid user liuming from 207.249.96.145 port 47830 ssh2 Jan 15 06:53:56 host sshd[13900]: Received disconnect from 207.249.96.145 port 47830:11: Bye Bye [preauth] Jan 15 06:53:56 host sshd[13900]: Disconnected from 207.249.96.145 port 47830 [preauth] Jan 15 06:54:05 host sshd[13926]: Invalid user liuming from 128.199.95.60 port 46886 Jan 15 06:54:05 host sshd[13926]: input_userauth_request: invalid user liuming [preauth] Jan 15 06:54:05 host sshd[13926]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:54:05 host sshd[13926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60 Jan 15 06:54:07 host sshd[13926]: Failed password for invalid user liuming from 128.199.95.60 port 46886 ssh2 Jan 15 06:54:07 host sshd[13926]: Received disconnect from 128.199.95.60 port 46886:11: Bye Bye [preauth] Jan 15 06:54:07 host sshd[13926]: Disconnected from 128.199.95.60 port 46886 [preauth] Jan 15 06:55:00 host sshd[14026]: Invalid user fmireshg from 23.242.51.26 port 50670 Jan 15 06:55:00 host sshd[14026]: input_userauth_request: invalid user fmireshg [preauth] Jan 15 06:55:00 host sshd[14026]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:55:00 host sshd[14026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.242.51.26 Jan 15 06:55:02 host sshd[14026]: Failed password for invalid user fmireshg from 23.242.51.26 port 50670 ssh2 Jan 15 06:55:02 host sshd[14026]: Received disconnect from 23.242.51.26 port 50670:11: Bye Bye [preauth] Jan 15 06:55:02 host sshd[14026]: Disconnected from 23.242.51.26 port 50670 [preauth] Jan 15 06:56:10 host sshd[14203]: Invalid user shanghai from 43.156.114.14 port 53156 Jan 15 06:56:10 host sshd[14203]: input_userauth_request: invalid user shanghai [preauth] Jan 15 06:56:10 host sshd[14203]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:56:10 host sshd[14203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.114.14 Jan 15 06:56:12 host sshd[14203]: Failed password for invalid user shanghai from 43.156.114.14 port 53156 ssh2 Jan 15 06:56:12 host sshd[14203]: Received disconnect from 43.156.114.14 port 53156:11: Bye Bye [preauth] Jan 15 06:56:12 host sshd[14203]: Disconnected from 43.156.114.14 port 53156 [preauth] Jan 15 06:56:16 host sshd[14213]: Invalid user telnet from 125.137.36.18 port 63277 Jan 15 06:56:16 host sshd[14213]: input_userauth_request: invalid user telnet [preauth] Jan 15 06:56:16 host sshd[14213]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:56:16 host sshd[14213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.137.36.18 Jan 15 06:56:16 host sshd[14216]: Invalid user huanghua from 206.189.219.241 port 50908 Jan 15 06:56:16 host sshd[14216]: input_userauth_request: invalid user huanghua [preauth] Jan 15 06:56:16 host sshd[14216]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:56:16 host sshd[14216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.219.241 Jan 15 06:56:17 host sshd[14218]: Invalid user chaochao from 23.242.51.26 port 39804 Jan 15 06:56:17 host sshd[14218]: input_userauth_request: invalid user chaochao [preauth] Jan 15 06:56:17 host sshd[14218]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:56:17 host sshd[14218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.242.51.26 Jan 15 06:56:17 host sshd[14213]: Failed password for invalid user telnet from 125.137.36.18 port 63277 ssh2 Jan 15 06:56:17 host sshd[14216]: Failed password for invalid user huanghua from 206.189.219.241 port 50908 ssh2 Jan 15 06:56:18 host sshd[14213]: Connection reset by 125.137.36.18 port 63277 [preauth] Jan 15 06:56:18 host sshd[14216]: Received disconnect from 206.189.219.241 port 50908:11: Bye Bye [preauth] Jan 15 06:56:18 host sshd[14216]: Disconnected from 206.189.219.241 port 50908 [preauth] Jan 15 06:56:19 host sshd[14218]: Failed password for invalid user chaochao from 23.242.51.26 port 39804 ssh2 Jan 15 06:56:29 host sshd[14273]: Invalid user liyuhua from 128.199.95.60 port 47100 Jan 15 06:56:29 host sshd[14273]: input_userauth_request: invalid user liyuhua [preauth] Jan 15 06:56:29 host sshd[14273]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:56:29 host sshd[14273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60 Jan 15 06:56:31 host sshd[14273]: Failed password for invalid user liyuhua from 128.199.95.60 port 47100 ssh2 Jan 15 06:56:31 host sshd[14273]: Received disconnect from 128.199.95.60 port 47100:11: Bye Bye [preauth] Jan 15 06:56:31 host sshd[14273]: Disconnected from 128.199.95.60 port 47100 [preauth] Jan 15 06:56:38 host sshd[14306]: Invalid user nilusha from 207.249.96.145 port 39604 Jan 15 06:56:38 host sshd[14306]: input_userauth_request: invalid user nilusha [preauth] Jan 15 06:56:38 host sshd[14306]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:56:38 host sshd[14306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.249.96.145 Jan 15 06:56:39 host sshd[14306]: Failed password for invalid user nilusha from 207.249.96.145 port 39604 ssh2 Jan 15 06:56:40 host sshd[14306]: Received disconnect from 207.249.96.145 port 39604:11: Bye Bye [preauth] Jan 15 06:56:40 host sshd[14306]: Disconnected from 207.249.96.145 port 39604 [preauth] Jan 15 06:57:26 host sshd[14386]: Invalid user dingbo from 43.156.114.14 port 39130 Jan 15 06:57:26 host sshd[14386]: input_userauth_request: invalid user dingbo [preauth] Jan 15 06:57:26 host sshd[14386]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:57:26 host sshd[14386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.114.14 Jan 15 06:57:27 host sshd[14386]: Failed password for invalid user dingbo from 43.156.114.14 port 39130 ssh2 Jan 15 06:57:27 host sshd[14386]: Received disconnect from 43.156.114.14 port 39130:11: Bye Bye [preauth] Jan 15 06:57:27 host sshd[14386]: Disconnected from 43.156.114.14 port 39130 [preauth] Jan 15 06:57:44 host sshd[14458]: Invalid user chaochao from 207.249.96.145 port 43504 Jan 15 06:57:44 host sshd[14458]: input_userauth_request: invalid user chaochao [preauth] Jan 15 06:57:44 host sshd[14458]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:57:44 host sshd[14458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.249.96.145 Jan 15 06:57:46 host sshd[14458]: Failed password for invalid user chaochao from 207.249.96.145 port 43504 ssh2 Jan 15 06:57:46 host sshd[14458]: Received disconnect from 207.249.96.145 port 43504:11: Bye Bye [preauth] Jan 15 06:57:46 host sshd[14458]: Disconnected from 207.249.96.145 port 43504 [preauth] Jan 15 06:57:49 host sshd[14476]: Invalid user zhangjun from 128.199.95.60 port 40062 Jan 15 06:57:49 host sshd[14476]: input_userauth_request: invalid user zhangjun [preauth] Jan 15 06:57:49 host sshd[14476]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:57:49 host sshd[14476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.60 Jan 15 06:57:51 host sshd[14476]: Failed password for invalid user zhangjun from 128.199.95.60 port 40062 ssh2 Jan 15 06:57:51 host sshd[14476]: Received disconnect from 128.199.95.60 port 40062:11: Bye Bye [preauth] Jan 15 06:57:51 host sshd[14476]: Disconnected from 128.199.95.60 port 40062 [preauth] Jan 15 06:58:34 host sshd[14731]: Invalid user fmireshg from 206.189.219.241 port 39584 Jan 15 06:58:34 host sshd[14731]: input_userauth_request: invalid user fmireshg [preauth] Jan 15 06:58:34 host sshd[14731]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:58:34 host sshd[14731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.219.241 Jan 15 06:58:36 host sshd[14731]: Failed password for invalid user fmireshg from 206.189.219.241 port 39584 ssh2 Jan 15 06:58:36 host sshd[14731]: Received disconnect from 206.189.219.241 port 39584:11: Bye Bye [preauth] Jan 15 06:58:36 host sshd[14731]: Disconnected from 206.189.219.241 port 39584 [preauth] Jan 15 06:58:45 host sshd[14776]: Invalid user roger from 209.141.56.48 port 54130 Jan 15 06:58:45 host sshd[14776]: input_userauth_request: invalid user roger [preauth] Jan 15 06:58:45 host sshd[14776]: pam_unix(sshd:auth): check pass; user unknown Jan 15 06:58:45 host sshd[14776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 15 06:58:47 host sshd[14776]: Failed password for invalid user roger from 209.141.56.48 port 54130 ssh2 Jan 15 06:58:47 host sshd[14776]: Connection closed by 209.141.56.48 port 54130 [preauth] Jan 15 07:02:48 host sshd[15515]: Invalid user roger from 209.141.56.48 port 39464 Jan 15 07:02:48 host sshd[15515]: input_userauth_request: invalid user roger [preauth] Jan 15 07:02:48 host sshd[15515]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:02:48 host sshd[15515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 15 07:02:51 host sshd[15515]: Failed password for invalid user roger from 209.141.56.48 port 39464 ssh2 Jan 15 07:02:51 host sshd[15515]: Connection closed by 209.141.56.48 port 39464 [preauth] Jan 15 07:03:24 host sshd[15644]: Did not receive identification string from 156.234.95.151 port 41128 Jan 15 07:03:25 host sshd[15647]: Invalid user user from 156.234.95.151 port 50132 Jan 15 07:03:25 host sshd[15647]: input_userauth_request: invalid user user [preauth] Jan 15 07:03:25 host sshd[15648]: User root from 156.234.95.151 not allowed because not listed in AllowUsers Jan 15 07:03:25 host sshd[15648]: input_userauth_request: invalid user root [preauth] Jan 15 07:03:25 host sshd[15647]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:03:25 host sshd[15647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.234.95.151 Jan 15 07:03:25 host unix_chkpwd[15672]: password check failed for user (root) Jan 15 07:03:25 host sshd[15648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.234.95.151 user=root Jan 15 07:03:25 host sshd[15648]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 07:03:26 host sshd[15645]: Invalid user git from 156.234.95.151 port 50128 Jan 15 07:03:26 host sshd[15645]: input_userauth_request: invalid user git [preauth] Jan 15 07:03:26 host sshd[15645]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:03:26 host sshd[15645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.234.95.151 Jan 15 07:03:26 host sshd[15654]: Invalid user ansadmin from 156.234.95.151 port 50130 Jan 15 07:03:26 host sshd[15654]: input_userauth_request: invalid user ansadmin [preauth] Jan 15 07:03:27 host sshd[15647]: Failed password for invalid user user from 156.234.95.151 port 50132 ssh2 Jan 15 07:03:27 host sshd[15648]: Failed password for invalid user root from 156.234.95.151 port 50126 ssh2 Jan 15 07:03:27 host sshd[15654]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:03:27 host sshd[15654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.234.95.151 Jan 15 07:03:27 host sshd[15647]: Connection closed by 156.234.95.151 port 50132 [preauth] Jan 15 07:03:27 host sshd[15648]: Connection closed by 156.234.95.151 port 50126 [preauth] Jan 15 07:03:27 host sshd[15715]: Invalid user test from 156.234.95.151 port 50140 Jan 15 07:03:27 host sshd[15715]: input_userauth_request: invalid user test [preauth] Jan 15 07:03:27 host sshd[15646]: Invalid user admin from 156.234.95.151 port 50124 Jan 15 07:03:27 host sshd[15646]: input_userauth_request: invalid user admin [preauth] Jan 15 07:03:27 host sshd[15715]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:03:27 host sshd[15715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.234.95.151 Jan 15 07:03:27 host sshd[15646]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:03:27 host sshd[15646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.234.95.151 Jan 15 07:03:27 host sshd[15645]: Failed password for invalid user git from 156.234.95.151 port 50128 ssh2 Jan 15 07:03:27 host sshd[15660]: Invalid user student from 156.234.95.151 port 50184 Jan 15 07:03:27 host sshd[15660]: input_userauth_request: invalid user student [preauth] Jan 15 07:03:27 host sshd[15661]: Invalid user vagrant from 156.234.95.151 port 50186 Jan 15 07:03:27 host sshd[15661]: input_userauth_request: invalid user vagrant [preauth] Jan 15 07:03:27 host sshd[15701]: Invalid user ftpuser from 156.234.95.151 port 50136 Jan 15 07:03:27 host sshd[15701]: input_userauth_request: invalid user ftpuser [preauth] Jan 15 07:03:27 host sshd[15645]: Connection closed by 156.234.95.151 port 50128 [preauth] Jan 15 07:03:27 host sshd[15716]: Invalid user admin from 156.234.95.151 port 50154 Jan 15 07:03:27 host sshd[15716]: input_userauth_request: invalid user admin [preauth] Jan 15 07:03:28 host sshd[15660]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:03:28 host sshd[15660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.234.95.151 Jan 15 07:03:28 host sshd[15701]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:03:28 host sshd[15701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.234.95.151 Jan 15 07:03:28 host sshd[15703]: Invalid user admin from 156.234.95.151 port 50214 Jan 15 07:03:28 host sshd[15703]: input_userauth_request: invalid user admin [preauth] Jan 15 07:03:28 host sshd[15658]: Invalid user devops from 156.234.95.151 port 50205 Jan 15 07:03:28 host sshd[15658]: input_userauth_request: invalid user devops [preauth] Jan 15 07:03:28 host sshd[15716]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:03:28 host sshd[15716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.234.95.151 Jan 15 07:03:28 host sshd[15658]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:03:28 host sshd[15658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.234.95.151 Jan 15 07:03:28 host sshd[15654]: Failed password for invalid user ansadmin from 156.234.95.151 port 50130 ssh2 Jan 15 07:03:28 host sshd[15704]: Invalid user ubnt from 156.234.95.151 port 50192 Jan 15 07:03:28 host sshd[15704]: input_userauth_request: invalid user ubnt [preauth] Jan 15 07:03:28 host sshd[15654]: Connection closed by 156.234.95.151 port 50130 [preauth] Jan 15 07:03:29 host sshd[15715]: Failed password for invalid user test from 156.234.95.151 port 50140 ssh2 Jan 15 07:03:29 host sshd[15704]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:03:29 host sshd[15704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.234.95.151 Jan 15 07:03:29 host sshd[15646]: Failed password for invalid user admin from 156.234.95.151 port 50124 ssh2 Jan 15 07:03:30 host sshd[15660]: Failed password for invalid user student from 156.234.95.151 port 50184 ssh2 Jan 15 07:03:30 host sshd[15701]: Failed password for invalid user ftpuser from 156.234.95.151 port 50136 ssh2 Jan 15 07:03:30 host sshd[15716]: Failed password for invalid user admin from 156.234.95.151 port 50154 ssh2 Jan 15 07:03:30 host sshd[15658]: Failed password for invalid user devops from 156.234.95.151 port 50205 ssh2 Jan 15 07:03:30 host sshd[15704]: Failed password for invalid user ubnt from 156.234.95.151 port 50192 ssh2 Jan 15 07:09:23 host sshd[16543]: User root from 220.132.196.170 not allowed because not listed in AllowUsers Jan 15 07:09:23 host sshd[16543]: input_userauth_request: invalid user root [preauth] Jan 15 07:09:23 host unix_chkpwd[16546]: password check failed for user (root) Jan 15 07:09:23 host sshd[16543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.196.170 user=root Jan 15 07:09:23 host sshd[16543]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 07:09:26 host sshd[16543]: Failed password for invalid user root from 220.132.196.170 port 49734 ssh2 Jan 15 07:09:27 host unix_chkpwd[16549]: password check failed for user (root) Jan 15 07:09:27 host sshd[16543]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 07:09:28 host sshd[16543]: Failed password for invalid user root from 220.132.196.170 port 49734 ssh2 Jan 15 07:09:29 host unix_chkpwd[16573]: password check failed for user (root) Jan 15 07:09:29 host sshd[16543]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 07:09:31 host sshd[16543]: Failed password for invalid user root from 220.132.196.170 port 49734 ssh2 Jan 15 07:09:32 host sshd[16543]: Connection reset by 220.132.196.170 port 49734 [preauth] Jan 15 07:09:32 host sshd[16543]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.196.170 user=root Jan 15 07:13:16 host sshd[16980]: Invalid user vadmin from 220.134.123.248 port 57066 Jan 15 07:13:16 host sshd[16980]: input_userauth_request: invalid user vadmin [preauth] Jan 15 07:13:16 host sshd[16980]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:13:16 host sshd[16980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.123.248 Jan 15 07:13:18 host sshd[16980]: Failed password for invalid user vadmin from 220.134.123.248 port 57066 ssh2 Jan 15 07:13:18 host sshd[16980]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:13:20 host sshd[16980]: Failed password for invalid user vadmin from 220.134.123.248 port 57066 ssh2 Jan 15 07:13:21 host sshd[16980]: Failed password for invalid user vadmin from 220.134.123.248 port 57066 ssh2 Jan 15 07:13:21 host sshd[16980]: Connection closed by 220.134.123.248 port 57066 [preauth] Jan 15 07:13:21 host sshd[16980]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.123.248 Jan 15 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 07:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 07:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 07:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 07:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwletsstalkfood user-15=straightcurve user-16=gifterman user-17=palco123 user-18=kottayamcalldriv user-19=phmetals user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=remysagr user-24=wwwkmaorg user-25=wwwkapin user-26=woodpeck user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 07:22:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 07:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 07:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MNQYaihZRmte6L5G.~ Jan 15 07:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MNQYaihZRmte6L5G.~' Jan 15 07:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MNQYaihZRmte6L5G.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 07:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 07:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 07:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 07:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 07:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 07:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 07:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 07:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 07:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 07:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 07:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 07:29:31 host sshd[19283]: Invalid user eh from 194.110.203.109 port 54302 Jan 15 07:29:31 host sshd[19283]: input_userauth_request: invalid user eh [preauth] Jan 15 07:29:31 host sshd[19283]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:29:31 host sshd[19283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 07:29:33 host sshd[19283]: Failed password for invalid user eh from 194.110.203.109 port 54302 ssh2 Jan 15 07:29:36 host sshd[19283]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:29:38 host sshd[19283]: Failed password for invalid user eh from 194.110.203.109 port 54302 ssh2 Jan 15 07:29:41 host sshd[19283]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:29:43 host sshd[19283]: Failed password for invalid user eh from 194.110.203.109 port 54302 ssh2 Jan 15 07:29:46 host sshd[19283]: Connection closed by 194.110.203.109 port 54302 [preauth] Jan 15 07:29:46 host sshd[19283]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 07:34:27 host sshd[19847]: Invalid user soporte from 195.226.194.242 port 60388 Jan 15 07:34:27 host sshd[19847]: input_userauth_request: invalid user soporte [preauth] Jan 15 07:34:28 host sshd[19847]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:34:28 host sshd[19847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 15 07:34:29 host sshd[19847]: Failed password for invalid user soporte from 195.226.194.242 port 60388 ssh2 Jan 15 07:34:29 host sshd[19847]: Received disconnect from 195.226.194.242 port 60388:11: Bye Bye [preauth] Jan 15 07:34:29 host sshd[19847]: Disconnected from 195.226.194.242 port 60388 [preauth] Jan 15 07:35:07 host sshd[19967]: Invalid user from 64.62.197.58 port 60959 Jan 15 07:35:07 host sshd[19967]: input_userauth_request: invalid user [preauth] Jan 15 07:35:10 host sshd[19967]: Connection closed by 64.62.197.58 port 60959 [preauth] Jan 15 07:42:33 host sshd[21074]: Invalid user viewuser from 205.185.113.129 port 57824 Jan 15 07:42:33 host sshd[21074]: input_userauth_request: invalid user viewuser [preauth] Jan 15 07:42:33 host sshd[21074]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:42:33 host sshd[21074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 15 07:42:34 host sshd[21074]: Failed password for invalid user viewuser from 205.185.113.129 port 57824 ssh2 Jan 15 07:42:35 host sshd[21074]: Connection closed by 205.185.113.129 port 57824 [preauth] Jan 15 07:50:29 host sshd[22653]: Invalid user jiazhen from 165.227.222.54 port 54652 Jan 15 07:50:29 host sshd[22653]: input_userauth_request: invalid user jiazhen [preauth] Jan 15 07:50:29 host sshd[22653]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:50:29 host sshd[22653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.222.54 Jan 15 07:50:31 host sshd[22653]: Failed password for invalid user jiazhen from 165.227.222.54 port 54652 ssh2 Jan 15 07:50:32 host sshd[22653]: Received disconnect from 165.227.222.54 port 54652:11: Bye Bye [preauth] Jan 15 07:50:32 host sshd[22653]: Disconnected from 165.227.222.54 port 54652 [preauth] Jan 15 07:50:41 host sshd[22678]: Invalid user xiaoling from 217.182.75.250 port 39450 Jan 15 07:50:41 host sshd[22678]: input_userauth_request: invalid user xiaoling [preauth] Jan 15 07:50:41 host sshd[22678]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:50:41 host sshd[22678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.75.250 Jan 15 07:50:43 host sshd[22678]: Failed password for invalid user xiaoling from 217.182.75.250 port 39450 ssh2 Jan 15 07:50:44 host sshd[22678]: Received disconnect from 217.182.75.250 port 39450:11: Bye Bye [preauth] Jan 15 07:50:44 host sshd[22678]: Disconnected from 217.182.75.250 port 39450 [preauth] Jan 15 07:51:50 host sshd[22850]: Invalid user roshni from 172.105.65.120 port 35538 Jan 15 07:51:50 host sshd[22850]: input_userauth_request: invalid user roshni [preauth] Jan 15 07:51:50 host sshd[22850]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:51:50 host sshd[22850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.105.65.120 Jan 15 07:51:52 host sshd[22850]: Failed password for invalid user roshni from 172.105.65.120 port 35538 ssh2 Jan 15 07:51:52 host sshd[22850]: Received disconnect from 172.105.65.120 port 35538:11: Bye Bye [preauth] Jan 15 07:51:52 host sshd[22850]: Disconnected from 172.105.65.120 port 35538 [preauth] Jan 15 07:53:07 host sshd[23048]: Invalid user zhangzhen from 162.241.70.56 port 40400 Jan 15 07:53:07 host sshd[23048]: input_userauth_request: invalid user zhangzhen [preauth] Jan 15 07:53:07 host sshd[23048]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:53:07 host sshd[23048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.70.56 Jan 15 07:53:09 host sshd[23048]: Failed password for invalid user zhangzhen from 162.241.70.56 port 40400 ssh2 Jan 15 07:53:10 host sshd[23048]: Received disconnect from 162.241.70.56 port 40400:11: Bye Bye [preauth] Jan 15 07:53:10 host sshd[23048]: Disconnected from 162.241.70.56 port 40400 [preauth] Jan 15 07:53:43 host sshd[23135]: Invalid user doudou from 165.232.64.113 port 53112 Jan 15 07:53:43 host sshd[23135]: input_userauth_request: invalid user doudou [preauth] Jan 15 07:53:43 host sshd[23135]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:53:43 host sshd[23135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.64.113 Jan 15 07:53:46 host sshd[23135]: Failed password for invalid user doudou from 165.232.64.113 port 53112 ssh2 Jan 15 07:53:46 host sshd[23135]: Received disconnect from 165.232.64.113 port 53112:11: Bye Bye [preauth] Jan 15 07:53:46 host sshd[23135]: Disconnected from 165.232.64.113 port 53112 [preauth] Jan 15 07:54:17 host sshd[23314]: Invalid user zhangzhen from 167.71.166.90 port 41728 Jan 15 07:54:17 host sshd[23314]: input_userauth_request: invalid user zhangzhen [preauth] Jan 15 07:54:17 host sshd[23314]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:54:17 host sshd[23314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.166.90 Jan 15 07:54:19 host sshd[23314]: Failed password for invalid user zhangzhen from 167.71.166.90 port 41728 ssh2 Jan 15 07:54:19 host sshd[23314]: Received disconnect from 167.71.166.90 port 41728:11: Bye Bye [preauth] Jan 15 07:54:19 host sshd[23314]: Disconnected from 167.71.166.90 port 41728 [preauth] Jan 15 07:55:30 host sshd[23508]: Invalid user huangkai from 165.227.222.54 port 59516 Jan 15 07:55:30 host sshd[23508]: input_userauth_request: invalid user huangkai [preauth] Jan 15 07:55:30 host sshd[23508]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:55:30 host sshd[23508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.222.54 Jan 15 07:55:32 host sshd[23508]: Failed password for invalid user huangkai from 165.227.222.54 port 59516 ssh2 Jan 15 07:55:32 host sshd[23508]: Received disconnect from 165.227.222.54 port 59516:11: Bye Bye [preauth] Jan 15 07:55:32 host sshd[23508]: Disconnected from 165.227.222.54 port 59516 [preauth] Jan 15 07:56:03 host sshd[23565]: Invalid user liguirong from 217.182.75.250 port 39708 Jan 15 07:56:03 host sshd[23565]: input_userauth_request: invalid user liguirong [preauth] Jan 15 07:56:03 host sshd[23565]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:56:03 host sshd[23565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.75.250 Jan 15 07:56:04 host sshd[23565]: Failed password for invalid user liguirong from 217.182.75.250 port 39708 ssh2 Jan 15 07:56:05 host sshd[23565]: Received disconnect from 217.182.75.250 port 39708:11: Bye Bye [preauth] Jan 15 07:56:05 host sshd[23565]: Disconnected from 217.182.75.250 port 39708 [preauth] Jan 15 07:56:08 host sshd[23575]: Invalid user lingling from 162.241.70.56 port 51596 Jan 15 07:56:08 host sshd[23575]: input_userauth_request: invalid user lingling [preauth] Jan 15 07:56:08 host sshd[23575]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:56:08 host sshd[23575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.70.56 Jan 15 07:56:09 host sshd[23575]: Failed password for invalid user lingling from 162.241.70.56 port 51596 ssh2 Jan 15 07:56:10 host sshd[23575]: Received disconnect from 162.241.70.56 port 51596:11: Bye Bye [preauth] Jan 15 07:56:10 host sshd[23575]: Disconnected from 162.241.70.56 port 51596 [preauth] Jan 15 07:56:10 host sshd[23579]: Invalid user xw from 165.232.64.113 port 60772 Jan 15 07:56:10 host sshd[23579]: input_userauth_request: invalid user xw [preauth] Jan 15 07:56:10 host sshd[23579]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:56:10 host sshd[23579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.64.113 Jan 15 07:56:12 host sshd[23579]: Failed password for invalid user xw from 165.232.64.113 port 60772 ssh2 Jan 15 07:56:12 host sshd[23579]: Received disconnect from 165.232.64.113 port 60772:11: Bye Bye [preauth] Jan 15 07:56:12 host sshd[23579]: Disconnected from 165.232.64.113 port 60772 [preauth] Jan 15 07:56:15 host sshd[23587]: Invalid user lianghao from 172.105.65.120 port 37520 Jan 15 07:56:15 host sshd[23587]: input_userauth_request: invalid user lianghao [preauth] Jan 15 07:56:15 host sshd[23587]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:56:15 host sshd[23587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.105.65.120 Jan 15 07:56:17 host sshd[23587]: Failed password for invalid user lianghao from 172.105.65.120 port 37520 ssh2 Jan 15 07:56:17 host sshd[23587]: Received disconnect from 172.105.65.120 port 37520:11: Bye Bye [preauth] Jan 15 07:56:17 host sshd[23587]: Disconnected from 172.105.65.120 port 37520 [preauth] Jan 15 07:56:20 host sshd[23592]: Invalid user mengmeng from 167.71.166.90 port 46582 Jan 15 07:56:20 host sshd[23592]: input_userauth_request: invalid user mengmeng [preauth] Jan 15 07:56:20 host sshd[23592]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:56:20 host sshd[23592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.166.90 Jan 15 07:56:21 host sshd[23592]: Failed password for invalid user mengmeng from 167.71.166.90 port 46582 ssh2 Jan 15 07:56:22 host sshd[23592]: Received disconnect from 167.71.166.90 port 46582:11: Bye Bye [preauth] Jan 15 07:56:22 host sshd[23592]: Disconnected from 167.71.166.90 port 46582 [preauth] Jan 15 07:56:33 host sshd[23634]: Invalid user zhangna from 165.227.222.54 port 34442 Jan 15 07:56:33 host sshd[23634]: input_userauth_request: invalid user zhangna [preauth] Jan 15 07:56:33 host sshd[23634]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:56:33 host sshd[23634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.222.54 Jan 15 07:56:34 host sshd[23634]: Failed password for invalid user zhangna from 165.227.222.54 port 34442 ssh2 Jan 15 07:56:34 host sshd[23634]: Received disconnect from 165.227.222.54 port 34442:11: Bye Bye [preauth] Jan 15 07:56:34 host sshd[23634]: Disconnected from 165.227.222.54 port 34442 [preauth] Jan 15 07:56:53 host sshd[23687]: Invalid user zhiheng from 112.78.134.11 port 38469 Jan 15 07:56:53 host sshd[23687]: input_userauth_request: invalid user zhiheng [preauth] Jan 15 07:56:53 host sshd[23687]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:56:53 host sshd[23687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.78.134.11 Jan 15 07:56:55 host sshd[23687]: Failed password for invalid user zhiheng from 112.78.134.11 port 38469 ssh2 Jan 15 07:56:55 host sshd[23687]: Received disconnect from 112.78.134.11 port 38469:11: Bye Bye [preauth] Jan 15 07:56:55 host sshd[23687]: Disconnected from 112.78.134.11 port 38469 [preauth] Jan 15 07:57:14 host sshd[23717]: Invalid user mengmeng from 165.232.64.113 port 59350 Jan 15 07:57:14 host sshd[23717]: input_userauth_request: invalid user mengmeng [preauth] Jan 15 07:57:14 host sshd[23717]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:57:14 host sshd[23717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.64.113 Jan 15 07:57:15 host sshd[23720]: Invalid user leopoldo from 217.182.75.250 port 39844 Jan 15 07:57:15 host sshd[23720]: input_userauth_request: invalid user leopoldo [preauth] Jan 15 07:57:15 host sshd[23720]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:57:15 host sshd[23720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.75.250 Jan 15 07:57:16 host sshd[23717]: Failed password for invalid user mengmeng from 165.232.64.113 port 59350 ssh2 Jan 15 07:57:17 host sshd[23720]: Failed password for invalid user leopoldo from 217.182.75.250 port 39844 ssh2 Jan 15 07:57:17 host sshd[23720]: Received disconnect from 217.182.75.250 port 39844:11: Bye Bye [preauth] Jan 15 07:57:17 host sshd[23720]: Disconnected from 217.182.75.250 port 39844 [preauth] Jan 15 07:57:18 host sshd[23754]: Invalid user beverlylin from 162.241.70.56 port 49900 Jan 15 07:57:18 host sshd[23754]: input_userauth_request: invalid user beverlylin [preauth] Jan 15 07:57:18 host sshd[23754]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:57:18 host sshd[23754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.70.56 Jan 15 07:57:20 host sshd[23754]: Failed password for invalid user beverlylin from 162.241.70.56 port 49900 ssh2 Jan 15 07:57:20 host sshd[23754]: Received disconnect from 162.241.70.56 port 49900:11: Bye Bye [preauth] Jan 15 07:57:20 host sshd[23754]: Disconnected from 162.241.70.56 port 49900 [preauth] Jan 15 07:57:23 host sshd[23826]: Invalid user msalahuddin from 167.71.166.90 port 44824 Jan 15 07:57:23 host sshd[23826]: input_userauth_request: invalid user msalahuddin [preauth] Jan 15 07:57:23 host sshd[23826]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:57:23 host sshd[23826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.166.90 Jan 15 07:57:24 host sshd[23829]: Invalid user xiaoling from 172.105.65.120 port 58746 Jan 15 07:57:24 host sshd[23829]: input_userauth_request: invalid user xiaoling [preauth] Jan 15 07:57:24 host sshd[23829]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:57:24 host sshd[23829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.105.65.120 Jan 15 07:57:24 host sshd[23826]: Failed password for invalid user msalahuddin from 167.71.166.90 port 44824 ssh2 Jan 15 07:57:25 host sshd[23826]: Received disconnect from 167.71.166.90 port 44824:11: Bye Bye [preauth] Jan 15 07:57:25 host sshd[23826]: Disconnected from 167.71.166.90 port 44824 [preauth] Jan 15 07:57:26 host sshd[23829]: Failed password for invalid user xiaoling from 172.105.65.120 port 58746 ssh2 Jan 15 07:59:39 host sshd[24172]: Invalid user lianghao from 112.78.134.11 port 38968 Jan 15 07:59:39 host sshd[24172]: input_userauth_request: invalid user lianghao [preauth] Jan 15 07:59:39 host sshd[24172]: pam_unix(sshd:auth): check pass; user unknown Jan 15 07:59:39 host sshd[24172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.78.134.11 Jan 15 07:59:41 host sshd[24172]: Failed password for invalid user lianghao from 112.78.134.11 port 38968 ssh2 Jan 15 07:59:41 host sshd[24172]: Received disconnect from 112.78.134.11 port 38968:11: Bye Bye [preauth] Jan 15 07:59:41 host sshd[24172]: Disconnected from 112.78.134.11 port 38968 [preauth] Jan 15 08:00:26 host sshd[24389]: User ftp from 106.105.115.156 not allowed because not listed in AllowUsers Jan 15 08:00:26 host sshd[24389]: input_userauth_request: invalid user ftp [preauth] Jan 15 08:00:26 host unix_chkpwd[24393]: password check failed for user (ftp) Jan 15 08:00:26 host sshd[24389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.105.115.156 user=ftp Jan 15 08:00:26 host sshd[24389]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 15 08:00:29 host sshd[24389]: Failed password for invalid user ftp from 106.105.115.156 port 34557 ssh2 Jan 15 08:00:29 host sshd[24389]: Connection reset by 106.105.115.156 port 34557 [preauth] Jan 15 08:01:33 host sshd[24560]: Invalid user leopoldo from 112.78.134.11 port 60492 Jan 15 08:01:33 host sshd[24560]: input_userauth_request: invalid user leopoldo [preauth] Jan 15 08:01:33 host sshd[24560]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:01:33 host sshd[24560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.78.134.11 Jan 15 08:01:34 host sshd[24560]: Failed password for invalid user leopoldo from 112.78.134.11 port 60492 ssh2 Jan 15 08:01:34 host sshd[24560]: Received disconnect from 112.78.134.11 port 60492:11: Bye Bye [preauth] Jan 15 08:01:34 host sshd[24560]: Disconnected from 112.78.134.11 port 60492 [preauth] Jan 15 08:03:02 host sshd[24727]: Invalid user dnsekakf2$$ from 211.225.148.244 port 61741 Jan 15 08:03:02 host sshd[24727]: input_userauth_request: invalid user dnsekakf2$$ [preauth] Jan 15 08:03:02 host sshd[24727]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:03:02 host sshd[24727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.225.148.244 Jan 15 08:03:04 host sshd[24727]: Failed password for invalid user dnsekakf2$$ from 211.225.148.244 port 61741 ssh2 Jan 15 08:03:04 host sshd[24727]: Failed password for invalid user dnsekakf2$$ from 211.225.148.244 port 61741 ssh2 Jan 15 08:03:05 host sshd[24727]: Connection closed by 211.225.148.244 port 61741 [preauth] Jan 15 08:03:07 host sshd[24744]: Invalid user user from 176.111.173.164 port 54620 Jan 15 08:03:07 host sshd[24744]: input_userauth_request: invalid user user [preauth] Jan 15 08:03:07 host sshd[24744]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:03:07 host sshd[24744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.111.173.164 Jan 15 08:03:09 host sshd[24744]: Failed password for invalid user user from 176.111.173.164 port 54620 ssh2 Jan 15 08:03:13 host sshd[24744]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:03:15 host sshd[24744]: Failed password for invalid user user from 176.111.173.164 port 54620 ssh2 Jan 15 08:03:18 host sshd[24744]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:03:20 host sshd[24744]: Failed password for invalid user user from 176.111.173.164 port 54620 ssh2 Jan 15 08:03:23 host sshd[24744]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:03:25 host sshd[24744]: Failed password for invalid user user from 176.111.173.164 port 54620 ssh2 Jan 15 08:03:29 host sshd[24744]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:03:31 host sshd[24744]: Failed password for invalid user user from 176.111.173.164 port 54620 ssh2 Jan 15 08:04:53 host sshd[24937]: Invalid user postgres from 195.226.194.242 port 19328 Jan 15 08:04:53 host sshd[24937]: input_userauth_request: invalid user postgres [preauth] Jan 15 08:04:53 host sshd[24937]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:04:53 host sshd[24937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 15 08:04:55 host sshd[24937]: Failed password for invalid user postgres from 195.226.194.242 port 19328 ssh2 Jan 15 08:04:55 host sshd[24937]: Received disconnect from 195.226.194.242 port 19328:11: Bye Bye [preauth] Jan 15 08:04:55 host sshd[24937]: Disconnected from 195.226.194.242 port 19328 [preauth] Jan 15 08:10:01 host sshd[25612]: Invalid user lianghao from 82.165.223.147 port 55442 Jan 15 08:10:01 host sshd[25612]: input_userauth_request: invalid user lianghao [preauth] Jan 15 08:10:01 host sshd[25612]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:10:01 host sshd[25612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.165.223.147 Jan 15 08:10:03 host sshd[25612]: Failed password for invalid user lianghao from 82.165.223.147 port 55442 ssh2 Jan 15 08:10:03 host sshd[25612]: Received disconnect from 82.165.223.147 port 55442:11: Bye Bye [preauth] Jan 15 08:10:03 host sshd[25612]: Disconnected from 82.165.223.147 port 55442 [preauth] Jan 15 08:10:29 host sshd[25782]: Invalid user yangmei from 81.30.195.246 port 34738 Jan 15 08:10:29 host sshd[25782]: input_userauth_request: invalid user yangmei [preauth] Jan 15 08:10:29 host sshd[25782]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:10:29 host sshd[25782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.195.246 Jan 15 08:10:31 host sshd[25782]: Failed password for invalid user yangmei from 81.30.195.246 port 34738 ssh2 Jan 15 08:10:31 host sshd[25782]: Received disconnect from 81.30.195.246 port 34738:11: Bye Bye [preauth] Jan 15 08:10:31 host sshd[25782]: Disconnected from 81.30.195.246 port 34738 [preauth] Jan 15 08:11:44 host sshd[25948]: Invalid user admin from 27.100.236.145 port 62196 Jan 15 08:11:44 host sshd[25948]: input_userauth_request: invalid user admin [preauth] Jan 15 08:11:44 host sshd[25948]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:11:44 host sshd[25948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.100.236.145 Jan 15 08:11:47 host sshd[25948]: Failed password for invalid user admin from 27.100.236.145 port 62196 ssh2 Jan 15 08:11:47 host sshd[25948]: Failed password for invalid user admin from 27.100.236.145 port 62196 ssh2 Jan 15 08:11:48 host sshd[25948]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:11:51 host sshd[25948]: Failed password for invalid user admin from 27.100.236.145 port 62196 ssh2 Jan 15 08:11:51 host sshd[25948]: Connection reset by 27.100.236.145 port 62196 [preauth] Jan 15 08:11:51 host sshd[25948]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.100.236.145 Jan 15 08:13:22 host sshd[26111]: Invalid user rbr from 82.165.223.147 port 34804 Jan 15 08:13:22 host sshd[26111]: input_userauth_request: invalid user rbr [preauth] Jan 15 08:13:22 host sshd[26111]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:13:22 host sshd[26111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.165.223.147 Jan 15 08:13:24 host sshd[26111]: Failed password for invalid user rbr from 82.165.223.147 port 34804 ssh2 Jan 15 08:13:24 host sshd[26111]: Received disconnect from 82.165.223.147 port 34804:11: Bye Bye [preauth] Jan 15 08:13:24 host sshd[26111]: Disconnected from 82.165.223.147 port 34804 [preauth] Jan 15 08:13:28 host sshd[26119]: Invalid user roger from 209.141.56.48 port 43186 Jan 15 08:13:28 host sshd[26119]: input_userauth_request: invalid user roger [preauth] Jan 15 08:13:28 host sshd[26119]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:13:28 host sshd[26119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 15 08:13:30 host sshd[26119]: Failed password for invalid user roger from 209.141.56.48 port 43186 ssh2 Jan 15 08:13:30 host sshd[26119]: Connection closed by 209.141.56.48 port 43186 [preauth] Jan 15 08:14:01 host sshd[26172]: Invalid user roger from 209.141.56.48 port 34690 Jan 15 08:14:01 host sshd[26172]: input_userauth_request: invalid user roger [preauth] Jan 15 08:14:01 host sshd[26172]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:14:01 host sshd[26172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 15 08:14:03 host sshd[26172]: Failed password for invalid user roger from 209.141.56.48 port 34690 ssh2 Jan 15 08:14:03 host sshd[26172]: Connection closed by 209.141.56.48 port 34690 [preauth] Jan 15 08:14:38 host sshd[26250]: Invalid user wuliao from 152.32.167.29 port 37698 Jan 15 08:14:38 host sshd[26250]: input_userauth_request: invalid user wuliao [preauth] Jan 15 08:14:38 host sshd[26250]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:14:38 host sshd[26250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.167.29 Jan 15 08:14:40 host sshd[26260]: Invalid user ziyuetian from 8.222.146.166 port 57496 Jan 15 08:14:40 host sshd[26260]: input_userauth_request: invalid user ziyuetian [preauth] Jan 15 08:14:40 host sshd[26260]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:14:40 host sshd[26260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.222.146.166 Jan 15 08:14:40 host sshd[26250]: Failed password for invalid user wuliao from 152.32.167.29 port 37698 ssh2 Jan 15 08:14:41 host sshd[26250]: Received disconnect from 152.32.167.29 port 37698:11: Bye Bye [preauth] Jan 15 08:14:41 host sshd[26250]: Disconnected from 152.32.167.29 port 37698 [preauth] Jan 15 08:14:41 host sshd[26260]: Failed password for invalid user ziyuetian from 8.222.146.166 port 57496 ssh2 Jan 15 08:14:41 host sshd[26260]: Received disconnect from 8.222.146.166 port 57496:11: Bye Bye [preauth] Jan 15 08:14:41 host sshd[26260]: Disconnected from 8.222.146.166 port 57496 [preauth] Jan 15 08:15:00 host sshd[26287]: Invalid user sunshine from 82.165.223.147 port 45752 Jan 15 08:15:00 host sshd[26287]: input_userauth_request: invalid user sunshine [preauth] Jan 15 08:15:00 host sshd[26287]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:15:00 host sshd[26287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.165.223.147 Jan 15 08:15:01 host sshd[26287]: Failed password for invalid user sunshine from 82.165.223.147 port 45752 ssh2 Jan 15 08:15:15 host sshd[26506]: Invalid user a_kawaba from 8.222.146.166 port 37112 Jan 15 08:15:15 host sshd[26506]: input_userauth_request: invalid user a_kawaba [preauth] Jan 15 08:15:15 host sshd[26506]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:15:15 host sshd[26506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.222.146.166 Jan 15 08:15:17 host sshd[26506]: Failed password for invalid user a_kawaba from 8.222.146.166 port 37112 ssh2 Jan 15 08:15:17 host sshd[26506]: Received disconnect from 8.222.146.166 port 37112:11: Bye Bye [preauth] Jan 15 08:15:17 host sshd[26506]: Disconnected from 8.222.146.166 port 37112 [preauth] Jan 15 08:15:45 host sshd[26682]: Invalid user zhanghua from 81.30.195.246 port 56226 Jan 15 08:15:45 host sshd[26682]: input_userauth_request: invalid user zhanghua [preauth] Jan 15 08:15:45 host sshd[26682]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:15:45 host sshd[26682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.195.246 Jan 15 08:15:47 host sshd[26682]: Failed password for invalid user zhanghua from 81.30.195.246 port 56226 ssh2 Jan 15 08:15:47 host sshd[26682]: Received disconnect from 81.30.195.246 port 56226:11: Bye Bye [preauth] Jan 15 08:15:47 host sshd[26682]: Disconnected from 81.30.195.246 port 56226 [preauth] Jan 15 08:16:55 host sshd[26780]: Invalid user chencheng from 152.32.167.29 port 40620 Jan 15 08:16:55 host sshd[26780]: input_userauth_request: invalid user chencheng [preauth] Jan 15 08:16:55 host sshd[26780]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:16:55 host sshd[26780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.167.29 Jan 15 08:16:57 host sshd[26780]: Failed password for invalid user chencheng from 152.32.167.29 port 40620 ssh2 Jan 15 08:16:57 host sshd[26785]: Invalid user myc from 81.30.195.246 port 50880 Jan 15 08:16:57 host sshd[26785]: input_userauth_request: invalid user myc [preauth] Jan 15 08:16:57 host sshd[26785]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:16:57 host sshd[26785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.195.246 Jan 15 08:16:57 host sshd[26780]: Received disconnect from 152.32.167.29 port 40620:11: Bye Bye [preauth] Jan 15 08:16:57 host sshd[26780]: Disconnected from 152.32.167.29 port 40620 [preauth] Jan 15 08:16:59 host sshd[26785]: Failed password for invalid user myc from 81.30.195.246 port 50880 ssh2 Jan 15 08:16:59 host sshd[26785]: Received disconnect from 81.30.195.246 port 50880:11: Bye Bye [preauth] Jan 15 08:16:59 host sshd[26785]: Disconnected from 81.30.195.246 port 50880 [preauth] Jan 15 08:17:22 host sshd[26862]: Invalid user testuser1 from 8.222.146.166 port 44160 Jan 15 08:17:22 host sshd[26862]: input_userauth_request: invalid user testuser1 [preauth] Jan 15 08:17:22 host sshd[26862]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:17:22 host sshd[26862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.222.146.166 Jan 15 08:17:24 host sshd[26862]: Failed password for invalid user testuser1 from 8.222.146.166 port 44160 ssh2 Jan 15 08:17:24 host sshd[26862]: Received disconnect from 8.222.146.166 port 44160:11: Bye Bye [preauth] Jan 15 08:17:24 host sshd[26862]: Disconnected from 8.222.146.166 port 44160 [preauth] Jan 15 08:18:30 host sshd[27013]: Invalid user caonimabi from 152.32.167.29 port 39476 Jan 15 08:18:30 host sshd[27013]: input_userauth_request: invalid user caonimabi [preauth] Jan 15 08:18:30 host sshd[27013]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:18:30 host sshd[27013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.167.29 Jan 15 08:18:32 host sshd[27013]: Failed password for invalid user caonimabi from 152.32.167.29 port 39476 ssh2 Jan 15 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 08:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 08:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 08:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 08:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 08:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 08:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=wwwtestugo user-4=shalinijames user-5=woodpeck user-6=wwwkapin user-7=remysagr user-8=disposeat user-9=wwwkmaorg user-10=wwwnexidigital user-11=mrsclean user-12=gifterman user-13=palco123 user-14=kottayamcalldriv user-15=phmetals user-16=wwwletsstalkfood user-17=straightcurve user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=cochintaxi user-24=wwwkaretakers user-25=wwwrmswll user-26=wwwresourcehunte user-27=keralaholi user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 08:22:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 08:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 08:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-y67ysIM2NXANPF7R.~ Jan 15 08:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-y67ysIM2NXANPF7R.~' Jan 15 08:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-y67ysIM2NXANPF7R.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 08:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 08:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 08:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 08:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 08:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 08:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 08:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 08:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 08:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 08:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 08:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 08:34:49 host sshd[29430]: User root from 195.226.194.142 not allowed because not listed in AllowUsers Jan 15 08:34:49 host sshd[29430]: input_userauth_request: invalid user root [preauth] Jan 15 08:34:49 host unix_chkpwd[29433]: password check failed for user (root) Jan 15 08:34:49 host sshd[29430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 user=root Jan 15 08:34:49 host sshd[29430]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 08:34:51 host sshd[29430]: Failed password for invalid user root from 195.226.194.142 port 51054 ssh2 Jan 15 08:34:51 host sshd[29430]: Received disconnect from 195.226.194.142 port 51054:11: Bye Bye [preauth] Jan 15 08:34:51 host sshd[29430]: Disconnected from 195.226.194.142 port 51054 [preauth] Jan 15 08:39:28 host sshd[30076]: Invalid user roger from 209.141.56.48 port 33884 Jan 15 08:39:28 host sshd[30076]: input_userauth_request: invalid user roger [preauth] Jan 15 08:39:28 host sshd[30076]: pam_unix(sshd:auth): check pass; user unknown Jan 15 08:39:28 host sshd[30076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 15 08:39:30 host sshd[30076]: Failed password for invalid user roger from 209.141.56.48 port 33884 ssh2 Jan 15 08:39:30 host sshd[30076]: Connection closed by 209.141.56.48 port 33884 [preauth] Jan 15 08:42:32 host sshd[30584]: Bad packet length 2435711452. [preauth] Jan 15 08:42:32 host sshd[30584]: ssh_dispatch_run_fatal: Connection from 36.238.20.122 port 35907: message authentication code incorrect [preauth] Jan 15 08:46:05 host sshd[30963]: User root from 175.126.232.120 not allowed because not listed in AllowUsers Jan 15 08:46:05 host sshd[30963]: input_userauth_request: invalid user root [preauth] Jan 15 08:46:06 host unix_chkpwd[30967]: password check failed for user (root) Jan 15 08:46:06 host sshd[30963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.232.120 user=root Jan 15 08:46:06 host sshd[30963]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 08:46:08 host sshd[30963]: Failed password for invalid user root from 175.126.232.120 port 52378 ssh2 Jan 15 08:46:08 host sshd[30963]: Received disconnect from 175.126.232.120 port 52378:11: Bye Bye [preauth] Jan 15 08:46:08 host sshd[30963]: Disconnected from 175.126.232.120 port 52378 [preauth] Jan 15 08:47:17 host sshd[31213]: User root from 43.155.173.30 not allowed because not listed in AllowUsers Jan 15 08:47:17 host sshd[31213]: input_userauth_request: invalid user root [preauth] Jan 15 08:47:17 host unix_chkpwd[31216]: password check failed for user (root) Jan 15 08:47:17 host sshd[31213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.173.30 user=root Jan 15 08:47:17 host sshd[31213]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 08:47:18 host sshd[31213]: Failed password for invalid user root from 43.155.173.30 port 45904 ssh2 Jan 15 08:47:18 host sshd[31213]: Received disconnect from 43.155.173.30 port 45904:11: Bye Bye [preauth] Jan 15 08:47:18 host sshd[31213]: Disconnected from 43.155.173.30 port 45904 [preauth] Jan 15 08:48:07 host sshd[31318]: User root from 142.93.100.226 not allowed because not listed in AllowUsers Jan 15 08:48:07 host sshd[31318]: input_userauth_request: invalid user root [preauth] Jan 15 08:48:07 host unix_chkpwd[31321]: password check failed for user (root) Jan 15 08:48:07 host sshd[31318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.100.226 user=root Jan 15 08:48:07 host sshd[31318]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 08:48:09 host sshd[31318]: Failed password for invalid user root from 142.93.100.226 port 34108 ssh2 Jan 15 08:48:09 host sshd[31318]: Received disconnect from 142.93.100.226 port 34108:11: Bye Bye [preauth] Jan 15 08:48:09 host sshd[31318]: Disconnected from 142.93.100.226 port 34108 [preauth] Jan 15 08:49:06 host sshd[31420]: User root from 154.68.225.162 not allowed because not listed in AllowUsers Jan 15 08:49:06 host sshd[31420]: input_userauth_request: invalid user root [preauth] Jan 15 08:49:06 host unix_chkpwd[31423]: password check failed for user (root) Jan 15 08:49:06 host sshd[31420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.225.162 user=root Jan 15 08:49:06 host sshd[31420]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 08:49:09 host sshd[31420]: Failed password for invalid user root from 154.68.225.162 port 60854 ssh2 Jan 15 08:49:09 host sshd[31420]: Received disconnect from 154.68.225.162 port 60854:11: Bye Bye [preauth] Jan 15 08:49:09 host sshd[31420]: Disconnected from 154.68.225.162 port 60854 [preauth] Jan 15 08:49:13 host sshd[31428]: User root from 198.12.85.199 not allowed because not listed in AllowUsers Jan 15 08:49:13 host sshd[31428]: input_userauth_request: invalid user root [preauth] Jan 15 08:49:13 host unix_chkpwd[31431]: password check failed for user (root) Jan 15 08:49:13 host sshd[31428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.12.85.199 user=root Jan 15 08:49:13 host sshd[31428]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 08:49:15 host sshd[31428]: Failed password for invalid user root from 198.12.85.199 port 45472 ssh2 Jan 15 08:49:15 host sshd[31428]: Received disconnect from 198.12.85.199 port 45472:11: Bye Bye [preauth] Jan 15 08:49:15 host sshd[31428]: Disconnected from 198.12.85.199 port 45472 [preauth] Jan 15 08:50:25 host sshd[31567]: User root from 220.133.148.212 not allowed because not listed in AllowUsers Jan 15 08:50:25 host sshd[31567]: input_userauth_request: invalid user root [preauth] Jan 15 08:50:25 host unix_chkpwd[31571]: password check failed for user (root) Jan 15 08:50:25 host sshd[31567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.148.212 user=root Jan 15 08:50:25 host sshd[31567]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 08:50:27 host sshd[31567]: Failed password for invalid user root from 220.133.148.212 port 49680 ssh2 Jan 15 08:50:28 host unix_chkpwd[31595]: password check failed for user (root) Jan 15 08:50:28 host sshd[31567]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 08:50:30 host sshd[31567]: Failed password for invalid user root from 220.133.148.212 port 49680 ssh2 Jan 15 08:50:31 host unix_chkpwd[31598]: password check failed for user (root) Jan 15 08:50:31 host sshd[31567]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 08:50:33 host sshd[31567]: Failed password for invalid user root from 220.133.148.212 port 49680 ssh2 Jan 15 08:50:34 host unix_chkpwd[31602]: password check failed for user (root) Jan 15 08:50:34 host sshd[31567]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 08:50:36 host sshd[31567]: Failed password for invalid user root from 220.133.148.212 port 49680 ssh2 Jan 15 08:50:37 host unix_chkpwd[31623]: password check failed for user (root) Jan 15 08:50:37 host sshd[31567]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 08:50:39 host sshd[31567]: Failed password for invalid user root from 220.133.148.212 port 49680 ssh2 Jan 15 08:52:12 host sshd[31948]: User root from 175.126.232.120 not allowed because not listed in AllowUsers Jan 15 08:52:12 host sshd[31948]: input_userauth_request: invalid user root [preauth] Jan 15 08:52:12 host unix_chkpwd[31951]: password check failed for user (root) Jan 15 08:52:12 host sshd[31948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.232.120 user=root Jan 15 08:52:12 host sshd[31948]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 08:52:14 host sshd[31948]: Failed password for invalid user root from 175.126.232.120 port 53996 ssh2 Jan 15 08:52:14 host sshd[31948]: Received disconnect from 175.126.232.120 port 53996:11: Bye Bye [preauth] Jan 15 08:52:14 host sshd[31948]: Disconnected from 175.126.232.120 port 53996 [preauth] Jan 15 08:52:18 host sshd[31956]: User root from 142.93.100.226 not allowed because not listed in AllowUsers Jan 15 08:52:18 host sshd[31956]: input_userauth_request: invalid user root [preauth] Jan 15 08:52:18 host unix_chkpwd[31988]: password check failed for user (root) Jan 15 08:52:18 host sshd[31956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.100.226 user=root Jan 15 08:52:18 host sshd[31956]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 08:52:19 host sshd[31956]: Failed password for invalid user root from 142.93.100.226 port 51792 ssh2 Jan 15 08:52:19 host sshd[31956]: Received disconnect from 142.93.100.226 port 51792:11: Bye Bye [preauth] Jan 15 08:52:19 host sshd[31956]: Disconnected from 142.93.100.226 port 51792 [preauth] Jan 15 08:52:31 host sshd[32061]: User root from 154.68.225.162 not allowed because not listed in AllowUsers Jan 15 08:52:31 host sshd[32061]: input_userauth_request: invalid user root [preauth] Jan 15 08:52:31 host unix_chkpwd[32065]: password check failed for user (root) Jan 15 08:52:31 host sshd[32061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.225.162 user=root Jan 15 08:52:31 host sshd[32061]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 08:52:33 host sshd[32061]: Failed password for invalid user root from 154.68.225.162 port 44514 ssh2 Jan 15 08:53:16 host sshd[32149]: User root from 43.155.173.30 not allowed because not listed in AllowUsers Jan 15 08:53:16 host sshd[32149]: input_userauth_request: invalid user root [preauth] Jan 15 08:53:16 host unix_chkpwd[32151]: password check failed for user (root) Jan 15 08:53:16 host sshd[32149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.173.30 user=root Jan 15 08:53:16 host sshd[32149]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 08:53:18 host sshd[32149]: Failed password for invalid user root from 43.155.173.30 port 43278 ssh2 Jan 15 08:53:42 host sshd[32236]: User root from 198.12.85.199 not allowed because not listed in AllowUsers Jan 15 08:53:42 host sshd[32236]: input_userauth_request: invalid user root [preauth] Jan 15 08:53:42 host unix_chkpwd[32243]: password check failed for user (root) Jan 15 08:53:42 host sshd[32236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.12.85.199 user=root Jan 15 08:53:42 host sshd[32236]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 08:53:45 host sshd[32236]: Failed password for invalid user root from 198.12.85.199 port 40470 ssh2 Jan 15 08:53:45 host sshd[32236]: Received disconnect from 198.12.85.199 port 40470:11: Bye Bye [preauth] Jan 15 08:53:45 host sshd[32236]: Disconnected from 198.12.85.199 port 40470 [preauth] Jan 15 09:05:03 host sshd[1246]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 15 09:05:03 host sshd[1246]: input_userauth_request: invalid user root [preauth] Jan 15 09:05:04 host unix_chkpwd[1249]: password check failed for user (root) Jan 15 09:05:04 host sshd[1246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 15 09:05:04 host sshd[1246]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:05:05 host sshd[1246]: Failed password for invalid user root from 195.226.194.242 port 45758 ssh2 Jan 15 09:05:06 host sshd[1246]: Received disconnect from 195.226.194.242 port 45758:11: Bye Bye [preauth] Jan 15 09:05:06 host sshd[1246]: Disconnected from 195.226.194.242 port 45758 [preauth] Jan 15 09:06:01 host sshd[1454]: Invalid user admin from 122.117.185.252 port 46098 Jan 15 09:06:01 host sshd[1454]: input_userauth_request: invalid user admin [preauth] Jan 15 09:06:01 host sshd[1454]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:06:01 host sshd[1454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.185.252 Jan 15 09:06:03 host sshd[1454]: Failed password for invalid user admin from 122.117.185.252 port 46098 ssh2 Jan 15 09:06:04 host sshd[1454]: Failed password for invalid user admin from 122.117.185.252 port 46098 ssh2 Jan 15 09:06:05 host sshd[1454]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:06:06 host sshd[1454]: Failed password for invalid user admin from 122.117.185.252 port 46098 ssh2 Jan 15 09:06:07 host sshd[1454]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:06:09 host sshd[1454]: Failed password for invalid user admin from 122.117.185.252 port 46098 ssh2 Jan 15 09:06:11 host sshd[1454]: Connection reset by 122.117.185.252 port 46098 [preauth] Jan 15 09:06:11 host sshd[1454]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.185.252 Jan 15 09:06:22 host sshd[1517]: Invalid user pi from 49.213.228.22 port 60689 Jan 15 09:06:22 host sshd[1517]: input_userauth_request: invalid user pi [preauth] Jan 15 09:06:22 host sshd[1517]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:06:22 host sshd[1517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.213.228.22 Jan 15 09:06:24 host sshd[1517]: Failed password for invalid user pi from 49.213.228.22 port 60689 ssh2 Jan 15 09:06:25 host sshd[1517]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:06:27 host sshd[1517]: Failed password for invalid user pi from 49.213.228.22 port 60689 ssh2 Jan 15 09:06:28 host sshd[1517]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:06:30 host sshd[1517]: Failed password for invalid user pi from 49.213.228.22 port 60689 ssh2 Jan 15 09:06:30 host sshd[1532]: Invalid user pi from 122.116.242.182 port 59270 Jan 15 09:06:30 host sshd[1532]: input_userauth_request: invalid user pi [preauth] Jan 15 09:06:30 host sshd[1532]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:06:30 host sshd[1532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.242.182 Jan 15 09:06:31 host sshd[1517]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:06:32 host sshd[1532]: Failed password for invalid user pi from 122.116.242.182 port 59270 ssh2 Jan 15 09:06:33 host sshd[1517]: Failed password for invalid user pi from 49.213.228.22 port 60689 ssh2 Jan 15 09:06:33 host sshd[1532]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:06:33 host sshd[1517]: Connection reset by 49.213.228.22 port 60689 [preauth] Jan 15 09:06:33 host sshd[1517]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.213.228.22 Jan 15 09:06:33 host sshd[1517]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 15 09:06:35 host sshd[1532]: Failed password for invalid user pi from 122.116.242.182 port 59270 ssh2 Jan 15 09:06:36 host sshd[1532]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:06:38 host sshd[1532]: Failed password for invalid user pi from 122.116.242.182 port 59270 ssh2 Jan 15 09:06:39 host sshd[1532]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:06:41 host sshd[1532]: Failed password for invalid user pi from 122.116.242.182 port 59270 ssh2 Jan 15 09:06:41 host sshd[1532]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:06:43 host sshd[1532]: Failed password for invalid user pi from 122.116.242.182 port 59270 ssh2 Jan 15 09:08:06 host sshd[1802]: Did not receive identification string from 104.221.223.82 port 49790 Jan 15 09:08:07 host sshd[1804]: Invalid user postgres from 104.221.223.82 port 40878 Jan 15 09:08:07 host sshd[1804]: input_userauth_request: invalid user postgres [preauth] Jan 15 09:08:07 host sshd[1803]: Invalid user user from 104.221.223.82 port 40802 Jan 15 09:08:07 host sshd[1805]: Invalid user steam from 104.221.223.82 port 40836 Jan 15 09:08:07 host sshd[1803]: input_userauth_request: invalid user user [preauth] Jan 15 09:08:07 host sshd[1805]: input_userauth_request: invalid user steam [preauth] Jan 15 09:08:07 host sshd[1807]: Invalid user vagrant from 104.221.223.82 port 40972 Jan 15 09:08:07 host sshd[1807]: input_userauth_request: invalid user vagrant [preauth] Jan 15 09:08:07 host sshd[1815]: Invalid user testuser from 104.221.223.82 port 41106 Jan 15 09:08:07 host sshd[1815]: input_userauth_request: invalid user testuser [preauth] Jan 15 09:08:07 host sshd[1813]: User root from 104.221.223.82 not allowed because not listed in AllowUsers Jan 15 09:08:07 host sshd[1813]: input_userauth_request: invalid user root [preauth] Jan 15 09:08:07 host sshd[1811]: User root from 104.221.223.82 not allowed because not listed in AllowUsers Jan 15 09:08:07 host sshd[1811]: input_userauth_request: invalid user root [preauth] Jan 15 09:08:07 host sshd[1809]: User root from 104.221.223.82 not allowed because not listed in AllowUsers Jan 15 09:08:07 host sshd[1809]: input_userauth_request: invalid user root [preauth] Jan 15 09:08:07 host sshd[1810]: Invalid user admin from 104.221.223.82 port 40854 Jan 15 09:08:07 host sshd[1810]: input_userauth_request: invalid user admin [preauth] Jan 15 09:08:07 host sshd[1806]: User root from 104.221.223.82 not allowed because not listed in AllowUsers Jan 15 09:08:07 host sshd[1806]: input_userauth_request: invalid user root [preauth] Jan 15 09:08:07 host sshd[1816]: Invalid user ubuntu from 104.221.223.82 port 41040 Jan 15 09:08:07 host sshd[1816]: input_userauth_request: invalid user ubuntu [preauth] Jan 15 09:08:07 host sshd[1817]: Invalid user pi from 104.221.223.82 port 40800 Jan 15 09:08:07 host sshd[1817]: input_userauth_request: invalid user pi [preauth] Jan 15 09:08:07 host sshd[1814]: Invalid user test from 104.221.223.82 port 41144 Jan 15 09:08:07 host sshd[1814]: input_userauth_request: invalid user test [preauth] Jan 15 09:08:07 host sshd[1808]: Invalid user test from 104.221.223.82 port 40930 Jan 15 09:08:07 host sshd[1808]: input_userauth_request: invalid user test [preauth] Jan 15 09:08:07 host sshd[1812]: Invalid user ftpuser from 104.221.223.82 port 41090 Jan 15 09:08:07 host sshd[1812]: input_userauth_request: invalid user ftpuser [preauth] Jan 15 09:08:07 host sshd[1821]: Invalid user devops from 104.221.223.82 port 41008 Jan 15 09:08:07 host sshd[1821]: input_userauth_request: invalid user devops [preauth] Jan 15 09:08:07 host sshd[1818]: Invalid user oracle from 104.221.223.82 port 40978 Jan 15 09:08:07 host sshd[1818]: input_userauth_request: invalid user oracle [preauth] Jan 15 09:08:07 host sshd[1820]: User centos from 104.221.223.82 not allowed because not listed in AllowUsers Jan 15 09:08:07 host sshd[1820]: input_userauth_request: invalid user centos [preauth] Jan 15 09:08:07 host sshd[1819]: Invalid user postgres from 104.221.223.82 port 40814 Jan 15 09:08:07 host sshd[1819]: input_userauth_request: invalid user postgres [preauth] Jan 15 09:08:07 host sshd[1822]: Invalid user admin from 104.221.223.82 port 41084 Jan 15 09:08:07 host sshd[1822]: input_userauth_request: invalid user admin [preauth] Jan 15 09:08:07 host sshd[1823]: Invalid user test from 104.221.223.82 port 41056 Jan 15 09:08:07 host sshd[1823]: input_userauth_request: invalid user test [preauth] Jan 15 09:08:07 host sshd[1826]: Invalid user ec2-user from 104.221.223.82 port 40916 Jan 15 09:08:07 host sshd[1826]: input_userauth_request: invalid user ec2-user [preauth] Jan 15 09:08:07 host sshd[1827]: Invalid user devops from 104.221.223.82 port 41118 Jan 15 09:08:07 host sshd[1827]: input_userauth_request: invalid user devops [preauth] Jan 15 09:08:07 host sshd[1825]: User root from 104.221.223.82 not allowed because not listed in AllowUsers Jan 15 09:08:07 host sshd[1825]: input_userauth_request: invalid user root [preauth] Jan 15 09:08:07 host sshd[1824]: Invalid user testuser from 104.221.223.82 port 40882 Jan 15 09:08:07 host sshd[1824]: input_userauth_request: invalid user testuser [preauth] Jan 15 09:08:07 host sshd[1831]: Invalid user steam from 104.221.223.82 port 41174 Jan 15 09:08:07 host sshd[1831]: input_userauth_request: invalid user steam [preauth] Jan 15 09:08:07 host sshd[1830]: Invalid user dev from 104.221.223.82 port 40906 Jan 15 09:08:07 host sshd[1830]: input_userauth_request: invalid user dev [preauth] Jan 15 09:08:07 host sshd[1805]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host sshd[1803]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host sshd[1804]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host sshd[1807]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host sshd[1817]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host sshd[1812]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host sshd[1808]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host sshd[1810]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host sshd[1815]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host sshd[1816]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host sshd[1821]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host sshd[1814]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host sshd[1818]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1819]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host sshd[1818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host sshd[1822]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host sshd[1823]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host unix_chkpwd[1874]: password check failed for user (root) Jan 15 09:08:07 host sshd[1813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 user=root Jan 15 09:08:07 host sshd[1826]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1813]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:08:07 host sshd[1826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host unix_chkpwd[1879]: password check failed for user (centos) Jan 15 09:08:07 host sshd[1820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 user=centos Jan 15 09:08:07 host unix_chkpwd[1876]: password check failed for user (root) Jan 15 09:08:07 host sshd[1806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 user=root Jan 15 09:08:07 host sshd[1806]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:08:07 host sshd[1827]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host sshd[1824]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host unix_chkpwd[1877]: password check failed for user (root) Jan 15 09:08:07 host sshd[1809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 user=root Jan 15 09:08:07 host sshd[1809]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:08:07 host unix_chkpwd[1878]: password check failed for user (root) Jan 15 09:08:07 host sshd[1811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 user=root Jan 15 09:08:07 host sshd[1811]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:08:07 host sshd[1831]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host sshd[1830]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:08:07 host sshd[1830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 Jan 15 09:08:07 host unix_chkpwd[1880]: password check failed for user (root) Jan 15 09:08:07 host sshd[1825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.221.223.82 user=root Jan 15 09:08:07 host sshd[1825]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:08:09 host sshd[1805]: Failed password for invalid user steam from 104.221.223.82 port 40836 ssh2 Jan 15 09:08:09 host sshd[1803]: Failed password for invalid user user from 104.221.223.82 port 40802 ssh2 Jan 15 09:08:09 host sshd[1804]: Failed password for invalid user postgres from 104.221.223.82 port 40878 ssh2 Jan 15 09:08:09 host sshd[1807]: Failed password for invalid user vagrant from 104.221.223.82 port 40972 ssh2 Jan 15 09:08:09 host sshd[1817]: Failed password for invalid user pi from 104.221.223.82 port 40800 ssh2 Jan 15 09:08:09 host sshd[1812]: Failed password for invalid user ftpuser from 104.221.223.82 port 41090 ssh2 Jan 15 09:08:09 host sshd[1808]: Failed password for invalid user test from 104.221.223.82 port 40930 ssh2 Jan 15 09:08:09 host sshd[1810]: Failed password for invalid user admin from 104.221.223.82 port 40854 ssh2 Jan 15 09:08:09 host sshd[1815]: Failed password for invalid user testuser from 104.221.223.82 port 41106 ssh2 Jan 15 09:08:09 host sshd[1816]: Failed password for invalid user ubuntu from 104.221.223.82 port 41040 ssh2 Jan 15 09:08:09 host sshd[1821]: Failed password for invalid user devops from 104.221.223.82 port 41008 ssh2 Jan 15 09:08:09 host sshd[1814]: Failed password for invalid user test from 104.221.223.82 port 41144 ssh2 Jan 15 09:08:09 host sshd[1818]: Failed password for invalid user oracle from 104.221.223.82 port 40978 ssh2 Jan 15 09:08:09 host sshd[1819]: Failed password for invalid user postgres from 104.221.223.82 port 40814 ssh2 Jan 15 09:08:09 host sshd[1822]: Failed password for invalid user admin from 104.221.223.82 port 41084 ssh2 Jan 15 09:08:09 host sshd[1823]: Failed password for invalid user test from 104.221.223.82 port 41056 ssh2 Jan 15 09:08:09 host sshd[1813]: Failed password for invalid user root from 104.221.223.82 port 41184 ssh2 Jan 15 09:08:09 host sshd[1826]: Failed password for invalid user ec2-user from 104.221.223.82 port 40916 ssh2 Jan 15 09:08:09 host sshd[1820]: Failed password for invalid user centos from 104.221.223.82 port 41134 ssh2 Jan 15 09:08:09 host sshd[1806]: Failed password for invalid user root from 104.221.223.82 port 41032 ssh2 Jan 15 09:08:09 host sshd[1827]: Failed password for invalid user devops from 104.221.223.82 port 41118 ssh2 Jan 15 09:08:09 host sshd[1824]: Failed password for invalid user testuser from 104.221.223.82 port 40882 ssh2 Jan 15 09:08:09 host sshd[1809]: Failed password for invalid user root from 104.221.223.82 port 41074 ssh2 Jan 15 09:08:09 host sshd[1811]: Failed password for invalid user root from 104.221.223.82 port 41018 ssh2 Jan 15 09:08:09 host sshd[1831]: Failed password for invalid user steam from 104.221.223.82 port 41174 ssh2 Jan 15 09:08:09 host sshd[1830]: Failed password for invalid user dev from 104.221.223.82 port 40906 ssh2 Jan 15 09:08:09 host sshd[1825]: Failed password for invalid user root from 104.221.223.82 port 41046 ssh2 Jan 15 09:08:23 host sshd[1945]: Did not receive identification string from 149.129.220.222 port 61000 Jan 15 09:11:14 host sshd[2387]: User root from 134.17.89.151 not allowed because not listed in AllowUsers Jan 15 09:11:14 host sshd[2387]: input_userauth_request: invalid user root [preauth] Jan 15 09:11:14 host unix_chkpwd[2392]: password check failed for user (root) Jan 15 09:11:14 host sshd[2387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.89.151 user=root Jan 15 09:11:14 host sshd[2387]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:11:16 host sshd[2387]: Failed password for invalid user root from 134.17.89.151 port 45436 ssh2 Jan 15 09:11:16 host sshd[2387]: Received disconnect from 134.17.89.151 port 45436:11: Bye Bye [preauth] Jan 15 09:11:16 host sshd[2387]: Disconnected from 134.17.89.151 port 45436 [preauth] Jan 15 09:11:46 host sshd[2453]: User root from 134.17.89.182 not allowed because not listed in AllowUsers Jan 15 09:11:46 host sshd[2453]: input_userauth_request: invalid user root [preauth] Jan 15 09:11:46 host unix_chkpwd[2456]: password check failed for user (root) Jan 15 09:11:46 host sshd[2453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.89.182 user=root Jan 15 09:11:46 host sshd[2453]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:11:47 host sshd[2453]: Failed password for invalid user root from 134.17.89.182 port 35404 ssh2 Jan 15 09:11:47 host sshd[2453]: Received disconnect from 134.17.89.182 port 35404:11: Bye Bye [preauth] Jan 15 09:11:47 host sshd[2453]: Disconnected from 134.17.89.182 port 35404 [preauth] Jan 15 09:12:05 host sshd[2487]: User root from 103.129.221.188 not allowed because not listed in AllowUsers Jan 15 09:12:05 host sshd[2487]: input_userauth_request: invalid user root [preauth] Jan 15 09:12:05 host unix_chkpwd[2489]: password check failed for user (root) Jan 15 09:12:05 host sshd[2487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.221.188 user=root Jan 15 09:12:05 host sshd[2487]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:12:06 host sshd[2487]: Failed password for invalid user root from 103.129.221.188 port 55336 ssh2 Jan 15 09:12:07 host sshd[2487]: Received disconnect from 103.129.221.188 port 55336:11: Bye Bye [preauth] Jan 15 09:12:07 host sshd[2487]: Disconnected from 103.129.221.188 port 55336 [preauth] Jan 15 09:15:06 host sshd[2827]: User root from 134.17.89.151 not allowed because not listed in AllowUsers Jan 15 09:15:06 host sshd[2827]: input_userauth_request: invalid user root [preauth] Jan 15 09:15:06 host unix_chkpwd[2832]: password check failed for user (root) Jan 15 09:15:06 host sshd[2827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.89.151 user=root Jan 15 09:15:06 host sshd[2827]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:15:08 host sshd[2827]: Failed password for invalid user root from 134.17.89.151 port 60998 ssh2 Jan 15 09:15:08 host sshd[2827]: Received disconnect from 134.17.89.151 port 60998:11: Bye Bye [preauth] Jan 15 09:15:08 host sshd[2827]: Disconnected from 134.17.89.151 port 60998 [preauth] Jan 15 09:16:27 host sshd[3108]: User root from 134.17.89.182 not allowed because not listed in AllowUsers Jan 15 09:16:27 host sshd[3108]: input_userauth_request: invalid user root [preauth] Jan 15 09:16:27 host unix_chkpwd[3111]: password check failed for user (root) Jan 15 09:16:27 host sshd[3108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.89.182 user=root Jan 15 09:16:27 host sshd[3108]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:16:28 host sshd[3108]: Failed password for invalid user root from 134.17.89.182 port 49104 ssh2 Jan 15 09:16:36 host sshd[3170]: User root from 103.129.221.188 not allowed because not listed in AllowUsers Jan 15 09:16:36 host sshd[3170]: input_userauth_request: invalid user root [preauth] Jan 15 09:16:36 host unix_chkpwd[3174]: password check failed for user (root) Jan 15 09:16:36 host sshd[3170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.221.188 user=root Jan 15 09:16:36 host sshd[3170]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:16:39 host sshd[3170]: Failed password for invalid user root from 103.129.221.188 port 40292 ssh2 Jan 15 09:18:37 host sshd[3427]: Invalid user ei from 194.110.203.109 port 48554 Jan 15 09:18:37 host sshd[3427]: input_userauth_request: invalid user ei [preauth] Jan 15 09:18:37 host sshd[3427]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:18:37 host sshd[3427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 09:18:38 host sshd[3427]: Failed password for invalid user ei from 194.110.203.109 port 48554 ssh2 Jan 15 09:18:42 host sshd[3427]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:18:44 host sshd[3427]: Failed password for invalid user ei from 194.110.203.109 port 48554 ssh2 Jan 15 09:18:47 host sshd[3427]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:18:49 host sshd[3427]: Failed password for invalid user ei from 194.110.203.109 port 48554 ssh2 Jan 15 09:18:52 host sshd[3427]: Connection closed by 194.110.203.109 port 48554 [preauth] Jan 15 09:18:52 host sshd[3427]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 09:20:53 host sshd[3801]: Invalid user dlxuser from 125.136.160.103 port 63688 Jan 15 09:20:53 host sshd[3801]: input_userauth_request: invalid user dlxuser [preauth] Jan 15 09:20:53 host sshd[3801]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:20:53 host sshd[3801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.136.160.103 Jan 15 09:20:55 host sshd[3801]: Failed password for invalid user dlxuser from 125.136.160.103 port 63688 ssh2 Jan 15 09:20:56 host sshd[3801]: Connection reset by 125.136.160.103 port 63688 [preauth] Jan 15 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 09:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 09:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 09:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 09:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 09:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 09:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 09:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 09:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 09:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 09:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 09:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 09:22:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 09:22:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=ugotscom user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=wwwpmcresource user-12=wwwtestugo user-13=shalinijames user-14=vfmassets user-15=pmcresources user-16=disposeat user-17=remysagr user-18=wwwkmaorg user-19=wwwkapin user-20=woodpeck user-21=kottayamcalldriv user-22=phmetals user-23=gifterman user-24=palco123 user-25=mrsclean user-26=wwwnexidigital user-27=wwwevmhonda user-28=bonifacegroup user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 09:22:19 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 09:22:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 09:22:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bt5gxA6EvqETMqkw.~ Jan 15 09:22:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bt5gxA6EvqETMqkw.~' Jan 15 09:22:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bt5gxA6EvqETMqkw.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 09:22:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 09:22:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 09:22:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 09:22:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 09:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 09:22:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 09:22:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 09:22:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 09:22:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:22:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 09:22:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 09:22:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 09:23:51 host sshd[4390]: Invalid user ONTUSER from 14.55.203.133 port 61539 Jan 15 09:23:51 host sshd[4390]: input_userauth_request: invalid user ONTUSER [preauth] Jan 15 09:23:51 host sshd[4390]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:23:51 host sshd[4390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.55.203.133 Jan 15 09:23:53 host sshd[4390]: Failed password for invalid user ONTUSER from 14.55.203.133 port 61539 ssh2 Jan 15 09:23:53 host sshd[4390]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:23:55 host sshd[4390]: Failed password for invalid user ONTUSER from 14.55.203.133 port 61539 ssh2 Jan 15 09:23:56 host sshd[4390]: Failed password for invalid user ONTUSER from 14.55.203.133 port 61539 ssh2 Jan 15 09:23:56 host sshd[4390]: Connection closed by 14.55.203.133 port 61539 [preauth] Jan 15 09:23:56 host sshd[4390]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.55.203.133 Jan 15 09:25:01 host sshd[4548]: Connection reset by 220.135.187.20 port 56435 [preauth] Jan 15 09:25:08 host sshd[4577]: Invalid user steam from 59.126.176.209 port 60210 Jan 15 09:25:08 host sshd[4577]: input_userauth_request: invalid user steam [preauth] Jan 15 09:25:08 host sshd[4577]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:25:08 host sshd[4577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.176.209 Jan 15 09:25:10 host sshd[4577]: Failed password for invalid user steam from 59.126.176.209 port 60210 ssh2 Jan 15 09:25:12 host sshd[4577]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:25:13 host sshd[4577]: Failed password for invalid user steam from 59.126.176.209 port 60210 ssh2 Jan 15 09:25:14 host sshd[4577]: Failed password for invalid user steam from 59.126.176.209 port 60210 ssh2 Jan 15 09:25:14 host sshd[4577]: Connection closed by 59.126.176.209 port 60210 [preauth] Jan 15 09:25:14 host sshd[4577]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.176.209 Jan 15 09:28:20 host sshd[4930]: Invalid user admin from 84.255.173.151 port 60063 Jan 15 09:28:20 host sshd[4930]: input_userauth_request: invalid user admin [preauth] Jan 15 09:28:20 host sshd[4930]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:28:20 host sshd[4930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.255.173.151 Jan 15 09:28:23 host sshd[4930]: Failed password for invalid user admin from 84.255.173.151 port 60063 ssh2 Jan 15 09:28:23 host sshd[4930]: Failed password for invalid user admin from 84.255.173.151 port 60063 ssh2 Jan 15 09:28:24 host sshd[4930]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:28:26 host sshd[4930]: Failed password for invalid user admin from 84.255.173.151 port 60063 ssh2 Jan 15 09:28:26 host sshd[4930]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:28:29 host sshd[4930]: Failed password for invalid user admin from 84.255.173.151 port 60063 ssh2 Jan 15 09:28:29 host sshd[4930]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:28:31 host sshd[4930]: Failed password for invalid user admin from 84.255.173.151 port 60063 ssh2 Jan 15 09:28:34 host sshd[4930]: Connection reset by 84.255.173.151 port 60063 [preauth] Jan 15 09:28:34 host sshd[4930]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.255.173.151 Jan 15 09:28:34 host sshd[4930]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 15 09:34:44 host sshd[5884]: User root from 159.203.11.165 not allowed because not listed in AllowUsers Jan 15 09:34:44 host sshd[5884]: input_userauth_request: invalid user root [preauth] Jan 15 09:34:44 host unix_chkpwd[5891]: password check failed for user (root) Jan 15 09:34:44 host sshd[5884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.11.165 user=root Jan 15 09:34:44 host sshd[5884]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:34:46 host sshd[5884]: Failed password for invalid user root from 159.203.11.165 port 33846 ssh2 Jan 15 09:34:47 host sshd[5884]: Received disconnect from 159.203.11.165 port 33846:11: Bye Bye [preauth] Jan 15 09:34:47 host sshd[5884]: Disconnected from 159.203.11.165 port 33846 [preauth] Jan 15 09:35:15 host sshd[5955]: User root from 125.229.55.11 not allowed because not listed in AllowUsers Jan 15 09:35:15 host sshd[5955]: input_userauth_request: invalid user root [preauth] Jan 15 09:35:15 host unix_chkpwd[5960]: password check failed for user (root) Jan 15 09:35:15 host sshd[5955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.55.11 user=root Jan 15 09:35:15 host sshd[5955]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:35:18 host sshd[5955]: Failed password for invalid user root from 125.229.55.11 port 60799 ssh2 Jan 15 09:35:18 host sshd[5955]: Connection reset by 125.229.55.11 port 60799 [preauth] Jan 15 09:35:25 host sshd[6012]: Invalid user francis from 195.226.194.242 port 29498 Jan 15 09:35:25 host sshd[6012]: input_userauth_request: invalid user francis [preauth] Jan 15 09:35:25 host sshd[6012]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:35:25 host sshd[6012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 15 09:35:27 host sshd[6012]: Failed password for invalid user francis from 195.226.194.242 port 29498 ssh2 Jan 15 09:35:27 host sshd[6012]: Received disconnect from 195.226.194.242 port 29498:11: Bye Bye [preauth] Jan 15 09:35:27 host sshd[6012]: Disconnected from 195.226.194.242 port 29498 [preauth] Jan 15 09:36:45 host sshd[6303]: User root from 51.75.170.189 not allowed because not listed in AllowUsers Jan 15 09:36:45 host sshd[6303]: input_userauth_request: invalid user root [preauth] Jan 15 09:36:45 host unix_chkpwd[6306]: password check failed for user (root) Jan 15 09:36:45 host sshd[6303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.170.189 user=root Jan 15 09:36:45 host sshd[6303]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:36:47 host sshd[6303]: Failed password for invalid user root from 51.75.170.189 port 41990 ssh2 Jan 15 09:36:47 host sshd[6303]: Received disconnect from 51.75.170.189 port 41990:11: Bye Bye [preauth] Jan 15 09:36:47 host sshd[6303]: Disconnected from 51.75.170.189 port 41990 [preauth] Jan 15 09:40:14 host sshd[6755]: User root from 152.228.174.113 not allowed because not listed in AllowUsers Jan 15 09:40:14 host sshd[6755]: input_userauth_request: invalid user root [preauth] Jan 15 09:40:14 host unix_chkpwd[6758]: password check failed for user (root) Jan 15 09:40:14 host sshd[6755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.228.174.113 user=root Jan 15 09:40:14 host sshd[6755]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:40:17 host sshd[6755]: Failed password for invalid user root from 152.228.174.113 port 34108 ssh2 Jan 15 09:40:17 host sshd[6755]: Received disconnect from 152.228.174.113 port 34108:11: Bye Bye [preauth] Jan 15 09:40:17 host sshd[6755]: Disconnected from 152.228.174.113 port 34108 [preauth] Jan 15 09:40:17 host sshd[6760]: User root from 159.203.11.165 not allowed because not listed in AllowUsers Jan 15 09:40:17 host sshd[6760]: input_userauth_request: invalid user root [preauth] Jan 15 09:40:17 host unix_chkpwd[6763]: password check failed for user (root) Jan 15 09:40:17 host sshd[6760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.11.165 user=root Jan 15 09:40:17 host sshd[6760]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:40:19 host sshd[6760]: Failed password for invalid user root from 159.203.11.165 port 34774 ssh2 Jan 15 09:41:10 host sshd[6892]: User root from 51.75.170.189 not allowed because not listed in AllowUsers Jan 15 09:41:10 host sshd[6892]: input_userauth_request: invalid user root [preauth] Jan 15 09:41:10 host unix_chkpwd[6895]: password check failed for user (root) Jan 15 09:41:10 host sshd[6892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.170.189 user=root Jan 15 09:41:10 host sshd[6892]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:41:12 host sshd[6892]: Failed password for invalid user root from 51.75.170.189 port 42210 ssh2 Jan 15 09:41:12 host sshd[6892]: Received disconnect from 51.75.170.189 port 42210:11: Bye Bye [preauth] Jan 15 09:41:12 host sshd[6892]: Disconnected from 51.75.170.189 port 42210 [preauth] Jan 15 09:41:52 host sshd[7120]: User root from 152.228.174.113 not allowed because not listed in AllowUsers Jan 15 09:41:52 host sshd[7120]: input_userauth_request: invalid user root [preauth] Jan 15 09:41:52 host unix_chkpwd[7123]: password check failed for user (root) Jan 15 09:41:52 host sshd[7120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.228.174.113 user=root Jan 15 09:41:52 host sshd[7120]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:41:55 host sshd[7120]: Failed password for invalid user root from 152.228.174.113 port 54628 ssh2 Jan 15 09:43:05 host sshd[7316]: User root from 123.240.224.118 not allowed because not listed in AllowUsers Jan 15 09:43:05 host sshd[7316]: input_userauth_request: invalid user root [preauth] Jan 15 09:43:05 host unix_chkpwd[7319]: password check failed for user (root) Jan 15 09:43:05 host sshd[7316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.240.224.118 user=root Jan 15 09:43:05 host sshd[7316]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:43:07 host sshd[7316]: Failed password for invalid user root from 123.240.224.118 port 45863 ssh2 Jan 15 09:43:11 host unix_chkpwd[7328]: password check failed for user (root) Jan 15 09:43:11 host sshd[7316]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:43:13 host sshd[7316]: Failed password for invalid user root from 123.240.224.118 port 45863 ssh2 Jan 15 09:43:15 host unix_chkpwd[7335]: password check failed for user (root) Jan 15 09:43:15 host sshd[7316]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:43:17 host sshd[7316]: Failed password for invalid user root from 123.240.224.118 port 45863 ssh2 Jan 15 09:43:18 host unix_chkpwd[7340]: password check failed for user (root) Jan 15 09:43:18 host sshd[7316]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:43:20 host sshd[7316]: Failed password for invalid user root from 123.240.224.118 port 45863 ssh2 Jan 15 09:43:26 host sshd[7383]: Invalid user vadmin from 122.117.83.43 port 33065 Jan 15 09:43:26 host sshd[7383]: input_userauth_request: invalid user vadmin [preauth] Jan 15 09:43:26 host sshd[7383]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:43:26 host sshd[7383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.83.43 Jan 15 09:43:28 host sshd[7383]: Failed password for invalid user vadmin from 122.117.83.43 port 33065 ssh2 Jan 15 09:43:29 host sshd[7383]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:43:31 host sshd[7383]: Failed password for invalid user vadmin from 122.117.83.43 port 33065 ssh2 Jan 15 09:43:32 host sshd[7383]: Failed password for invalid user vadmin from 122.117.83.43 port 33065 ssh2 Jan 15 09:43:32 host sshd[7383]: Connection closed by 122.117.83.43 port 33065 [preauth] Jan 15 09:43:32 host sshd[7383]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.83.43 Jan 15 09:43:55 host sshd[7460]: Invalid user danny from 107.189.30.59 port 34868 Jan 15 09:43:55 host sshd[7460]: input_userauth_request: invalid user danny [preauth] Jan 15 09:43:55 host sshd[7460]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:43:55 host sshd[7460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 15 09:43:57 host sshd[7460]: Failed password for invalid user danny from 107.189.30.59 port 34868 ssh2 Jan 15 09:43:58 host sshd[7460]: Connection closed by 107.189.30.59 port 34868 [preauth] Jan 15 09:48:27 host sshd[8127]: User root from 220.72.248.26 not allowed because not listed in AllowUsers Jan 15 09:48:27 host sshd[8127]: input_userauth_request: invalid user root [preauth] Jan 15 09:48:27 host unix_chkpwd[8131]: password check failed for user (root) Jan 15 09:48:27 host sshd[8127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.72.248.26 user=root Jan 15 09:48:27 host sshd[8127]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:48:29 host sshd[8127]: Failed password for invalid user root from 220.72.248.26 port 32982 ssh2 Jan 15 09:48:30 host unix_chkpwd[8156]: password check failed for user (root) Jan 15 09:48:30 host sshd[8127]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:48:32 host sshd[8127]: Failed password for invalid user root from 220.72.248.26 port 32982 ssh2 Jan 15 09:48:32 host unix_chkpwd[8159]: password check failed for user (root) Jan 15 09:48:32 host sshd[8127]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:48:34 host sshd[8127]: Failed password for invalid user root from 220.72.248.26 port 32982 ssh2 Jan 15 09:48:35 host unix_chkpwd[8162]: password check failed for user (root) Jan 15 09:48:35 host sshd[8127]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:48:37 host sshd[8127]: Failed password for invalid user root from 220.72.248.26 port 32982 ssh2 Jan 15 09:48:37 host sshd[8163]: Invalid user user from 82.114.228.214 port 53776 Jan 15 09:48:37 host sshd[8163]: input_userauth_request: invalid user user [preauth] Jan 15 09:48:37 host sshd[8163]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:48:37 host sshd[8163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.114.228.214 Jan 15 09:48:38 host unix_chkpwd[8169]: password check failed for user (root) Jan 15 09:48:38 host sshd[8127]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:48:39 host sshd[8127]: Failed password for invalid user root from 220.72.248.26 port 32982 ssh2 Jan 15 09:48:40 host sshd[8163]: Failed password for invalid user user from 82.114.228.214 port 53776 ssh2 Jan 15 09:48:41 host sshd[8163]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:48:43 host sshd[8163]: Failed password for invalid user user from 82.114.228.214 port 53776 ssh2 Jan 15 09:48:43 host sshd[8163]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:48:46 host sshd[8163]: Failed password for invalid user user from 82.114.228.214 port 53776 ssh2 Jan 15 09:48:46 host sshd[8163]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:48:49 host sshd[8163]: Failed password for invalid user user from 82.114.228.214 port 53776 ssh2 Jan 15 09:48:49 host sshd[8163]: Connection reset by 82.114.228.214 port 53776 [preauth] Jan 15 09:48:49 host sshd[8163]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.114.228.214 Jan 15 09:48:49 host sshd[8163]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 15 09:50:04 host sshd[8414]: User root from 43.153.210.18 not allowed because not listed in AllowUsers Jan 15 09:50:04 host sshd[8414]: input_userauth_request: invalid user root [preauth] Jan 15 09:50:04 host unix_chkpwd[8416]: password check failed for user (root) Jan 15 09:50:04 host sshd[8414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.210.18 user=root Jan 15 09:50:04 host sshd[8414]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:50:06 host sshd[8414]: Failed password for invalid user root from 43.153.210.18 port 33854 ssh2 Jan 15 09:50:06 host sshd[8414]: Received disconnect from 43.153.210.18 port 33854:11: Bye Bye [preauth] Jan 15 09:50:06 host sshd[8414]: Disconnected from 43.153.210.18 port 33854 [preauth] Jan 15 09:51:18 host sshd[8533]: User root from 102.129.37.140 not allowed because not listed in AllowUsers Jan 15 09:51:18 host sshd[8533]: input_userauth_request: invalid user root [preauth] Jan 15 09:51:18 host unix_chkpwd[8536]: password check failed for user (root) Jan 15 09:51:18 host sshd[8533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.129.37.140 user=root Jan 15 09:51:18 host sshd[8533]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:51:19 host sshd[8533]: Failed password for invalid user root from 102.129.37.140 port 40722 ssh2 Jan 15 09:51:19 host sshd[8533]: Received disconnect from 102.129.37.140 port 40722:11: Bye Bye [preauth] Jan 15 09:51:19 host sshd[8533]: Disconnected from 102.129.37.140 port 40722 [preauth] Jan 15 09:52:17 host sshd[8664]: User root from 107.173.156.194 not allowed because not listed in AllowUsers Jan 15 09:52:17 host sshd[8664]: input_userauth_request: invalid user root [preauth] Jan 15 09:52:17 host unix_chkpwd[8668]: password check failed for user (root) Jan 15 09:52:17 host sshd[8664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.156.194 user=root Jan 15 09:52:17 host sshd[8664]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:52:19 host sshd[8664]: Failed password for invalid user root from 107.173.156.194 port 59348 ssh2 Jan 15 09:52:20 host sshd[8664]: Received disconnect from 107.173.156.194 port 59348:11: Bye Bye [preauth] Jan 15 09:52:20 host sshd[8664]: Disconnected from 107.173.156.194 port 59348 [preauth] Jan 15 09:54:30 host sshd[8881]: Invalid user pi from 119.196.240.71 port 63425 Jan 15 09:54:30 host sshd[8881]: input_userauth_request: invalid user pi [preauth] Jan 15 09:54:30 host sshd[8881]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:54:30 host sshd[8881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.196.240.71 Jan 15 09:54:31 host sshd[8905]: User root from 107.173.156.194 not allowed because not listed in AllowUsers Jan 15 09:54:31 host sshd[8905]: input_userauth_request: invalid user root [preauth] Jan 15 09:54:31 host unix_chkpwd[8909]: password check failed for user (root) Jan 15 09:54:31 host sshd[8905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.156.194 user=root Jan 15 09:54:31 host sshd[8905]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:54:31 host sshd[8881]: Failed password for invalid user pi from 119.196.240.71 port 63425 ssh2 Jan 15 09:54:32 host sshd[8881]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:54:33 host sshd[8905]: Failed password for invalid user root from 107.173.156.194 port 34012 ssh2 Jan 15 09:54:33 host sshd[8905]: Received disconnect from 107.173.156.194 port 34012:11: Bye Bye [preauth] Jan 15 09:54:33 host sshd[8905]: Disconnected from 107.173.156.194 port 34012 [preauth] Jan 15 09:54:34 host sshd[8881]: Failed password for invalid user pi from 119.196.240.71 port 63425 ssh2 Jan 15 09:54:35 host sshd[8881]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:54:37 host sshd[8881]: Failed password for invalid user pi from 119.196.240.71 port 63425 ssh2 Jan 15 09:54:38 host sshd[8881]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:54:40 host sshd[8881]: Failed password for invalid user pi from 119.196.240.71 port 63425 ssh2 Jan 15 09:54:41 host sshd[8881]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:54:42 host sshd[8881]: Failed password for invalid user pi from 119.196.240.71 port 63425 ssh2 Jan 15 09:54:43 host sshd[8881]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:54:46 host sshd[8881]: Failed password for invalid user pi from 119.196.240.71 port 63425 ssh2 Jan 15 09:54:46 host sshd[8881]: error: maximum authentication attempts exceeded for invalid user pi from 119.196.240.71 port 63425 ssh2 [preauth] Jan 15 09:54:46 host sshd[8881]: Disconnecting: Too many authentication failures [preauth] Jan 15 09:54:46 host sshd[8881]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.196.240.71 Jan 15 09:54:46 host sshd[8881]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 15 09:55:11 host sshd[9134]: User root from 43.153.210.18 not allowed because not listed in AllowUsers Jan 15 09:55:11 host sshd[9134]: input_userauth_request: invalid user root [preauth] Jan 15 09:55:11 host unix_chkpwd[9136]: password check failed for user (root) Jan 15 09:55:11 host sshd[9134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.210.18 user=root Jan 15 09:55:11 host sshd[9134]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:55:14 host sshd[9134]: Failed password for invalid user root from 43.153.210.18 port 50768 ssh2 Jan 15 09:55:14 host sshd[9134]: Received disconnect from 43.153.210.18 port 50768:11: Bye Bye [preauth] Jan 15 09:55:14 host sshd[9134]: Disconnected from 43.153.210.18 port 50768 [preauth] Jan 15 09:56:17 host sshd[9329]: Invalid user admin from 220.87.209.99 port 60962 Jan 15 09:56:17 host sshd[9329]: input_userauth_request: invalid user admin [preauth] Jan 15 09:56:17 host sshd[9329]: pam_unix(sshd:auth): check pass; user unknown Jan 15 09:56:17 host sshd[9329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.87.209.99 Jan 15 09:56:20 host sshd[9329]: Failed password for invalid user admin from 220.87.209.99 port 60962 ssh2 Jan 15 09:56:20 host sshd[9329]: Failed password for invalid user admin from 220.87.209.99 port 60962 ssh2 Jan 15 09:56:21 host sshd[9329]: Connection reset by 220.87.209.99 port 60962 [preauth] Jan 15 09:57:55 host sshd[9577]: User root from 102.129.37.140 not allowed because not listed in AllowUsers Jan 15 09:57:55 host sshd[9577]: input_userauth_request: invalid user root [preauth] Jan 15 09:57:55 host unix_chkpwd[9584]: password check failed for user (root) Jan 15 09:57:55 host sshd[9577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.129.37.140 user=root Jan 15 09:57:55 host sshd[9577]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 09:57:57 host sshd[9577]: Failed password for invalid user root from 102.129.37.140 port 40876 ssh2 Jan 15 09:57:57 host sshd[9577]: Received disconnect from 102.129.37.140 port 40876:11: Bye Bye [preauth] Jan 15 09:57:57 host sshd[9577]: Disconnected from 102.129.37.140 port 40876 [preauth] Jan 15 10:01:19 host sshd[10212]: User root from 143.198.39.194 not allowed because not listed in AllowUsers Jan 15 10:01:19 host sshd[10212]: input_userauth_request: invalid user root [preauth] Jan 15 10:01:19 host unix_chkpwd[10217]: password check failed for user (root) Jan 15 10:01:19 host sshd[10212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.39.194 user=root Jan 15 10:01:19 host sshd[10212]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 10:01:21 host sshd[10212]: Failed password for invalid user root from 143.198.39.194 port 59102 ssh2 Jan 15 10:01:22 host sshd[10212]: Received disconnect from 143.198.39.194 port 59102:11: Bye Bye [preauth] Jan 15 10:01:22 host sshd[10212]: Disconnected from 143.198.39.194 port 59102 [preauth] Jan 15 10:02:00 host sshd[10281]: User root from 64.227.72.154 not allowed because not listed in AllowUsers Jan 15 10:02:00 host sshd[10281]: input_userauth_request: invalid user root [preauth] Jan 15 10:02:00 host unix_chkpwd[10284]: password check failed for user (root) Jan 15 10:02:00 host sshd[10281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.72.154 user=root Jan 15 10:02:00 host sshd[10281]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 10:02:02 host sshd[10281]: Failed password for invalid user root from 64.227.72.154 port 39346 ssh2 Jan 15 10:02:02 host sshd[10281]: Received disconnect from 64.227.72.154 port 39346:11: Bye Bye [preauth] Jan 15 10:02:02 host sshd[10281]: Disconnected from 64.227.72.154 port 39346 [preauth] Jan 15 10:03:16 host sshd[10424]: Connection reset by 211.250.39.72 port 44498 [preauth] Jan 15 10:04:18 host sshd[10552]: User root from 203.172.76.4 not allowed because not listed in AllowUsers Jan 15 10:04:18 host sshd[10552]: input_userauth_request: invalid user root [preauth] Jan 15 10:04:18 host unix_chkpwd[10555]: password check failed for user (root) Jan 15 10:04:18 host sshd[10552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.76.4 user=root Jan 15 10:04:18 host sshd[10552]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 10:04:20 host sshd[10552]: Failed password for invalid user root from 203.172.76.4 port 56294 ssh2 Jan 15 10:04:20 host sshd[10552]: Received disconnect from 203.172.76.4 port 56294:11: Bye Bye [preauth] Jan 15 10:04:20 host sshd[10552]: Disconnected from 203.172.76.4 port 56294 [preauth] Jan 15 10:04:50 host sshd[10621]: User root from 46.101.244.79 not allowed because not listed in AllowUsers Jan 15 10:04:50 host sshd[10621]: input_userauth_request: invalid user root [preauth] Jan 15 10:04:50 host unix_chkpwd[10626]: password check failed for user (root) Jan 15 10:04:50 host sshd[10621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.244.79 user=root Jan 15 10:04:50 host sshd[10621]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 10:04:52 host sshd[10621]: Failed password for invalid user root from 46.101.244.79 port 34724 ssh2 Jan 15 10:04:52 host sshd[10621]: Received disconnect from 46.101.244.79 port 34724:11: Bye Bye [preauth] Jan 15 10:04:52 host sshd[10621]: Disconnected from 46.101.244.79 port 34724 [preauth] Jan 15 10:05:57 host sshd[10880]: User root from 61.42.20.175 not allowed because not listed in AllowUsers Jan 15 10:05:57 host sshd[10880]: input_userauth_request: invalid user root [preauth] Jan 15 10:05:57 host unix_chkpwd[10885]: password check failed for user (root) Jan 15 10:05:57 host sshd[10880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.42.20.175 user=root Jan 15 10:05:57 host sshd[10880]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 10:05:59 host sshd[10880]: Failed password for invalid user root from 61.42.20.175 port 48446 ssh2 Jan 15 10:05:59 host sshd[10880]: Received disconnect from 61.42.20.175 port 48446:11: Bye Bye [preauth] Jan 15 10:05:59 host sshd[10880]: Disconnected from 61.42.20.175 port 48446 [preauth] Jan 15 10:06:09 host sshd[10911]: Invalid user apagar from 195.226.194.142 port 26866 Jan 15 10:06:09 host sshd[10911]: input_userauth_request: invalid user apagar [preauth] Jan 15 10:06:09 host sshd[10911]: pam_unix(sshd:auth): check pass; user unknown Jan 15 10:06:09 host sshd[10911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 15 10:06:11 host sshd[10911]: Failed password for invalid user apagar from 195.226.194.142 port 26866 ssh2 Jan 15 10:06:11 host sshd[10911]: Received disconnect from 195.226.194.142 port 26866:11: Bye Bye [preauth] Jan 15 10:06:11 host sshd[10911]: Disconnected from 195.226.194.142 port 26866 [preauth] Jan 15 10:06:43 host sshd[10975]: User root from 143.198.39.194 not allowed because not listed in AllowUsers Jan 15 10:06:43 host sshd[10975]: input_userauth_request: invalid user root [preauth] Jan 15 10:06:43 host unix_chkpwd[10979]: password check failed for user (root) Jan 15 10:06:43 host sshd[10975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.39.194 user=root Jan 15 10:06:43 host sshd[10975]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 10:06:45 host sshd[10975]: Failed password for invalid user root from 143.198.39.194 port 55534 ssh2 Jan 15 10:07:17 host sshd[11070]: User root from 46.101.244.79 not allowed because not listed in AllowUsers Jan 15 10:07:17 host sshd[11070]: input_userauth_request: invalid user root [preauth] Jan 15 10:07:17 host unix_chkpwd[11074]: password check failed for user (root) Jan 15 10:07:17 host sshd[11070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.244.79 user=root Jan 15 10:07:17 host sshd[11070]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 10:07:19 host sshd[11070]: Failed password for invalid user root from 46.101.244.79 port 55808 ssh2 Jan 15 10:07:19 host sshd[11070]: Received disconnect from 46.101.244.79 port 55808:11: Bye Bye [preauth] Jan 15 10:07:19 host sshd[11070]: Disconnected from 46.101.244.79 port 55808 [preauth] Jan 15 10:08:24 host sshd[11254]: User root from 203.172.76.4 not allowed because not listed in AllowUsers Jan 15 10:08:24 host sshd[11254]: input_userauth_request: invalid user root [preauth] Jan 15 10:08:24 host unix_chkpwd[11257]: password check failed for user (root) Jan 15 10:08:24 host sshd[11254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.172.76.4 user=root Jan 15 10:08:24 host sshd[11254]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 10:08:26 host sshd[11254]: Failed password for invalid user root from 203.172.76.4 port 41856 ssh2 Jan 15 10:08:36 host sshd[11338]: User root from 61.42.20.175 not allowed because not listed in AllowUsers Jan 15 10:08:36 host sshd[11338]: input_userauth_request: invalid user root [preauth] Jan 15 10:08:36 host unix_chkpwd[11341]: password check failed for user (root) Jan 15 10:08:36 host sshd[11338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.42.20.175 user=root Jan 15 10:08:36 host sshd[11338]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 10:08:39 host sshd[11338]: Failed password for invalid user root from 61.42.20.175 port 52132 ssh2 Jan 15 10:08:39 host sshd[11338]: Received disconnect from 61.42.20.175 port 52132:11: Bye Bye [preauth] Jan 15 10:08:39 host sshd[11338]: Disconnected from 61.42.20.175 port 52132 [preauth] Jan 15 10:09:19 host sshd[11457]: User root from 64.227.72.154 not allowed because not listed in AllowUsers Jan 15 10:09:19 host sshd[11457]: input_userauth_request: invalid user root [preauth] Jan 15 10:09:19 host unix_chkpwd[11460]: password check failed for user (root) Jan 15 10:09:19 host sshd[11457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.72.154 user=root Jan 15 10:09:19 host sshd[11457]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 10:09:21 host sshd[11457]: Failed password for invalid user root from 64.227.72.154 port 58680 ssh2 Jan 15 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 10:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 10:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 10:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 10:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 10:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 10:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 10:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 10:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 10:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 10:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 10:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 10:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 10:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=shalinijames user-4=wwwtestugo user-5=wwwkapin user-6=woodpeck user-7=remysagr user-8=disposeat user-9=wwwkmaorg user-10=wwwnexidigital user-11=mrsclean user-12=palco123 user-13=gifterman user-14=kottayamcalldriv user-15=phmetals user-16=wwwletsstalkfood user-17=straightcurve user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=wwwkaretakers user-24=cochintaxi user-25=wwwresourcehunte user-26=keralaholi user-27=wwwrmswll user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 10:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 10:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 10:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Arx8MJm8M7GCMl5c.~ Jan 15 10:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Arx8MJm8M7GCMl5c.~' Jan 15 10:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Arx8MJm8M7GCMl5c.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 10:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 10:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 10:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 10:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 10:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 10:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 10:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 10:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 10:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 10:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 10:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 10:23:17 host sshd[13807]: Invalid user admin from 118.37.164.107 port 49006 Jan 15 10:23:17 host sshd[13807]: input_userauth_request: invalid user admin [preauth] Jan 15 10:23:17 host sshd[13807]: pam_unix(sshd:auth): check pass; user unknown Jan 15 10:23:17 host sshd[13807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.37.164.107 Jan 15 10:23:20 host sshd[13807]: Failed password for invalid user admin from 118.37.164.107 port 49006 ssh2 Jan 15 10:23:22 host sshd[13807]: Failed password for invalid user admin from 118.37.164.107 port 49006 ssh2 Jan 15 10:23:22 host sshd[13807]: pam_unix(sshd:auth): check pass; user unknown Jan 15 10:23:25 host sshd[13807]: Failed password for invalid user admin from 118.37.164.107 port 49006 ssh2 Jan 15 10:23:25 host sshd[13807]: pam_unix(sshd:auth): check pass; user unknown Jan 15 10:23:28 host sshd[13807]: Failed password for invalid user admin from 118.37.164.107 port 49006 ssh2 Jan 15 10:23:28 host sshd[13807]: pam_unix(sshd:auth): check pass; user unknown Jan 15 10:23:30 host sshd[13807]: Failed password for invalid user admin from 118.37.164.107 port 49006 ssh2 Jan 15 10:36:15 host sshd[15643]: User root from 195.226.194.142 not allowed because not listed in AllowUsers Jan 15 10:36:15 host sshd[15643]: input_userauth_request: invalid user root [preauth] Jan 15 10:36:15 host unix_chkpwd[15646]: password check failed for user (root) Jan 15 10:36:15 host sshd[15643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 user=root Jan 15 10:36:15 host sshd[15643]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 10:36:17 host sshd[15643]: Failed password for invalid user root from 195.226.194.142 port 35190 ssh2 Jan 15 10:36:17 host sshd[15643]: Received disconnect from 195.226.194.142 port 35190:11: Bye Bye [preauth] Jan 15 10:36:17 host sshd[15643]: Disconnected from 195.226.194.142 port 35190 [preauth] Jan 15 10:43:17 host sshd[16765]: Invalid user admin from 112.172.86.235 port 60413 Jan 15 10:43:17 host sshd[16765]: input_userauth_request: invalid user admin [preauth] Jan 15 10:43:17 host sshd[16765]: pam_unix(sshd:auth): check pass; user unknown Jan 15 10:43:17 host sshd[16765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.172.86.235 Jan 15 10:43:19 host sshd[16765]: Failed password for invalid user admin from 112.172.86.235 port 60413 ssh2 Jan 15 10:43:20 host sshd[16765]: Failed password for invalid user admin from 112.172.86.235 port 60413 ssh2 Jan 15 10:43:21 host sshd[16765]: pam_unix(sshd:auth): check pass; user unknown Jan 15 10:43:23 host sshd[16765]: Failed password for invalid user admin from 112.172.86.235 port 60413 ssh2 Jan 15 10:43:25 host sshd[16765]: pam_unix(sshd:auth): check pass; user unknown Jan 15 10:43:27 host sshd[16765]: Failed password for invalid user admin from 112.172.86.235 port 60413 ssh2 Jan 15 10:58:19 host sshd[18751]: Invalid user ubnt from 123.240.127.181 port 47068 Jan 15 10:58:19 host sshd[18751]: input_userauth_request: invalid user ubnt [preauth] Jan 15 10:58:19 host sshd[18751]: pam_unix(sshd:auth): check pass; user unknown Jan 15 10:58:19 host sshd[18751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.240.127.181 Jan 15 10:58:21 host sshd[18751]: Failed password for invalid user ubnt from 123.240.127.181 port 47068 ssh2 Jan 15 10:58:22 host sshd[18751]: Connection reset by 123.240.127.181 port 47068 [preauth] Jan 15 11:00:52 host sshd[19149]: Invalid user user from 1.161.227.163 port 40493 Jan 15 11:00:52 host sshd[19149]: input_userauth_request: invalid user user [preauth] Jan 15 11:00:52 host sshd[19149]: pam_unix(sshd:auth): check pass; user unknown Jan 15 11:00:52 host sshd[19149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.161.227.163 Jan 15 11:00:53 host sshd[19149]: Failed password for invalid user user from 1.161.227.163 port 40493 ssh2 Jan 15 11:00:54 host sshd[19149]: pam_unix(sshd:auth): check pass; user unknown Jan 15 11:00:56 host sshd[19149]: Failed password for invalid user user from 1.161.227.163 port 40493 ssh2 Jan 15 11:00:57 host sshd[19149]: pam_unix(sshd:auth): check pass; user unknown Jan 15 11:00:59 host sshd[19149]: Failed password for invalid user user from 1.161.227.163 port 40493 ssh2 Jan 15 11:00:59 host sshd[19149]: Connection reset by 1.161.227.163 port 40493 [preauth] Jan 15 11:00:59 host sshd[19149]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.161.227.163 Jan 15 11:10:24 host sshd[20340]: Invalid user ej from 194.110.203.109 port 45098 Jan 15 11:10:24 host sshd[20340]: input_userauth_request: invalid user ej [preauth] Jan 15 11:10:24 host sshd[20340]: pam_unix(sshd:auth): check pass; user unknown Jan 15 11:10:24 host sshd[20340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 11:10:26 host sshd[20340]: Failed password for invalid user ej from 194.110.203.109 port 45098 ssh2 Jan 15 11:10:29 host sshd[20340]: pam_unix(sshd:auth): check pass; user unknown Jan 15 11:10:31 host sshd[20340]: Failed password for invalid user ej from 194.110.203.109 port 45098 ssh2 Jan 15 11:10:34 host sshd[20340]: pam_unix(sshd:auth): check pass; user unknown Jan 15 11:10:36 host sshd[20340]: Failed password for invalid user ej from 194.110.203.109 port 45098 ssh2 Jan 15 11:10:39 host sshd[20340]: Connection closed by 194.110.203.109 port 45098 [preauth] Jan 15 11:10:39 host sshd[20340]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 11:13:06 host sshd[20749]: User root from 119.194.114.53 not allowed because not listed in AllowUsers Jan 15 11:13:06 host sshd[20749]: input_userauth_request: invalid user root [preauth] Jan 15 11:13:06 host unix_chkpwd[20756]: password check failed for user (root) Jan 15 11:13:06 host sshd[20749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.194.114.53 user=root Jan 15 11:13:06 host sshd[20749]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 11:13:08 host sshd[20749]: Failed password for invalid user root from 119.194.114.53 port 63867 ssh2 Jan 15 11:13:09 host unix_chkpwd[20767]: password check failed for user (root) Jan 15 11:13:09 host sshd[20749]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 11:13:11 host sshd[20749]: Failed password for invalid user root from 119.194.114.53 port 63867 ssh2 Jan 15 11:13:12 host unix_chkpwd[20771]: password check failed for user (root) Jan 15 11:13:12 host sshd[20749]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 11:13:14 host sshd[20749]: Failed password for invalid user root from 119.194.114.53 port 63867 ssh2 Jan 15 11:13:15 host unix_chkpwd[20775]: password check failed for user (root) Jan 15 11:13:15 host sshd[20749]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 11:13:17 host sshd[20749]: Failed password for invalid user root from 119.194.114.53 port 63867 ssh2 Jan 15 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 11:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 11:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 11:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 11:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 11:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 11:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=shalinijames user-3=wwwtestugo user-4=vfmassets user-5=wwwkapin user-6=woodpeck user-7=remysagr user-8=disposeat user-9=wwwkmaorg user-10=mrsclean user-11=wwwnexidigital user-12=phmetals user-13=kottayamcalldriv user-14=palco123 user-15=gifterman user-16=straightcurve user-17=wwwletsstalkfood user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=ugotscom user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 11:22:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 11:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 11:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SoVqPeHI1mCeJhl8.~ Jan 15 11:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SoVqPeHI1mCeJhl8.~' Jan 15 11:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-SoVqPeHI1mCeJhl8.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 11:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 11:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 11:22:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 11:22:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 11:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 11:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 11:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 11:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 11:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 11:22:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 11:22:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 11:22:18 host sshd[22105]: User root from 209.141.55.27 not allowed because not listed in AllowUsers Jan 15 11:22:18 host sshd[22105]: input_userauth_request: invalid user root [preauth] Jan 15 11:22:18 host unix_chkpwd[22119]: password check failed for user (root) Jan 15 11:22:18 host sshd[22105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 user=root Jan 15 11:22:18 host sshd[22105]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 11:22:20 host sshd[22105]: Failed password for invalid user root from 209.141.55.27 port 36956 ssh2 Jan 15 11:22:20 host sshd[22105]: Received disconnect from 209.141.55.27 port 36956:11: Normal Shutdown, Thank you for playing [preauth] Jan 15 11:22:20 host sshd[22105]: Disconnected from 209.141.55.27 port 36956 [preauth] Jan 15 11:40:11 host sshd[24397]: User root from 95.156.96.46 not allowed because not listed in AllowUsers Jan 15 11:40:11 host sshd[24397]: input_userauth_request: invalid user root [preauth] Jan 15 11:40:11 host unix_chkpwd[24400]: password check failed for user (root) Jan 15 11:40:11 host sshd[24397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.156.96.46 user=root Jan 15 11:40:11 host sshd[24397]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 11:40:13 host sshd[24397]: Failed password for invalid user root from 95.156.96.46 port 52331 ssh2 Jan 15 11:40:13 host sshd[24397]: Received disconnect from 95.156.96.46 port 52331:11: Bye Bye [preauth] Jan 15 11:40:13 host sshd[24397]: Disconnected from 95.156.96.46 port 52331 [preauth] Jan 15 11:43:59 host sshd[24941]: User root from 95.156.96.46 not allowed because not listed in AllowUsers Jan 15 11:43:59 host sshd[24941]: input_userauth_request: invalid user root [preauth] Jan 15 11:43:59 host unix_chkpwd[24944]: password check failed for user (root) Jan 15 11:43:59 host sshd[24941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.156.96.46 user=root Jan 15 11:43:59 host sshd[24941]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 11:44:01 host sshd[24941]: Failed password for invalid user root from 95.156.96.46 port 58541 ssh2 Jan 15 11:44:01 host sshd[24941]: Received disconnect from 95.156.96.46 port 58541:11: Bye Bye [preauth] Jan 15 11:44:01 host sshd[24941]: Disconnected from 95.156.96.46 port 58541 [preauth] Jan 15 11:46:47 host sshd[25436]: Invalid user dlxuser from 220.132.161.200 port 40896 Jan 15 11:46:47 host sshd[25436]: input_userauth_request: invalid user dlxuser [preauth] Jan 15 11:46:47 host sshd[25436]: pam_unix(sshd:auth): check pass; user unknown Jan 15 11:46:47 host sshd[25436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.161.200 Jan 15 11:46:49 host sshd[25436]: Failed password for invalid user dlxuser from 220.132.161.200 port 40896 ssh2 Jan 15 11:46:49 host sshd[25436]: pam_unix(sshd:auth): check pass; user unknown Jan 15 11:46:52 host sshd[25436]: Failed password for invalid user dlxuser from 220.132.161.200 port 40896 ssh2 Jan 15 11:46:52 host sshd[25436]: Connection reset by 220.132.161.200 port 40896 [preauth] Jan 15 11:46:52 host sshd[25436]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.161.200 Jan 15 11:55:35 host sshd[26649]: Invalid user admin from 31.41.244.124 port 44642 Jan 15 11:55:35 host sshd[26649]: input_userauth_request: invalid user admin [preauth] Jan 15 11:55:35 host sshd[26649]: pam_unix(sshd:auth): check pass; user unknown Jan 15 11:55:35 host sshd[26649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 15 11:55:37 host sshd[26649]: Failed password for invalid user admin from 31.41.244.124 port 44642 ssh2 Jan 15 11:55:37 host sshd[26649]: Received disconnect from 31.41.244.124 port 44642:11: Client disconnecting normally [preauth] Jan 15 11:55:37 host sshd[26649]: Disconnected from 31.41.244.124 port 44642 [preauth] Jan 15 11:55:38 host sshd[26656]: User root from 31.41.244.124 not allowed because not listed in AllowUsers Jan 15 11:55:38 host sshd[26656]: input_userauth_request: invalid user root [preauth] Jan 15 11:55:38 host unix_chkpwd[26660]: password check failed for user (root) Jan 15 11:55:38 host sshd[26656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 user=root Jan 15 11:55:38 host sshd[26656]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 11:55:40 host sshd[26656]: Failed password for invalid user root from 31.41.244.124 port 48026 ssh2 Jan 15 11:55:41 host sshd[26656]: Received disconnect from 31.41.244.124 port 48026:11: Client disconnecting normally [preauth] Jan 15 11:55:41 host sshd[26656]: Disconnected from 31.41.244.124 port 48026 [preauth] Jan 15 11:55:42 host sshd[26666]: Invalid user admin from 31.41.244.124 port 53125 Jan 15 11:55:42 host sshd[26666]: input_userauth_request: invalid user admin [preauth] Jan 15 11:55:42 host sshd[26666]: pam_unix(sshd:auth): check pass; user unknown Jan 15 11:55:42 host sshd[26666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 15 11:55:44 host sshd[26666]: Failed password for invalid user admin from 31.41.244.124 port 53125 ssh2 Jan 15 11:59:49 host sshd[27467]: Invalid user admin from 189.179.198.245 port 41325 Jan 15 11:59:49 host sshd[27467]: input_userauth_request: invalid user admin [preauth] Jan 15 11:59:49 host sshd[27467]: pam_unix(sshd:auth): check pass; user unknown Jan 15 11:59:49 host sshd[27467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.179.198.245 Jan 15 11:59:51 host sshd[27467]: Failed password for invalid user admin from 189.179.198.245 port 41325 ssh2 Jan 15 11:59:53 host sshd[27467]: Failed password for invalid user admin from 189.179.198.245 port 41325 ssh2 Jan 15 11:59:55 host sshd[27467]: pam_unix(sshd:auth): check pass; user unknown Jan 15 11:59:57 host sshd[27467]: Failed password for invalid user admin from 189.179.198.245 port 41325 ssh2 Jan 15 11:59:58 host sshd[27467]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:00:00 host sshd[27467]: Failed password for invalid user admin from 189.179.198.245 port 41325 ssh2 Jan 15 12:00:01 host sshd[27467]: Connection reset by 189.179.198.245 port 41325 [preauth] Jan 15 12:00:01 host sshd[27467]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.179.198.245 Jan 15 12:10:51 host sshd[29522]: Invalid user ubuntu from 121.182.36.208 port 62440 Jan 15 12:10:51 host sshd[29522]: input_userauth_request: invalid user ubuntu [preauth] Jan 15 12:10:51 host sshd[29522]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:10:51 host sshd[29522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.182.36.208 Jan 15 12:10:53 host sshd[29522]: Failed password for invalid user ubuntu from 121.182.36.208 port 62440 ssh2 Jan 15 12:10:54 host sshd[29522]: Connection reset by 121.182.36.208 port 62440 [preauth] Jan 15 12:16:11 host sshd[30881]: User root from 164.90.172.83 not allowed because not listed in AllowUsers Jan 15 12:16:11 host sshd[30881]: input_userauth_request: invalid user root [preauth] Jan 15 12:16:11 host unix_chkpwd[30885]: password check failed for user (root) Jan 15 12:16:11 host sshd[30881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.172.83 user=root Jan 15 12:16:11 host sshd[30881]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:16:11 host sshd[30886]: User root from 138.64.139.25 not allowed because not listed in AllowUsers Jan 15 12:16:11 host sshd[30886]: input_userauth_request: invalid user root [preauth] Jan 15 12:16:12 host unix_chkpwd[30889]: password check failed for user (root) Jan 15 12:16:12 host sshd[30886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.64.139.25 user=root Jan 15 12:16:12 host sshd[30886]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:16:12 host sshd[30881]: Failed password for invalid user root from 164.90.172.83 port 45888 ssh2 Jan 15 12:16:13 host sshd[30881]: Received disconnect from 164.90.172.83 port 45888:11: Bye Bye [preauth] Jan 15 12:16:13 host sshd[30881]: Disconnected from 164.90.172.83 port 45888 [preauth] Jan 15 12:16:13 host sshd[30886]: Failed password for invalid user root from 138.64.139.25 port 53714 ssh2 Jan 15 12:16:13 host sshd[30886]: Received disconnect from 138.64.139.25 port 53714:11: Bye Bye [preauth] Jan 15 12:16:13 host sshd[30886]: Disconnected from 138.64.139.25 port 53714 [preauth] Jan 15 12:16:31 host sshd[30935]: User root from 1.0.171.2 not allowed because not listed in AllowUsers Jan 15 12:16:31 host sshd[30935]: input_userauth_request: invalid user root [preauth] Jan 15 12:16:31 host unix_chkpwd[30938]: password check failed for user (root) Jan 15 12:16:31 host sshd[30935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.0.171.2 user=root Jan 15 12:16:31 host sshd[30935]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:16:33 host sshd[30935]: Failed password for invalid user root from 1.0.171.2 port 50158 ssh2 Jan 15 12:16:33 host sshd[30935]: Received disconnect from 1.0.171.2 port 50158:11: Bye Bye [preauth] Jan 15 12:16:33 host sshd[30935]: Disconnected from 1.0.171.2 port 50158 [preauth] Jan 15 12:18:27 host sshd[31130]: User root from 79.188.87.194 not allowed because not listed in AllowUsers Jan 15 12:18:27 host sshd[31130]: input_userauth_request: invalid user root [preauth] Jan 15 12:18:27 host unix_chkpwd[31135]: password check failed for user (root) Jan 15 12:18:27 host sshd[31130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.188.87.194 user=root Jan 15 12:18:27 host sshd[31130]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:18:29 host sshd[31130]: Failed password for invalid user root from 79.188.87.194 port 49860 ssh2 Jan 15 12:18:29 host sshd[31130]: Received disconnect from 79.188.87.194 port 49860:11: Bye Bye [preauth] Jan 15 12:18:29 host sshd[31130]: Disconnected from 79.188.87.194 port 49860 [preauth] Jan 15 12:19:26 host sshd[31272]: Invalid user dlxuser from 196.202.58.162 port 45124 Jan 15 12:19:26 host sshd[31272]: input_userauth_request: invalid user dlxuser [preauth] Jan 15 12:19:26 host sshd[31272]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:19:26 host sshd[31272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.202.58.162 Jan 15 12:19:28 host sshd[31272]: Failed password for invalid user dlxuser from 196.202.58.162 port 45124 ssh2 Jan 15 12:19:28 host sshd[31272]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:19:30 host sshd[31272]: Failed password for invalid user dlxuser from 196.202.58.162 port 45124 ssh2 Jan 15 12:19:31 host sshd[31323]: User root from 123.58.216.78 not allowed because not listed in AllowUsers Jan 15 12:19:31 host sshd[31323]: input_userauth_request: invalid user root [preauth] Jan 15 12:19:31 host unix_chkpwd[31328]: password check failed for user (root) Jan 15 12:19:31 host sshd[31323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.58.216.78 user=root Jan 15 12:19:31 host sshd[31323]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:19:32 host sshd[31272]: Failed password for invalid user dlxuser from 196.202.58.162 port 45124 ssh2 Jan 15 12:19:33 host sshd[31323]: Failed password for invalid user root from 123.58.216.78 port 43464 ssh2 Jan 15 12:19:33 host sshd[31323]: Received disconnect from 123.58.216.78 port 43464:11: Bye Bye [preauth] Jan 15 12:19:33 host sshd[31323]: Disconnected from 123.58.216.78 port 43464 [preauth] Jan 15 12:19:33 host sshd[31272]: Connection closed by 196.202.58.162 port 45124 [preauth] Jan 15 12:19:33 host sshd[31272]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.202.58.162 Jan 15 12:20:07 host sshd[31565]: User root from 202.179.191.68 not allowed because not listed in AllowUsers Jan 15 12:20:07 host sshd[31565]: input_userauth_request: invalid user root [preauth] Jan 15 12:20:07 host unix_chkpwd[31568]: password check failed for user (root) Jan 15 12:20:07 host sshd[31565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.179.191.68 user=root Jan 15 12:20:07 host sshd[31565]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:20:09 host sshd[31565]: Failed password for invalid user root from 202.179.191.68 port 33770 ssh2 Jan 15 12:20:09 host sshd[31565]: Received disconnect from 202.179.191.68 port 33770:11: Bye Bye [preauth] Jan 15 12:20:09 host sshd[31565]: Disconnected from 202.179.191.68 port 33770 [preauth] Jan 15 12:20:45 host sshd[31716]: User root from 167.71.239.134 not allowed because not listed in AllowUsers Jan 15 12:20:45 host sshd[31716]: input_userauth_request: invalid user root [preauth] Jan 15 12:20:45 host unix_chkpwd[31718]: password check failed for user (root) Jan 15 12:20:45 host sshd[31716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.239.134 user=root Jan 15 12:20:45 host sshd[31716]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:20:47 host sshd[31716]: Failed password for invalid user root from 167.71.239.134 port 42652 ssh2 Jan 15 12:20:47 host sshd[31716]: Received disconnect from 167.71.239.134 port 42652:11: Bye Bye [preauth] Jan 15 12:20:47 host sshd[31716]: Disconnected from 167.71.239.134 port 42652 [preauth] Jan 15 12:21:55 host sshd[31972]: User root from 138.64.139.25 not allowed because not listed in AllowUsers Jan 15 12:21:55 host sshd[31972]: input_userauth_request: invalid user root [preauth] Jan 15 12:21:55 host unix_chkpwd[31975]: password check failed for user (root) Jan 15 12:21:55 host sshd[31972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.64.139.25 user=root Jan 15 12:21:55 host sshd[31972]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:21:57 host sshd[31972]: Failed password for invalid user root from 138.64.139.25 port 32988 ssh2 Jan 15 12:21:58 host sshd[31972]: Received disconnect from 138.64.139.25 port 32988:11: Bye Bye [preauth] Jan 15 12:21:58 host sshd[31972]: Disconnected from 138.64.139.25 port 32988 [preauth] Jan 15 12:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 12:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 12:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 12:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=ugotscom user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=straightcurve user-13=wwwletsstalkfood user-14=bonifacegroup user-15=wwwevmhonda user-16=mrsclean user-17=wwwnexidigital user-18=gifterman user-19=palco123 user-20=kottayamcalldriv user-21=phmetals user-22=wwwkapin user-23=woodpeck user-24=remysagr user-25=disposeat user-26=wwwkmaorg user-27=pmcresources user-28=vfmassets user-29=wwwtestugo user-30=shalinijames feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 12:22:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 12:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 12:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QaM1vsafGPfAKfs8.~ Jan 15 12:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QaM1vsafGPfAKfs8.~' Jan 15 12:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QaM1vsafGPfAKfs8.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 12:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 12:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 12:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 12:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 12:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 12:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 12:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 12:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 12:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 12:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 12:22:32 host sshd[32364]: User root from 1.0.171.2 not allowed because not listed in AllowUsers Jan 15 12:22:32 host sshd[32364]: input_userauth_request: invalid user root [preauth] Jan 15 12:22:32 host unix_chkpwd[32368]: password check failed for user (root) Jan 15 12:22:32 host sshd[32364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.0.171.2 user=root Jan 15 12:22:32 host sshd[32364]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:22:34 host sshd[32364]: Failed password for invalid user root from 1.0.171.2 port 57386 ssh2 Jan 15 12:22:34 host sshd[32364]: Received disconnect from 1.0.171.2 port 57386:11: Bye Bye [preauth] Jan 15 12:22:34 host sshd[32364]: Disconnected from 1.0.171.2 port 57386 [preauth] Jan 15 12:23:11 host sshd[32543]: User root from 202.179.191.68 not allowed because not listed in AllowUsers Jan 15 12:23:11 host sshd[32543]: input_userauth_request: invalid user root [preauth] Jan 15 12:23:11 host unix_chkpwd[32545]: password check failed for user (root) Jan 15 12:23:11 host sshd[32543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.179.191.68 user=root Jan 15 12:23:11 host sshd[32543]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:23:12 host sshd[32543]: Failed password for invalid user root from 202.179.191.68 port 52528 ssh2 Jan 15 12:23:12 host sshd[32543]: Received disconnect from 202.179.191.68 port 52528:11: Bye Bye [preauth] Jan 15 12:23:12 host sshd[32543]: Disconnected from 202.179.191.68 port 52528 [preauth] Jan 15 12:23:18 host sshd[32593]: User root from 79.188.87.194 not allowed because not listed in AllowUsers Jan 15 12:23:18 host sshd[32593]: input_userauth_request: invalid user root [preauth] Jan 15 12:23:18 host unix_chkpwd[32597]: password check failed for user (root) Jan 15 12:23:18 host sshd[32593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.188.87.194 user=root Jan 15 12:23:18 host sshd[32593]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:23:20 host sshd[32593]: Failed password for invalid user root from 79.188.87.194 port 45155 ssh2 Jan 15 12:23:21 host sshd[32636]: User root from 167.71.239.134 not allowed because not listed in AllowUsers Jan 15 12:23:21 host sshd[32636]: input_userauth_request: invalid user root [preauth] Jan 15 12:23:21 host unix_chkpwd[32638]: password check failed for user (root) Jan 15 12:23:21 host sshd[32636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.239.134 user=root Jan 15 12:23:21 host sshd[32636]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:23:23 host sshd[32636]: Failed password for invalid user root from 167.71.239.134 port 48552 ssh2 Jan 15 12:23:23 host sshd[32636]: Received disconnect from 167.71.239.134 port 48552:11: Bye Bye [preauth] Jan 15 12:23:23 host sshd[32636]: Disconnected from 167.71.239.134 port 48552 [preauth] Jan 15 12:23:31 host sshd[32717]: User root from 164.90.172.83 not allowed because not listed in AllowUsers Jan 15 12:23:31 host sshd[32717]: input_userauth_request: invalid user root [preauth] Jan 15 12:23:31 host unix_chkpwd[32726]: password check failed for user (root) Jan 15 12:23:31 host sshd[32717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.172.83 user=root Jan 15 12:23:31 host sshd[32717]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:23:33 host sshd[32717]: Failed password for invalid user root from 164.90.172.83 port 40954 ssh2 Jan 15 12:23:33 host sshd[32717]: Received disconnect from 164.90.172.83 port 40954:11: Bye Bye [preauth] Jan 15 12:23:33 host sshd[32717]: Disconnected from 164.90.172.83 port 40954 [preauth] Jan 15 12:24:39 host sshd[527]: User root from 123.58.216.78 not allowed because not listed in AllowUsers Jan 15 12:24:39 host sshd[527]: input_userauth_request: invalid user root [preauth] Jan 15 12:24:39 host unix_chkpwd[531]: password check failed for user (root) Jan 15 12:24:39 host sshd[527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.58.216.78 user=root Jan 15 12:24:39 host sshd[527]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:24:41 host sshd[527]: Failed password for invalid user root from 123.58.216.78 port 57596 ssh2 Jan 15 12:24:57 host sshd[621]: User root from 36.110.228.254 not allowed because not listed in AllowUsers Jan 15 12:24:57 host sshd[621]: input_userauth_request: invalid user root [preauth] Jan 15 12:24:57 host unix_chkpwd[635]: password check failed for user (root) Jan 15 12:24:57 host sshd[621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.228.254 user=root Jan 15 12:24:57 host sshd[621]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:25:00 host sshd[621]: Failed password for invalid user root from 36.110.228.254 port 18423 ssh2 Jan 15 12:25:00 host unix_chkpwd[649]: password check failed for user (root) Jan 15 12:25:00 host sshd[621]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:25:02 host sshd[621]: Failed password for invalid user root from 36.110.228.254 port 18423 ssh2 Jan 15 12:25:02 host unix_chkpwd[686]: password check failed for user (root) Jan 15 12:25:02 host sshd[621]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:25:04 host sshd[621]: Failed password for invalid user root from 36.110.228.254 port 18423 ssh2 Jan 15 12:25:05 host unix_chkpwd[699]: password check failed for user (root) Jan 15 12:25:05 host sshd[621]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:25:07 host sshd[621]: Failed password for invalid user root from 36.110.228.254 port 18423 ssh2 Jan 15 12:26:50 host sshd[1169]: Did not receive identification string from 172.105.128.13 port 51494 Jan 15 12:26:53 host sshd[1175]: Connection closed by 172.105.128.13 port 51496 [preauth] Jan 15 12:26:54 host sshd[1185]: Did not receive identification string from 172.105.128.13 port 51508 Jan 15 12:29:31 host sshd[1785]: Connection reset by 59.126.144.89 port 53997 [preauth] Jan 15 12:37:07 host sshd[3601]: Invalid user dlxuser from 111.252.49.217 port 51242 Jan 15 12:37:07 host sshd[3601]: input_userauth_request: invalid user dlxuser [preauth] Jan 15 12:37:07 host sshd[3601]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:37:07 host sshd[3601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.252.49.217 Jan 15 12:37:09 host sshd[3601]: Failed password for invalid user dlxuser from 111.252.49.217 port 51242 ssh2 Jan 15 12:37:10 host sshd[3601]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:37:12 host sshd[3601]: Failed password for invalid user dlxuser from 111.252.49.217 port 51242 ssh2 Jan 15 12:37:13 host sshd[3601]: Failed password for invalid user dlxuser from 111.252.49.217 port 51242 ssh2 Jan 15 12:37:13 host sshd[3601]: Connection closed by 111.252.49.217 port 51242 [preauth] Jan 15 12:37:13 host sshd[3601]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.252.49.217 Jan 15 12:44:01 host sshd[4784]: Did not receive identification string from 139.155.253.103 port 36923 Jan 15 12:44:04 host sshd[4797]: User root from 139.155.253.103 not allowed because not listed in AllowUsers Jan 15 12:44:04 host sshd[4797]: input_userauth_request: invalid user root [preauth] Jan 15 12:44:04 host sshd[4798]: User root from 139.155.253.103 not allowed because not listed in AllowUsers Jan 15 12:44:04 host sshd[4798]: input_userauth_request: invalid user root [preauth] Jan 15 12:44:04 host sshd[4796]: Invalid user ubuntu from 139.155.253.103 port 39115 Jan 15 12:44:04 host sshd[4796]: input_userauth_request: invalid user ubuntu [preauth] Jan 15 12:44:05 host sshd[4803]: User root from 139.155.253.103 not allowed because not listed in AllowUsers Jan 15 12:44:05 host sshd[4803]: input_userauth_request: invalid user root [preauth] Jan 15 12:44:05 host unix_chkpwd[4843]: password check failed for user (root) Jan 15 12:44:05 host sshd[4797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.253.103 user=root Jan 15 12:44:05 host sshd[4797]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:44:05 host unix_chkpwd[4844]: password check failed for user (root) Jan 15 12:44:05 host sshd[4798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.253.103 user=root Jan 15 12:44:05 host sshd[4798]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:44:05 host sshd[4796]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:44:05 host sshd[4796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.253.103 Jan 15 12:44:05 host sshd[4807]: User root from 139.155.253.103 not allowed because not listed in AllowUsers Jan 15 12:44:05 host sshd[4807]: input_userauth_request: invalid user root [preauth] Jan 15 12:44:05 host sshd[4809]: User root from 139.155.253.103 not allowed because not listed in AllowUsers Jan 15 12:44:05 host sshd[4809]: input_userauth_request: invalid user root [preauth] Jan 15 12:44:05 host unix_chkpwd[4854]: password check failed for user (root) Jan 15 12:44:05 host sshd[4803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.253.103 user=root Jan 15 12:44:05 host sshd[4803]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:44:05 host sshd[4822]: Invalid user emqx from 139.155.253.103 port 39163 Jan 15 12:44:05 host sshd[4822]: input_userauth_request: invalid user emqx [preauth] Jan 15 12:44:07 host sshd[4797]: Failed password for invalid user root from 139.155.253.103 port 39121 ssh2 Jan 15 12:44:07 host sshd[4798]: Failed password for invalid user root from 139.155.253.103 port 39117 ssh2 Jan 15 12:44:07 host sshd[4796]: Failed password for invalid user ubuntu from 139.155.253.103 port 39115 ssh2 Jan 15 12:44:07 host sshd[4803]: Failed password for invalid user root from 139.155.253.103 port 39135 ssh2 Jan 15 12:51:06 host sshd[5844]: Did not receive identification string from 104.167.82.144 port 54266 Jan 15 12:51:08 host sshd[5846]: Invalid user guest from 104.167.82.144 port 54272 Jan 15 12:51:08 host sshd[5846]: input_userauth_request: invalid user guest [preauth] Jan 15 12:51:08 host sshd[5862]: Invalid user admin from 104.167.82.144 port 54528 Jan 15 12:51:08 host sshd[5862]: input_userauth_request: invalid user admin [preauth] Jan 15 12:51:08 host sshd[5855]: Invalid user devops from 104.167.82.144 port 54304 Jan 15 12:51:08 host sshd[5855]: input_userauth_request: invalid user devops [preauth] Jan 15 12:51:08 host sshd[5851]: Invalid user admin from 104.167.82.144 port 54554 Jan 15 12:51:08 host sshd[5865]: Invalid user steam from 104.167.82.144 port 54444 Jan 15 12:51:08 host sshd[5864]: Invalid user zjw from 104.167.82.144 port 54498 Jan 15 12:51:08 host sshd[5851]: input_userauth_request: invalid user admin [preauth] Jan 15 12:51:08 host sshd[5864]: input_userauth_request: invalid user zjw [preauth] Jan 15 12:51:08 host sshd[5847]: Invalid user admin from 104.167.82.144 port 54336 Jan 15 12:51:08 host sshd[5847]: input_userauth_request: invalid user admin [preauth] Jan 15 12:51:08 host sshd[5868]: Invalid user www from 104.167.82.144 port 54548 Jan 15 12:51:08 host sshd[5868]: input_userauth_request: invalid user www [preauth] Jan 15 12:51:08 host sshd[5870]: Invalid user halo from 104.167.82.144 port 54506 Jan 15 12:51:08 host sshd[5865]: input_userauth_request: invalid user steam [preauth] Jan 15 12:51:08 host sshd[5870]: input_userauth_request: invalid user halo [preauth] Jan 15 12:51:08 host sshd[5848]: User root from 104.167.82.144 not allowed because not listed in AllowUsers Jan 15 12:51:08 host sshd[5850]: Invalid user git from 104.167.82.144 port 54370 Jan 15 12:51:08 host sshd[5850]: input_userauth_request: invalid user git [preauth] Jan 15 12:51:08 host sshd[5867]: User root from 104.167.82.144 not allowed because not listed in AllowUsers Jan 15 12:51:08 host sshd[5867]: input_userauth_request: invalid user root [preauth] Jan 15 12:51:08 host sshd[5848]: input_userauth_request: invalid user root [preauth] Jan 15 12:51:08 host sshd[5849]: Invalid user esuser from 104.167.82.144 port 54514 Jan 15 12:51:08 host sshd[5849]: input_userauth_request: invalid user esuser [preauth] Jan 15 12:51:08 host sshd[5852]: User root from 104.167.82.144 not allowed because not listed in AllowUsers Jan 15 12:51:08 host sshd[5852]: input_userauth_request: invalid user root [preauth] Jan 15 12:51:08 host sshd[5859]: Invalid user steam from 104.167.82.144 port 54386 Jan 15 12:51:08 host sshd[5854]: Invalid user es from 104.167.82.144 port 54646 Jan 15 12:51:08 host sshd[5859]: input_userauth_request: invalid user steam [preauth] Jan 15 12:51:08 host sshd[5854]: input_userauth_request: invalid user es [preauth] Jan 15 12:51:08 host sshd[5856]: User root from 104.167.82.144 not allowed because not listed in AllowUsers Jan 15 12:51:08 host sshd[5856]: input_userauth_request: invalid user root [preauth] Jan 15 12:51:08 host sshd[5853]: Invalid user devops from 104.167.82.144 port 54292 Jan 15 12:51:08 host sshd[5866]: Invalid user admin from 104.167.82.144 port 54468 Jan 15 12:51:08 host sshd[5861]: Invalid user steam from 104.167.82.144 port 54458 Jan 15 12:51:08 host sshd[5866]: input_userauth_request: invalid user admin [preauth] Jan 15 12:51:08 host sshd[5863]: User root from 104.167.82.144 not allowed because not listed in AllowUsers Jan 15 12:51:08 host sshd[5861]: input_userauth_request: invalid user steam [preauth] Jan 15 12:51:08 host sshd[5869]: User root from 104.167.82.144 not allowed because not listed in AllowUsers Jan 15 12:51:08 host sshd[5853]: input_userauth_request: invalid user devops [preauth] Jan 15 12:51:08 host sshd[5869]: input_userauth_request: invalid user root [preauth] Jan 15 12:51:08 host sshd[5858]: Invalid user zjw from 104.167.82.144 port 54346 Jan 15 12:51:08 host sshd[5860]: Invalid user admin from 104.167.82.144 port 54480 Jan 15 12:51:08 host sshd[5857]: Invalid user postgres from 104.167.82.144 port 54608 Jan 15 12:51:08 host sshd[5863]: input_userauth_request: invalid user root [preauth] Jan 15 12:51:08 host sshd[5860]: input_userauth_request: invalid user admin [preauth] Jan 15 12:51:08 host sshd[5858]: input_userauth_request: invalid user zjw [preauth] Jan 15 12:51:08 host sshd[5857]: input_userauth_request: invalid user postgres [preauth] Jan 15 12:51:08 host sshd[5846]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host sshd[5862]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host sshd[5855]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host sshd[5851]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host sshd[5864]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host sshd[5847]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host sshd[5857]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host sshd[5858]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host sshd[5849]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host sshd[5850]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host unix_chkpwd[5902]: password check failed for user (root) Jan 15 12:51:08 host sshd[5848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 user=root Jan 15 12:51:08 host sshd[5848]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:51:08 host sshd[5870]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host sshd[5861]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host unix_chkpwd[5901]: password check failed for user (root) Jan 15 12:51:08 host sshd[5853]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5866]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host sshd[5866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host sshd[5869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 user=root Jan 15 12:51:08 host sshd[5869]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:51:08 host sshd[5859]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host sshd[5854]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host sshd[5865]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host unix_chkpwd[5903]: password check failed for user (root) Jan 15 12:51:08 host sshd[5852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 user=root Jan 15 12:51:08 host sshd[5852]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:51:08 host sshd[5868]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host sshd[5860]: pam_unix(sshd:auth): check pass; user unknown Jan 15 12:51:08 host sshd[5860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 Jan 15 12:51:08 host unix_chkpwd[5904]: password check failed for user (root) Jan 15 12:51:08 host sshd[5863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 user=root Jan 15 12:51:08 host sshd[5863]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:51:08 host unix_chkpwd[5906]: password check failed for user (root) Jan 15 12:51:08 host sshd[5856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 user=root Jan 15 12:51:08 host sshd[5856]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:51:08 host unix_chkpwd[5907]: password check failed for user (root) Jan 15 12:51:08 host sshd[5867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.167.82.144 user=root Jan 15 12:51:08 host sshd[5867]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:51:10 host sshd[5846]: Failed password for invalid user guest from 104.167.82.144 port 54272 ssh2 Jan 15 12:51:10 host sshd[5862]: Failed password for invalid user admin from 104.167.82.144 port 54528 ssh2 Jan 15 12:51:10 host sshd[5855]: Failed password for invalid user devops from 104.167.82.144 port 54304 ssh2 Jan 15 12:51:10 host sshd[5851]: Failed password for invalid user admin from 104.167.82.144 port 54554 ssh2 Jan 15 12:51:10 host sshd[5864]: Failed password for invalid user zjw from 104.167.82.144 port 54498 ssh2 Jan 15 12:51:10 host sshd[5847]: Failed password for invalid user admin from 104.167.82.144 port 54336 ssh2 Jan 15 12:51:10 host sshd[5857]: Failed password for invalid user postgres from 104.167.82.144 port 54608 ssh2 Jan 15 12:51:10 host sshd[5858]: Failed password for invalid user zjw from 104.167.82.144 port 54346 ssh2 Jan 15 12:51:10 host sshd[5849]: Failed password for invalid user esuser from 104.167.82.144 port 54514 ssh2 Jan 15 12:51:10 host sshd[5850]: Failed password for invalid user git from 104.167.82.144 port 54370 ssh2 Jan 15 12:51:10 host sshd[5848]: Failed password for invalid user root from 104.167.82.144 port 54302 ssh2 Jan 15 12:51:10 host sshd[5870]: Failed password for invalid user halo from 104.167.82.144 port 54506 ssh2 Jan 15 12:51:10 host sshd[5861]: Failed password for invalid user steam from 104.167.82.144 port 54458 ssh2 Jan 15 12:51:10 host sshd[5853]: Failed password for invalid user devops from 104.167.82.144 port 54292 ssh2 Jan 15 12:51:10 host sshd[5869]: Failed password for invalid user root from 104.167.82.144 port 54536 ssh2 Jan 15 12:51:10 host sshd[5866]: Failed password for invalid user admin from 104.167.82.144 port 54468 ssh2 Jan 15 12:51:10 host sshd[5859]: Failed password for invalid user steam from 104.167.82.144 port 54386 ssh2 Jan 15 12:51:10 host sshd[5854]: Failed password for invalid user es from 104.167.82.144 port 54646 ssh2 Jan 15 12:51:10 host sshd[5846]: Connection closed by 104.167.82.144 port 54272 [preauth] Jan 15 12:51:10 host sshd[5865]: Failed password for invalid user steam from 104.167.82.144 port 54444 ssh2 Jan 15 12:51:10 host sshd[5852]: Failed password for invalid user root from 104.167.82.144 port 54402 ssh2 Jan 15 12:51:10 host sshd[5862]: Connection closed by 104.167.82.144 port 54528 [preauth] Jan 15 12:51:10 host sshd[5855]: Connection closed by 104.167.82.144 port 54304 [preauth] Jan 15 12:51:10 host sshd[5868]: Failed password for invalid user www from 104.167.82.144 port 54548 ssh2 Jan 15 12:51:10 host sshd[5851]: Connection closed by 104.167.82.144 port 54554 [preauth] Jan 15 12:51:10 host sshd[5864]: Connection closed by 104.167.82.144 port 54498 [preauth] Jan 15 12:51:10 host sshd[5860]: Failed password for invalid user admin from 104.167.82.144 port 54480 ssh2 Jan 15 12:51:10 host sshd[5857]: Connection closed by 104.167.82.144 port 54608 [preauth] Jan 15 12:51:10 host sshd[5858]: Connection closed by 104.167.82.144 port 54346 [preauth] Jan 15 12:51:10 host sshd[5847]: Connection closed by 104.167.82.144 port 54336 [preauth] Jan 15 12:51:10 host sshd[5849]: Connection closed by 104.167.82.144 port 54514 [preauth] Jan 15 12:51:10 host sshd[5850]: Connection closed by 104.167.82.144 port 54370 [preauth] Jan 15 12:51:10 host sshd[5863]: Failed password for invalid user root from 104.167.82.144 port 54356 ssh2 Jan 15 12:51:10 host sshd[5856]: Failed password for invalid user root from 104.167.82.144 port 54464 ssh2 Jan 15 12:51:10 host sshd[5861]: Connection closed by 104.167.82.144 port 54458 [preauth] Jan 15 12:51:10 host sshd[5848]: Connection closed by 104.167.82.144 port 54302 [preauth] Jan 15 12:51:10 host sshd[5854]: Connection closed by 104.167.82.144 port 54646 [preauth] Jan 15 12:51:10 host sshd[5859]: Connection closed by 104.167.82.144 port 54386 [preauth] Jan 15 12:51:10 host sshd[5853]: Connection closed by 104.167.82.144 port 54292 [preauth] Jan 15 12:51:10 host sshd[5869]: Connection closed by 104.167.82.144 port 54536 [preauth] Jan 15 12:51:10 host sshd[5866]: Connection closed by 104.167.82.144 port 54468 [preauth] Jan 15 12:51:10 host sshd[5865]: Connection closed by 104.167.82.144 port 54444 [preauth] Jan 15 12:51:10 host sshd[5852]: Connection closed by 104.167.82.144 port 54402 [preauth] Jan 15 12:51:10 host sshd[5867]: Failed password for invalid user root from 104.167.82.144 port 54352 ssh2 Jan 15 12:51:10 host sshd[5868]: Connection closed by 104.167.82.144 port 54548 [preauth] Jan 15 12:51:10 host sshd[5870]: Connection closed by 104.167.82.144 port 54506 [preauth] Jan 15 12:51:10 host sshd[5860]: Connection closed by 104.167.82.144 port 54480 [preauth] Jan 15 12:51:10 host sshd[5863]: Connection closed by 104.167.82.144 port 54356 [preauth] Jan 15 12:51:10 host sshd[5856]: Connection closed by 104.167.82.144 port 54464 [preauth] Jan 15 12:51:11 host sshd[5867]: Connection closed by 104.167.82.144 port 54352 [preauth] Jan 15 12:57:55 host sshd[6748]: User root from 194.169.175.102 not allowed because not listed in AllowUsers Jan 15 12:57:55 host sshd[6748]: input_userauth_request: invalid user root [preauth] Jan 15 12:57:55 host unix_chkpwd[6752]: password check failed for user (root) Jan 15 12:57:55 host sshd[6748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=root Jan 15 12:57:55 host sshd[6748]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 12:57:58 host sshd[6748]: Failed password for invalid user root from 194.169.175.102 port 61896 ssh2 Jan 15 12:57:58 host sshd[6748]: Received disconnect from 194.169.175.102 port 61896:11: Client disconnecting normally [preauth] Jan 15 12:57:58 host sshd[6748]: Disconnected from 194.169.175.102 port 61896 [preauth] Jan 15 13:02:24 host sshd[7393]: Invalid user ek from 194.110.203.109 port 57830 Jan 15 13:02:24 host sshd[7393]: input_userauth_request: invalid user ek [preauth] Jan 15 13:02:24 host sshd[7393]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:02:24 host sshd[7393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 13:02:26 host sshd[7393]: Failed password for invalid user ek from 194.110.203.109 port 57830 ssh2 Jan 15 13:02:29 host sshd[7393]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:02:31 host sshd[7393]: Failed password for invalid user ek from 194.110.203.109 port 57830 ssh2 Jan 15 13:02:34 host sshd[7393]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:02:37 host sshd[7393]: Failed password for invalid user ek from 194.110.203.109 port 57830 ssh2 Jan 15 13:02:40 host sshd[7393]: Connection closed by 194.110.203.109 port 57830 [preauth] Jan 15 13:02:40 host sshd[7393]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 13:03:27 host sshd[7503]: User root from 165.154.242.88 not allowed because not listed in AllowUsers Jan 15 13:03:27 host sshd[7503]: input_userauth_request: invalid user root [preauth] Jan 15 13:03:27 host unix_chkpwd[7506]: password check failed for user (root) Jan 15 13:03:27 host sshd[7503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.242.88 user=root Jan 15 13:03:27 host sshd[7503]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:03:30 host sshd[7503]: Failed password for invalid user root from 165.154.242.88 port 27494 ssh2 Jan 15 13:03:30 host sshd[7503]: Received disconnect from 165.154.242.88 port 27494:11: Bye Bye [preauth] Jan 15 13:03:30 host sshd[7503]: Disconnected from 165.154.242.88 port 27494 [preauth] Jan 15 13:03:37 host sshd[7539]: User root from 143.198.123.124 not allowed because not listed in AllowUsers Jan 15 13:03:37 host sshd[7539]: input_userauth_request: invalid user root [preauth] Jan 15 13:03:37 host unix_chkpwd[7545]: password check failed for user (root) Jan 15 13:03:37 host sshd[7539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.123.124 user=root Jan 15 13:03:37 host sshd[7539]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:03:38 host sshd[7547]: User root from 170.106.114.160 not allowed because not listed in AllowUsers Jan 15 13:03:38 host sshd[7547]: input_userauth_request: invalid user root [preauth] Jan 15 13:03:38 host unix_chkpwd[7552]: password check failed for user (root) Jan 15 13:03:38 host sshd[7547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.114.160 user=root Jan 15 13:03:38 host sshd[7547]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:03:38 host sshd[7539]: Failed password for invalid user root from 143.198.123.124 port 47886 ssh2 Jan 15 13:03:39 host sshd[7539]: Received disconnect from 143.198.123.124 port 47886:11: Bye Bye [preauth] Jan 15 13:03:39 host sshd[7539]: Disconnected from 143.198.123.124 port 47886 [preauth] Jan 15 13:03:39 host sshd[7549]: Invalid user ec2-user from 114.33.143.108 port 49187 Jan 15 13:03:39 host sshd[7549]: input_userauth_request: invalid user ec2-user [preauth] Jan 15 13:03:39 host sshd[7549]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:03:39 host sshd[7549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.143.108 Jan 15 13:03:40 host sshd[7547]: Failed password for invalid user root from 170.106.114.160 port 40630 ssh2 Jan 15 13:03:40 host sshd[7547]: Received disconnect from 170.106.114.160 port 40630:11: Bye Bye [preauth] Jan 15 13:03:40 host sshd[7547]: Disconnected from 170.106.114.160 port 40630 [preauth] Jan 15 13:03:41 host sshd[7549]: Failed password for invalid user ec2-user from 114.33.143.108 port 49187 ssh2 Jan 15 13:03:42 host sshd[7549]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:03:44 host sshd[7549]: Failed password for invalid user ec2-user from 114.33.143.108 port 49187 ssh2 Jan 15 13:03:44 host sshd[7549]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:03:46 host sshd[7549]: Failed password for invalid user ec2-user from 114.33.143.108 port 49187 ssh2 Jan 15 13:03:47 host sshd[7549]: Failed password for invalid user ec2-user from 114.33.143.108 port 49187 ssh2 Jan 15 13:03:47 host sshd[7549]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:03:49 host sshd[7549]: Failed password for invalid user ec2-user from 114.33.143.108 port 49187 ssh2 Jan 15 13:03:50 host sshd[7549]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:03:52 host sshd[7549]: Failed password for invalid user ec2-user from 114.33.143.108 port 49187 ssh2 Jan 15 13:03:52 host sshd[7549]: error: maximum authentication attempts exceeded for invalid user ec2-user from 114.33.143.108 port 49187 ssh2 [preauth] Jan 15 13:03:52 host sshd[7549]: Disconnecting: Too many authentication failures [preauth] Jan 15 13:03:52 host sshd[7549]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.143.108 Jan 15 13:03:52 host sshd[7549]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 15 13:05:27 host sshd[7792]: User root from 85.234.125.13 not allowed because not listed in AllowUsers Jan 15 13:05:27 host sshd[7792]: input_userauth_request: invalid user root [preauth] Jan 15 13:05:28 host unix_chkpwd[7795]: password check failed for user (root) Jan 15 13:05:28 host sshd[7792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.234.125.13 user=root Jan 15 13:05:28 host sshd[7792]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:05:30 host sshd[7792]: Failed password for invalid user root from 85.234.125.13 port 59148 ssh2 Jan 15 13:05:30 host sshd[7792]: Received disconnect from 85.234.125.13 port 59148:11: Bye Bye [preauth] Jan 15 13:05:30 host sshd[7792]: Disconnected from 85.234.125.13 port 59148 [preauth] Jan 15 13:05:33 host sshd[7874]: User root from 178.57.195.4 not allowed because not listed in AllowUsers Jan 15 13:05:33 host sshd[7874]: input_userauth_request: invalid user root [preauth] Jan 15 13:05:33 host unix_chkpwd[7893]: password check failed for user (root) Jan 15 13:05:33 host sshd[7874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.57.195.4 user=root Jan 15 13:05:33 host sshd[7874]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:05:35 host sshd[7874]: Failed password for invalid user root from 178.57.195.4 port 55282 ssh2 Jan 15 13:05:35 host sshd[7874]: Received disconnect from 178.57.195.4 port 55282:11: Bye Bye [preauth] Jan 15 13:05:35 host sshd[7874]: Disconnected from 178.57.195.4 port 55282 [preauth] Jan 15 13:06:08 host sshd[7974]: User root from 134.209.74.42 not allowed because not listed in AllowUsers Jan 15 13:06:08 host sshd[7974]: input_userauth_request: invalid user root [preauth] Jan 15 13:06:08 host unix_chkpwd[7977]: password check failed for user (root) Jan 15 13:06:08 host sshd[7974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.74.42 user=root Jan 15 13:06:08 host sshd[7974]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:06:10 host sshd[7974]: Failed password for invalid user root from 134.209.74.42 port 52962 ssh2 Jan 15 13:06:10 host sshd[7974]: Received disconnect from 134.209.74.42 port 52962:11: Bye Bye [preauth] Jan 15 13:06:10 host sshd[7974]: Disconnected from 134.209.74.42 port 52962 [preauth] Jan 15 13:06:44 host sshd[8036]: User root from 20.119.249.229 not allowed because not listed in AllowUsers Jan 15 13:06:44 host sshd[8036]: input_userauth_request: invalid user root [preauth] Jan 15 13:06:44 host unix_chkpwd[8039]: password check failed for user (root) Jan 15 13:06:44 host sshd[8036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.119.249.229 user=root Jan 15 13:06:44 host sshd[8036]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:06:46 host sshd[8036]: Failed password for invalid user root from 20.119.249.229 port 1024 ssh2 Jan 15 13:06:46 host sshd[8036]: Received disconnect from 20.119.249.229 port 1024:11: Bye Bye [preauth] Jan 15 13:06:46 host sshd[8036]: Disconnected from 20.119.249.229 port 1024 [preauth] Jan 15 13:08:01 host sshd[8165]: User root from 189.35.82.41 not allowed because not listed in AllowUsers Jan 15 13:08:01 host sshd[8165]: input_userauth_request: invalid user root [preauth] Jan 15 13:08:01 host unix_chkpwd[8168]: password check failed for user (root) Jan 15 13:08:01 host sshd[8165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.35.82.41 user=root Jan 15 13:08:01 host sshd[8165]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:08:02 host sshd[8165]: Failed password for invalid user root from 189.35.82.41 port 60263 ssh2 Jan 15 13:08:03 host sshd[8165]: Received disconnect from 189.35.82.41 port 60263:11: Bye Bye [preauth] Jan 15 13:08:03 host sshd[8165]: Disconnected from 189.35.82.41 port 60263 [preauth] Jan 15 13:08:59 host sshd[8274]: User root from 143.198.123.124 not allowed because not listed in AllowUsers Jan 15 13:08:59 host sshd[8274]: input_userauth_request: invalid user root [preauth] Jan 15 13:08:59 host unix_chkpwd[8281]: password check failed for user (root) Jan 15 13:08:59 host sshd[8274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.123.124 user=root Jan 15 13:08:59 host sshd[8274]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:09:01 host sshd[8274]: Failed password for invalid user root from 143.198.123.124 port 47392 ssh2 Jan 15 13:09:01 host sshd[8274]: Received disconnect from 143.198.123.124 port 47392:11: Bye Bye [preauth] Jan 15 13:09:01 host sshd[8274]: Disconnected from 143.198.123.124 port 47392 [preauth] Jan 15 13:09:20 host sshd[8356]: User root from 170.106.114.160 not allowed because not listed in AllowUsers Jan 15 13:09:20 host sshd[8356]: input_userauth_request: invalid user root [preauth] Jan 15 13:09:20 host unix_chkpwd[8360]: password check failed for user (root) Jan 15 13:09:20 host sshd[8356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.114.160 user=root Jan 15 13:09:20 host sshd[8356]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:09:22 host sshd[8356]: Failed password for invalid user root from 170.106.114.160 port 41816 ssh2 Jan 15 13:09:44 host sshd[8441]: User root from 134.209.74.42 not allowed because not listed in AllowUsers Jan 15 13:09:44 host sshd[8441]: input_userauth_request: invalid user root [preauth] Jan 15 13:09:44 host unix_chkpwd[8444]: password check failed for user (root) Jan 15 13:09:44 host sshd[8441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.74.42 user=root Jan 15 13:09:44 host sshd[8441]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:09:46 host sshd[8441]: Failed password for invalid user root from 134.209.74.42 port 41436 ssh2 Jan 15 13:09:57 host sshd[8486]: User root from 178.57.195.4 not allowed because not listed in AllowUsers Jan 15 13:09:57 host sshd[8486]: input_userauth_request: invalid user root [preauth] Jan 15 13:09:57 host unix_chkpwd[8489]: password check failed for user (root) Jan 15 13:09:57 host sshd[8486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.57.195.4 user=root Jan 15 13:09:57 host sshd[8486]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:09:59 host sshd[8486]: Failed password for invalid user root from 178.57.195.4 port 46232 ssh2 Jan 15 13:09:59 host sshd[8486]: Received disconnect from 178.57.195.4 port 46232:11: Bye Bye [preauth] Jan 15 13:09:59 host sshd[8486]: Disconnected from 178.57.195.4 port 46232 [preauth] Jan 15 13:10:00 host sshd[8492]: User root from 85.234.125.13 not allowed because not listed in AllowUsers Jan 15 13:10:00 host sshd[8492]: input_userauth_request: invalid user root [preauth] Jan 15 13:10:00 host unix_chkpwd[8495]: password check failed for user (root) Jan 15 13:10:00 host sshd[8492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.234.125.13 user=root Jan 15 13:10:00 host sshd[8492]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:10:02 host sshd[8492]: Failed password for invalid user root from 85.234.125.13 port 51470 ssh2 Jan 15 13:10:05 host sshd[8581]: User root from 165.154.242.88 not allowed because not listed in AllowUsers Jan 15 13:10:05 host sshd[8581]: input_userauth_request: invalid user root [preauth] Jan 15 13:10:05 host unix_chkpwd[8586]: password check failed for user (root) Jan 15 13:10:05 host sshd[8581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.242.88 user=root Jan 15 13:10:05 host sshd[8581]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:10:07 host sshd[8581]: Failed password for invalid user root from 165.154.242.88 port 30442 ssh2 Jan 15 13:10:44 host sshd[8685]: User root from 20.119.249.229 not allowed because not listed in AllowUsers Jan 15 13:10:44 host sshd[8685]: input_userauth_request: invalid user root [preauth] Jan 15 13:10:44 host unix_chkpwd[8688]: password check failed for user (root) Jan 15 13:10:44 host sshd[8685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.119.249.229 user=root Jan 15 13:10:44 host sshd[8685]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:10:46 host sshd[8685]: Failed password for invalid user root from 20.119.249.229 port 1024 ssh2 Jan 15 13:11:39 host sshd[8930]: User root from 189.35.82.41 not allowed because not listed in AllowUsers Jan 15 13:11:39 host sshd[8930]: input_userauth_request: invalid user root [preauth] Jan 15 13:11:40 host unix_chkpwd[8936]: password check failed for user (root) Jan 15 13:11:40 host sshd[8930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.35.82.41 user=root Jan 15 13:11:40 host sshd[8930]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:11:41 host sshd[8930]: Failed password for invalid user root from 189.35.82.41 port 52021 ssh2 Jan 15 13:14:25 host sshd[9253]: Invalid user hikvision from 112.157.220.67 port 62004 Jan 15 13:14:25 host sshd[9253]: input_userauth_request: invalid user hikvision [preauth] Jan 15 13:14:25 host sshd[9253]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:14:25 host sshd[9253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.157.220.67 Jan 15 13:14:28 host sshd[9253]: Failed password for invalid user hikvision from 112.157.220.67 port 62004 ssh2 Jan 15 13:14:29 host sshd[9253]: Connection reset by 112.157.220.67 port 62004 [preauth] Jan 15 13:15:12 host sshd[9346]: User root from 153.186.42.26 not allowed because not listed in AllowUsers Jan 15 13:15:12 host sshd[9346]: input_userauth_request: invalid user root [preauth] Jan 15 13:15:12 host unix_chkpwd[9350]: password check failed for user (root) Jan 15 13:15:12 host sshd[9346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.186.42.26 user=root Jan 15 13:15:12 host sshd[9346]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:15:14 host sshd[9346]: Failed password for invalid user root from 153.186.42.26 port 45437 ssh2 Jan 15 13:15:15 host sshd[9346]: Connection reset by 153.186.42.26 port 45437 [preauth] Jan 15 13:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 13:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 13:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 13:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=a2zgroup user-5=dartsimp user-6=wwwpmcresource user-7=keralaholi user-8=wwwresourcehunte user-9=wwwrmswll user-10=ugotscom user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=wwwkmaorg user-15=disposeat user-16=remysagr user-17=pmcresources user-18=vfmassets user-19=shalinijames user-20=wwwtestugo user-21=straightcurve user-22=wwwletsstalkfood user-23=bonifacegroup user-24=wwwevmhonda user-25=wwwnexidigital user-26=mrsclean user-27=palco123 user-28=gifterman user-29=phmetals user-30=kottayamcalldriv feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 13:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 13:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5yzADysa2xvnfL0q.~ Jan 15 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5yzADysa2xvnfL0q.~' Jan 15 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5yzADysa2xvnfL0q.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 13:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 13:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 13:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 13:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 13:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 13:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 13:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 13:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 13:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 13:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 13:22:46 host sshd[10580]: Invalid user super from 220.92.190.81 port 61542 Jan 15 13:22:46 host sshd[10580]: input_userauth_request: invalid user super [preauth] Jan 15 13:22:46 host sshd[10580]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:22:46 host sshd[10580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.92.190.81 Jan 15 13:22:48 host sshd[10580]: Failed password for invalid user super from 220.92.190.81 port 61542 ssh2 Jan 15 13:22:48 host sshd[10580]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:22:50 host sshd[10580]: Failed password for invalid user super from 220.92.190.81 port 61542 ssh2 Jan 15 13:22:51 host sshd[10580]: Connection reset by 220.92.190.81 port 61542 [preauth] Jan 15 13:22:51 host sshd[10580]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.92.190.81 Jan 15 13:22:52 host sshd[10585]: User root from 185.122.204.242 not allowed because not listed in AllowUsers Jan 15 13:22:52 host sshd[10585]: input_userauth_request: invalid user root [preauth] Jan 15 13:22:52 host unix_chkpwd[10596]: password check failed for user (root) Jan 15 13:22:52 host sshd[10585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.122.204.242 user=root Jan 15 13:22:52 host sshd[10585]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:22:54 host sshd[10597]: User root from 185.122.204.242 not allowed because not listed in AllowUsers Jan 15 13:22:54 host sshd[10597]: input_userauth_request: invalid user root [preauth] Jan 15 13:22:54 host unix_chkpwd[10600]: password check failed for user (root) Jan 15 13:22:54 host sshd[10597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.122.204.242 user=root Jan 15 13:22:54 host sshd[10597]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:22:54 host sshd[10585]: Failed password for invalid user root from 185.122.204.242 port 49658 ssh2 Jan 15 13:22:54 host sshd[10585]: Connection closed by 185.122.204.242 port 49658 [preauth] Jan 15 13:22:56 host sshd[10597]: Failed password for invalid user root from 185.122.204.242 port 52742 ssh2 Jan 15 13:22:56 host sshd[10597]: Connection closed by 185.122.204.242 port 52742 [preauth] Jan 15 13:24:11 host sshd[10758]: Invalid user pi from 125.229.164.216 port 58658 Jan 15 13:24:11 host sshd[10758]: input_userauth_request: invalid user pi [preauth] Jan 15 13:24:11 host sshd[10758]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:24:11 host sshd[10758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.164.216 Jan 15 13:24:12 host sshd[10758]: Failed password for invalid user pi from 125.229.164.216 port 58658 ssh2 Jan 15 13:24:13 host sshd[10758]: Connection reset by 125.229.164.216 port 58658 [preauth] Jan 15 13:35:34 host sshd[12146]: Connection reset by 175.212.95.239 port 61951 [preauth] Jan 15 13:36:43 host sshd[12279]: Invalid user admin from 2.231.46.61 port 35866 Jan 15 13:36:43 host sshd[12279]: input_userauth_request: invalid user admin [preauth] Jan 15 13:36:43 host sshd[12279]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:36:43 host sshd[12279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.231.46.61 Jan 15 13:36:45 host sshd[12279]: Failed password for invalid user admin from 2.231.46.61 port 35866 ssh2 Jan 15 13:36:46 host sshd[12279]: Connection reset by 2.231.46.61 port 35866 [preauth] Jan 15 13:37:09 host sshd[12324]: Did not receive identification string from 149.129.220.222 port 61000 Jan 15 13:47:59 host sshd[14060]: Connection reset by 5.15.16.209 port 36465 [preauth] Jan 15 13:50:57 host sshd[14476]: User root from 59.126.149.89 not allowed because not listed in AllowUsers Jan 15 13:50:57 host sshd[14476]: input_userauth_request: invalid user root [preauth] Jan 15 13:50:57 host unix_chkpwd[14487]: password check failed for user (root) Jan 15 13:50:57 host sshd[14476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.149.89 user=root Jan 15 13:50:57 host sshd[14476]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:51:00 host sshd[14476]: Failed password for invalid user root from 59.126.149.89 port 55271 ssh2 Jan 15 13:51:01 host unix_chkpwd[14492]: password check failed for user (root) Jan 15 13:51:01 host sshd[14476]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:51:02 host sshd[14476]: Failed password for invalid user root from 59.126.149.89 port 55271 ssh2 Jan 15 13:51:03 host unix_chkpwd[14506]: password check failed for user (root) Jan 15 13:51:03 host sshd[14476]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:51:05 host sshd[14476]: Failed password for invalid user root from 59.126.149.89 port 55271 ssh2 Jan 15 13:51:06 host unix_chkpwd[14509]: password check failed for user (root) Jan 15 13:51:06 host sshd[14476]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 13:51:08 host sshd[14476]: Failed password for invalid user root from 59.126.149.89 port 55271 ssh2 Jan 15 13:52:31 host sshd[14779]: Invalid user hikvision from 220.132.53.201 port 35869 Jan 15 13:52:31 host sshd[14779]: input_userauth_request: invalid user hikvision [preauth] Jan 15 13:52:31 host sshd[14779]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:52:31 host sshd[14779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.53.201 Jan 15 13:52:33 host sshd[14779]: Failed password for invalid user hikvision from 220.132.53.201 port 35869 ssh2 Jan 15 13:52:33 host sshd[14779]: Connection reset by 220.132.53.201 port 35869 [preauth] Jan 15 13:54:06 host sshd[14928]: Invalid user admin from 220.135.13.109 port 44643 Jan 15 13:54:06 host sshd[14928]: input_userauth_request: invalid user admin [preauth] Jan 15 13:54:06 host sshd[14928]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:54:06 host sshd[14928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.13.109 Jan 15 13:54:07 host sshd[14928]: Failed password for invalid user admin from 220.135.13.109 port 44643 ssh2 Jan 15 13:54:08 host sshd[14928]: Failed password for invalid user admin from 220.135.13.109 port 44643 ssh2 Jan 15 13:54:09 host sshd[14928]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:54:11 host sshd[14928]: Failed password for invalid user admin from 220.135.13.109 port 44643 ssh2 Jan 15 13:54:11 host sshd[14928]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:54:14 host sshd[14928]: Failed password for invalid user admin from 220.135.13.109 port 44643 ssh2 Jan 15 13:54:14 host sshd[14928]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:54:16 host sshd[14928]: Failed password for invalid user admin from 220.135.13.109 port 44643 ssh2 Jan 15 13:54:17 host sshd[14928]: pam_unix(sshd:auth): check pass; user unknown Jan 15 13:54:19 host sshd[14928]: Failed password for invalid user admin from 220.135.13.109 port 44643 ssh2 Jan 15 13:54:19 host sshd[14928]: error: maximum authentication attempts exceeded for invalid user admin from 220.135.13.109 port 44643 ssh2 [preauth] Jan 15 13:54:19 host sshd[14928]: Disconnecting: Too many authentication failures [preauth] Jan 15 13:54:19 host sshd[14928]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.13.109 Jan 15 13:54:19 host sshd[14928]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 15 14:15:54 host sshd[17766]: Invalid user pi from 175.205.145.158 port 57577 Jan 15 14:15:54 host sshd[17766]: input_userauth_request: invalid user pi [preauth] Jan 15 14:15:54 host sshd[17766]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:15:54 host sshd[17766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.205.145.158 Jan 15 14:15:56 host sshd[17766]: Failed password for invalid user pi from 175.205.145.158 port 57577 ssh2 Jan 15 14:15:57 host sshd[17766]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:15:59 host sshd[17766]: Failed password for invalid user pi from 175.205.145.158 port 57577 ssh2 Jan 15 14:16:00 host sshd[17766]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:16:01 host sshd[17766]: Failed password for invalid user pi from 175.205.145.158 port 57577 ssh2 Jan 15 14:16:03 host sshd[17766]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:16:05 host sshd[17766]: Failed password for invalid user pi from 175.205.145.158 port 57577 ssh2 Jan 15 14:16:06 host sshd[17766]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:16:08 host sshd[17766]: Failed password for invalid user pi from 175.205.145.158 port 57577 ssh2 Jan 15 14:16:39 host sshd[17991]: User root from 141.98.11.66 not allowed because not listed in AllowUsers Jan 15 14:16:39 host sshd[17991]: input_userauth_request: invalid user root [preauth] Jan 15 14:16:39 host unix_chkpwd[17995]: password check failed for user (root) Jan 15 14:16:39 host sshd[17991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.66 user=root Jan 15 14:16:39 host sshd[17991]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 14:16:42 host sshd[17991]: Failed password for invalid user root from 141.98.11.66 port 37862 ssh2 Jan 15 14:16:42 host sshd[17991]: Received disconnect from 141.98.11.66 port 37862:11: Normal Shutdown, Thank you for playing [preauth] Jan 15 14:16:42 host sshd[17991]: Disconnected from 141.98.11.66 port 37862 [preauth] Jan 15 14:20:55 host sshd[18459]: Invalid user emcali from 114.26.170.22 port 53855 Jan 15 14:20:55 host sshd[18459]: input_userauth_request: invalid user emcali [preauth] Jan 15 14:20:55 host sshd[18459]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:20:55 host sshd[18459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.26.170.22 Jan 15 14:20:57 host sshd[18459]: Failed password for invalid user emcali from 114.26.170.22 port 53855 ssh2 Jan 15 14:20:59 host sshd[18459]: Failed password for invalid user emcali from 114.26.170.22 port 53855 ssh2 Jan 15 14:20:59 host sshd[18459]: Connection closed by 114.26.170.22 port 53855 [preauth] Jan 15 14:20:59 host sshd[18467]: Invalid user hikvision from 118.41.49.96 port 59119 Jan 15 14:20:59 host sshd[18467]: input_userauth_request: invalid user hikvision [preauth] Jan 15 14:20:59 host sshd[18467]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:20:59 host sshd[18467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.41.49.96 Jan 15 14:21:01 host sshd[18467]: Failed password for invalid user hikvision from 118.41.49.96 port 59119 ssh2 Jan 15 14:21:02 host sshd[18467]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:21:05 host sshd[18467]: Failed password for invalid user hikvision from 118.41.49.96 port 59119 ssh2 Jan 15 14:21:05 host sshd[18467]: Failed password for invalid user hikvision from 118.41.49.96 port 59119 ssh2 Jan 15 14:21:06 host sshd[18467]: Connection closed by 118.41.49.96 port 59119 [preauth] Jan 15 14:21:06 host sshd[18467]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.41.49.96 Jan 15 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 14:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 14:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=gifterman user-4=palco123 user-5=phmetals user-6=kottayamcalldriv user-7=straightcurve user-8=wwwletsstalkfood user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=woodpeck user-16=wwwkapin user-17=wwwkmaorg user-18=disposeat user-19=remysagr user-20=wwwrmswll user-21=wwwresourcehunte user-22=keralaholi user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 14:22:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 14:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 14:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-m1h3xwOu59APW56Y.~ Jan 15 14:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-m1h3xwOu59APW56Y.~' Jan 15 14:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-m1h3xwOu59APW56Y.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 14:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 14:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 14:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 14:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 14:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 14:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 14:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 14:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 14:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 14:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 14:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 14:23:47 host sshd[18975]: User root from 141.98.11.66 not allowed because not listed in AllowUsers Jan 15 14:23:47 host sshd[18975]: input_userauth_request: invalid user root [preauth] Jan 15 14:23:47 host unix_chkpwd[18979]: password check failed for user (root) Jan 15 14:23:47 host sshd[18975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.66 user=root Jan 15 14:23:47 host sshd[18975]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 14:23:49 host sshd[18975]: Failed password for invalid user root from 141.98.11.66 port 53144 ssh2 Jan 15 14:23:49 host sshd[18975]: Received disconnect from 141.98.11.66 port 53144:11: Normal Shutdown, Thank you for playing [preauth] Jan 15 14:23:49 host sshd[18975]: Disconnected from 141.98.11.66 port 53144 [preauth] Jan 15 14:24:26 host sshd[19174]: Invalid user user from 117.2.67.93 port 59736 Jan 15 14:24:26 host sshd[19174]: input_userauth_request: invalid user user [preauth] Jan 15 14:24:27 host sshd[19174]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:24:27 host sshd[19174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.2.67.93 Jan 15 14:24:28 host sshd[19174]: Failed password for invalid user user from 117.2.67.93 port 59736 ssh2 Jan 15 14:24:29 host sshd[19174]: Connection closed by 117.2.67.93 port 59736 [preauth] Jan 15 14:25:37 host sshd[19337]: Connection reset by 59.8.83.147 port 63989 [preauth] Jan 15 14:33:26 host sshd[20320]: User root from 122.117.59.154 not allowed because not listed in AllowUsers Jan 15 14:33:26 host sshd[20320]: input_userauth_request: invalid user root [preauth] Jan 15 14:33:26 host unix_chkpwd[20325]: password check failed for user (root) Jan 15 14:33:26 host sshd[20320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.59.154 user=root Jan 15 14:33:26 host sshd[20320]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 14:33:28 host sshd[20320]: Failed password for invalid user root from 122.117.59.154 port 45320 ssh2 Jan 15 14:33:29 host unix_chkpwd[20352]: password check failed for user (root) Jan 15 14:33:29 host sshd[20320]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 14:33:32 host sshd[20320]: Failed password for invalid user root from 122.117.59.154 port 45320 ssh2 Jan 15 14:33:33 host unix_chkpwd[20360]: password check failed for user (root) Jan 15 14:33:33 host sshd[20320]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 14:33:35 host sshd[20320]: Failed password for invalid user root from 122.117.59.154 port 45320 ssh2 Jan 15 14:33:36 host unix_chkpwd[20368]: password check failed for user (root) Jan 15 14:33:36 host sshd[20320]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 14:33:38 host sshd[20320]: Failed password for invalid user root from 122.117.59.154 port 45320 ssh2 Jan 15 14:33:38 host unix_chkpwd[20371]: password check failed for user (root) Jan 15 14:33:38 host sshd[20320]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 14:33:40 host sshd[20320]: Failed password for invalid user root from 122.117.59.154 port 45320 ssh2 Jan 15 14:34:35 host sshd[20509]: Invalid user oracle from 47.23.31.173 port 34208 Jan 15 14:34:35 host sshd[20509]: input_userauth_request: invalid user oracle [preauth] Jan 15 14:34:35 host sshd[20509]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:34:35 host sshd[20509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.23.31.173 Jan 15 14:34:38 host sshd[20509]: Failed password for invalid user oracle from 47.23.31.173 port 34208 ssh2 Jan 15 14:34:40 host sshd[20509]: Connection reset by 47.23.31.173 port 34208 [preauth] Jan 15 14:38:20 host sshd[21030]: Invalid user admin from 121.161.116.161 port 62943 Jan 15 14:38:20 host sshd[21030]: input_userauth_request: invalid user admin [preauth] Jan 15 14:38:20 host sshd[21030]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:38:20 host sshd[21030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.161.116.161 Jan 15 14:38:21 host sshd[21030]: Failed password for invalid user admin from 121.161.116.161 port 62943 ssh2 Jan 15 14:38:22 host sshd[21030]: Failed password for invalid user admin from 121.161.116.161 port 62943 ssh2 Jan 15 14:38:23 host sshd[21030]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:38:26 host sshd[21030]: Failed password for invalid user admin from 121.161.116.161 port 62943 ssh2 Jan 15 14:38:27 host sshd[21030]: Connection reset by 121.161.116.161 port 62943 [preauth] Jan 15 14:38:27 host sshd[21030]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.161.116.161 Jan 15 14:49:58 host sshd[22595]: Invalid user bryan from 107.189.30.59 port 49560 Jan 15 14:49:58 host sshd[22595]: input_userauth_request: invalid user bryan [preauth] Jan 15 14:49:58 host sshd[22595]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:49:58 host sshd[22595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 15 14:50:00 host sshd[22595]: Failed password for invalid user bryan from 107.189.30.59 port 49560 ssh2 Jan 15 14:50:00 host sshd[22595]: Connection closed by 107.189.30.59 port 49560 [preauth] Jan 15 14:53:24 host sshd[23083]: Connection reset by 59.126.35.101 port 52534 [preauth] Jan 15 14:54:40 host sshd[23278]: Invalid user el from 194.110.203.109 port 48078 Jan 15 14:54:40 host sshd[23278]: input_userauth_request: invalid user el [preauth] Jan 15 14:54:40 host sshd[23278]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:54:40 host sshd[23278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 14:54:43 host sshd[23278]: Failed password for invalid user el from 194.110.203.109 port 48078 ssh2 Jan 15 14:54:46 host sshd[23278]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:54:47 host sshd[23278]: Failed password for invalid user el from 194.110.203.109 port 48078 ssh2 Jan 15 14:54:50 host sshd[23278]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:54:52 host sshd[23278]: Failed password for invalid user el from 194.110.203.109 port 48078 ssh2 Jan 15 14:54:55 host sshd[23278]: Connection closed by 194.110.203.109 port 48078 [preauth] Jan 15 14:54:55 host sshd[23278]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 14:59:24 host sshd[23861]: Invalid user ubnt from 95.181.161.70 port 38944 Jan 15 14:59:24 host sshd[23861]: input_userauth_request: invalid user ubnt [preauth] Jan 15 14:59:24 host sshd[23861]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:59:24 host sshd[23861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.181.161.70 Jan 15 14:59:25 host sshd[23861]: Failed password for invalid user ubnt from 95.181.161.70 port 38944 ssh2 Jan 15 14:59:26 host sshd[23861]: Received disconnect from 95.181.161.70 port 38944:11: Bye Bye [preauth] Jan 15 14:59:26 host sshd[23861]: Disconnected from 95.181.161.70 port 38944 [preauth] Jan 15 14:59:27 host sshd[23866]: Invalid user admin from 95.181.161.70 port 43706 Jan 15 14:59:27 host sshd[23866]: input_userauth_request: invalid user admin [preauth] Jan 15 14:59:27 host sshd[23866]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:59:27 host sshd[23866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.181.161.70 Jan 15 14:59:29 host sshd[23866]: Failed password for invalid user admin from 95.181.161.70 port 43706 ssh2 Jan 15 14:59:29 host sshd[23866]: Received disconnect from 95.181.161.70 port 43706:11: Bye Bye [preauth] Jan 15 14:59:29 host sshd[23866]: Disconnected from 95.181.161.70 port 43706 [preauth] Jan 15 14:59:31 host sshd[23893]: User root from 95.181.161.70 not allowed because not listed in AllowUsers Jan 15 14:59:31 host sshd[23893]: input_userauth_request: invalid user root [preauth] Jan 15 14:59:31 host unix_chkpwd[23896]: password check failed for user (root) Jan 15 14:59:31 host sshd[23893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.181.161.70 user=root Jan 15 14:59:31 host sshd[23893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 14:59:33 host sshd[23893]: Failed password for invalid user root from 95.181.161.70 port 49316 ssh2 Jan 15 14:59:33 host sshd[23893]: Received disconnect from 95.181.161.70 port 49316:11: Bye Bye [preauth] Jan 15 14:59:33 host sshd[23893]: Disconnected from 95.181.161.70 port 49316 [preauth] Jan 15 14:59:35 host sshd[23899]: Invalid user 1234 from 95.181.161.70 port 54474 Jan 15 14:59:35 host sshd[23899]: input_userauth_request: invalid user 1234 [preauth] Jan 15 14:59:35 host sshd[23899]: pam_unix(sshd:auth): check pass; user unknown Jan 15 14:59:35 host sshd[23899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.181.161.70 Jan 15 14:59:36 host sshd[23899]: Failed password for invalid user 1234 from 95.181.161.70 port 54474 ssh2 Jan 15 15:02:10 host sshd[24313]: Did not receive identification string from 51.15.3.135 port 50864 Jan 15 15:02:11 host sshd[24314]: Invalid user pi from 51.15.3.135 port 52850 Jan 15 15:02:11 host sshd[24314]: input_userauth_request: invalid user pi [preauth] Jan 15 15:02:11 host sshd[24314]: pam_unix(sshd:auth): check pass; user unknown Jan 15 15:02:11 host sshd[24314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 15 15:02:13 host sshd[24314]: Failed password for invalid user pi from 51.15.3.135 port 52850 ssh2 Jan 15 15:02:13 host sshd[24314]: Connection closed by 51.15.3.135 port 52850 [preauth] Jan 15 15:03:44 host sshd[24485]: User root from 197.234.43.131 not allowed because not listed in AllowUsers Jan 15 15:03:44 host sshd[24485]: input_userauth_request: invalid user root [preauth] Jan 15 15:03:45 host unix_chkpwd[24495]: password check failed for user (root) Jan 15 15:03:45 host sshd[24485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.234.43.131 user=root Jan 15 15:03:45 host sshd[24485]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 15:03:47 host sshd[24485]: Failed password for invalid user root from 197.234.43.131 port 60198 ssh2 Jan 15 15:03:49 host sshd[24485]: Connection closed by 197.234.43.131 port 60198 [preauth] Jan 15 15:16:12 host sshd[26112]: Connection reset by 121.148.214.171 port 63090 [preauth] Jan 15 15:17:28 host sshd[26223]: User root from 23.116.82.170 not allowed because not listed in AllowUsers Jan 15 15:17:28 host sshd[26223]: input_userauth_request: invalid user root [preauth] Jan 15 15:17:28 host unix_chkpwd[26228]: password check failed for user (root) Jan 15 15:17:28 host sshd[26223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.116.82.170 user=root Jan 15 15:17:28 host sshd[26223]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 15:17:30 host sshd[26223]: Failed password for invalid user root from 23.116.82.170 port 38263 ssh2 Jan 15 15:17:31 host unix_chkpwd[26253]: password check failed for user (root) Jan 15 15:17:31 host sshd[26223]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 15:17:33 host sshd[26223]: Failed password for invalid user root from 23.116.82.170 port 38263 ssh2 Jan 15 15:17:33 host unix_chkpwd[26260]: password check failed for user (root) Jan 15 15:17:33 host sshd[26223]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 15:17:36 host sshd[26223]: Failed password for invalid user root from 23.116.82.170 port 38263 ssh2 Jan 15 15:17:36 host sshd[26223]: Connection reset by 23.116.82.170 port 38263 [preauth] Jan 15 15:17:36 host sshd[26223]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.116.82.170 user=root Jan 15 15:19:37 host sshd[26644]: Invalid user admin from 97.101.208.71 port 57384 Jan 15 15:19:37 host sshd[26644]: input_userauth_request: invalid user admin [preauth] Jan 15 15:19:38 host sshd[26644]: pam_unix(sshd:auth): check pass; user unknown Jan 15 15:19:38 host sshd[26644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.101.208.71 Jan 15 15:19:40 host sshd[26644]: Failed password for invalid user admin from 97.101.208.71 port 57384 ssh2 Jan 15 15:19:40 host sshd[26644]: Received disconnect from 97.101.208.71 port 57384:11: Bye Bye [preauth] Jan 15 15:19:40 host sshd[26644]: Disconnected from 97.101.208.71 port 57384 [preauth] Jan 15 15:19:42 host sshd[26651]: Invalid user admin from 97.101.208.71 port 57726 Jan 15 15:19:42 host sshd[26651]: input_userauth_request: invalid user admin [preauth] Jan 15 15:19:43 host sshd[26651]: pam_unix(sshd:auth): check pass; user unknown Jan 15 15:19:43 host sshd[26651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.101.208.71 Jan 15 15:19:45 host sshd[26651]: Failed password for invalid user admin from 97.101.208.71 port 57726 ssh2 Jan 15 15:19:45 host sshd[26651]: Received disconnect from 97.101.208.71 port 57726:11: Bye Bye [preauth] Jan 15 15:19:45 host sshd[26651]: Disconnected from 97.101.208.71 port 57726 [preauth] Jan 15 15:19:47 host sshd[26657]: Invalid user admin from 97.101.208.71 port 57776 Jan 15 15:19:47 host sshd[26657]: input_userauth_request: invalid user admin [preauth] Jan 15 15:19:47 host sshd[26657]: pam_unix(sshd:auth): check pass; user unknown Jan 15 15:19:47 host sshd[26657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.101.208.71 Jan 15 15:19:49 host sshd[26657]: Failed password for invalid user admin from 97.101.208.71 port 57776 ssh2 Jan 15 15:19:49 host sshd[26657]: Received disconnect from 97.101.208.71 port 57776:11: Bye Bye [preauth] Jan 15 15:19:49 host sshd[26657]: Disconnected from 97.101.208.71 port 57776 [preauth] Jan 15 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwrmswll user-2=wwwresourcehunte user-3=keralaholi user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=cochintaxi user-11=wwwkaretakers user-12=wwwnexidigital user-13=mrsclean user-14=gifterman user-15=palco123 user-16=phmetals user-17=kottayamcalldriv user-18=wwwletsstalkfood user-19=straightcurve user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=wwwtestugo user-25=shalinijames user-26=woodpeck user-27=wwwkapin user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 15:22:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zin7IvacrCZyB4up.~ Jan 15 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zin7IvacrCZyB4up.~' Jan 15 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zin7IvacrCZyB4up.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 15:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 15:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 15:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 15:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 15:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 15:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 15:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 15:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 15:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 15:22:22 host sshd[27199]: Invalid user support from 109.193.161.176 port 33492 Jan 15 15:22:22 host sshd[27199]: input_userauth_request: invalid user support [preauth] Jan 15 15:22:22 host sshd[27199]: pam_unix(sshd:auth): check pass; user unknown Jan 15 15:22:22 host sshd[27199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.193.161.176 Jan 15 15:22:24 host sshd[27199]: Failed password for invalid user support from 109.193.161.176 port 33492 ssh2 Jan 15 15:22:24 host sshd[27199]: Connection closed by 109.193.161.176 port 33492 [preauth] Jan 15 15:25:58 host sshd[27682]: Connection reset by 223.206.49.244 port 50577 [preauth] Jan 15 15:41:11 host sshd[29602]: User root from 39.75.231.25 not allowed because not listed in AllowUsers Jan 15 15:41:11 host sshd[29602]: input_userauth_request: invalid user root [preauth] Jan 15 15:41:12 host unix_chkpwd[29610]: password check failed for user (root) Jan 15 15:41:12 host sshd[29602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.75.231.25 user=root Jan 15 15:41:12 host sshd[29602]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 15:41:14 host sshd[29602]: Failed password for invalid user root from 39.75.231.25 port 58778 ssh2 Jan 15 15:41:15 host sshd[29602]: Connection closed by 39.75.231.25 port 58778 [preauth] Jan 15 15:51:31 host sshd[31083]: Invalid user ubuntu from 211.228.25.108 port 61985 Jan 15 15:51:31 host sshd[31083]: input_userauth_request: invalid user ubuntu [preauth] Jan 15 15:51:31 host sshd[31083]: pam_unix(sshd:auth): check pass; user unknown Jan 15 15:51:31 host sshd[31083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.228.25.108 Jan 15 15:51:32 host sshd[31083]: Failed password for invalid user ubuntu from 211.228.25.108 port 61985 ssh2 Jan 15 15:51:32 host sshd[31083]: pam_unix(sshd:auth): check pass; user unknown Jan 15 15:51:34 host sshd[31083]: Failed password for invalid user ubuntu from 211.228.25.108 port 61985 ssh2 Jan 15 15:51:36 host sshd[31083]: pam_unix(sshd:auth): check pass; user unknown Jan 15 15:51:38 host sshd[31083]: Failed password for invalid user ubuntu from 211.228.25.108 port 61985 ssh2 Jan 15 15:51:38 host sshd[31083]: Failed password for invalid user ubuntu from 211.228.25.108 port 61985 ssh2 Jan 15 15:51:38 host sshd[31083]: pam_unix(sshd:auth): check pass; user unknown Jan 15 15:51:41 host sshd[31083]: Failed password for invalid user ubuntu from 211.228.25.108 port 61985 ssh2 Jan 15 15:51:41 host sshd[31083]: pam_unix(sshd:auth): check pass; user unknown Jan 15 15:51:43 host sshd[31083]: Failed password for invalid user ubuntu from 211.228.25.108 port 61985 ssh2 Jan 15 15:51:43 host sshd[31083]: error: maximum authentication attempts exceeded for invalid user ubuntu from 211.228.25.108 port 61985 ssh2 [preauth] Jan 15 15:51:43 host sshd[31083]: Disconnecting: Too many authentication failures [preauth] Jan 15 15:51:43 host sshd[31083]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.228.25.108 Jan 15 15:51:43 host sshd[31083]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 15 15:57:05 host sshd[31771]: Invalid user pi from 223.197.183.126 port 51284 Jan 15 15:57:05 host sshd[31771]: input_userauth_request: invalid user pi [preauth] Jan 15 15:57:05 host sshd[31771]: pam_unix(sshd:auth): check pass; user unknown Jan 15 15:57:05 host sshd[31771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.183.126 Jan 15 15:57:07 host sshd[31771]: Failed password for invalid user pi from 223.197.183.126 port 51284 ssh2 Jan 15 15:57:08 host sshd[31771]: pam_unix(sshd:auth): check pass; user unknown Jan 15 15:57:10 host sshd[31771]: Failed password for invalid user pi from 223.197.183.126 port 51284 ssh2 Jan 15 15:57:10 host sshd[31771]: pam_unix(sshd:auth): check pass; user unknown Jan 15 15:57:12 host sshd[31771]: Failed password for invalid user pi from 223.197.183.126 port 51284 ssh2 Jan 15 15:57:12 host sshd[31771]: pam_unix(sshd:auth): check pass; user unknown Jan 15 15:57:14 host sshd[31771]: Failed password for invalid user pi from 223.197.183.126 port 51284 ssh2 Jan 15 15:57:14 host sshd[31771]: pam_unix(sshd:auth): check pass; user unknown Jan 15 15:57:16 host sshd[31771]: Failed password for invalid user pi from 223.197.183.126 port 51284 ssh2 Jan 15 15:57:16 host sshd[31771]: pam_unix(sshd:auth): check pass; user unknown Jan 15 15:57:19 host sshd[31771]: Failed password for invalid user pi from 223.197.183.126 port 51284 ssh2 Jan 15 15:57:19 host sshd[31771]: error: maximum authentication attempts exceeded for invalid user pi from 223.197.183.126 port 51284 ssh2 [preauth] Jan 15 15:57:19 host sshd[31771]: Disconnecting: Too many authentication failures [preauth] Jan 15 15:57:19 host sshd[31771]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.183.126 Jan 15 15:57:19 host sshd[31771]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 15 15:58:31 host sshd[32046]: Invalid user vadmin from 220.122.86.187 port 60050 Jan 15 15:58:31 host sshd[32046]: input_userauth_request: invalid user vadmin [preauth] Jan 15 15:58:31 host sshd[32046]: pam_unix(sshd:auth): check pass; user unknown Jan 15 15:58:31 host sshd[32046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.122.86.187 Jan 15 15:58:33 host sshd[32046]: Failed password for invalid user vadmin from 220.122.86.187 port 60050 ssh2 Jan 15 15:58:33 host sshd[32046]: Connection reset by 220.122.86.187 port 60050 [preauth] Jan 15 15:59:22 host sshd[32180]: User root from 180.117.20.20 not allowed because not listed in AllowUsers Jan 15 15:59:22 host sshd[32180]: input_userauth_request: invalid user root [preauth] Jan 15 15:59:23 host unix_chkpwd[32184]: password check failed for user (root) Jan 15 15:59:23 host sshd[32180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.117.20.20 user=root Jan 15 15:59:23 host sshd[32180]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 15:59:26 host sshd[32180]: Failed password for invalid user root from 180.117.20.20 port 60399 ssh2 Jan 15 15:59:26 host sshd[32180]: Connection closed by 180.117.20.20 port 60399 [preauth] Jan 15 16:01:39 host sshd[32470]: Connection reset by 119.200.132.123 port 36736 [preauth] Jan 15 16:09:12 host sshd[1098]: User root from 51.250.1.109 not allowed because not listed in AllowUsers Jan 15 16:09:12 host sshd[1098]: input_userauth_request: invalid user root [preauth] Jan 15 16:09:12 host unix_chkpwd[1101]: password check failed for user (root) Jan 15 16:09:12 host sshd[1098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.1.109 user=root Jan 15 16:09:12 host sshd[1098]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 16:09:14 host sshd[1103]: User root from 102.176.188.35 not allowed because not listed in AllowUsers Jan 15 16:09:14 host sshd[1103]: input_userauth_request: invalid user root [preauth] Jan 15 16:09:14 host unix_chkpwd[1106]: password check failed for user (root) Jan 15 16:09:14 host sshd[1098]: Failed password for invalid user root from 51.250.1.109 port 36616 ssh2 Jan 15 16:09:14 host sshd[1103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.176.188.35 user=root Jan 15 16:09:14 host sshd[1103]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 16:09:14 host sshd[1098]: Received disconnect from 51.250.1.109 port 36616:11: Bye Bye [preauth] Jan 15 16:09:14 host sshd[1098]: Disconnected from 51.250.1.109 port 36616 [preauth] Jan 15 16:09:16 host sshd[1103]: Failed password for invalid user root from 102.176.188.35 port 54858 ssh2 Jan 15 16:09:16 host sshd[1103]: Received disconnect from 102.176.188.35 port 54858:11: Bye Bye [preauth] Jan 15 16:09:16 host sshd[1103]: Disconnected from 102.176.188.35 port 54858 [preauth] Jan 15 16:09:43 host sshd[1166]: User root from 70.45.248.52 not allowed because not listed in AllowUsers Jan 15 16:09:43 host sshd[1166]: input_userauth_request: invalid user root [preauth] Jan 15 16:09:43 host unix_chkpwd[1173]: password check failed for user (root) Jan 15 16:09:43 host sshd[1166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.45.248.52 user=root Jan 15 16:09:43 host sshd[1166]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 16:09:45 host sshd[1166]: Failed password for invalid user root from 70.45.248.52 port 50224 ssh2 Jan 15 16:09:45 host sshd[1166]: Received disconnect from 70.45.248.52 port 50224:11: Bye Bye [preauth] Jan 15 16:09:45 host sshd[1166]: Disconnected from 70.45.248.52 port 50224 [preauth] Jan 15 16:12:12 host sshd[1473]: User root from 157.245.156.72 not allowed because not listed in AllowUsers Jan 15 16:12:12 host sshd[1473]: input_userauth_request: invalid user root [preauth] Jan 15 16:12:12 host unix_chkpwd[1476]: password check failed for user (root) Jan 15 16:12:12 host sshd[1473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.156.72 user=root Jan 15 16:12:12 host sshd[1473]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 16:12:14 host sshd[1473]: Failed password for invalid user root from 157.245.156.72 port 44710 ssh2 Jan 15 16:12:14 host sshd[1473]: Received disconnect from 157.245.156.72 port 44710:11: Bye Bye [preauth] Jan 15 16:12:14 host sshd[1473]: Disconnected from 157.245.156.72 port 44710 [preauth] Jan 15 16:12:25 host sshd[1488]: User root from 144.217.243.126 not allowed because not listed in AllowUsers Jan 15 16:12:25 host sshd[1488]: input_userauth_request: invalid user root [preauth] Jan 15 16:12:26 host unix_chkpwd[1491]: password check failed for user (root) Jan 15 16:12:26 host sshd[1488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.243.126 user=root Jan 15 16:12:26 host sshd[1488]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 16:12:27 host sshd[1488]: Failed password for invalid user root from 144.217.243.126 port 34006 ssh2 Jan 15 16:12:27 host sshd[1488]: Received disconnect from 144.217.243.126 port 34006:11: Bye Bye [preauth] Jan 15 16:12:27 host sshd[1488]: Disconnected from 144.217.243.126 port 34006 [preauth] Jan 15 16:14:58 host sshd[2004]: User root from 102.176.188.35 not allowed because not listed in AllowUsers Jan 15 16:14:58 host sshd[2004]: input_userauth_request: invalid user root [preauth] Jan 15 16:14:58 host unix_chkpwd[2012]: password check failed for user (root) Jan 15 16:14:58 host sshd[2004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.176.188.35 user=root Jan 15 16:14:58 host sshd[2004]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 16:14:59 host sshd[2009]: User root from 51.250.1.109 not allowed because not listed in AllowUsers Jan 15 16:14:59 host sshd[2009]: input_userauth_request: invalid user root [preauth] Jan 15 16:14:59 host unix_chkpwd[2015]: password check failed for user (root) Jan 15 16:14:59 host sshd[2009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.1.109 user=root Jan 15 16:14:59 host sshd[2009]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 16:15:00 host sshd[2004]: Failed password for invalid user root from 102.176.188.35 port 54698 ssh2 Jan 15 16:15:00 host sshd[2004]: Received disconnect from 102.176.188.35 port 54698:11: Bye Bye [preauth] Jan 15 16:15:00 host sshd[2004]: Disconnected from 102.176.188.35 port 54698 [preauth] Jan 15 16:15:01 host sshd[2009]: Failed password for invalid user root from 51.250.1.109 port 37160 ssh2 Jan 15 16:15:01 host sshd[2009]: Received disconnect from 51.250.1.109 port 37160:11: Bye Bye [preauth] Jan 15 16:15:01 host sshd[2009]: Disconnected from 51.250.1.109 port 37160 [preauth] Jan 15 16:15:18 host sshd[2125]: Connection closed by 70.45.248.52 port 34046 [preauth] Jan 15 16:15:42 host sshd[2189]: User root from 144.217.243.126 not allowed because not listed in AllowUsers Jan 15 16:15:42 host sshd[2189]: input_userauth_request: invalid user root [preauth] Jan 15 16:15:42 host unix_chkpwd[2196]: password check failed for user (root) Jan 15 16:15:42 host sshd[2189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.243.126 user=root Jan 15 16:15:42 host sshd[2189]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 16:15:45 host sshd[2189]: Failed password for invalid user root from 144.217.243.126 port 41224 ssh2 Jan 15 16:15:45 host sshd[2189]: Received disconnect from 144.217.243.126 port 41224:11: Bye Bye [preauth] Jan 15 16:15:45 host sshd[2189]: Disconnected from 144.217.243.126 port 41224 [preauth] Jan 15 16:16:13 host sshd[2281]: User root from 157.245.156.72 not allowed because not listed in AllowUsers Jan 15 16:16:13 host sshd[2281]: input_userauth_request: invalid user root [preauth] Jan 15 16:16:13 host unix_chkpwd[2283]: password check failed for user (root) Jan 15 16:16:13 host sshd[2281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.156.72 user=root Jan 15 16:16:13 host sshd[2281]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 16:16:15 host sshd[2281]: Failed password for invalid user root from 157.245.156.72 port 46322 ssh2 Jan 15 16:16:15 host sshd[2281]: Received disconnect from 157.245.156.72 port 46322:11: Bye Bye [preauth] Jan 15 16:16:15 host sshd[2281]: Disconnected from 157.245.156.72 port 46322 [preauth] Jan 15 16:18:43 host sshd[2721]: Invalid user user from 27.2.115.42 port 42694 Jan 15 16:18:43 host sshd[2721]: input_userauth_request: invalid user user [preauth] Jan 15 16:18:44 host sshd[2721]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:18:44 host sshd[2721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.2.115.42 Jan 15 16:18:46 host sshd[2721]: Failed password for invalid user user from 27.2.115.42 port 42694 ssh2 Jan 15 16:18:47 host sshd[2721]: Connection closed by 27.2.115.42 port 42694 [preauth] Jan 15 16:18:57 host sshd[2724]: User root from 70.45.248.52 not allowed because not listed in AllowUsers Jan 15 16:18:57 host sshd[2724]: input_userauth_request: invalid user root [preauth] Jan 15 16:18:57 host unix_chkpwd[2752]: password check failed for user (root) Jan 15 16:18:57 host sshd[2724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.45.248.52 user=root Jan 15 16:18:57 host sshd[2724]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 16:18:59 host sshd[2724]: Failed password for invalid user root from 70.45.248.52 port 34544 ssh2 Jan 15 16:19:00 host sshd[2724]: Received disconnect from 70.45.248.52 port 34544:11: Bye Bye [preauth] Jan 15 16:19:00 host sshd[2724]: Disconnected from 70.45.248.52 port 34544 [preauth] Jan 15 16:20:47 host sshd[3031]: Invalid user user from 111.255.32.76 port 60816 Jan 15 16:20:47 host sshd[3031]: input_userauth_request: invalid user user [preauth] Jan 15 16:20:47 host sshd[3031]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:20:47 host sshd[3031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.255.32.76 Jan 15 16:20:49 host sshd[3031]: Failed password for invalid user user from 111.255.32.76 port 60816 ssh2 Jan 15 16:20:50 host sshd[3031]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:20:53 host sshd[3031]: Failed password for invalid user user from 111.255.32.76 port 60816 ssh2 Jan 15 16:20:53 host sshd[3031]: Connection reset by 111.255.32.76 port 60816 [preauth] Jan 15 16:20:53 host sshd[3031]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.255.32.76 Jan 15 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=shalinijames user-3=wwwtestugo user-4=vfmassets user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=remysagr user-9=wwwkmaorg user-10=wwwnexidigital user-11=mrsclean user-12=kottayamcalldriv user-13=phmetals user-14=palco123 user-15=gifterman user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=ugotscom user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 16:22:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wszlORISXovg969P.~ Jan 15 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wszlORISXovg969P.~' Jan 15 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wszlORISXovg969P.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 16:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 16:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 16:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 16:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 16:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 16:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 16:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 16:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 16:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 16:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 16:24:00 host sshd[3634]: Invalid user tiara from 205.185.113.129 port 58976 Jan 15 16:24:00 host sshd[3634]: input_userauth_request: invalid user tiara [preauth] Jan 15 16:24:00 host sshd[3634]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:24:00 host sshd[3634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 15 16:24:02 host sshd[3634]: Failed password for invalid user tiara from 205.185.113.129 port 58976 ssh2 Jan 15 16:24:03 host sshd[3634]: Connection closed by 205.185.113.129 port 58976 [preauth] Jan 15 16:24:56 host sshd[3806]: User root from 27.147.145.186 not allowed because not listed in AllowUsers Jan 15 16:24:56 host sshd[3806]: input_userauth_request: invalid user root [preauth] Jan 15 16:24:56 host unix_chkpwd[3809]: password check failed for user (root) Jan 15 16:24:56 host sshd[3806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.147.145.186 user=root Jan 15 16:24:56 host sshd[3806]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 16:24:58 host sshd[3806]: Failed password for invalid user root from 27.147.145.186 port 35448 ssh2 Jan 15 16:24:59 host sshd[3806]: Received disconnect from 27.147.145.186 port 35448:11: Bye Bye [preauth] Jan 15 16:24:59 host sshd[3806]: Disconnected from 27.147.145.186 port 35448 [preauth] Jan 15 16:26:31 host sshd[4253]: User root from 122.177.103.214 not allowed because not listed in AllowUsers Jan 15 16:26:31 host sshd[4253]: input_userauth_request: invalid user root [preauth] Jan 15 16:26:31 host unix_chkpwd[4255]: password check failed for user (root) Jan 15 16:26:31 host sshd[4253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.177.103.214 user=root Jan 15 16:26:31 host sshd[4253]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 16:26:33 host sshd[4253]: Failed password for invalid user root from 122.177.103.214 port 27714 ssh2 Jan 15 16:26:33 host sshd[4253]: Received disconnect from 122.177.103.214 port 27714:11: Bye Bye [preauth] Jan 15 16:26:33 host sshd[4253]: Disconnected from 122.177.103.214 port 27714 [preauth] Jan 15 16:27:00 host sshd[4305]: Invalid user ubuntu from 194.180.49.57 port 43440 Jan 15 16:27:00 host sshd[4305]: input_userauth_request: invalid user ubuntu [preauth] Jan 15 16:27:01 host sshd[4305]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:27:01 host sshd[4305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.49.57 Jan 15 16:27:03 host sshd[4305]: Failed password for invalid user ubuntu from 194.180.49.57 port 43440 ssh2 Jan 15 16:27:03 host sshd[4305]: Connection closed by 194.180.49.57 port 43440 [preauth] Jan 15 16:27:16 host sshd[4344]: Invalid user admin from 210.103.38.230 port 63620 Jan 15 16:27:16 host sshd[4344]: input_userauth_request: invalid user admin [preauth] Jan 15 16:27:16 host sshd[4344]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:27:16 host sshd[4344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.103.38.230 Jan 15 16:27:18 host sshd[4344]: Failed password for invalid user admin from 210.103.38.230 port 63620 ssh2 Jan 15 16:27:19 host sshd[4344]: Connection reset by 210.103.38.230 port 63620 [preauth] Jan 15 16:27:30 host sshd[4398]: Invalid user zyfwp from 114.34.194.18 port 45725 Jan 15 16:27:30 host sshd[4398]: input_userauth_request: invalid user zyfwp [preauth] Jan 15 16:27:30 host sshd[4398]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:27:30 host sshd[4398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.194.18 Jan 15 16:27:32 host sshd[4398]: Failed password for invalid user zyfwp from 114.34.194.18 port 45725 ssh2 Jan 15 16:27:33 host sshd[4398]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:27:35 host sshd[4398]: Failed password for invalid user zyfwp from 114.34.194.18 port 45725 ssh2 Jan 15 16:27:36 host sshd[4398]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:27:38 host sshd[4398]: Failed password for invalid user zyfwp from 114.34.194.18 port 45725 ssh2 Jan 15 16:27:38 host sshd[4398]: Connection closed by 114.34.194.18 port 45725 [preauth] Jan 15 16:27:38 host sshd[4398]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.194.18 Jan 15 16:28:40 host sshd[4584]: User root from 122.177.103.214 not allowed because not listed in AllowUsers Jan 15 16:28:40 host sshd[4584]: input_userauth_request: invalid user root [preauth] Jan 15 16:28:40 host unix_chkpwd[4587]: password check failed for user (root) Jan 15 16:28:40 host sshd[4584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.177.103.214 user=root Jan 15 16:28:40 host sshd[4584]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 16:28:42 host sshd[4584]: Failed password for invalid user root from 122.177.103.214 port 32878 ssh2 Jan 15 16:28:42 host sshd[4584]: Received disconnect from 122.177.103.214 port 32878:11: Bye Bye [preauth] Jan 15 16:28:42 host sshd[4584]: Disconnected from 122.177.103.214 port 32878 [preauth] Jan 15 16:29:00 host sshd[4666]: User root from 27.147.145.186 not allowed because not listed in AllowUsers Jan 15 16:29:00 host sshd[4666]: input_userauth_request: invalid user root [preauth] Jan 15 16:29:00 host unix_chkpwd[4668]: password check failed for user (root) Jan 15 16:29:00 host sshd[4666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.147.145.186 user=root Jan 15 16:29:00 host sshd[4666]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 16:29:02 host sshd[4666]: Failed password for invalid user root from 27.147.145.186 port 53680 ssh2 Jan 15 16:29:02 host sshd[4666]: Received disconnect from 27.147.145.186 port 53680:11: Bye Bye [preauth] Jan 15 16:29:02 host sshd[4666]: Disconnected from 27.147.145.186 port 53680 [preauth] Jan 15 16:33:51 host sshd[5486]: Invalid user ftpuser from 194.180.49.57 port 45588 Jan 15 16:33:51 host sshd[5486]: input_userauth_request: invalid user ftpuser [preauth] Jan 15 16:33:52 host sshd[5486]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:33:52 host sshd[5486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.49.57 Jan 15 16:33:54 host sshd[5486]: Failed password for invalid user ftpuser from 194.180.49.57 port 45588 ssh2 Jan 15 16:33:54 host sshd[5486]: Connection closed by 194.180.49.57 port 45588 [preauth] Jan 15 16:38:26 host sshd[6205]: Invalid user admin from 106.51.152.8 port 41070 Jan 15 16:38:26 host sshd[6205]: input_userauth_request: invalid user admin [preauth] Jan 15 16:38:26 host sshd[6205]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:38:26 host sshd[6205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.152.8 Jan 15 16:38:27 host sshd[6205]: Failed password for invalid user admin from 106.51.152.8 port 41070 ssh2 Jan 15 16:38:28 host sshd[6205]: Connection closed by 106.51.152.8 port 41070 [preauth] Jan 15 16:39:17 host sshd[6324]: Invalid user em from 194.110.203.109 port 49036 Jan 15 16:39:17 host sshd[6324]: input_userauth_request: invalid user em [preauth] Jan 15 16:39:17 host sshd[6324]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:39:17 host sshd[6324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 16:39:20 host sshd[6324]: Failed password for invalid user em from 194.110.203.109 port 49036 ssh2 Jan 15 16:39:23 host sshd[6324]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:39:25 host sshd[6324]: Failed password for invalid user em from 194.110.203.109 port 49036 ssh2 Jan 15 16:39:28 host sshd[6324]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:39:30 host sshd[6324]: Failed password for invalid user em from 194.110.203.109 port 49036 ssh2 Jan 15 16:39:34 host sshd[6324]: Connection closed by 194.110.203.109 port 49036 [preauth] Jan 15 16:39:34 host sshd[6324]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 16:39:46 host sshd[6396]: Invalid user admin from 14.172.134.26 port 42435 Jan 15 16:39:46 host sshd[6396]: input_userauth_request: invalid user admin [preauth] Jan 15 16:39:46 host sshd[6396]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:39:46 host sshd[6396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.172.134.26 Jan 15 16:39:48 host sshd[6396]: Failed password for invalid user admin from 14.172.134.26 port 42435 ssh2 Jan 15 16:39:49 host sshd[6396]: Failed password for invalid user admin from 14.172.134.26 port 42435 ssh2 Jan 15 16:39:49 host sshd[6396]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:39:51 host sshd[6396]: Failed password for invalid user admin from 14.172.134.26 port 42435 ssh2 Jan 15 16:39:51 host sshd[6396]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:39:53 host sshd[6396]: Failed password for invalid user admin from 14.172.134.26 port 42435 ssh2 Jan 15 16:39:53 host sshd[6396]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:39:55 host sshd[6396]: Failed password for invalid user admin from 14.172.134.26 port 42435 ssh2 Jan 15 16:40:40 host sshd[6574]: Invalid user ftpadmin from 194.180.49.57 port 47716 Jan 15 16:40:40 host sshd[6574]: input_userauth_request: invalid user ftpadmin [preauth] Jan 15 16:40:40 host sshd[6574]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:40:40 host sshd[6574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.49.57 Jan 15 16:40:42 host sshd[6574]: Failed password for invalid user ftpadmin from 194.180.49.57 port 47716 ssh2 Jan 15 16:40:42 host sshd[6574]: Connection closed by 194.180.49.57 port 47716 [preauth] Jan 15 16:56:45 host sshd[8911]: Did not receive identification string from 5.8.10.202 port 1033 Jan 15 16:56:45 host sshd[8912]: Connection closed by 5.8.10.202 port 43397 [preauth] Jan 15 16:57:02 host sshd[8938]: User sshd from 62.233.50.248 not allowed because not listed in AllowUsers Jan 15 16:57:02 host sshd[8938]: input_userauth_request: invalid user sshd [preauth] Jan 15 16:57:02 host unix_chkpwd[8941]: password check failed for user (sshd) Jan 15 16:57:02 host sshd[8938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 user=sshd Jan 15 16:57:02 host sshd[8938]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sshd" Jan 15 16:57:04 host sshd[8938]: Failed password for invalid user sshd from 62.233.50.248 port 10573 ssh2 Jan 15 16:57:04 host sshd[8938]: Received disconnect from 62.233.50.248 port 10573:11: Client disconnecting normally [preauth] Jan 15 16:57:04 host sshd[8938]: Disconnected from 62.233.50.248 port 10573 [preauth] Jan 15 16:57:05 host sshd[8946]: Invalid user admin from 62.233.50.248 port 13885 Jan 15 16:57:05 host sshd[8946]: input_userauth_request: invalid user admin [preauth] Jan 15 16:57:06 host sshd[8946]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:57:06 host sshd[8946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 15 16:57:06 host sshd[8942]: Connection reset by 104.191.174.129 port 44018 [preauth] Jan 15 16:57:08 host sshd[8946]: Failed password for invalid user admin from 62.233.50.248 port 13885 ssh2 Jan 15 16:57:08 host sshd[8946]: Received disconnect from 62.233.50.248 port 13885:11: Client disconnecting normally [preauth] Jan 15 16:57:08 host sshd[8946]: Disconnected from 62.233.50.248 port 13885 [preauth] Jan 15 16:57:09 host sshd[8951]: Invalid user admin from 62.233.50.248 port 17166 Jan 15 16:57:09 host sshd[8951]: input_userauth_request: invalid user admin [preauth] Jan 15 16:57:09 host sshd[8951]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:57:09 host sshd[8951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 15 16:57:11 host sshd[8951]: Failed password for invalid user admin from 62.233.50.248 port 17166 ssh2 Jan 15 16:57:46 host sshd[9048]: Invalid user ubnt from 138.75.78.39 port 50358 Jan 15 16:57:46 host sshd[9048]: input_userauth_request: invalid user ubnt [preauth] Jan 15 16:57:47 host sshd[9048]: pam_unix(sshd:auth): check pass; user unknown Jan 15 16:57:47 host sshd[9048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.75.78.39 Jan 15 16:57:48 host sshd[9048]: Failed password for invalid user ubnt from 138.75.78.39 port 50358 ssh2 Jan 15 16:57:48 host sshd[9048]: Connection closed by 138.75.78.39 port 50358 [preauth] Jan 15 17:05:36 host sshd[10087]: Invalid user dnsekakf2$$ from 114.33.213.154 port 53315 Jan 15 17:05:36 host sshd[10087]: input_userauth_request: invalid user dnsekakf2$$ [preauth] Jan 15 17:05:36 host sshd[10087]: pam_unix(sshd:auth): check pass; user unknown Jan 15 17:05:36 host sshd[10087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.213.154 Jan 15 17:05:38 host sshd[10087]: Failed password for invalid user dnsekakf2$$ from 114.33.213.154 port 53315 ssh2 Jan 15 17:05:38 host sshd[10087]: Failed password for invalid user dnsekakf2$$ from 114.33.213.154 port 53315 ssh2 Jan 15 17:05:39 host sshd[10087]: Connection closed by 114.33.213.154 port 53315 [preauth] Jan 15 17:14:51 host sshd[11140]: User root from 103.152.145.14 not allowed because not listed in AllowUsers Jan 15 17:14:51 host sshd[11140]: input_userauth_request: invalid user root [preauth] Jan 15 17:14:52 host sshd[11140]: Failed none for invalid user root from 103.152.145.14 port 43736 ssh2 Jan 15 17:14:52 host sshd[11140]: Connection closed by 103.152.145.14 port 43736 [preauth] Jan 15 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 17:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 17:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=straightcurve user-4=wwwletsstalkfood user-5=phmetals user-6=kottayamcalldriv user-7=palco123 user-8=gifterman user-9=mrsclean user-10=wwwnexidigital user-11=disposeat user-12=wwwkmaorg user-13=remysagr user-14=wwwkapin user-15=woodpeck user-16=shalinijames user-17=wwwtestugo user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=keralaholi user-24=wwwresourcehunte user-25=wwwrmswll user-26=cochintaxi user-27=wwwkaretakers user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 17:22:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 17:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 17:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sGwf1oBCGlp22CzX.~ Jan 15 17:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sGwf1oBCGlp22CzX.~' Jan 15 17:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sGwf1oBCGlp22CzX.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 17:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 17:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 17:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 17:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 17:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 17:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 17:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 17:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 17:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 17:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 17:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 17:22:58 host sshd[12480]: Invalid user admin from 121.184.215.199 port 62544 Jan 15 17:22:58 host sshd[12480]: input_userauth_request: invalid user admin [preauth] Jan 15 17:22:58 host sshd[12480]: pam_unix(sshd:auth): check pass; user unknown Jan 15 17:22:58 host sshd[12480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.184.215.199 Jan 15 17:23:00 host sshd[12480]: Failed password for invalid user admin from 121.184.215.199 port 62544 ssh2 Jan 15 17:23:01 host sshd[12480]: Connection reset by 121.184.215.199 port 62544 [preauth] Jan 15 17:35:27 host sshd[14215]: Invalid user admin from 178.18.252.111 port 48732 Jan 15 17:35:27 host sshd[14215]: input_userauth_request: invalid user admin [preauth] Jan 15 17:35:27 host sshd[14215]: pam_unix(sshd:auth): check pass; user unknown Jan 15 17:35:27 host sshd[14215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.18.252.111 Jan 15 17:35:29 host sshd[14215]: Failed password for invalid user admin from 178.18.252.111 port 48732 ssh2 Jan 15 17:35:29 host sshd[14215]: Connection closed by 178.18.252.111 port 48732 [preauth] Jan 15 17:44:29 host sshd[15509]: Connection reset by 122.116.170.221 port 44269 [preauth] Jan 15 17:44:31 host sshd[15513]: Invalid user admin from 122.116.170.221 port 44277 Jan 15 17:44:31 host sshd[15513]: input_userauth_request: invalid user admin [preauth] Jan 15 17:44:31 host sshd[15513]: pam_unix(sshd:auth): check pass; user unknown Jan 15 17:44:31 host sshd[15513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.170.221 Jan 15 17:44:33 host sshd[15513]: Failed password for invalid user admin from 122.116.170.221 port 44277 ssh2 Jan 15 17:44:34 host sshd[15513]: Failed password for invalid user admin from 122.116.170.221 port 44277 ssh2 Jan 15 17:44:35 host sshd[15513]: pam_unix(sshd:auth): check pass; user unknown Jan 15 17:44:37 host sshd[15513]: Failed password for invalid user admin from 122.116.170.221 port 44277 ssh2 Jan 15 17:44:38 host sshd[15513]: pam_unix(sshd:auth): check pass; user unknown Jan 15 17:44:40 host sshd[15513]: Failed password for invalid user admin from 122.116.170.221 port 44277 ssh2 Jan 15 17:44:41 host sshd[15513]: pam_unix(sshd:auth): check pass; user unknown Jan 15 17:44:42 host sshd[15513]: Failed password for invalid user admin from 122.116.170.221 port 44277 ssh2 Jan 15 17:47:54 host sshd[16018]: User root from 121.144.254.36 not allowed because not listed in AllowUsers Jan 15 17:47:54 host sshd[16018]: input_userauth_request: invalid user root [preauth] Jan 15 17:47:54 host unix_chkpwd[16023]: password check failed for user (root) Jan 15 17:47:54 host sshd[16018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.144.254.36 user=root Jan 15 17:47:54 host sshd[16018]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 17:47:56 host sshd[16018]: Failed password for invalid user root from 121.144.254.36 port 63382 ssh2 Jan 15 17:47:56 host unix_chkpwd[16025]: password check failed for user (root) Jan 15 17:47:56 host sshd[16018]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 17:47:58 host sshd[16018]: Failed password for invalid user root from 121.144.254.36 port 63382 ssh2 Jan 15 17:47:59 host unix_chkpwd[16029]: password check failed for user (root) Jan 15 17:47:59 host sshd[16018]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 17:48:01 host sshd[16018]: Failed password for invalid user root from 121.144.254.36 port 63382 ssh2 Jan 15 17:48:19 host sshd[16093]: Connection reset by 220.135.173.28 port 60118 [preauth] Jan 15 17:50:34 host sshd[16465]: Did not receive identification string from 122.224.235.122 port 50380 Jan 15 17:52:46 host sshd[16711]: Connection closed by 198.199.93.20 port 42822 [preauth] Jan 15 17:54:30 host sshd[16926]: User root from 189.56.100.42 not allowed because not listed in AllowUsers Jan 15 17:54:30 host sshd[16926]: input_userauth_request: invalid user root [preauth] Jan 15 17:54:30 host unix_chkpwd[16930]: password check failed for user (root) Jan 15 17:54:30 host sshd[16926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.56.100.42 user=root Jan 15 17:54:30 host sshd[16926]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 17:54:32 host sshd[16926]: Failed password for invalid user root from 189.56.100.42 port 56067 ssh2 Jan 15 17:54:32 host sshd[16926]: Received disconnect from 189.56.100.42 port 56067:11: Bye Bye [preauth] Jan 15 17:54:32 host sshd[16926]: Disconnected from 189.56.100.42 port 56067 [preauth] Jan 15 17:55:53 host sshd[17218]: User root from 204.195.72.196 not allowed because not listed in AllowUsers Jan 15 17:55:53 host sshd[17218]: input_userauth_request: invalid user root [preauth] Jan 15 17:55:53 host unix_chkpwd[17224]: password check failed for user (root) Jan 15 17:55:53 host sshd[17218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.195.72.196 user=root Jan 15 17:55:53 host sshd[17218]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 17:55:55 host sshd[17218]: Failed password for invalid user root from 204.195.72.196 port 35032 ssh2 Jan 15 17:55:56 host sshd[17218]: Connection closed by 204.195.72.196 port 35032 [preauth] Jan 15 17:57:59 host sshd[17451]: Invalid user pi from 68.7.89.165 port 54784 Jan 15 17:57:59 host sshd[17451]: input_userauth_request: invalid user pi [preauth] Jan 15 17:57:59 host sshd[17453]: Invalid user pi from 68.7.89.165 port 54790 Jan 15 17:57:59 host sshd[17453]: input_userauth_request: invalid user pi [preauth] Jan 15 17:57:59 host sshd[17451]: pam_unix(sshd:auth): check pass; user unknown Jan 15 17:57:59 host sshd[17451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.7.89.165 Jan 15 17:57:59 host sshd[17453]: pam_unix(sshd:auth): check pass; user unknown Jan 15 17:57:59 host sshd[17453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.7.89.165 Jan 15 17:58:01 host sshd[17451]: Failed password for invalid user pi from 68.7.89.165 port 54784 ssh2 Jan 15 17:58:01 host sshd[17453]: Failed password for invalid user pi from 68.7.89.165 port 54790 ssh2 Jan 15 17:58:02 host sshd[17451]: Connection closed by 68.7.89.165 port 54784 [preauth] Jan 15 17:58:02 host sshd[17453]: Connection closed by 68.7.89.165 port 54790 [preauth] Jan 15 18:00:52 host sshd[17820]: User root from 189.56.100.42 not allowed because not listed in AllowUsers Jan 15 18:00:52 host sshd[17820]: input_userauth_request: invalid user root [preauth] Jan 15 18:00:52 host unix_chkpwd[17825]: password check failed for user (root) Jan 15 18:00:52 host sshd[17820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.56.100.42 user=root Jan 15 18:00:52 host sshd[17820]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 18:00:54 host sshd[17820]: Failed password for invalid user root from 189.56.100.42 port 57671 ssh2 Jan 15 18:00:54 host sshd[17820]: Received disconnect from 189.56.100.42 port 57671:11: Bye Bye [preauth] Jan 15 18:00:54 host sshd[17820]: Disconnected from 189.56.100.42 port 57671 [preauth] Jan 15 18:04:51 host sshd[18396]: Did not receive identification string from 92.255.85.115 port 65189 Jan 15 18:14:58 host sshd[19730]: Invalid user bzrx1098ui from 92.255.85.115 port 29029 Jan 15 18:14:58 host sshd[19730]: input_userauth_request: invalid user bzrx1098ui [preauth] Jan 15 18:14:58 host sshd[19730]: pam_unix(sshd:auth): check pass; user unknown Jan 15 18:14:58 host sshd[19730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 15 18:15:00 host sshd[19730]: Failed password for invalid user bzrx1098ui from 92.255.85.115 port 29029 ssh2 Jan 15 18:15:00 host sshd[19730]: Connection reset by 92.255.85.115 port 29029 [preauth] Jan 15 18:15:52 host sshd[20017]: Invalid user 1234 from 177.99.235.37 port 47402 Jan 15 18:15:52 host sshd[20017]: input_userauth_request: invalid user 1234 [preauth] Jan 15 18:15:53 host sshd[20017]: pam_unix(sshd:auth): check pass; user unknown Jan 15 18:15:53 host sshd[20017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.99.235.37 Jan 15 18:15:54 host sshd[20017]: Failed password for invalid user 1234 from 177.99.235.37 port 47402 ssh2 Jan 15 18:15:55 host sshd[20017]: Connection closed by 177.99.235.37 port 47402 [preauth] Jan 15 18:18:49 host sshd[20402]: Invalid user ec2-user from 80.13.12.200 port 61040 Jan 15 18:18:49 host sshd[20402]: input_userauth_request: invalid user ec2-user [preauth] Jan 15 18:18:49 host sshd[20402]: pam_unix(sshd:auth): check pass; user unknown Jan 15 18:18:49 host sshd[20402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.13.12.200 Jan 15 18:18:52 host sshd[20402]: Failed password for invalid user ec2-user from 80.13.12.200 port 61040 ssh2 Jan 15 18:18:53 host sshd[20402]: pam_unix(sshd:auth): check pass; user unknown Jan 15 18:18:54 host sshd[20402]: Failed password for invalid user ec2-user from 80.13.12.200 port 61040 ssh2 Jan 15 18:18:55 host sshd[20402]: pam_unix(sshd:auth): check pass; user unknown Jan 15 18:18:57 host sshd[20402]: Failed password for invalid user ec2-user from 80.13.12.200 port 61040 ssh2 Jan 15 18:19:04 host sshd[20434]: Invalid user ubuntu from 114.35.162.184 port 50191 Jan 15 18:19:04 host sshd[20434]: input_userauth_request: invalid user ubuntu [preauth] Jan 15 18:19:04 host sshd[20434]: pam_unix(sshd:auth): check pass; user unknown Jan 15 18:19:04 host sshd[20434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.162.184 Jan 15 18:19:07 host sshd[20434]: Failed password for invalid user ubuntu from 114.35.162.184 port 50191 ssh2 Jan 15 18:19:07 host sshd[20434]: pam_unix(sshd:auth): check pass; user unknown Jan 15 18:19:09 host sshd[20434]: Failed password for invalid user ubuntu from 114.35.162.184 port 50191 ssh2 Jan 15 18:19:10 host sshd[20434]: Connection reset by 114.35.162.184 port 50191 [preauth] Jan 15 18:19:10 host sshd[20434]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.162.184 Jan 15 18:21:20 host sshd[20762]: Invalid user admin from 92.255.85.115 port 12704 Jan 15 18:21:20 host sshd[20762]: input_userauth_request: invalid user admin [preauth] Jan 15 18:21:20 host sshd[20762]: pam_unix(sshd:auth): check pass; user unknown Jan 15 18:21:20 host sshd[20762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 15 18:21:22 host sshd[20762]: Failed password for invalid user admin from 92.255.85.115 port 12704 ssh2 Jan 15 18:21:22 host sshd[20762]: Connection reset by 92.255.85.115 port 12704 [preauth] Jan 15 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 18:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 18:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwresourcehunte user-4=keralaholi user-5=wwwrmswll user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=palco123 user-17=gifterman user-18=phmetals user-19=kottayamcalldriv user-20=wwwnexidigital user-21=mrsclean user-22=wwwkmaorg user-23=disposeat user-24=remysagr user-25=wwwkapin user-26=woodpeck user-27=vfmassets user-28=shalinijames user-29=wwwtestugo user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 18:22:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 18:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 18:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-b2F7STY7VJ3WIFRE.~ Jan 15 18:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-b2F7STY7VJ3WIFRE.~' Jan 15 18:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-b2F7STY7VJ3WIFRE.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 18:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 18:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 18:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 18:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 18:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 18:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 18:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 18:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 18:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 18:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 18:24:09 host sshd[21476]: Connection closed by 45.79.181.223 port 55892 [preauth] Jan 15 18:24:10 host sshd[21483]: Did not receive identification string from 45.79.181.223 port 55908 Jan 15 18:24:13 host sshd[21487]: Connection closed by 45.79.181.223 port 55916 [preauth] Jan 15 18:26:35 host sshd[21777]: Invalid user en from 194.110.203.109 port 45228 Jan 15 18:26:35 host sshd[21777]: input_userauth_request: invalid user en [preauth] Jan 15 18:26:35 host sshd[21777]: pam_unix(sshd:auth): check pass; user unknown Jan 15 18:26:35 host sshd[21777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 18:26:37 host sshd[21777]: Failed password for invalid user en from 194.110.203.109 port 45228 ssh2 Jan 15 18:26:40 host sshd[21777]: pam_unix(sshd:auth): check pass; user unknown Jan 15 18:26:43 host sshd[21777]: Failed password for invalid user en from 194.110.203.109 port 45228 ssh2 Jan 15 18:26:46 host sshd[21777]: pam_unix(sshd:auth): check pass; user unknown Jan 15 18:26:49 host sshd[21777]: Failed password for invalid user en from 194.110.203.109 port 45228 ssh2 Jan 15 18:26:52 host sshd[21777]: Connection closed by 194.110.203.109 port 45228 [preauth] Jan 15 18:26:52 host sshd[21777]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 18:30:40 host sshd[22340]: Invalid user zyfwp from 223.204.8.94 port 55608 Jan 15 18:30:40 host sshd[22340]: input_userauth_request: invalid user zyfwp [preauth] Jan 15 18:30:40 host sshd[22340]: pam_unix(sshd:auth): check pass; user unknown Jan 15 18:30:40 host sshd[22340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.204.8.94 Jan 15 18:30:41 host sshd[22340]: Failed password for invalid user zyfwp from 223.204.8.94 port 55608 ssh2 Jan 15 18:30:42 host sshd[22340]: pam_unix(sshd:auth): check pass; user unknown Jan 15 18:30:43 host sshd[22340]: Failed password for invalid user zyfwp from 223.204.8.94 port 55608 ssh2 Jan 15 18:30:44 host sshd[22340]: pam_unix(sshd:auth): check pass; user unknown Jan 15 18:30:46 host sshd[22340]: Failed password for invalid user zyfwp from 223.204.8.94 port 55608 ssh2 Jan 15 18:30:47 host sshd[22340]: Connection closed by 223.204.8.94 port 55608 [preauth] Jan 15 18:30:47 host sshd[22340]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.204.8.94 Jan 15 18:34:36 host sshd[22770]: Invalid user steam from 125.228.151.252 port 50099 Jan 15 18:34:36 host sshd[22770]: input_userauth_request: invalid user steam [preauth] Jan 15 18:34:36 host sshd[22770]: pam_unix(sshd:auth): check pass; user unknown Jan 15 18:34:36 host sshd[22770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.151.252 Jan 15 18:34:38 host sshd[22770]: Failed password for invalid user steam from 125.228.151.252 port 50099 ssh2 Jan 15 18:34:39 host sshd[22770]: pam_unix(sshd:auth): check pass; user unknown Jan 15 18:34:40 host sshd[22770]: Failed password for invalid user steam from 125.228.151.252 port 50099 ssh2 Jan 15 18:34:42 host sshd[22770]: Failed password for invalid user steam from 125.228.151.252 port 50099 ssh2 Jan 15 18:34:42 host sshd[22770]: Connection closed by 125.228.151.252 port 50099 [preauth] Jan 15 18:34:42 host sshd[22770]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.151.252 Jan 15 18:36:38 host sshd[23117]: Invalid user admin from 173.95.235.227 port 55000 Jan 15 18:36:38 host sshd[23117]: input_userauth_request: invalid user admin [preauth] Jan 15 18:36:38 host sshd[23117]: pam_unix(sshd:auth): check pass; user unknown Jan 15 18:36:38 host sshd[23117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.95.235.227 Jan 15 18:36:40 host sshd[23117]: Failed password for invalid user admin from 173.95.235.227 port 55000 ssh2 Jan 15 18:36:41 host sshd[23117]: Connection closed by 173.95.235.227 port 55000 [preauth] Jan 15 18:37:29 host sshd[23209]: User root from 77.40.0.17 not allowed because not listed in AllowUsers Jan 15 18:37:29 host sshd[23209]: input_userauth_request: invalid user root [preauth] Jan 15 18:37:29 host unix_chkpwd[23212]: password check failed for user (root) Jan 15 18:37:29 host sshd[23209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.40.0.17 user=root Jan 15 18:37:29 host sshd[23209]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 18:37:31 host sshd[23209]: Failed password for invalid user root from 77.40.0.17 port 41525 ssh2 Jan 15 18:37:32 host sshd[23209]: Received disconnect from 77.40.0.17 port 41525:11: Bye Bye [preauth] Jan 15 18:37:32 host sshd[23209]: Disconnected from 77.40.0.17 port 41525 [preauth] Jan 15 18:38:21 host sshd[23285]: User root from 211.46.4.196 not allowed because not listed in AllowUsers Jan 15 18:38:21 host sshd[23285]: input_userauth_request: invalid user root [preauth] Jan 15 18:38:22 host unix_chkpwd[23289]: password check failed for user (root) Jan 15 18:38:22 host sshd[23285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.46.4.196 user=root Jan 15 18:38:22 host sshd[23285]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 18:38:23 host sshd[23285]: Failed password for invalid user root from 211.46.4.196 port 50886 ssh2 Jan 15 18:38:24 host sshd[23285]: Received disconnect from 211.46.4.196 port 50886:11: Bye Bye [preauth] Jan 15 18:38:24 host sshd[23285]: Disconnected from 211.46.4.196 port 50886 [preauth] Jan 15 18:38:31 host sshd[23328]: User root from 188.173.136.132 not allowed because not listed in AllowUsers Jan 15 18:38:31 host sshd[23328]: input_userauth_request: invalid user root [preauth] Jan 15 18:38:31 host unix_chkpwd[23331]: password check failed for user (root) Jan 15 18:38:31 host sshd[23328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.173.136.132 user=root Jan 15 18:38:31 host sshd[23328]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 18:38:33 host sshd[23328]: Failed password for invalid user root from 188.173.136.132 port 36221 ssh2 Jan 15 18:38:33 host sshd[23328]: Received disconnect from 188.173.136.132 port 36221:11: Bye Bye [preauth] Jan 15 18:38:33 host sshd[23328]: Disconnected from 188.173.136.132 port 36221 [preauth] Jan 15 18:38:37 host sshd[23341]: User root from 158.160.6.234 not allowed because not listed in AllowUsers Jan 15 18:38:37 host sshd[23341]: input_userauth_request: invalid user root [preauth] Jan 15 18:38:37 host unix_chkpwd[23344]: password check failed for user (root) Jan 15 18:38:37 host sshd[23341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.6.234 user=root Jan 15 18:38:37 host sshd[23341]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 18:38:39 host sshd[23341]: Failed password for invalid user root from 158.160.6.234 port 42448 ssh2 Jan 15 18:38:39 host sshd[23341]: Received disconnect from 158.160.6.234 port 42448:11: Bye Bye [preauth] Jan 15 18:38:39 host sshd[23341]: Disconnected from 158.160.6.234 port 42448 [preauth] Jan 15 18:39:28 host sshd[23439]: User root from 146.4.92.212 not allowed because not listed in AllowUsers Jan 15 18:39:28 host sshd[23439]: input_userauth_request: invalid user root [preauth] Jan 15 18:39:28 host unix_chkpwd[23443]: password check failed for user (root) Jan 15 18:39:28 host sshd[23439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.4.92.212 user=root Jan 15 18:39:28 host sshd[23439]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 18:39:30 host sshd[23439]: Failed password for invalid user root from 146.4.92.212 port 36906 ssh2 Jan 15 18:39:30 host sshd[23439]: Received disconnect from 146.4.92.212 port 36906:11: Bye Bye [preauth] Jan 15 18:39:30 host sshd[23439]: Disconnected from 146.4.92.212 port 36906 [preauth] Jan 15 18:40:32 host sshd[23594]: User root from 159.65.231.164 not allowed because not listed in AllowUsers Jan 15 18:40:32 host sshd[23594]: input_userauth_request: invalid user root [preauth] Jan 15 18:40:32 host unix_chkpwd[23597]: password check failed for user (root) Jan 15 18:40:32 host sshd[23594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.231.164 user=root Jan 15 18:40:32 host sshd[23594]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 18:40:33 host sshd[23594]: Failed password for invalid user root from 159.65.231.164 port 46320 ssh2 Jan 15 18:40:34 host sshd[23594]: Received disconnect from 159.65.231.164 port 46320:11: Bye Bye [preauth] Jan 15 18:40:34 host sshd[23594]: Disconnected from 159.65.231.164 port 46320 [preauth] Jan 15 18:41:29 host sshd[23803]: User root from 159.203.60.67 not allowed because not listed in AllowUsers Jan 15 18:41:29 host sshd[23803]: input_userauth_request: invalid user root [preauth] Jan 15 18:41:29 host unix_chkpwd[23806]: password check failed for user (root) Jan 15 18:41:29 host sshd[23803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.60.67 user=root Jan 15 18:41:29 host sshd[23803]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 18:41:32 host sshd[23803]: Failed password for invalid user root from 159.203.60.67 port 38990 ssh2 Jan 15 18:41:32 host sshd[23803]: Received disconnect from 159.203.60.67 port 38990:11: Bye Bye [preauth] Jan 15 18:41:32 host sshd[23803]: Disconnected from 159.203.60.67 port 38990 [preauth] Jan 15 18:42:42 host sshd[23939]: User root from 77.40.0.17 not allowed because not listed in AllowUsers Jan 15 18:42:42 host sshd[23939]: input_userauth_request: invalid user root [preauth] Jan 15 18:42:42 host unix_chkpwd[23942]: password check failed for user (root) Jan 15 18:42:42 host sshd[23939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.40.0.17 user=root Jan 15 18:42:42 host sshd[23939]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 18:42:44 host sshd[23939]: Failed password for invalid user root from 77.40.0.17 port 40594 ssh2 Jan 15 18:42:48 host sshd[23984]: User root from 146.4.92.212 not allowed because not listed in AllowUsers Jan 15 18:42:48 host sshd[23984]: input_userauth_request: invalid user root [preauth] Jan 15 18:42:48 host unix_chkpwd[23987]: password check failed for user (root) Jan 15 18:42:48 host sshd[23984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.4.92.212 user=root Jan 15 18:42:48 host sshd[23984]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 18:42:50 host sshd[23984]: Failed password for invalid user root from 146.4.92.212 port 45004 ssh2 Jan 15 18:42:50 host sshd[23984]: Received disconnect from 146.4.92.212 port 45004:11: Bye Bye [preauth] Jan 15 18:42:50 host sshd[23984]: Disconnected from 146.4.92.212 port 45004 [preauth] Jan 15 18:42:56 host sshd[24029]: User root from 159.65.231.164 not allowed because not listed in AllowUsers Jan 15 18:42:56 host sshd[24029]: input_userauth_request: invalid user root [preauth] Jan 15 18:42:56 host unix_chkpwd[24038]: password check failed for user (root) Jan 15 18:42:56 host sshd[24029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.231.164 user=root Jan 15 18:42:56 host sshd[24029]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 18:42:58 host sshd[24029]: Failed password for invalid user root from 159.65.231.164 port 53486 ssh2 Jan 15 18:42:58 host sshd[24029]: Received disconnect from 159.65.231.164 port 53486:11: Bye Bye [preauth] Jan 15 18:42:58 host sshd[24029]: Disconnected from 159.65.231.164 port 53486 [preauth] Jan 15 18:43:18 host sshd[24108]: User root from 159.203.60.67 not allowed because not listed in AllowUsers Jan 15 18:43:18 host sshd[24108]: input_userauth_request: invalid user root [preauth] Jan 15 18:43:18 host unix_chkpwd[24111]: password check failed for user (root) Jan 15 18:43:18 host sshd[24108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.60.67 user=root Jan 15 18:43:18 host sshd[24108]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 18:43:21 host sshd[24108]: Failed password for invalid user root from 159.203.60.67 port 45850 ssh2 Jan 15 18:43:21 host sshd[24108]: Received disconnect from 159.203.60.67 port 45850:11: Bye Bye [preauth] Jan 15 18:43:21 host sshd[24108]: Disconnected from 159.203.60.67 port 45850 [preauth] Jan 15 18:43:27 host sshd[24150]: User root from 211.46.4.196 not allowed because not listed in AllowUsers Jan 15 18:43:27 host sshd[24150]: input_userauth_request: invalid user root [preauth] Jan 15 18:43:27 host unix_chkpwd[24153]: password check failed for user (root) Jan 15 18:43:27 host sshd[24150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.46.4.196 user=root Jan 15 18:43:27 host sshd[24150]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 18:43:30 host sshd[24150]: Failed password for invalid user root from 211.46.4.196 port 42934 ssh2 Jan 15 18:43:37 host sshd[24217]: User root from 158.160.6.234 not allowed because not listed in AllowUsers Jan 15 18:43:37 host sshd[24217]: input_userauth_request: invalid user root [preauth] Jan 15 18:43:37 host unix_chkpwd[24220]: password check failed for user (root) Jan 15 18:43:37 host sshd[24217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.6.234 user=root Jan 15 18:43:37 host sshd[24217]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 18:43:39 host sshd[24217]: Failed password for invalid user root from 158.160.6.234 port 36386 ssh2 Jan 15 18:43:55 host sshd[24274]: User root from 188.173.136.132 not allowed because not listed in AllowUsers Jan 15 18:43:55 host sshd[24274]: input_userauth_request: invalid user root [preauth] Jan 15 18:43:55 host unix_chkpwd[24277]: password check failed for user (root) Jan 15 18:43:55 host sshd[24274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.173.136.132 user=root Jan 15 18:43:55 host sshd[24274]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 18:43:57 host sshd[24274]: Failed password for invalid user root from 188.173.136.132 port 59959 ssh2 Jan 15 18:43:57 host sshd[24274]: Received disconnect from 188.173.136.132 port 59959:11: Bye Bye [preauth] Jan 15 18:43:57 host sshd[24274]: Disconnected from 188.173.136.132 port 59959 [preauth] Jan 15 19:05:08 host sshd[27187]: User root from 1.34.100.72 not allowed because not listed in AllowUsers Jan 15 19:05:08 host sshd[27187]: input_userauth_request: invalid user root [preauth] Jan 15 19:05:08 host unix_chkpwd[27190]: password check failed for user (root) Jan 15 19:05:08 host sshd[27187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.100.72 user=root Jan 15 19:05:08 host sshd[27187]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 19:05:10 host sshd[27187]: Failed password for invalid user root from 1.34.100.72 port 56822 ssh2 Jan 15 19:05:10 host unix_chkpwd[27192]: password check failed for user (root) Jan 15 19:05:10 host sshd[27187]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 19:05:12 host sshd[27187]: Failed password for invalid user root from 1.34.100.72 port 56822 ssh2 Jan 15 19:05:13 host sshd[27187]: Connection reset by 1.34.100.72 port 56822 [preauth] Jan 15 19:05:13 host sshd[27187]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.100.72 user=root Jan 15 19:16:27 host sshd[28793]: Invalid user admin from 177.85.254.2 port 56837 Jan 15 19:16:27 host sshd[28793]: input_userauth_request: invalid user admin [preauth] Jan 15 19:16:27 host sshd[28793]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:16:27 host sshd[28793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.85.254.2 Jan 15 19:16:29 host sshd[28793]: Failed password for invalid user admin from 177.85.254.2 port 56837 ssh2 Jan 15 19:16:30 host sshd[28793]: Connection closed by 177.85.254.2 port 56837 [preauth] Jan 15 19:18:49 host sshd[29076]: Bad protocol version identification '\026\003\001\001\t\001' from 137.220.228.87 port 42560 Jan 15 19:19:26 host sshd[29107]: Did not receive identification string from 137.220.228.87 port 50728 Jan 15 19:19:31 host sshd[29142]: Connection closed by 137.220.228.87 port 58840 [preauth] Jan 15 19:19:31 host sshd[29170]: Protocol major versions differ for 137.220.228.87 port 60946: SSH-2.0-OpenSSH_7.4 vs. SSH-1.5-Server Jan 15 19:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=gifterman user-2=palco123 user-3=kottayamcalldriv user-4=phmetals user-5=wwwnexidigital user-6=mrsclean user-7=bonifacegroup user-8=wwwevmhonda user-9=wwwletsstalkfood user-10=straightcurve user-11=vfmassets user-12=wwwtestugo user-13=shalinijames user-14=pmcresources user-15=disposeat user-16=remysagr user-17=wwwkmaorg user-18=wwwkapin user-19=woodpeck user-20=travelboniface user-21=wwwrmswll user-22=wwwresourcehunte user-23=keralaholi user-24=ugotscom user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 19:21:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1HBhofs3lh0rhgsj.~ Jan 15 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1HBhofs3lh0rhgsj.~' Jan 15 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1HBhofs3lh0rhgsj.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 19:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 19:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 19:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 19:21:50 host sshd[29818]: Invalid user pi from 183.102.168.178 port 60379 Jan 15 19:21:50 host sshd[29818]: input_userauth_request: invalid user pi [preauth] Jan 15 19:21:50 host sshd[29818]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:21:50 host sshd[29818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.102.168.178 Jan 15 19:21:52 host sshd[29818]: Failed password for invalid user pi from 183.102.168.178 port 60379 ssh2 Jan 15 19:21:53 host sshd[29818]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:21:56 host sshd[29818]: Failed password for invalid user pi from 183.102.168.178 port 60379 ssh2 Jan 15 19:21:56 host sshd[29829]: Invalid user usr from 121.150.180.187 port 62426 Jan 15 19:21:56 host sshd[29829]: input_userauth_request: invalid user usr [preauth] Jan 15 19:21:56 host sshd[29829]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:21:56 host sshd[29829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.150.180.187 Jan 15 19:21:58 host sshd[29829]: Failed password for invalid user usr from 121.150.180.187 port 62426 ssh2 Jan 15 19:21:58 host sshd[29829]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:22:00 host sshd[29829]: Failed password for invalid user usr from 121.150.180.187 port 62426 ssh2 Jan 15 19:22:01 host sshd[29829]: Connection reset by 121.150.180.187 port 62426 [preauth] Jan 15 19:22:01 host sshd[29829]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.150.180.187 Jan 15 19:22:02 host sshd[29818]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:22:05 host sshd[29818]: Failed password for invalid user pi from 183.102.168.178 port 60379 ssh2 Jan 15 19:22:06 host sshd[29818]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:22:08 host sshd[29818]: Failed password for invalid user pi from 183.102.168.178 port 60379 ssh2 Jan 15 19:22:08 host sshd[29818]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:22:10 host sshd[29818]: Failed password for invalid user pi from 183.102.168.178 port 60379 ssh2 Jan 15 19:24:02 host sshd[30107]: Connection reset by 222.103.54.183 port 61716 [preauth] Jan 15 19:36:11 host sshd[31756]: Invalid user guest from 24.130.164.51 port 56468 Jan 15 19:36:11 host sshd[31756]: input_userauth_request: invalid user guest [preauth] Jan 15 19:36:11 host sshd[31756]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:36:11 host sshd[31756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.130.164.51 Jan 15 19:36:13 host sshd[31756]: Failed password for invalid user guest from 24.130.164.51 port 56468 ssh2 Jan 15 19:36:14 host sshd[31756]: Connection closed by 24.130.164.51 port 56468 [preauth] Jan 15 19:36:14 host sshd[31761]: Invalid user ubnt from 122.117.18.207 port 38033 Jan 15 19:36:14 host sshd[31761]: input_userauth_request: invalid user ubnt [preauth] Jan 15 19:36:14 host sshd[31761]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:36:14 host sshd[31761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.18.207 Jan 15 19:36:15 host sshd[31761]: Failed password for invalid user ubnt from 122.117.18.207 port 38033 ssh2 Jan 15 19:36:16 host sshd[31761]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:36:18 host sshd[31761]: Failed password for invalid user ubnt from 122.117.18.207 port 38033 ssh2 Jan 15 19:36:18 host sshd[31761]: Failed password for invalid user ubnt from 122.117.18.207 port 38033 ssh2 Jan 15 19:36:19 host sshd[31761]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:36:21 host sshd[31761]: Failed password for invalid user ubnt from 122.117.18.207 port 38033 ssh2 Jan 15 19:36:21 host sshd[31761]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:36:23 host sshd[31761]: Failed password for invalid user ubnt from 122.117.18.207 port 38033 ssh2 Jan 15 19:36:23 host sshd[31761]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:36:25 host sshd[31761]: Failed password for invalid user ubnt from 122.117.18.207 port 38033 ssh2 Jan 15 19:36:25 host sshd[31761]: error: maximum authentication attempts exceeded for invalid user ubnt from 122.117.18.207 port 38033 ssh2 [preauth] Jan 15 19:36:25 host sshd[31761]: Disconnecting: Too many authentication failures [preauth] Jan 15 19:36:25 host sshd[31761]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.18.207 Jan 15 19:36:25 host sshd[31761]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 15 19:39:44 host sshd[32329]: Invalid user oracle from 222.97.244.117 port 63561 Jan 15 19:39:44 host sshd[32329]: input_userauth_request: invalid user oracle [preauth] Jan 15 19:39:44 host sshd[32329]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:39:44 host sshd[32329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.97.244.117 Jan 15 19:39:45 host sshd[32329]: Failed password for invalid user oracle from 222.97.244.117 port 63561 ssh2 Jan 15 19:39:45 host sshd[32329]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:39:48 host sshd[32329]: Failed password for invalid user oracle from 222.97.244.117 port 63561 ssh2 Jan 15 19:39:49 host sshd[32329]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:39:51 host sshd[32329]: Failed password for invalid user oracle from 222.97.244.117 port 63561 ssh2 Jan 15 19:39:52 host sshd[32329]: Failed password for invalid user oracle from 222.97.244.117 port 63561 ssh2 Jan 15 19:39:53 host sshd[32329]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:39:54 host sshd[32329]: Failed password for invalid user oracle from 222.97.244.117 port 63561 ssh2 Jan 15 19:39:55 host sshd[32329]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:39:57 host sshd[32329]: Failed password for invalid user oracle from 222.97.244.117 port 63561 ssh2 Jan 15 19:39:57 host sshd[32329]: error: maximum authentication attempts exceeded for invalid user oracle from 222.97.244.117 port 63561 ssh2 [preauth] Jan 15 19:39:57 host sshd[32329]: Disconnecting: Too many authentication failures [preauth] Jan 15 19:39:57 host sshd[32329]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.97.244.117 Jan 15 19:39:57 host sshd[32329]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 15 19:53:58 host sshd[2239]: Invalid user pi from 182.176.169.180 port 41326 Jan 15 19:53:58 host sshd[2239]: input_userauth_request: invalid user pi [preauth] Jan 15 19:53:58 host sshd[2239]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:53:58 host sshd[2239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.176.169.180 Jan 15 19:54:00 host sshd[2239]: Failed password for invalid user pi from 182.176.169.180 port 41326 ssh2 Jan 15 19:54:01 host sshd[2239]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:54:03 host sshd[2239]: Failed password for invalid user pi from 182.176.169.180 port 41326 ssh2 Jan 15 19:54:03 host sshd[2239]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:54:05 host sshd[2239]: Failed password for invalid user pi from 182.176.169.180 port 41326 ssh2 Jan 15 19:54:06 host sshd[2239]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:54:07 host sshd[2239]: Failed password for invalid user pi from 182.176.169.180 port 41326 ssh2 Jan 15 19:54:07 host sshd[2239]: Connection reset by 182.176.169.180 port 41326 [preauth] Jan 15 19:54:07 host sshd[2239]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.176.169.180 Jan 15 19:54:07 host sshd[2239]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 15 19:55:16 host sshd[2571]: Invalid user squid from 111.220.87.91 port 36164 Jan 15 19:55:16 host sshd[2571]: input_userauth_request: invalid user squid [preauth] Jan 15 19:55:16 host sshd[2571]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:55:16 host sshd[2571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.220.87.91 Jan 15 19:55:18 host sshd[2571]: Failed password for invalid user squid from 111.220.87.91 port 36164 ssh2 Jan 15 19:55:19 host sshd[2571]: Connection closed by 111.220.87.91 port 36164 [preauth] Jan 15 19:55:38 host sshd[2626]: Invalid user tony from 107.189.30.59 port 36020 Jan 15 19:55:38 host sshd[2626]: input_userauth_request: invalid user tony [preauth] Jan 15 19:55:38 host sshd[2626]: pam_unix(sshd:auth): check pass; user unknown Jan 15 19:55:38 host sshd[2626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 15 19:55:40 host sshd[2626]: Failed password for invalid user tony from 107.189.30.59 port 36020 ssh2 Jan 15 19:55:41 host sshd[2626]: Connection closed by 107.189.30.59 port 36020 [preauth] Jan 15 20:09:09 host sshd[4547]: Invalid user vadmin from 183.98.9.246 port 61209 Jan 15 20:09:09 host sshd[4547]: input_userauth_request: invalid user vadmin [preauth] Jan 15 20:09:09 host sshd[4547]: pam_unix(sshd:auth): check pass; user unknown Jan 15 20:09:09 host sshd[4547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.98.9.246 Jan 15 20:09:11 host sshd[4547]: Failed password for invalid user vadmin from 183.98.9.246 port 61209 ssh2 Jan 15 20:09:12 host sshd[4547]: pam_unix(sshd:auth): check pass; user unknown Jan 15 20:09:14 host sshd[4547]: Failed password for invalid user vadmin from 183.98.9.246 port 61209 ssh2 Jan 15 20:09:35 host sshd[4547]: Failed password for invalid user vadmin from 183.98.9.246 port 61209 ssh2 Jan 15 20:14:36 host sshd[5261]: Invalid user ubnt from 61.216.171.176 port 33621 Jan 15 20:14:36 host sshd[5261]: input_userauth_request: invalid user ubnt [preauth] Jan 15 20:14:36 host sshd[5261]: pam_unix(sshd:auth): check pass; user unknown Jan 15 20:14:36 host sshd[5261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.216.171.176 Jan 15 20:14:38 host sshd[5261]: Failed password for invalid user ubnt from 61.216.171.176 port 33621 ssh2 Jan 15 20:14:39 host sshd[5261]: pam_unix(sshd:auth): check pass; user unknown Jan 15 20:14:40 host sshd[5261]: Failed password for invalid user ubnt from 61.216.171.176 port 33621 ssh2 Jan 15 20:14:41 host sshd[5261]: Failed password for invalid user ubnt from 61.216.171.176 port 33621 ssh2 Jan 15 20:14:41 host sshd[5261]: Connection reset by 61.216.171.176 port 33621 [preauth] Jan 15 20:14:41 host sshd[5261]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.216.171.176 Jan 15 20:14:52 host sshd[5281]: Invalid user nginx from 220.132.40.160 port 54805 Jan 15 20:14:52 host sshd[5281]: input_userauth_request: invalid user nginx [preauth] Jan 15 20:14:52 host sshd[5281]: pam_unix(sshd:auth): check pass; user unknown Jan 15 20:14:52 host sshd[5281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.40.160 Jan 15 20:14:54 host sshd[5281]: Failed password for invalid user nginx from 220.132.40.160 port 54805 ssh2 Jan 15 20:14:55 host sshd[5281]: pam_unix(sshd:auth): check pass; user unknown Jan 15 20:14:58 host sshd[5281]: Failed password for invalid user nginx from 220.132.40.160 port 54805 ssh2 Jan 15 20:15:00 host sshd[5281]: pam_unix(sshd:auth): check pass; user unknown Jan 15 20:15:02 host sshd[5281]: Failed password for invalid user nginx from 220.132.40.160 port 54805 ssh2 Jan 15 20:15:03 host sshd[5281]: Connection reset by 220.132.40.160 port 54805 [preauth] Jan 15 20:15:03 host sshd[5281]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.40.160 Jan 15 20:16:03 host sshd[5523]: User root from 186.238.33.62 not allowed because not listed in AllowUsers Jan 15 20:16:03 host sshd[5523]: input_userauth_request: invalid user root [preauth] Jan 15 20:16:03 host unix_chkpwd[5539]: password check failed for user (root) Jan 15 20:16:03 host sshd[5523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.238.33.62 user=root Jan 15 20:16:03 host sshd[5523]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 20:16:05 host sshd[5523]: Failed password for invalid user root from 186.238.33.62 port 57429 ssh2 Jan 15 20:16:06 host sshd[5523]: Connection closed by 186.238.33.62 port 57429 [preauth] Jan 15 20:16:06 host sshd[5537]: Invalid user usr from 36.232.14.60 port 42549 Jan 15 20:16:06 host sshd[5537]: input_userauth_request: invalid user usr [preauth] Jan 15 20:16:06 host sshd[5537]: pam_unix(sshd:auth): check pass; user unknown Jan 15 20:16:06 host sshd[5537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.232.14.60 Jan 15 20:16:08 host sshd[5537]: Failed password for invalid user usr from 36.232.14.60 port 42549 ssh2 Jan 15 20:16:09 host sshd[5537]: Connection reset by 36.232.14.60 port 42549 [preauth] Jan 15 20:17:57 host sshd[5726]: Invalid user eo from 194.110.203.109 port 40784 Jan 15 20:17:57 host sshd[5726]: input_userauth_request: invalid user eo [preauth] Jan 15 20:17:57 host sshd[5726]: pam_unix(sshd:auth): check pass; user unknown Jan 15 20:17:57 host sshd[5726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 20:17:59 host sshd[5726]: Failed password for invalid user eo from 194.110.203.109 port 40784 ssh2 Jan 15 20:18:02 host sshd[5726]: pam_unix(sshd:auth): check pass; user unknown Jan 15 20:18:04 host sshd[5726]: Failed password for invalid user eo from 194.110.203.109 port 40784 ssh2 Jan 15 20:18:07 host sshd[5726]: pam_unix(sshd:auth): check pass; user unknown Jan 15 20:18:09 host sshd[5726]: Failed password for invalid user eo from 194.110.203.109 port 40784 ssh2 Jan 15 20:18:12 host sshd[5726]: Connection closed by 194.110.203.109 port 40784 [preauth] Jan 15 20:18:12 host sshd[5726]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 20:20:26 host sshd[6014]: Invalid user admin from 114.34.102.49 port 51016 Jan 15 20:20:26 host sshd[6014]: input_userauth_request: invalid user admin [preauth] Jan 15 20:20:26 host sshd[6014]: pam_unix(sshd:auth): check pass; user unknown Jan 15 20:20:26 host sshd[6014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.102.49 Jan 15 20:20:27 host sshd[6014]: Failed password for invalid user admin from 114.34.102.49 port 51016 ssh2 Jan 15 20:20:28 host sshd[6014]: Failed password for invalid user admin from 114.34.102.49 port 51016 ssh2 Jan 15 20:20:29 host sshd[6014]: Connection reset by 114.34.102.49 port 51016 [preauth] Jan 15 20:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 20:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 20:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=cochintaxi user-5=wwwkaretakers user-6=ugotscom user-7=wwwrmswll user-8=keralaholi user-9=wwwresourcehunte user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=wwwtestugo user-14=shalinijames user-15=vfmassets user-16=wwwkapin user-17=woodpeck user-18=wwwkmaorg user-19=disposeat user-20=remysagr user-21=wwwnexidigital user-22=mrsclean user-23=kottayamcalldriv user-24=phmetals user-25=gifterman user-26=palco123 user-27=straightcurve user-28=wwwletsstalkfood user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 20:21:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 20:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 20:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5cdfFsmtTndoe7Y9.~ Jan 15 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5cdfFsmtTndoe7Y9.~' Jan 15 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5cdfFsmtTndoe7Y9.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 20:21:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 20:21:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 20:23:36 host sshd[6745]: User root from 119.196.144.232 not allowed because not listed in AllowUsers Jan 15 20:23:36 host sshd[6745]: input_userauth_request: invalid user root [preauth] Jan 15 20:23:36 host unix_chkpwd[6761]: password check failed for user (root) Jan 15 20:23:36 host sshd[6745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.196.144.232 user=root Jan 15 20:23:36 host sshd[6745]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 20:23:38 host sshd[6745]: Failed password for invalid user root from 119.196.144.232 port 60684 ssh2 Jan 15 20:35:50 host sshd[8395]: User ftp from 198.59.178.7 not allowed because not listed in AllowUsers Jan 15 20:35:50 host sshd[8395]: input_userauth_request: invalid user ftp [preauth] Jan 15 20:35:51 host unix_chkpwd[8418]: password check failed for user (ftp) Jan 15 20:35:51 host sshd[8395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.59.178.7 user=ftp Jan 15 20:35:51 host sshd[8395]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 15 20:35:53 host sshd[8395]: Failed password for invalid user ftp from 198.59.178.7 port 58606 ssh2 Jan 15 20:35:54 host sshd[8395]: Connection closed by 198.59.178.7 port 58606 [preauth] Jan 15 20:37:36 host sshd[8625]: Invalid user stunnel4 from 205.185.113.129 port 45436 Jan 15 20:37:36 host sshd[8625]: input_userauth_request: invalid user stunnel4 [preauth] Jan 15 20:37:36 host sshd[8625]: pam_unix(sshd:auth): check pass; user unknown Jan 15 20:37:36 host sshd[8625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 15 20:37:38 host sshd[8625]: Failed password for invalid user stunnel4 from 205.185.113.129 port 45436 ssh2 Jan 15 20:37:39 host sshd[8625]: Connection closed by 205.185.113.129 port 45436 [preauth] Jan 15 20:55:14 host sshd[11147]: Invalid user admin from 186.151.211.125 port 49080 Jan 15 20:55:14 host sshd[11147]: input_userauth_request: invalid user admin [preauth] Jan 15 20:55:14 host sshd[11147]: pam_unix(sshd:auth): check pass; user unknown Jan 15 20:55:14 host sshd[11147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.151.211.125 Jan 15 20:55:17 host sshd[11147]: Failed password for invalid user admin from 186.151.211.125 port 49080 ssh2 Jan 15 20:55:17 host sshd[11147]: Connection closed by 186.151.211.125 port 49080 [preauth] Jan 15 21:02:22 host sshd[12037]: User root from 61.72.79.196 not allowed because not listed in AllowUsers Jan 15 21:02:22 host sshd[12037]: input_userauth_request: invalid user root [preauth] Jan 15 21:02:22 host unix_chkpwd[12040]: password check failed for user (root) Jan 15 21:02:22 host sshd[12037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.72.79.196 user=root Jan 15 21:02:22 host sshd[12037]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:02:24 host sshd[12037]: Failed password for invalid user root from 61.72.79.196 port 63674 ssh2 Jan 15 21:02:24 host unix_chkpwd[12044]: password check failed for user (root) Jan 15 21:02:24 host sshd[12037]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:02:26 host sshd[12037]: Failed password for invalid user root from 61.72.79.196 port 63674 ssh2 Jan 15 21:02:27 host unix_chkpwd[12048]: password check failed for user (root) Jan 15 21:02:27 host sshd[12037]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:02:29 host sshd[12037]: Failed password for invalid user root from 61.72.79.196 port 63674 ssh2 Jan 15 21:02:29 host sshd[12037]: Connection reset by 61.72.79.196 port 63674 [preauth] Jan 15 21:02:29 host sshd[12037]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.72.79.196 user=root Jan 15 21:03:09 host sshd[12158]: User root from 183.103.65.181 not allowed because not listed in AllowUsers Jan 15 21:03:09 host sshd[12158]: input_userauth_request: invalid user root [preauth] Jan 15 21:03:09 host unix_chkpwd[12162]: password check failed for user (root) Jan 15 21:03:09 host sshd[12158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.103.65.181 user=root Jan 15 21:03:09 host sshd[12158]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:03:10 host sshd[12158]: Failed password for invalid user root from 183.103.65.181 port 63563 ssh2 Jan 15 21:03:11 host sshd[12158]: Connection reset by 183.103.65.181 port 63563 [preauth] Jan 15 21:09:58 host sshd[13065]: Did not receive identification string from 165.227.87.78 port 47290 Jan 15 21:13:25 host sshd[13564]: Invalid user admin from 80.94.248.11 port 53982 Jan 15 21:13:25 host sshd[13564]: input_userauth_request: invalid user admin [preauth] Jan 15 21:13:26 host sshd[13564]: pam_unix(sshd:auth): check pass; user unknown Jan 15 21:13:26 host sshd[13564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.248.11 Jan 15 21:13:28 host sshd[13564]: Failed password for invalid user admin from 80.94.248.11 port 53982 ssh2 Jan 15 21:13:29 host sshd[13564]: Connection closed by 80.94.248.11 port 53982 [preauth] Jan 15 21:16:43 host sshd[13936]: Connection reset by 177.32.113.138 port 59501 [preauth] Jan 15 21:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwrmswll user-5=keralaholi user-6=wwwresourcehunte user-7=wwwkaretakers user-8=cochintaxi user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=straightcurve user-15=wwwletsstalkfood user-16=kottayamcalldriv user-17=phmetals user-18=gifterman user-19=palco123 user-20=wwwnexidigital user-21=mrsclean user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=woodpeck user-26=wwwkapin user-27=wwwtestugo user-28=shalinijames user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 21:21:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cvhNYeHVae75n2uq.~ Jan 15 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cvhNYeHVae75n2uq.~' Jan 15 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cvhNYeHVae75n2uq.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 21:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 21:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 21:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 21:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 21:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 21:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 21:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 21:27:11 host sshd[15487]: Bad protocol version identification 'MGLNDD_167.71.234.10_22' from 107.170.227.9 port 54514 Jan 15 21:31:40 host sshd[15980]: Invalid user test from 178.219.126.205 port 55732 Jan 15 21:31:40 host sshd[15980]: input_userauth_request: invalid user test [preauth] Jan 15 21:31:40 host sshd[15980]: pam_unix(sshd:auth): check pass; user unknown Jan 15 21:31:40 host sshd[15980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.219.126.205 Jan 15 21:31:43 host sshd[15980]: Failed password for invalid user test from 178.219.126.205 port 55732 ssh2 Jan 15 21:31:43 host sshd[15980]: Connection closed by 178.219.126.205 port 55732 [preauth] Jan 15 21:37:02 host sshd[16684]: User root from 121.161.122.176 not allowed because not listed in AllowUsers Jan 15 21:37:02 host sshd[16684]: input_userauth_request: invalid user root [preauth] Jan 15 21:37:02 host unix_chkpwd[16697]: password check failed for user (root) Jan 15 21:37:02 host sshd[16684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.161.122.176 user=root Jan 15 21:37:02 host sshd[16684]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:37:03 host sshd[16684]: Failed password for invalid user root from 121.161.122.176 port 42116 ssh2 Jan 15 21:37:04 host sshd[16684]: Received disconnect from 121.161.122.176 port 42116:11: Bye Bye [preauth] Jan 15 21:37:04 host sshd[16684]: Disconnected from 121.161.122.176 port 42116 [preauth] Jan 15 21:37:57 host sshd[16901]: User root from 51.250.4.112 not allowed because not listed in AllowUsers Jan 15 21:37:57 host sshd[16901]: input_userauth_request: invalid user root [preauth] Jan 15 21:37:57 host unix_chkpwd[16904]: password check failed for user (root) Jan 15 21:37:57 host sshd[16901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.4.112 user=root Jan 15 21:37:57 host sshd[16901]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:37:59 host sshd[16901]: Failed password for invalid user root from 51.250.4.112 port 35956 ssh2 Jan 15 21:38:00 host sshd[16901]: Received disconnect from 51.250.4.112 port 35956:11: Bye Bye [preauth] Jan 15 21:38:00 host sshd[16901]: Disconnected from 51.250.4.112 port 35956 [preauth] Jan 15 21:39:25 host sshd[17062]: User root from 143.137.235.42 not allowed because not listed in AllowUsers Jan 15 21:39:25 host sshd[17062]: input_userauth_request: invalid user root [preauth] Jan 15 21:39:25 host unix_chkpwd[17068]: password check failed for user (root) Jan 15 21:39:25 host sshd[17062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.137.235.42 user=root Jan 15 21:39:25 host sshd[17062]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:39:27 host sshd[17062]: Failed password for invalid user root from 143.137.235.42 port 56860 ssh2 Jan 15 21:39:28 host sshd[17062]: Received disconnect from 143.137.235.42 port 56860:11: Bye Bye [preauth] Jan 15 21:39:28 host sshd[17062]: Disconnected from 143.137.235.42 port 56860 [preauth] Jan 15 21:40:26 host sshd[17196]: User root from 138.3.240.178 not allowed because not listed in AllowUsers Jan 15 21:40:26 host sshd[17196]: input_userauth_request: invalid user root [preauth] Jan 15 21:40:26 host unix_chkpwd[17200]: password check failed for user (root) Jan 15 21:40:26 host sshd[17196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.3.240.178 user=root Jan 15 21:40:26 host sshd[17196]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:40:28 host sshd[17196]: Failed password for invalid user root from 138.3.240.178 port 45294 ssh2 Jan 15 21:40:28 host sshd[17196]: Received disconnect from 138.3.240.178 port 45294:11: Bye Bye [preauth] Jan 15 21:40:28 host sshd[17196]: Disconnected from 138.3.240.178 port 45294 [preauth] Jan 15 21:41:04 host sshd[17275]: Invalid user admin from 175.213.142.102 port 62541 Jan 15 21:41:04 host sshd[17275]: input_userauth_request: invalid user admin [preauth] Jan 15 21:41:04 host sshd[17275]: pam_unix(sshd:auth): check pass; user unknown Jan 15 21:41:04 host sshd[17275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.213.142.102 Jan 15 21:41:06 host sshd[17275]: Failed password for invalid user admin from 175.213.142.102 port 62541 ssh2 Jan 15 21:41:07 host sshd[17275]: Failed password for invalid user admin from 175.213.142.102 port 62541 ssh2 Jan 15 21:41:08 host sshd[17275]: pam_unix(sshd:auth): check pass; user unknown Jan 15 21:41:11 host sshd[17275]: Failed password for invalid user admin from 175.213.142.102 port 62541 ssh2 Jan 15 21:41:16 host sshd[17275]: pam_unix(sshd:auth): check pass; user unknown Jan 15 21:41:18 host sshd[17275]: Failed password for invalid user admin from 175.213.142.102 port 62541 ssh2 Jan 15 21:41:19 host sshd[17275]: Connection reset by 175.213.142.102 port 62541 [preauth] Jan 15 21:41:19 host sshd[17275]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.213.142.102 Jan 15 21:41:44 host sshd[17395]: User root from 185.137.24.110 not allowed because not listed in AllowUsers Jan 15 21:41:44 host sshd[17395]: input_userauth_request: invalid user root [preauth] Jan 15 21:41:44 host unix_chkpwd[17398]: password check failed for user (root) Jan 15 21:41:44 host sshd[17395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.137.24.110 user=root Jan 15 21:41:44 host sshd[17395]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:41:46 host sshd[17395]: Failed password for invalid user root from 185.137.24.110 port 42396 ssh2 Jan 15 21:41:46 host sshd[17395]: Received disconnect from 185.137.24.110 port 42396:11: Bye Bye [preauth] Jan 15 21:41:46 host sshd[17395]: Disconnected from 185.137.24.110 port 42396 [preauth] Jan 15 21:42:49 host sshd[17609]: User root from 51.250.4.112 not allowed because not listed in AllowUsers Jan 15 21:42:49 host sshd[17609]: input_userauth_request: invalid user root [preauth] Jan 15 21:42:49 host unix_chkpwd[17612]: password check failed for user (root) Jan 15 21:42:49 host sshd[17609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.4.112 user=root Jan 15 21:42:49 host sshd[17609]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:42:52 host sshd[17609]: Failed password for invalid user root from 51.250.4.112 port 58726 ssh2 Jan 15 21:42:53 host sshd[17651]: User root from 163.172.160.152 not allowed because not listed in AllowUsers Jan 15 21:42:53 host sshd[17651]: input_userauth_request: invalid user root [preauth] Jan 15 21:42:53 host unix_chkpwd[17653]: password check failed for user (root) Jan 15 21:42:53 host sshd[17651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.160.152 user=root Jan 15 21:42:53 host sshd[17651]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:42:55 host sshd[17651]: Failed password for invalid user root from 163.172.160.152 port 47906 ssh2 Jan 15 21:42:55 host sshd[17651]: Received disconnect from 163.172.160.152 port 47906:11: Bye Bye [preauth] Jan 15 21:42:55 host sshd[17651]: Disconnected from 163.172.160.152 port 47906 [preauth] Jan 15 21:43:29 host sshd[17707]: User root from 121.161.122.176 not allowed because not listed in AllowUsers Jan 15 21:43:29 host sshd[17707]: input_userauth_request: invalid user root [preauth] Jan 15 21:43:29 host unix_chkpwd[17733]: password check failed for user (root) Jan 15 21:43:29 host sshd[17707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.161.122.176 user=root Jan 15 21:43:29 host sshd[17707]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:43:31 host sshd[17707]: Failed password for invalid user root from 121.161.122.176 port 43190 ssh2 Jan 15 21:43:50 host sshd[17790]: User root from 143.137.235.42 not allowed because not listed in AllowUsers Jan 15 21:43:50 host sshd[17790]: input_userauth_request: invalid user root [preauth] Jan 15 21:43:50 host unix_chkpwd[17798]: password check failed for user (root) Jan 15 21:43:50 host sshd[17790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.137.235.42 user=root Jan 15 21:43:50 host sshd[17790]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:43:52 host sshd[17790]: Failed password for invalid user root from 143.137.235.42 port 50048 ssh2 Jan 15 21:43:52 host sshd[17790]: Received disconnect from 143.137.235.42 port 50048:11: Bye Bye [preauth] Jan 15 21:43:52 host sshd[17790]: Disconnected from 143.137.235.42 port 50048 [preauth] Jan 15 21:44:23 host sshd[17872]: User root from 206.189.87.115 not allowed because not listed in AllowUsers Jan 15 21:44:23 host sshd[17872]: input_userauth_request: invalid user root [preauth] Jan 15 21:44:23 host unix_chkpwd[17875]: password check failed for user (root) Jan 15 21:44:23 host sshd[17872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.87.115 user=root Jan 15 21:44:23 host sshd[17872]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:44:25 host sshd[17872]: Failed password for invalid user root from 206.189.87.115 port 55060 ssh2 Jan 15 21:44:25 host sshd[17872]: Received disconnect from 206.189.87.115 port 55060:11: Bye Bye [preauth] Jan 15 21:44:25 host sshd[17872]: Disconnected from 206.189.87.115 port 55060 [preauth] Jan 15 21:44:29 host sshd[17886]: User root from 163.172.160.152 not allowed because not listed in AllowUsers Jan 15 21:44:29 host sshd[17886]: input_userauth_request: invalid user root [preauth] Jan 15 21:44:29 host unix_chkpwd[17908]: password check failed for user (root) Jan 15 21:44:29 host sshd[17886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.160.152 user=root Jan 15 21:44:29 host sshd[17886]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:44:31 host sshd[17886]: Failed password for invalid user root from 163.172.160.152 port 48948 ssh2 Jan 15 21:44:54 host sshd[17981]: User root from 185.137.24.110 not allowed because not listed in AllowUsers Jan 15 21:44:54 host sshd[17981]: input_userauth_request: invalid user root [preauth] Jan 15 21:44:54 host unix_chkpwd[17984]: password check failed for user (root) Jan 15 21:44:54 host sshd[17981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.137.24.110 user=root Jan 15 21:44:54 host sshd[17981]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:44:56 host sshd[17981]: Failed password for invalid user root from 185.137.24.110 port 45536 ssh2 Jan 15 21:45:01 host sshd[18025]: User root from 138.3.240.178 not allowed because not listed in AllowUsers Jan 15 21:45:01 host sshd[18025]: input_userauth_request: invalid user root [preauth] Jan 15 21:45:01 host unix_chkpwd[18032]: password check failed for user (root) Jan 15 21:45:01 host sshd[18025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.3.240.178 user=root Jan 15 21:45:01 host sshd[18025]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:45:03 host sshd[18025]: Failed password for invalid user root from 138.3.240.178 port 38668 ssh2 Jan 15 21:45:03 host sshd[18025]: Received disconnect from 138.3.240.178 port 38668:11: Bye Bye [preauth] Jan 15 21:45:03 host sshd[18025]: Disconnected from 138.3.240.178 port 38668 [preauth] Jan 15 21:45:32 host sshd[18152]: User root from 141.145.201.209 not allowed because not listed in AllowUsers Jan 15 21:45:32 host sshd[18152]: input_userauth_request: invalid user root [preauth] Jan 15 21:45:32 host unix_chkpwd[18155]: password check failed for user (root) Jan 15 21:45:32 host sshd[18152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.145.201.209 user=root Jan 15 21:45:32 host sshd[18152]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:45:35 host sshd[18152]: Failed password for invalid user root from 141.145.201.209 port 35576 ssh2 Jan 15 21:45:35 host sshd[18152]: Received disconnect from 141.145.201.209 port 35576:11: Bye Bye [preauth] Jan 15 21:45:35 host sshd[18152]: Disconnected from 141.145.201.209 port 35576 [preauth] Jan 15 21:46:06 host sshd[18238]: Bad protocol version identification 'GET / HTTP/1.1' from 81.95.124.10 port 39886 Jan 15 21:46:07 host sshd[18239]: User root from 81.95.124.10 not allowed because not listed in AllowUsers Jan 15 21:46:07 host sshd[18239]: input_userauth_request: invalid user root [preauth] Jan 15 21:46:07 host unix_chkpwd[18243]: password check failed for user (root) Jan 15 21:46:07 host sshd[18239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.95.124.10 user=root Jan 15 21:46:07 host sshd[18239]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:46:09 host sshd[18239]: Failed password for invalid user root from 81.95.124.10 port 40090 ssh2 Jan 15 21:46:10 host sshd[18239]: Connection closed by 81.95.124.10 port 40090 [preauth] Jan 15 21:46:11 host sshd[18249]: User root from 81.95.124.10 not allowed because not listed in AllowUsers Jan 15 21:46:11 host sshd[18249]: input_userauth_request: invalid user root [preauth] Jan 15 21:46:11 host unix_chkpwd[18253]: password check failed for user (root) Jan 15 21:46:11 host sshd[18249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.95.124.10 user=root Jan 15 21:46:11 host sshd[18249]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:46:13 host sshd[18249]: Failed password for invalid user root from 81.95.124.10 port 41092 ssh2 Jan 15 21:46:13 host sshd[18249]: Connection closed by 81.95.124.10 port 41092 [preauth] Jan 15 21:46:14 host sshd[18257]: User root from 81.95.124.10 not allowed because not listed in AllowUsers Jan 15 21:46:14 host sshd[18257]: input_userauth_request: invalid user root [preauth] Jan 15 21:46:14 host unix_chkpwd[18261]: password check failed for user (root) Jan 15 21:46:14 host sshd[18257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.95.124.10 user=root Jan 15 21:46:14 host sshd[18257]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:46:17 host sshd[18257]: Failed password for invalid user root from 81.95.124.10 port 42432 ssh2 Jan 15 21:46:17 host sshd[18257]: Connection closed by 81.95.124.10 port 42432 [preauth] Jan 15 21:46:44 host sshd[18367]: User root from 2.42.138.122 not allowed because not listed in AllowUsers Jan 15 21:46:44 host sshd[18367]: input_userauth_request: invalid user root [preauth] Jan 15 21:46:44 host unix_chkpwd[18370]: password check failed for user (root) Jan 15 21:46:44 host sshd[18367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.42.138.122 user=root Jan 15 21:46:44 host sshd[18367]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:46:47 host sshd[18367]: Failed password for invalid user root from 2.42.138.122 port 41921 ssh2 Jan 15 21:46:47 host sshd[18367]: Received disconnect from 2.42.138.122 port 41921:11: Bye Bye [preauth] Jan 15 21:46:47 host sshd[18367]: Disconnected from 2.42.138.122 port 41921 [preauth] Jan 15 21:47:36 host sshd[18565]: User root from 61.216.157.13 not allowed because not listed in AllowUsers Jan 15 21:47:36 host sshd[18565]: input_userauth_request: invalid user root [preauth] Jan 15 21:47:36 host unix_chkpwd[18610]: password check failed for user (root) Jan 15 21:47:36 host sshd[18565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.216.157.13 user=root Jan 15 21:47:36 host sshd[18565]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:47:38 host sshd[18565]: Failed password for invalid user root from 61.216.157.13 port 50173 ssh2 Jan 15 21:47:38 host unix_chkpwd[18614]: password check failed for user (root) Jan 15 21:47:38 host sshd[18565]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:47:40 host sshd[18565]: Failed password for invalid user root from 61.216.157.13 port 50173 ssh2 Jan 15 21:47:40 host sshd[18565]: Connection reset by 61.216.157.13 port 50173 [preauth] Jan 15 21:47:40 host sshd[18565]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.216.157.13 user=root Jan 15 21:49:48 host sshd[18926]: User root from 103.172.204.12 not allowed because not listed in AllowUsers Jan 15 21:49:48 host sshd[18926]: input_userauth_request: invalid user root [preauth] Jan 15 21:49:48 host unix_chkpwd[18928]: password check failed for user (root) Jan 15 21:49:48 host sshd[18926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.172.204.12 user=root Jan 15 21:49:48 host sshd[18926]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:49:50 host sshd[18926]: Failed password for invalid user root from 103.172.204.12 port 44410 ssh2 Jan 15 21:49:50 host sshd[18926]: Received disconnect from 103.172.204.12 port 44410:11: Bye Bye [preauth] Jan 15 21:49:50 host sshd[18926]: Disconnected from 103.172.204.12 port 44410 [preauth] Jan 15 21:50:21 host sshd[19036]: User root from 141.145.201.209 not allowed because not listed in AllowUsers Jan 15 21:50:21 host sshd[19036]: input_userauth_request: invalid user root [preauth] Jan 15 21:50:21 host unix_chkpwd[19042]: password check failed for user (root) Jan 15 21:50:21 host sshd[19036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.145.201.209 user=root Jan 15 21:50:21 host sshd[19036]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:50:22 host sshd[19036]: Failed password for invalid user root from 141.145.201.209 port 37736 ssh2 Jan 15 21:50:23 host sshd[19036]: Received disconnect from 141.145.201.209 port 37736:11: Bye Bye [preauth] Jan 15 21:50:23 host sshd[19036]: Disconnected from 141.145.201.209 port 37736 [preauth] Jan 15 21:50:47 host sshd[19141]: User root from 2.42.138.122 not allowed because not listed in AllowUsers Jan 15 21:50:47 host sshd[19141]: input_userauth_request: invalid user root [preauth] Jan 15 21:50:47 host unix_chkpwd[19144]: password check failed for user (root) Jan 15 21:50:47 host sshd[19141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.42.138.122 user=root Jan 15 21:50:47 host sshd[19141]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:50:49 host sshd[19141]: Failed password for invalid user root from 2.42.138.122 port 35582 ssh2 Jan 15 21:50:49 host sshd[19141]: Received disconnect from 2.42.138.122 port 35582:11: Bye Bye [preauth] Jan 15 21:50:49 host sshd[19141]: Disconnected from 2.42.138.122 port 35582 [preauth] Jan 15 21:50:52 host sshd[19177]: Invalid user admin from 24.98.180.156 port 41808 Jan 15 21:50:52 host sshd[19177]: input_userauth_request: invalid user admin [preauth] Jan 15 21:50:52 host sshd[19177]: pam_unix(sshd:auth): check pass; user unknown Jan 15 21:50:52 host sshd[19177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.98.180.156 Jan 15 21:50:54 host sshd[19177]: Failed password for invalid user admin from 24.98.180.156 port 41808 ssh2 Jan 15 21:50:54 host sshd[19177]: Connection closed by 24.98.180.156 port 41808 [preauth] Jan 15 21:51:34 host sshd[19319]: User root from 206.189.87.115 not allowed because not listed in AllowUsers Jan 15 21:51:34 host sshd[19319]: input_userauth_request: invalid user root [preauth] Jan 15 21:51:34 host unix_chkpwd[19323]: password check failed for user (root) Jan 15 21:51:34 host sshd[19319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.87.115 user=root Jan 15 21:51:34 host sshd[19319]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:51:36 host sshd[19319]: Failed password for invalid user root from 206.189.87.115 port 56086 ssh2 Jan 15 21:51:37 host sshd[19358]: User root from 103.172.204.12 not allowed because not listed in AllowUsers Jan 15 21:51:37 host sshd[19358]: input_userauth_request: invalid user root [preauth] Jan 15 21:51:37 host unix_chkpwd[19360]: password check failed for user (root) Jan 15 21:51:37 host sshd[19358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.172.204.12 user=root Jan 15 21:51:37 host sshd[19358]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 21:51:39 host sshd[19358]: Failed password for invalid user root from 103.172.204.12 port 50470 ssh2 Jan 15 21:51:39 host sshd[19358]: Received disconnect from 103.172.204.12 port 50470:11: Bye Bye [preauth] Jan 15 21:51:39 host sshd[19358]: Disconnected from 103.172.204.12 port 50470 [preauth] Jan 15 21:56:09 host sshd[20034]: Connection reset by 114.34.222.138 port 37669 [preauth] Jan 15 22:02:51 host sshd[20880]: User root from 209.141.55.27 not allowed because not listed in AllowUsers Jan 15 22:02:51 host sshd[20880]: input_userauth_request: invalid user root [preauth] Jan 15 22:02:51 host unix_chkpwd[20889]: password check failed for user (root) Jan 15 22:02:51 host sshd[20880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 user=root Jan 15 22:02:51 host sshd[20880]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 22:02:52 host sshd[20880]: Failed password for invalid user root from 209.141.55.27 port 33572 ssh2 Jan 15 22:02:52 host sshd[20880]: Received disconnect from 209.141.55.27 port 33572:11: Normal Shutdown, Thank you for playing [preauth] Jan 15 22:02:52 host sshd[20880]: Disconnected from 209.141.55.27 port 33572 [preauth] Jan 15 22:04:09 host sshd[21034]: Invalid user ep from 194.110.203.109 port 58002 Jan 15 22:04:09 host sshd[21034]: input_userauth_request: invalid user ep [preauth] Jan 15 22:04:09 host sshd[21034]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:04:09 host sshd[21034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 22:04:10 host sshd[21034]: Failed password for invalid user ep from 194.110.203.109 port 58002 ssh2 Jan 15 22:04:13 host sshd[21034]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:04:16 host sshd[21034]: Failed password for invalid user ep from 194.110.203.109 port 58002 ssh2 Jan 15 22:04:19 host sshd[21034]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:04:20 host sshd[21034]: Failed password for invalid user ep from 194.110.203.109 port 58002 ssh2 Jan 15 22:04:23 host sshd[21034]: Connection closed by 194.110.203.109 port 58002 [preauth] Jan 15 22:04:23 host sshd[21034]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 22:05:46 host sshd[21322]: Invalid user pi from 122.117.62.76 port 38733 Jan 15 22:05:46 host sshd[21322]: input_userauth_request: invalid user pi [preauth] Jan 15 22:05:46 host sshd[21322]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:05:46 host sshd[21322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.62.76 Jan 15 22:05:48 host sshd[21322]: Failed password for invalid user pi from 122.117.62.76 port 38733 ssh2 Jan 15 22:05:49 host sshd[21322]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:05:51 host sshd[21322]: Failed password for invalid user pi from 122.117.62.76 port 38733 ssh2 Jan 15 22:05:52 host sshd[21322]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:05:54 host sshd[21322]: Failed password for invalid user pi from 122.117.62.76 port 38733 ssh2 Jan 15 22:05:55 host sshd[21322]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:05:56 host sshd[21322]: Failed password for invalid user pi from 122.117.62.76 port 38733 ssh2 Jan 15 22:05:57 host sshd[21322]: Connection reset by 122.117.62.76 port 38733 [preauth] Jan 15 22:05:57 host sshd[21322]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.62.76 Jan 15 22:05:57 host sshd[21322]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 15 22:09:58 host sshd[21827]: Invalid user username from 190.149.196.65 port 36063 Jan 15 22:09:58 host sshd[21827]: input_userauth_request: invalid user username [preauth] Jan 15 22:09:59 host sshd[21827]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:09:59 host sshd[21827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.149.196.65 Jan 15 22:10:01 host sshd[21827]: Failed password for invalid user username from 190.149.196.65 port 36063 ssh2 Jan 15 22:10:01 host sshd[21827]: Connection closed by 190.149.196.65 port 36063 [preauth] Jan 15 22:11:19 host sshd[22085]: Invalid user zyfwp from 218.148.7.152 port 63431 Jan 15 22:11:19 host sshd[22085]: input_userauth_request: invalid user zyfwp [preauth] Jan 15 22:11:19 host sshd[22085]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:11:19 host sshd[22085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.148.7.152 Jan 15 22:11:21 host sshd[22085]: Failed password for invalid user zyfwp from 218.148.7.152 port 63431 ssh2 Jan 15 22:11:23 host sshd[22085]: Connection reset by 218.148.7.152 port 63431 [preauth] Jan 15 22:16:27 host sshd[22649]: Invalid user admin from 221.157.44.193 port 60516 Jan 15 22:16:27 host sshd[22649]: input_userauth_request: invalid user admin [preauth] Jan 15 22:16:27 host sshd[22649]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:16:27 host sshd[22649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.157.44.193 Jan 15 22:16:29 host sshd[22649]: Failed password for invalid user admin from 221.157.44.193 port 60516 ssh2 Jan 15 22:16:29 host sshd[22649]: Failed password for invalid user admin from 221.157.44.193 port 60516 ssh2 Jan 15 22:16:30 host sshd[22649]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:16:32 host sshd[22649]: Failed password for invalid user admin from 221.157.44.193 port 60516 ssh2 Jan 15 22:16:33 host sshd[22649]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:16:34 host sshd[22649]: Failed password for invalid user admin from 221.157.44.193 port 60516 ssh2 Jan 15 22:16:35 host sshd[22649]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:16:37 host sshd[22649]: Failed password for invalid user admin from 221.157.44.193 port 60516 ssh2 Jan 15 22:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=ugotscom user-6=wwwpmcresource user-7=dartsimp user-8=a2zgroup user-9=laundryboniface user-10=cochintaxi user-11=wwwkaretakers user-12=gifterman user-13=palco123 user-14=phmetals user-15=kottayamcalldriv user-16=wwwnexidigital user-17=mrsclean user-18=bonifacegroup user-19=wwwevmhonda user-20=wwwletsstalkfood user-21=straightcurve user-22=vfmassets user-23=wwwtestugo user-24=shalinijames user-25=pmcresources user-26=remysagr user-27=disposeat user-28=wwwkmaorg user-29=wwwkapin user-30=woodpeck feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 22:21:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ci8Na1ZcTCfATeeU.~ Jan 15 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ci8Na1ZcTCfATeeU.~' Jan 15 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ci8Na1ZcTCfATeeU.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 22:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 22:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 22:28:52 host sshd[24475]: User root from 129.126.115.190 not allowed because not listed in AllowUsers Jan 15 22:28:52 host sshd[24475]: input_userauth_request: invalid user root [preauth] Jan 15 22:28:53 host unix_chkpwd[24486]: password check failed for user (root) Jan 15 22:28:53 host sshd[24475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.126.115.190 user=root Jan 15 22:28:53 host sshd[24475]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 22:28:55 host sshd[24475]: Failed password for invalid user root from 129.126.115.190 port 59429 ssh2 Jan 15 22:28:55 host sshd[24475]: Connection closed by 129.126.115.190 port 59429 [preauth] Jan 15 22:31:57 host sshd[24956]: User root from 121.151.142.37 not allowed because not listed in AllowUsers Jan 15 22:31:57 host sshd[24956]: input_userauth_request: invalid user root [preauth] Jan 15 22:31:57 host unix_chkpwd[24963]: password check failed for user (root) Jan 15 22:31:57 host sshd[24956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.151.142.37 user=root Jan 15 22:31:57 host sshd[24956]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 22:31:59 host sshd[24956]: Failed password for invalid user root from 121.151.142.37 port 55270 ssh2 Jan 15 22:32:01 host unix_chkpwd[24980]: password check failed for user (root) Jan 15 22:32:01 host sshd[24956]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 22:32:03 host sshd[24956]: Failed password for invalid user root from 121.151.142.37 port 55270 ssh2 Jan 15 22:42:21 host sshd[26223]: Invalid user sFTPUser from 121.134.98.135 port 60190 Jan 15 22:42:21 host sshd[26223]: input_userauth_request: invalid user sFTPUser [preauth] Jan 15 22:42:21 host sshd[26223]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:42:21 host sshd[26223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.134.98.135 Jan 15 22:42:23 host sshd[26223]: Failed password for invalid user sFTPUser from 121.134.98.135 port 60190 ssh2 Jan 15 22:42:24 host sshd[26223]: Connection reset by 121.134.98.135 port 60190 [preauth] Jan 15 22:44:53 host sshd[26487]: Invalid user admin from 121.129.93.181 port 50655 Jan 15 22:44:53 host sshd[26487]: input_userauth_request: invalid user admin [preauth] Jan 15 22:44:53 host sshd[26487]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:44:53 host sshd[26487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.129.93.181 Jan 15 22:44:56 host sshd[26487]: Failed password for invalid user admin from 121.129.93.181 port 50655 ssh2 Jan 15 22:44:57 host sshd[26487]: Failed password for invalid user admin from 121.129.93.181 port 50655 ssh2 Jan 15 22:44:57 host sshd[26487]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:44:59 host sshd[26487]: Failed password for invalid user admin from 121.129.93.181 port 50655 ssh2 Jan 15 22:44:59 host sshd[26487]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:45:01 host sshd[26487]: Failed password for invalid user admin from 121.129.93.181 port 50655 ssh2 Jan 15 22:45:02 host sshd[26487]: Connection reset by 121.129.93.181 port 50655 [preauth] Jan 15 22:45:02 host sshd[26487]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.129.93.181 Jan 15 22:47:09 host sshd[26942]: Invalid user ubnt from 178.219.122.73 port 50128 Jan 15 22:47:09 host sshd[26942]: input_userauth_request: invalid user ubnt [preauth] Jan 15 22:47:09 host sshd[26942]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:47:09 host sshd[26942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.219.122.73 Jan 15 22:47:11 host sshd[26942]: Failed password for invalid user ubnt from 178.219.122.73 port 50128 ssh2 Jan 15 22:47:12 host sshd[26942]: Connection closed by 178.219.122.73 port 50128 [preauth] Jan 15 22:48:23 host sshd[27068]: User root from 188.166.228.226 not allowed because not listed in AllowUsers Jan 15 22:48:23 host sshd[27068]: input_userauth_request: invalid user root [preauth] Jan 15 22:48:23 host unix_chkpwd[27071]: password check failed for user (root) Jan 15 22:48:23 host sshd[27068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.228.226 user=root Jan 15 22:48:23 host sshd[27068]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 22:48:25 host sshd[27068]: Failed password for invalid user root from 188.166.228.226 port 60210 ssh2 Jan 15 22:48:25 host sshd[27068]: Received disconnect from 188.166.228.226 port 60210:11: Bye Bye [preauth] Jan 15 22:48:25 host sshd[27068]: Disconnected from 188.166.228.226 port 60210 [preauth] Jan 15 22:52:05 host sshd[27616]: User root from 159.223.50.39 not allowed because not listed in AllowUsers Jan 15 22:52:05 host sshd[27616]: input_userauth_request: invalid user root [preauth] Jan 15 22:52:05 host unix_chkpwd[27618]: password check failed for user (root) Jan 15 22:52:05 host sshd[27616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.50.39 user=root Jan 15 22:52:05 host sshd[27616]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 22:52:07 host sshd[27616]: Failed password for invalid user root from 159.223.50.39 port 54494 ssh2 Jan 15 22:52:07 host sshd[27616]: Received disconnect from 159.223.50.39 port 54494:11: Bye Bye [preauth] Jan 15 22:52:07 host sshd[27616]: Disconnected from 159.223.50.39 port 54494 [preauth] Jan 15 22:52:17 host sshd[27632]: User root from 187.111.28.131 not allowed because not listed in AllowUsers Jan 15 22:52:17 host sshd[27632]: input_userauth_request: invalid user root [preauth] Jan 15 22:52:17 host unix_chkpwd[27638]: password check failed for user (root) Jan 15 22:52:17 host sshd[27632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.111.28.131 user=root Jan 15 22:52:17 host sshd[27632]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 22:52:18 host sshd[27635]: User root from 158.69.84.149 not allowed because not listed in AllowUsers Jan 15 22:52:18 host sshd[27635]: input_userauth_request: invalid user root [preauth] Jan 15 22:52:18 host unix_chkpwd[27639]: password check failed for user (root) Jan 15 22:52:18 host sshd[27635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.84.149 user=root Jan 15 22:52:18 host sshd[27635]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 22:52:19 host sshd[27632]: Failed password for invalid user root from 187.111.28.131 port 44576 ssh2 Jan 15 22:52:19 host sshd[27632]: Received disconnect from 187.111.28.131 port 44576:11: Bye Bye [preauth] Jan 15 22:52:19 host sshd[27632]: Disconnected from 187.111.28.131 port 44576 [preauth] Jan 15 22:52:20 host sshd[27635]: Failed password for invalid user root from 158.69.84.149 port 42492 ssh2 Jan 15 22:52:20 host sshd[27635]: Received disconnect from 158.69.84.149 port 42492:11: Bye Bye [preauth] Jan 15 22:52:20 host sshd[27635]: Disconnected from 158.69.84.149 port 42492 [preauth] Jan 15 22:52:46 host sshd[27689]: Invalid user pi from 211.220.55.2 port 60595 Jan 15 22:52:46 host sshd[27689]: input_userauth_request: invalid user pi [preauth] Jan 15 22:52:46 host sshd[27689]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:52:46 host sshd[27689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.220.55.2 Jan 15 22:52:48 host sshd[27689]: Failed password for invalid user pi from 211.220.55.2 port 60595 ssh2 Jan 15 22:52:49 host sshd[27689]: pam_unix(sshd:auth): check pass; user unknown Jan 15 22:52:51 host sshd[27689]: Failed password for invalid user pi from 211.220.55.2 port 60595 ssh2 Jan 15 22:52:51 host sshd[27689]: Connection reset by 211.220.55.2 port 60595 [preauth] Jan 15 22:52:51 host sshd[27689]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.220.55.2 Jan 15 22:54:32 host sshd[27870]: User root from 158.69.84.149 not allowed because not listed in AllowUsers Jan 15 22:54:32 host sshd[27870]: input_userauth_request: invalid user root [preauth] Jan 15 22:54:32 host unix_chkpwd[27873]: password check failed for user (root) Jan 15 22:54:32 host sshd[27870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.84.149 user=root Jan 15 22:54:32 host sshd[27870]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 22:54:34 host sshd[27870]: Failed password for invalid user root from 158.69.84.149 port 49192 ssh2 Jan 15 22:54:37 host sshd[27907]: User root from 188.166.228.226 not allowed because not listed in AllowUsers Jan 15 22:54:37 host sshd[27907]: input_userauth_request: invalid user root [preauth] Jan 15 22:54:37 host unix_chkpwd[27910]: password check failed for user (root) Jan 15 22:54:37 host sshd[27907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.228.226 user=root Jan 15 22:54:37 host sshd[27907]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 22:54:38 host sshd[27907]: Failed password for invalid user root from 188.166.228.226 port 35306 ssh2 Jan 15 22:55:21 host sshd[28029]: User root from 159.223.50.39 not allowed because not listed in AllowUsers Jan 15 22:55:21 host sshd[28029]: input_userauth_request: invalid user root [preauth] Jan 15 22:55:21 host unix_chkpwd[28032]: password check failed for user (root) Jan 15 22:55:21 host sshd[28029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.50.39 user=root Jan 15 22:55:21 host sshd[28029]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 22:55:23 host sshd[28029]: Failed password for invalid user root from 159.223.50.39 port 37448 ssh2 Jan 15 22:55:35 host sshd[28116]: User root from 187.111.28.131 not allowed because not listed in AllowUsers Jan 15 22:55:35 host sshd[28116]: input_userauth_request: invalid user root [preauth] Jan 15 22:55:35 host unix_chkpwd[28120]: password check failed for user (root) Jan 15 22:55:35 host sshd[28116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.111.28.131 user=root Jan 15 22:55:35 host sshd[28116]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 22:55:37 host sshd[28116]: Failed password for invalid user root from 187.111.28.131 port 44578 ssh2 Jan 15 22:55:37 host sshd[28116]: Received disconnect from 187.111.28.131 port 44578:11: Bye Bye [preauth] Jan 15 22:55:37 host sshd[28116]: Disconnected from 187.111.28.131 port 44578 [preauth] Jan 15 22:59:51 host sshd[28818]: Did not receive identification string from 8.219.76.192 port 61000 Jan 15 23:05:18 host sshd[29554]: Invalid user admin from 49.73.6.189 port 39400 Jan 15 23:05:18 host sshd[29554]: input_userauth_request: invalid user admin [preauth] Jan 15 23:05:18 host sshd[29554]: pam_unix(sshd:auth): check pass; user unknown Jan 15 23:05:18 host sshd[29554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.73.6.189 Jan 15 23:05:21 host sshd[29554]: Failed password for invalid user admin from 49.73.6.189 port 39400 ssh2 Jan 15 23:05:22 host sshd[29554]: Connection closed by 49.73.6.189 port 39400 [preauth] Jan 15 23:06:38 host sshd[29727]: User root from 220.135.173.116 not allowed because not listed in AllowUsers Jan 15 23:06:38 host sshd[29727]: input_userauth_request: invalid user root [preauth] Jan 15 23:06:38 host unix_chkpwd[29730]: password check failed for user (root) Jan 15 23:06:38 host sshd[29727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.173.116 user=root Jan 15 23:06:38 host sshd[29727]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:06:41 host sshd[29727]: Failed password for invalid user root from 220.135.173.116 port 55524 ssh2 Jan 15 23:06:41 host unix_chkpwd[29736]: password check failed for user (root) Jan 15 23:06:41 host sshd[29727]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:06:43 host sshd[29727]: Failed password for invalid user root from 220.135.173.116 port 55524 ssh2 Jan 15 23:06:43 host unix_chkpwd[29743]: password check failed for user (root) Jan 15 23:06:43 host sshd[29727]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:06:45 host sshd[29727]: Failed password for invalid user root from 220.135.173.116 port 55524 ssh2 Jan 15 23:06:46 host sshd[29727]: Connection reset by 220.135.173.116 port 55524 [preauth] Jan 15 23:06:46 host sshd[29727]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.173.116 user=root Jan 15 23:08:26 host sshd[30040]: Connection closed by 106.10.122.53 port 36264 [preauth] Jan 15 23:08:45 host sshd[30080]: Invalid user ubnt from 183.99.124.33 port 63853 Jan 15 23:08:45 host sshd[30080]: input_userauth_request: invalid user ubnt [preauth] Jan 15 23:08:45 host sshd[30080]: pam_unix(sshd:auth): check pass; user unknown Jan 15 23:08:45 host sshd[30080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.99.124.33 Jan 15 23:08:46 host sshd[30080]: Failed password for invalid user ubnt from 183.99.124.33 port 63853 ssh2 Jan 15 23:08:47 host sshd[30080]: Connection reset by 183.99.124.33 port 63853 [preauth] Jan 15 23:09:54 host sshd[30222]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Jan 15 23:09:54 host sshd[30222]: input_userauth_request: invalid user root [preauth] Jan 15 23:09:54 host unix_chkpwd[30224]: password check failed for user (root) Jan 15 23:09:54 host sshd[30222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Jan 15 23:09:54 host sshd[30222]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:09:57 host sshd[30222]: Failed password for invalid user root from 106.10.122.53 port 56432 ssh2 Jan 15 23:09:57 host sshd[30222]: Connection closed by 106.10.122.53 port 56432 [preauth] Jan 15 23:11:28 host sshd[30439]: Invalid user a from 106.10.122.53 port 44018 Jan 15 23:11:28 host sshd[30439]: input_userauth_request: invalid user a [preauth] Jan 15 23:11:28 host sshd[30439]: pam_unix(sshd:auth): check pass; user unknown Jan 15 23:11:28 host sshd[30439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 15 23:11:29 host sshd[30439]: Failed password for invalid user a from 106.10.122.53 port 44018 ssh2 Jan 15 23:11:29 host sshd[30439]: Connection closed by 106.10.122.53 port 44018 [preauth] Jan 15 23:12:11 host sshd[30572]: User root from 49.36.43.167 not allowed because not listed in AllowUsers Jan 15 23:12:11 host sshd[30572]: input_userauth_request: invalid user root [preauth] Jan 15 23:12:11 host unix_chkpwd[30575]: password check failed for user (root) Jan 15 23:12:11 host sshd[30572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.36.43.167 user=root Jan 15 23:12:11 host sshd[30572]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:12:13 host sshd[30572]: Failed password for invalid user root from 49.36.43.167 port 32972 ssh2 Jan 15 23:12:13 host sshd[30572]: Received disconnect from 49.36.43.167 port 32972:11: Bye Bye [preauth] Jan 15 23:12:13 host sshd[30572]: Disconnected from 49.36.43.167 port 32972 [preauth] Jan 15 23:13:24 host sshd[30703]: User root from 143.110.224.148 not allowed because not listed in AllowUsers Jan 15 23:13:24 host sshd[30703]: input_userauth_request: invalid user root [preauth] Jan 15 23:13:24 host unix_chkpwd[30710]: password check failed for user (root) Jan 15 23:13:24 host sshd[30703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.224.148 user=root Jan 15 23:13:24 host sshd[30703]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:13:26 host sshd[30703]: Failed password for invalid user root from 143.110.224.148 port 33850 ssh2 Jan 15 23:13:26 host sshd[30703]: Received disconnect from 143.110.224.148 port 33850:11: Bye Bye [preauth] Jan 15 23:13:26 host sshd[30703]: Disconnected from 143.110.224.148 port 33850 [preauth] Jan 15 23:13:46 host sshd[30749]: User root from 190.144.51.254 not allowed because not listed in AllowUsers Jan 15 23:13:46 host sshd[30749]: input_userauth_request: invalid user root [preauth] Jan 15 23:13:46 host unix_chkpwd[30752]: password check failed for user (root) Jan 15 23:13:46 host sshd[30749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.51.254 user=root Jan 15 23:13:46 host sshd[30749]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:13:47 host sshd[30749]: Failed password for invalid user root from 190.144.51.254 port 41576 ssh2 Jan 15 23:13:48 host sshd[30749]: Received disconnect from 190.144.51.254 port 41576:11: Bye Bye [preauth] Jan 15 23:13:48 host sshd[30749]: Disconnected from 190.144.51.254 port 41576 [preauth] Jan 15 23:15:20 host sshd[31027]: User root from 208.109.34.15 not allowed because not listed in AllowUsers Jan 15 23:15:20 host sshd[31027]: input_userauth_request: invalid user root [preauth] Jan 15 23:15:20 host unix_chkpwd[31030]: password check failed for user (root) Jan 15 23:15:20 host sshd[31027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.109.34.15 user=root Jan 15 23:15:20 host sshd[31027]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:15:23 host sshd[31027]: Failed password for invalid user root from 208.109.34.15 port 46884 ssh2 Jan 15 23:15:23 host sshd[31027]: Received disconnect from 208.109.34.15 port 46884:11: Bye Bye [preauth] Jan 15 23:15:23 host sshd[31027]: Disconnected from 208.109.34.15 port 46884 [preauth] Jan 15 23:16:34 host sshd[31179]: User root from 165.22.101.75 not allowed because not listed in AllowUsers Jan 15 23:16:34 host sshd[31179]: input_userauth_request: invalid user root [preauth] Jan 15 23:16:35 host unix_chkpwd[31181]: password check failed for user (root) Jan 15 23:16:35 host sshd[31179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.101.75 user=root Jan 15 23:16:35 host sshd[31179]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:16:36 host sshd[31179]: Failed password for invalid user root from 165.22.101.75 port 44894 ssh2 Jan 15 23:16:37 host sshd[31179]: Received disconnect from 165.22.101.75 port 44894:11: Bye Bye [preauth] Jan 15 23:16:37 host sshd[31179]: Disconnected from 165.22.101.75 port 44894 [preauth] Jan 15 23:17:45 host sshd[31302]: User root from 43.155.165.118 not allowed because not listed in AllowUsers Jan 15 23:17:45 host sshd[31302]: input_userauth_request: invalid user root [preauth] Jan 15 23:17:45 host unix_chkpwd[31305]: password check failed for user (root) Jan 15 23:17:45 host sshd[31302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.165.118 user=root Jan 15 23:17:45 host sshd[31302]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:17:46 host sshd[31302]: Failed password for invalid user root from 43.155.165.118 port 43984 ssh2 Jan 15 23:17:47 host sshd[31302]: Received disconnect from 43.155.165.118 port 43984:11: Bye Bye [preauth] Jan 15 23:17:47 host sshd[31302]: Disconnected from 43.155.165.118 port 43984 [preauth] Jan 15 23:18:11 host sshd[31351]: User root from 201.149.20.162 not allowed because not listed in AllowUsers Jan 15 23:18:11 host sshd[31351]: input_userauth_request: invalid user root [preauth] Jan 15 23:18:11 host unix_chkpwd[31355]: password check failed for user (root) Jan 15 23:18:11 host sshd[31351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.20.162 user=root Jan 15 23:18:11 host sshd[31351]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:18:13 host sshd[31351]: Failed password for invalid user root from 201.149.20.162 port 44334 ssh2 Jan 15 23:18:13 host sshd[31351]: Received disconnect from 201.149.20.162 port 44334:11: Bye Bye [preauth] Jan 15 23:18:13 host sshd[31351]: Disconnected from 201.149.20.162 port 44334 [preauth] Jan 15 23:18:36 host sshd[31401]: User root from 143.110.224.148 not allowed because not listed in AllowUsers Jan 15 23:18:36 host sshd[31401]: input_userauth_request: invalid user root [preauth] Jan 15 23:18:36 host unix_chkpwd[31406]: password check failed for user (root) Jan 15 23:18:36 host sshd[31401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.224.148 user=root Jan 15 23:18:36 host sshd[31401]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:18:38 host sshd[31401]: Failed password for invalid user root from 143.110.224.148 port 56342 ssh2 Jan 15 23:18:38 host sshd[31401]: Received disconnect from 143.110.224.148 port 56342:11: Bye Bye [preauth] Jan 15 23:18:38 host sshd[31401]: Disconnected from 143.110.224.148 port 56342 [preauth] Jan 15 23:18:53 host sshd[31452]: User root from 49.36.43.167 not allowed because not listed in AllowUsers Jan 15 23:18:53 host sshd[31452]: input_userauth_request: invalid user root [preauth] Jan 15 23:18:53 host unix_chkpwd[31454]: password check failed for user (root) Jan 15 23:18:53 host sshd[31452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.36.43.167 user=root Jan 15 23:18:53 host sshd[31452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:18:55 host sshd[31452]: Failed password for invalid user root from 49.36.43.167 port 60542 ssh2 Jan 15 23:19:11 host sshd[31542]: User root from 208.109.34.15 not allowed because not listed in AllowUsers Jan 15 23:19:11 host sshd[31542]: input_userauth_request: invalid user root [preauth] Jan 15 23:19:11 host unix_chkpwd[31545]: password check failed for user (root) Jan 15 23:19:11 host sshd[31542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.109.34.15 user=root Jan 15 23:19:11 host sshd[31542]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:19:13 host sshd[31542]: Failed password for invalid user root from 208.109.34.15 port 55156 ssh2 Jan 15 23:19:13 host sshd[31542]: Received disconnect from 208.109.34.15 port 55156:11: Bye Bye [preauth] Jan 15 23:19:13 host sshd[31542]: Disconnected from 208.109.34.15 port 55156 [preauth] Jan 15 23:19:15 host sshd[31574]: User root from 190.144.51.254 not allowed because not listed in AllowUsers Jan 15 23:19:15 host sshd[31574]: input_userauth_request: invalid user root [preauth] Jan 15 23:19:15 host unix_chkpwd[31582]: password check failed for user (root) Jan 15 23:19:15 host sshd[31574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.51.254 user=root Jan 15 23:19:15 host sshd[31574]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:19:17 host sshd[31574]: Failed password for invalid user root from 190.144.51.254 port 49544 ssh2 Jan 15 23:19:17 host sshd[31574]: Received disconnect from 190.144.51.254 port 49544:11: Bye Bye [preauth] Jan 15 23:19:17 host sshd[31574]: Disconnected from 190.144.51.254 port 49544 [preauth] Jan 15 23:19:25 host sshd[31727]: User root from 165.22.101.75 not allowed because not listed in AllowUsers Jan 15 23:19:25 host sshd[31727]: input_userauth_request: invalid user root [preauth] Jan 15 23:19:26 host unix_chkpwd[31730]: password check failed for user (root) Jan 15 23:19:26 host sshd[31727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.101.75 user=root Jan 15 23:19:26 host sshd[31727]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:19:27 host sshd[31727]: Failed password for invalid user root from 165.22.101.75 port 49916 ssh2 Jan 15 23:19:27 host sshd[31727]: Received disconnect from 165.22.101.75 port 49916:11: Bye Bye [preauth] Jan 15 23:19:27 host sshd[31727]: Disconnected from 165.22.101.75 port 49916 [preauth] Jan 15 23:19:32 host sshd[31786]: User root from 124.160.96.242 not allowed because not listed in AllowUsers Jan 15 23:19:32 host sshd[31786]: input_userauth_request: invalid user root [preauth] Jan 15 23:19:32 host unix_chkpwd[31792]: password check failed for user (root) Jan 15 23:19:32 host sshd[31786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.242 user=root Jan 15 23:19:32 host sshd[31786]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:19:34 host sshd[31786]: Failed password for invalid user root from 124.160.96.242 port 11189 ssh2 Jan 15 23:19:34 host sshd[31786]: Received disconnect from 124.160.96.242 port 11189:11: Bye Bye [preauth] Jan 15 23:19:34 host sshd[31786]: Disconnected from 124.160.96.242 port 11189 [preauth] Jan 15 23:19:36 host sshd[31797]: User root from 43.155.165.118 not allowed because not listed in AllowUsers Jan 15 23:19:36 host sshd[31797]: input_userauth_request: invalid user root [preauth] Jan 15 23:19:36 host unix_chkpwd[31800]: password check failed for user (root) Jan 15 23:19:36 host sshd[31797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.165.118 user=root Jan 15 23:19:36 host sshd[31797]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:19:38 host sshd[31797]: Failed password for invalid user root from 43.155.165.118 port 45284 ssh2 Jan 15 23:19:38 host sshd[31797]: Received disconnect from 43.155.165.118 port 45284:11: Bye Bye [preauth] Jan 15 23:19:38 host sshd[31797]: Disconnected from 43.155.165.118 port 45284 [preauth] Jan 15 23:20:40 host sshd[31968]: User root from 201.149.20.162 not allowed because not listed in AllowUsers Jan 15 23:20:40 host sshd[31968]: input_userauth_request: invalid user root [preauth] Jan 15 23:20:40 host unix_chkpwd[31971]: password check failed for user (root) Jan 15 23:20:40 host sshd[31968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.20.162 user=root Jan 15 23:20:40 host sshd[31968]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:20:42 host sshd[31968]: Failed password for invalid user root from 201.149.20.162 port 18868 ssh2 Jan 15 23:20:42 host sshd[31968]: Received disconnect from 201.149.20.162 port 18868:11: Bye Bye [preauth] Jan 15 23:20:42 host sshd[31968]: Disconnected from 201.149.20.162 port 18868 [preauth] Jan 15 23:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 15 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=shalinijames user-3=wwwtestugo user-4=pmcresources user-5=disposeat user-6=remysagr user-7=wwwkmaorg user-8=woodpeck user-9=wwwkapin user-10=palco123 user-11=gifterman user-12=phmetals user-13=kottayamcalldriv user-14=wwwnexidigital user-15=mrsclean user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 15 23:21:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 15 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ctu3OZmUktV9bsxg.~ Jan 15 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ctu3OZmUktV9bsxg.~' Jan 15 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ctu3OZmUktV9bsxg.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 15 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 15 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 15 23:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 15 23:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 15 23:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 15 23:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 15 23:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 15 23:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 15 23:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 15 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 15 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 15 23:24:06 host sshd[32587]: Bad protocol version identification '\376\b\001adminSSH-2.0-PuTTY_Release_0.77' from 5.53.136.135 port 46265 Jan 15 23:25:41 host sshd[32766]: User root from 124.160.96.242 not allowed because not listed in AllowUsers Jan 15 23:25:41 host sshd[32766]: input_userauth_request: invalid user root [preauth] Jan 15 23:25:41 host unix_chkpwd[302]: password check failed for user (root) Jan 15 23:25:41 host sshd[32766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.242 user=root Jan 15 23:25:41 host sshd[32766]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:25:43 host sshd[32766]: Failed password for invalid user root from 124.160.96.242 port 21814 ssh2 Jan 15 23:25:43 host sshd[32766]: Received disconnect from 124.160.96.242 port 21814:11: Bye Bye [preauth] Jan 15 23:25:43 host sshd[32766]: Disconnected from 124.160.96.242 port 21814 [preauth] Jan 15 23:27:16 host sshd[630]: Did not receive identification string from 37.187.88.37 port 49925 Jan 15 23:28:03 host sshd[735]: User root from 45.191.205.197 not allowed because not listed in AllowUsers Jan 15 23:28:03 host sshd[735]: input_userauth_request: invalid user root [preauth] Jan 15 23:28:04 host unix_chkpwd[741]: password check failed for user (root) Jan 15 23:28:04 host sshd[735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.191.205.197 user=root Jan 15 23:28:04 host sshd[735]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:28:05 host sshd[735]: Failed password for invalid user root from 45.191.205.197 port 20988 ssh2 Jan 15 23:28:06 host sshd[735]: Received disconnect from 45.191.205.197 port 20988:11: Bye Bye [preauth] Jan 15 23:28:06 host sshd[735]: Disconnected from 45.191.205.197 port 20988 [preauth] Jan 15 23:29:36 host sshd[916]: User root from 188.166.217.179 not allowed because not listed in AllowUsers Jan 15 23:29:36 host sshd[916]: input_userauth_request: invalid user root [preauth] Jan 15 23:29:36 host unix_chkpwd[918]: password check failed for user (root) Jan 15 23:29:36 host sshd[916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.217.179 user=root Jan 15 23:29:36 host sshd[916]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:29:38 host sshd[916]: Failed password for invalid user root from 188.166.217.179 port 56164 ssh2 Jan 15 23:29:38 host sshd[916]: Received disconnect from 188.166.217.179 port 56164:11: Bye Bye [preauth] Jan 15 23:29:38 host sshd[916]: Disconnected from 188.166.217.179 port 56164 [preauth] Jan 15 23:32:23 host sshd[1365]: Invalid user admin from 115.22.201.63 port 60290 Jan 15 23:32:23 host sshd[1365]: input_userauth_request: invalid user admin [preauth] Jan 15 23:32:23 host sshd[1365]: pam_unix(sshd:auth): check pass; user unknown Jan 15 23:32:23 host sshd[1365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.22.201.63 Jan 15 23:32:26 host sshd[1365]: Failed password for invalid user admin from 115.22.201.63 port 60290 ssh2 Jan 15 23:32:26 host sshd[1365]: Connection reset by 115.22.201.63 port 60290 [preauth] Jan 15 23:33:37 host sshd[1513]: User root from 119.64.60.106 not allowed because not listed in AllowUsers Jan 15 23:33:37 host sshd[1513]: input_userauth_request: invalid user root [preauth] Jan 15 23:33:37 host unix_chkpwd[1515]: password check failed for user (root) Jan 15 23:33:37 host sshd[1513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.64.60.106 user=root Jan 15 23:33:37 host sshd[1513]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:33:39 host sshd[1513]: Failed password for invalid user root from 119.64.60.106 port 59844 ssh2 Jan 15 23:33:39 host sshd[1513]: Received disconnect from 119.64.60.106 port 59844:11: Bye Bye [preauth] Jan 15 23:33:39 host sshd[1513]: Disconnected from 119.64.60.106 port 59844 [preauth] Jan 15 23:34:17 host sshd[1589]: User root from 188.166.217.179 not allowed because not listed in AllowUsers Jan 15 23:34:17 host sshd[1589]: input_userauth_request: invalid user root [preauth] Jan 15 23:34:17 host unix_chkpwd[1593]: password check failed for user (root) Jan 15 23:34:17 host sshd[1589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.217.179 user=root Jan 15 23:34:17 host sshd[1589]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:34:19 host sshd[1589]: Failed password for invalid user root from 188.166.217.179 port 38586 ssh2 Jan 15 23:34:19 host sshd[1589]: Received disconnect from 188.166.217.179 port 38586:11: Bye Bye [preauth] Jan 15 23:34:19 host sshd[1589]: Disconnected from 188.166.217.179 port 38586 [preauth] Jan 15 23:34:44 host sshd[1674]: User root from 45.191.205.197 not allowed because not listed in AllowUsers Jan 15 23:34:44 host sshd[1674]: input_userauth_request: invalid user root [preauth] Jan 15 23:34:44 host unix_chkpwd[1680]: password check failed for user (root) Jan 15 23:34:44 host sshd[1674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.191.205.197 user=root Jan 15 23:34:44 host sshd[1674]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:34:46 host sshd[1674]: Failed password for invalid user root from 45.191.205.197 port 44150 ssh2 Jan 15 23:34:46 host sshd[1674]: Received disconnect from 45.191.205.197 port 44150:11: Bye Bye [preauth] Jan 15 23:34:46 host sshd[1674]: Disconnected from 45.191.205.197 port 44150 [preauth] Jan 15 23:35:36 host sshd[1845]: User root from 119.64.60.106 not allowed because not listed in AllowUsers Jan 15 23:35:36 host sshd[1845]: input_userauth_request: invalid user root [preauth] Jan 15 23:35:36 host unix_chkpwd[1848]: password check failed for user (root) Jan 15 23:35:36 host sshd[1845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.64.60.106 user=root Jan 15 23:35:36 host sshd[1845]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:35:39 host sshd[1845]: Failed password for invalid user root from 119.64.60.106 port 44056 ssh2 Jan 15 23:35:39 host sshd[1845]: Received disconnect from 119.64.60.106 port 44056:11: Bye Bye [preauth] Jan 15 23:35:39 host sshd[1845]: Disconnected from 119.64.60.106 port 44056 [preauth] Jan 15 23:42:39 host sshd[2941]: User root from 200.6.218.173 not allowed because not listed in AllowUsers Jan 15 23:42:39 host sshd[2941]: input_userauth_request: invalid user root [preauth] Jan 15 23:42:39 host unix_chkpwd[2946]: password check failed for user (root) Jan 15 23:42:39 host sshd[2941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.6.218.173 user=root Jan 15 23:42:39 host sshd[2941]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:42:41 host sshd[2941]: Failed password for invalid user root from 200.6.218.173 port 35072 ssh2 Jan 15 23:42:41 host sshd[2941]: Connection closed by 200.6.218.173 port 35072 [preauth] Jan 15 23:48:28 host sshd[3521]: Invalid user eq from 194.110.203.109 port 45768 Jan 15 23:48:28 host sshd[3521]: input_userauth_request: invalid user eq [preauth] Jan 15 23:48:28 host sshd[3521]: pam_unix(sshd:auth): check pass; user unknown Jan 15 23:48:28 host sshd[3521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 23:48:30 host sshd[3521]: Failed password for invalid user eq from 194.110.203.109 port 45768 ssh2 Jan 15 23:48:34 host sshd[3521]: pam_unix(sshd:auth): check pass; user unknown Jan 15 23:48:35 host sshd[3521]: Failed password for invalid user eq from 194.110.203.109 port 45768 ssh2 Jan 15 23:48:38 host sshd[3521]: pam_unix(sshd:auth): check pass; user unknown Jan 15 23:48:41 host sshd[3521]: Failed password for invalid user eq from 194.110.203.109 port 45768 ssh2 Jan 15 23:48:44 host sshd[3521]: Connection closed by 194.110.203.109 port 45768 [preauth] Jan 15 23:48:44 host sshd[3521]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 15 23:51:45 host sshd[4027]: User root from 152.32.226.121 not allowed because not listed in AllowUsers Jan 15 23:51:45 host sshd[4027]: input_userauth_request: invalid user root [preauth] Jan 15 23:51:45 host unix_chkpwd[4029]: password check failed for user (root) Jan 15 23:51:45 host sshd[4027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.226.121 user=root Jan 15 23:51:45 host sshd[4027]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:51:47 host sshd[4027]: Failed password for invalid user root from 152.32.226.121 port 21688 ssh2 Jan 15 23:51:47 host sshd[4027]: Received disconnect from 152.32.226.121 port 21688:11: Bye Bye [preauth] Jan 15 23:51:47 host sshd[4027]: Disconnected from 152.32.226.121 port 21688 [preauth] Jan 15 23:54:18 host sshd[4294]: User root from 152.32.226.121 not allowed because not listed in AllowUsers Jan 15 23:54:18 host sshd[4294]: input_userauth_request: invalid user root [preauth] Jan 15 23:54:18 host unix_chkpwd[4296]: password check failed for user (root) Jan 15 23:54:18 host sshd[4294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.226.121 user=root Jan 15 23:54:18 host sshd[4294]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:54:20 host sshd[4294]: Failed password for invalid user root from 152.32.226.121 port 14144 ssh2 Jan 15 23:54:30 host sshd[4361]: User root from 173.201.188.226 not allowed because not listed in AllowUsers Jan 15 23:54:30 host sshd[4361]: input_userauth_request: invalid user root [preauth] Jan 15 23:54:31 host unix_chkpwd[4365]: password check failed for user (root) Jan 15 23:54:31 host sshd[4361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.201.188.226 user=root Jan 15 23:54:31 host sshd[4361]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:54:33 host sshd[4361]: Failed password for invalid user root from 173.201.188.226 port 37788 ssh2 Jan 15 23:54:33 host sshd[4361]: Received disconnect from 173.201.188.226 port 37788:11: Bye Bye [preauth] Jan 15 23:54:33 host sshd[4361]: Disconnected from 173.201.188.226 port 37788 [preauth] Jan 15 23:55:01 host sshd[4397]: User root from 189.225.33.149 not allowed because not listed in AllowUsers Jan 15 23:55:01 host sshd[4397]: input_userauth_request: invalid user root [preauth] Jan 15 23:55:01 host unix_chkpwd[4417]: password check failed for user (root) Jan 15 23:55:01 host sshd[4397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.225.33.149 user=root Jan 15 23:55:01 host sshd[4397]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:55:04 host sshd[4397]: Failed password for invalid user root from 189.225.33.149 port 54054 ssh2 Jan 15 23:55:04 host sshd[4397]: Received disconnect from 189.225.33.149 port 54054:11: Bye Bye [preauth] Jan 15 23:55:04 host sshd[4397]: Disconnected from 189.225.33.149 port 54054 [preauth] Jan 15 23:55:18 host sshd[4441]: User root from 164.70.92.9 not allowed because not listed in AllowUsers Jan 15 23:55:18 host sshd[4441]: input_userauth_request: invalid user root [preauth] Jan 15 23:55:18 host unix_chkpwd[4444]: password check failed for user (root) Jan 15 23:55:18 host sshd[4441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.70.92.9 user=root Jan 15 23:55:18 host sshd[4441]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:55:20 host sshd[4441]: Failed password for invalid user root from 164.70.92.9 port 47572 ssh2 Jan 15 23:55:20 host sshd[4441]: Received disconnect from 164.70.92.9 port 47572:11: Bye Bye [preauth] Jan 15 23:55:20 host sshd[4441]: Disconnected from 164.70.92.9 port 47572 [preauth] Jan 15 23:55:26 host sshd[4458]: User root from 211.224.105.95 not allowed because not listed in AllowUsers Jan 15 23:55:26 host sshd[4458]: input_userauth_request: invalid user root [preauth] Jan 15 23:55:26 host unix_chkpwd[4464]: password check failed for user (root) Jan 15 23:55:26 host sshd[4458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.224.105.95 user=root Jan 15 23:55:26 host sshd[4458]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:55:29 host sshd[4458]: Failed password for invalid user root from 211.224.105.95 port 61094 ssh2 Jan 15 23:55:30 host sshd[4458]: Connection reset by 211.224.105.95 port 61094 [preauth] Jan 15 23:55:35 host sshd[4494]: Invalid user telnet from 220.135.78.157 port 38640 Jan 15 23:55:35 host sshd[4494]: input_userauth_request: invalid user telnet [preauth] Jan 15 23:55:35 host sshd[4494]: pam_unix(sshd:auth): check pass; user unknown Jan 15 23:55:35 host sshd[4494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.78.157 Jan 15 23:55:36 host sshd[4494]: Failed password for invalid user telnet from 220.135.78.157 port 38640 ssh2 Jan 15 23:55:38 host sshd[4494]: pam_unix(sshd:auth): check pass; user unknown Jan 15 23:55:40 host sshd[4494]: Failed password for invalid user telnet from 220.135.78.157 port 38640 ssh2 Jan 15 23:55:41 host sshd[4494]: Connection reset by 220.135.78.157 port 38640 [preauth] Jan 15 23:55:41 host sshd[4494]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.78.157 Jan 15 23:55:55 host sshd[4551]: User root from 174.138.18.192 not allowed because not listed in AllowUsers Jan 15 23:55:55 host sshd[4551]: input_userauth_request: invalid user root [preauth] Jan 15 23:55:55 host unix_chkpwd[4570]: password check failed for user (root) Jan 15 23:55:55 host sshd[4551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.18.192 user=root Jan 15 23:55:55 host sshd[4551]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:55:57 host sshd[4551]: Failed password for invalid user root from 174.138.18.192 port 48516 ssh2 Jan 15 23:55:57 host sshd[4551]: Received disconnect from 174.138.18.192 port 48516:11: Bye Bye [preauth] Jan 15 23:55:57 host sshd[4551]: Disconnected from 174.138.18.192 port 48516 [preauth] Jan 15 23:56:00 host sshd[4650]: User root from 103.165.78.179 not allowed because not listed in AllowUsers Jan 15 23:56:00 host sshd[4650]: input_userauth_request: invalid user root [preauth] Jan 15 23:56:00 host unix_chkpwd[4652]: password check failed for user (root) Jan 15 23:56:00 host sshd[4650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.165.78.179 user=root Jan 15 23:56:00 host sshd[4650]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:56:03 host sshd[4650]: Failed password for invalid user root from 103.165.78.179 port 37768 ssh2 Jan 15 23:56:03 host sshd[4650]: Received disconnect from 103.165.78.179 port 37768:11: Bye Bye [preauth] Jan 15 23:56:03 host sshd[4650]: Disconnected from 103.165.78.179 port 37768 [preauth] Jan 15 23:56:05 host sshd[4673]: User root from 41.185.26.240 not allowed because not listed in AllowUsers Jan 15 23:56:05 host sshd[4673]: input_userauth_request: invalid user root [preauth] Jan 15 23:56:05 host unix_chkpwd[4677]: password check failed for user (root) Jan 15 23:56:05 host sshd[4673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.185.26.240 user=root Jan 15 23:56:05 host sshd[4673]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:56:07 host sshd[4673]: Failed password for invalid user root from 41.185.26.240 port 53172 ssh2 Jan 15 23:56:07 host sshd[4673]: Received disconnect from 41.185.26.240 port 53172:11: Bye Bye [preauth] Jan 15 23:56:07 host sshd[4673]: Disconnected from 41.185.26.240 port 53172 [preauth] Jan 15 23:56:09 host sshd[4680]: User root from 139.59.146.144 not allowed because not listed in AllowUsers Jan 15 23:56:09 host sshd[4680]: input_userauth_request: invalid user root [preauth] Jan 15 23:56:09 host unix_chkpwd[4683]: password check failed for user (root) Jan 15 23:56:09 host sshd[4680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.146.144 user=root Jan 15 23:56:09 host sshd[4680]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:56:12 host sshd[4680]: Failed password for invalid user root from 139.59.146.144 port 59246 ssh2 Jan 15 23:56:12 host sshd[4680]: Received disconnect from 139.59.146.144 port 59246:11: Bye Bye [preauth] Jan 15 23:56:12 host sshd[4680]: Disconnected from 139.59.146.144 port 59246 [preauth] Jan 15 23:57:11 host sshd[4795]: User root from 160.153.252.142 not allowed because not listed in AllowUsers Jan 15 23:57:11 host sshd[4795]: input_userauth_request: invalid user root [preauth] Jan 15 23:57:11 host unix_chkpwd[4798]: password check failed for user (root) Jan 15 23:57:11 host sshd[4795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.153.252.142 user=root Jan 15 23:57:11 host sshd[4795]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:57:11 host sshd[4791]: User root from 173.201.188.226 not allowed because not listed in AllowUsers Jan 15 23:57:11 host sshd[4791]: input_userauth_request: invalid user root [preauth] Jan 15 23:57:11 host unix_chkpwd[4799]: password check failed for user (root) Jan 15 23:57:11 host sshd[4791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.201.188.226 user=root Jan 15 23:57:11 host sshd[4791]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:57:13 host sshd[4795]: Failed password for invalid user root from 160.153.252.142 port 58676 ssh2 Jan 15 23:57:13 host sshd[4791]: Failed password for invalid user root from 173.201.188.226 port 40602 ssh2 Jan 15 23:57:13 host sshd[4795]: Received disconnect from 160.153.252.142 port 58676:11: Bye Bye [preauth] Jan 15 23:57:13 host sshd[4795]: Disconnected from 160.153.252.142 port 58676 [preauth] Jan 15 23:57:13 host sshd[4791]: Received disconnect from 173.201.188.226 port 40602:11: Bye Bye [preauth] Jan 15 23:57:13 host sshd[4791]: Disconnected from 173.201.188.226 port 40602 [preauth] Jan 15 23:58:42 host sshd[4981]: User root from 160.153.252.142 not allowed because not listed in AllowUsers Jan 15 23:58:42 host sshd[4981]: input_userauth_request: invalid user root [preauth] Jan 15 23:58:42 host unix_chkpwd[4986]: password check failed for user (root) Jan 15 23:58:42 host sshd[4981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.153.252.142 user=root Jan 15 23:58:42 host sshd[4981]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:58:42 host sshd[4984]: User root from 164.70.92.9 not allowed because not listed in AllowUsers Jan 15 23:58:42 host sshd[4984]: input_userauth_request: invalid user root [preauth] Jan 15 23:58:42 host unix_chkpwd[4987]: password check failed for user (root) Jan 15 23:58:42 host sshd[4984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.70.92.9 user=root Jan 15 23:58:42 host sshd[4984]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:58:43 host sshd[4981]: Failed password for invalid user root from 160.153.252.142 port 55264 ssh2 Jan 15 23:58:43 host sshd[4984]: Failed password for invalid user root from 164.70.92.9 port 60584 ssh2 Jan 15 23:58:44 host sshd[4981]: Received disconnect from 160.153.252.142 port 55264:11: Bye Bye [preauth] Jan 15 23:58:44 host sshd[4981]: Disconnected from 160.153.252.142 port 55264 [preauth] Jan 15 23:58:44 host sshd[4984]: Received disconnect from 164.70.92.9 port 60584:11: Bye Bye [preauth] Jan 15 23:58:44 host sshd[4984]: Disconnected from 164.70.92.9 port 60584 [preauth] Jan 15 23:58:50 host sshd[5065]: User root from 189.225.33.149 not allowed because not listed in AllowUsers Jan 15 23:58:50 host sshd[5065]: input_userauth_request: invalid user root [preauth] Jan 15 23:58:50 host unix_chkpwd[5070]: password check failed for user (root) Jan 15 23:58:50 host sshd[5065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.225.33.149 user=root Jan 15 23:58:50 host sshd[5065]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:58:52 host sshd[5065]: Failed password for invalid user root from 189.225.33.149 port 41382 ssh2 Jan 15 23:58:53 host sshd[5065]: Received disconnect from 189.225.33.149 port 41382:11: Bye Bye [preauth] Jan 15 23:58:53 host sshd[5065]: Disconnected from 189.225.33.149 port 41382 [preauth] Jan 15 23:59:26 host sshd[5155]: User root from 103.165.78.179 not allowed because not listed in AllowUsers Jan 15 23:59:26 host sshd[5155]: input_userauth_request: invalid user root [preauth] Jan 15 23:59:26 host unix_chkpwd[5157]: password check failed for user (root) Jan 15 23:59:26 host sshd[5155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.165.78.179 user=root Jan 15 23:59:26 host sshd[5155]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:59:26 host sshd[5153]: User root from 139.59.146.144 not allowed because not listed in AllowUsers Jan 15 23:59:26 host sshd[5153]: input_userauth_request: invalid user root [preauth] Jan 15 23:59:26 host unix_chkpwd[5159]: password check failed for user (root) Jan 15 23:59:26 host sshd[5153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.146.144 user=root Jan 15 23:59:26 host sshd[5153]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:59:28 host sshd[5155]: Failed password for invalid user root from 103.165.78.179 port 37910 ssh2 Jan 15 23:59:28 host sshd[5155]: Received disconnect from 103.165.78.179 port 37910:11: Bye Bye [preauth] Jan 15 23:59:28 host sshd[5155]: Disconnected from 103.165.78.179 port 37910 [preauth] Jan 15 23:59:28 host sshd[5153]: Failed password for invalid user root from 139.59.146.144 port 53494 ssh2 Jan 15 23:59:28 host sshd[5153]: Received disconnect from 139.59.146.144 port 53494:11: Bye Bye [preauth] Jan 15 23:59:28 host sshd[5153]: Disconnected from 139.59.146.144 port 53494 [preauth] Jan 15 23:59:31 host sshd[5183]: User root from 41.185.26.240 not allowed because not listed in AllowUsers Jan 15 23:59:31 host sshd[5183]: input_userauth_request: invalid user root [preauth] Jan 15 23:59:31 host unix_chkpwd[5247]: password check failed for user (root) Jan 15 23:59:31 host sshd[5183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.185.26.240 user=root Jan 15 23:59:31 host sshd[5183]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 15 23:59:32 host sshd[5183]: Failed password for invalid user root from 41.185.26.240 port 60782 ssh2 Jan 15 23:59:33 host sshd[5183]: Received disconnect from 41.185.26.240 port 60782:11: Bye Bye [preauth] Jan 15 23:59:33 host sshd[5183]: Disconnected from 41.185.26.240 port 60782 [preauth] Jan 16 00:00:57 host sshd[5471]: Invalid user admin from 103.147.142.204 port 60904 Jan 16 00:00:57 host sshd[5471]: input_userauth_request: invalid user admin [preauth] Jan 16 00:00:59 host sshd[5471]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:00:59 host sshd[5471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.142.204 Jan 16 00:01:01 host sshd[5471]: Failed password for invalid user admin from 103.147.142.204 port 60904 ssh2 Jan 16 00:01:04 host sshd[5471]: Connection closed by 103.147.142.204 port 60904 [preauth] Jan 16 00:01:42 host sshd[5698]: Invalid user vadmin from 60.249.95.90 port 33591 Jan 16 00:01:42 host sshd[5698]: input_userauth_request: invalid user vadmin [preauth] Jan 16 00:01:42 host sshd[5698]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:01:42 host sshd[5698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.249.95.90 Jan 16 00:01:44 host sshd[5698]: Failed password for invalid user vadmin from 60.249.95.90 port 33591 ssh2 Jan 16 00:01:44 host sshd[5698]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:01:46 host sshd[5698]: Failed password for invalid user vadmin from 60.249.95.90 port 33591 ssh2 Jan 16 00:01:47 host sshd[5698]: Failed password for invalid user vadmin from 60.249.95.90 port 33591 ssh2 Jan 16 00:02:03 host sshd[5698]: Connection closed by 60.249.95.90 port 33591 [preauth] Jan 16 00:02:03 host sshd[5698]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.249.95.90 Jan 16 00:05:05 host sshd[6090]: User root from 146.19.24.89 not allowed because not listed in AllowUsers Jan 16 00:05:05 host sshd[6090]: input_userauth_request: invalid user root [preauth] Jan 16 00:05:05 host unix_chkpwd[6094]: password check failed for user (root) Jan 16 00:05:05 host sshd[6090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.19.24.89 user=root Jan 16 00:05:05 host sshd[6090]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:05:07 host sshd[6090]: Failed password for invalid user root from 146.19.24.89 port 52806 ssh2 Jan 16 00:05:07 host sshd[6090]: Received disconnect from 146.19.24.89 port 52806:11: Bye Bye [preauth] Jan 16 00:05:07 host sshd[6090]: Disconnected from 146.19.24.89 port 52806 [preauth] Jan 16 00:05:11 host sshd[6099]: User root from 196.11.86.104 not allowed because not listed in AllowUsers Jan 16 00:05:11 host sshd[6099]: input_userauth_request: invalid user root [preauth] Jan 16 00:05:11 host unix_chkpwd[6103]: password check failed for user (root) Jan 16 00:05:11 host sshd[6099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.11.86.104 user=root Jan 16 00:05:11 host sshd[6099]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:05:13 host sshd[6099]: Failed password for invalid user root from 196.11.86.104 port 2943 ssh2 Jan 16 00:05:13 host sshd[6099]: Received disconnect from 196.11.86.104 port 2943:11: Bye Bye [preauth] Jan 16 00:05:13 host sshd[6099]: Disconnected from 196.11.86.104 port 2943 [preauth] Jan 16 00:06:21 host sshd[6323]: User root from 159.89.194.160 not allowed because not listed in AllowUsers Jan 16 00:06:21 host sshd[6323]: input_userauth_request: invalid user root [preauth] Jan 16 00:06:21 host unix_chkpwd[6325]: password check failed for user (root) Jan 16 00:06:21 host sshd[6323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.160 user=root Jan 16 00:06:21 host sshd[6323]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:06:23 host sshd[6323]: Failed password for invalid user root from 159.89.194.160 port 47812 ssh2 Jan 16 00:06:23 host sshd[6323]: Received disconnect from 159.89.194.160 port 47812:11: Bye Bye [preauth] Jan 16 00:06:23 host sshd[6323]: Disconnected from 159.89.194.160 port 47812 [preauth] Jan 16 00:07:12 host sshd[6422]: User root from 84.201.156.194 not allowed because not listed in AllowUsers Jan 16 00:07:12 host sshd[6422]: input_userauth_request: invalid user root [preauth] Jan 16 00:07:12 host unix_chkpwd[6425]: password check failed for user (root) Jan 16 00:07:12 host sshd[6422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.156.194 user=root Jan 16 00:07:12 host sshd[6422]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:07:15 host sshd[6427]: User root from 137.184.0.243 not allowed because not listed in AllowUsers Jan 16 00:07:15 host sshd[6427]: input_userauth_request: invalid user root [preauth] Jan 16 00:07:15 host sshd[6422]: Failed password for invalid user root from 84.201.156.194 port 48908 ssh2 Jan 16 00:07:15 host unix_chkpwd[6432]: password check failed for user (root) Jan 16 00:07:15 host sshd[6427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.0.243 user=root Jan 16 00:07:15 host sshd[6427]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:07:15 host sshd[6422]: Received disconnect from 84.201.156.194 port 48908:11: Bye Bye [preauth] Jan 16 00:07:15 host sshd[6422]: Disconnected from 84.201.156.194 port 48908 [preauth] Jan 16 00:07:16 host sshd[6427]: Failed password for invalid user root from 137.184.0.243 port 40688 ssh2 Jan 16 00:07:17 host sshd[6427]: Received disconnect from 137.184.0.243 port 40688:11: Bye Bye [preauth] Jan 16 00:07:17 host sshd[6427]: Disconnected from 137.184.0.243 port 40688 [preauth] Jan 16 00:07:17 host sshd[6437]: User root from 51.91.254.109 not allowed because not listed in AllowUsers Jan 16 00:07:17 host sshd[6437]: input_userauth_request: invalid user root [preauth] Jan 16 00:07:17 host unix_chkpwd[6440]: password check failed for user (root) Jan 16 00:07:17 host sshd[6437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.254.109 user=root Jan 16 00:07:17 host sshd[6437]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:07:19 host sshd[6437]: Failed password for invalid user root from 51.91.254.109 port 43974 ssh2 Jan 16 00:07:20 host sshd[6437]: Received disconnect from 51.91.254.109 port 43974:11: Bye Bye [preauth] Jan 16 00:07:20 host sshd[6437]: Disconnected from 51.91.254.109 port 43974 [preauth] Jan 16 00:07:25 host sshd[6434]: Connection closed by 157.245.252.5 port 37438 [preauth] Jan 16 00:07:35 host sshd[6476]: User root from 51.68.94.192 not allowed because not listed in AllowUsers Jan 16 00:07:35 host sshd[6476]: input_userauth_request: invalid user root [preauth] Jan 16 00:07:35 host unix_chkpwd[6480]: password check failed for user (root) Jan 16 00:07:35 host sshd[6476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.94.192 user=root Jan 16 00:07:35 host sshd[6476]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:07:37 host sshd[6476]: Failed password for invalid user root from 51.68.94.192 port 38452 ssh2 Jan 16 00:07:37 host sshd[6476]: Received disconnect from 51.68.94.192 port 38452:11: Bye Bye [preauth] Jan 16 00:07:37 host sshd[6476]: Disconnected from 51.68.94.192 port 38452 [preauth] Jan 16 00:07:39 host sshd[6484]: User root from 51.75.124.212 not allowed because not listed in AllowUsers Jan 16 00:07:39 host sshd[6484]: input_userauth_request: invalid user root [preauth] Jan 16 00:07:39 host unix_chkpwd[6488]: password check failed for user (root) Jan 16 00:07:39 host sshd[6484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.124.212 user=root Jan 16 00:07:39 host sshd[6484]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:07:41 host sshd[6484]: Failed password for invalid user root from 51.75.124.212 port 58082 ssh2 Jan 16 00:07:41 host sshd[6484]: Received disconnect from 51.75.124.212 port 58082:11: Bye Bye [preauth] Jan 16 00:07:41 host sshd[6484]: Disconnected from 51.75.124.212 port 58082 [preauth] Jan 16 00:08:18 host sshd[6544]: User root from 149.7.16.55 not allowed because not listed in AllowUsers Jan 16 00:08:18 host sshd[6544]: input_userauth_request: invalid user root [preauth] Jan 16 00:08:18 host unix_chkpwd[6549]: password check failed for user (root) Jan 16 00:08:18 host sshd[6544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.7.16.55 user=root Jan 16 00:08:18 host sshd[6544]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:08:21 host sshd[6544]: Failed password for invalid user root from 149.7.16.55 port 36428 ssh2 Jan 16 00:08:21 host sshd[6544]: Received disconnect from 149.7.16.55 port 36428:11: Bye Bye [preauth] Jan 16 00:08:21 host sshd[6544]: Disconnected from 149.7.16.55 port 36428 [preauth] Jan 16 00:08:28 host sshd[6567]: User root from 103.161.150.82 not allowed because not listed in AllowUsers Jan 16 00:08:28 host sshd[6567]: input_userauth_request: invalid user root [preauth] Jan 16 00:08:28 host unix_chkpwd[6570]: password check failed for user (root) Jan 16 00:08:28 host sshd[6567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.161.150.82 user=root Jan 16 00:08:28 host sshd[6567]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:08:30 host sshd[6567]: Failed password for invalid user root from 103.161.150.82 port 46846 ssh2 Jan 16 00:08:30 host sshd[6567]: Received disconnect from 103.161.150.82 port 46846:11: Bye Bye [preauth] Jan 16 00:08:30 host sshd[6567]: Disconnected from 103.161.150.82 port 46846 [preauth] Jan 16 00:08:44 host sshd[6614]: User root from 51.83.27.205 not allowed because not listed in AllowUsers Jan 16 00:08:44 host sshd[6614]: input_userauth_request: invalid user root [preauth] Jan 16 00:08:44 host unix_chkpwd[6616]: password check failed for user (root) Jan 16 00:08:44 host sshd[6614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.27.205 user=root Jan 16 00:08:44 host sshd[6614]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:08:46 host sshd[6614]: Failed password for invalid user root from 51.83.27.205 port 50668 ssh2 Jan 16 00:08:46 host sshd[6614]: Received disconnect from 51.83.27.205 port 50668:11: Bye Bye [preauth] Jan 16 00:08:46 host sshd[6614]: Disconnected from 51.83.27.205 port 50668 [preauth] Jan 16 00:08:47 host sshd[6620]: User root from 203.113.167.3 not allowed because not listed in AllowUsers Jan 16 00:08:47 host sshd[6620]: input_userauth_request: invalid user root [preauth] Jan 16 00:08:47 host unix_chkpwd[6623]: password check failed for user (root) Jan 16 00:08:47 host sshd[6620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.113.167.3 user=root Jan 16 00:08:47 host sshd[6620]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:08:48 host sshd[6618]: User root from 218.150.239.195 not allowed because not listed in AllowUsers Jan 16 00:08:48 host sshd[6618]: input_userauth_request: invalid user root [preauth] Jan 16 00:08:48 host unix_chkpwd[6625]: password check failed for user (root) Jan 16 00:08:48 host sshd[6618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.150.239.195 user=root Jan 16 00:08:48 host sshd[6618]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:08:49 host sshd[6620]: Failed password for invalid user root from 203.113.167.3 port 59208 ssh2 Jan 16 00:08:49 host sshd[6620]: Received disconnect from 203.113.167.3 port 59208:11: Bye Bye [preauth] Jan 16 00:08:49 host sshd[6620]: Disconnected from 203.113.167.3 port 59208 [preauth] Jan 16 00:08:50 host sshd[6618]: Failed password for invalid user root from 218.150.239.195 port 60430 ssh2 Jan 16 00:08:50 host unix_chkpwd[6629]: password check failed for user (root) Jan 16 00:08:50 host sshd[6618]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:08:52 host sshd[6618]: Failed password for invalid user root from 218.150.239.195 port 60430 ssh2 Jan 16 00:08:53 host sshd[6618]: Connection reset by 218.150.239.195 port 60430 [preauth] Jan 16 00:08:53 host sshd[6618]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.150.239.195 user=root Jan 16 00:09:46 host sshd[6723]: User root from 138.2.123.176 not allowed because not listed in AllowUsers Jan 16 00:09:46 host sshd[6723]: input_userauth_request: invalid user root [preauth] Jan 16 00:09:46 host unix_chkpwd[6725]: password check failed for user (root) Jan 16 00:09:46 host sshd[6723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.123.176 user=root Jan 16 00:09:46 host sshd[6723]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:09:48 host sshd[6723]: Failed password for invalid user root from 138.2.123.176 port 43654 ssh2 Jan 16 00:09:48 host sshd[6723]: Received disconnect from 138.2.123.176 port 43654:11: Bye Bye [preauth] Jan 16 00:09:48 host sshd[6723]: Disconnected from 138.2.123.176 port 43654 [preauth] Jan 16 00:10:45 host sshd[6861]: User root from 145.239.90.141 not allowed because not listed in AllowUsers Jan 16 00:10:45 host sshd[6861]: input_userauth_request: invalid user root [preauth] Jan 16 00:10:45 host unix_chkpwd[6864]: password check failed for user (root) Jan 16 00:10:45 host sshd[6861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.90.141 user=root Jan 16 00:10:45 host sshd[6861]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:10:46 host sshd[6861]: Failed password for invalid user root from 145.239.90.141 port 48986 ssh2 Jan 16 00:10:46 host sshd[6861]: Received disconnect from 145.239.90.141 port 48986:11: Bye Bye [preauth] Jan 16 00:10:46 host sshd[6861]: Disconnected from 145.239.90.141 port 48986 [preauth] Jan 16 00:10:56 host sshd[6877]: User root from 146.19.24.89 not allowed because not listed in AllowUsers Jan 16 00:10:56 host sshd[6877]: input_userauth_request: invalid user root [preauth] Jan 16 00:10:56 host unix_chkpwd[6884]: password check failed for user (root) Jan 16 00:10:56 host sshd[6877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.19.24.89 user=root Jan 16 00:10:56 host sshd[6877]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:10:57 host sshd[6879]: User root from 69.49.245.238 not allowed because not listed in AllowUsers Jan 16 00:10:57 host sshd[6879]: input_userauth_request: invalid user root [preauth] Jan 16 00:10:57 host sshd[6881]: User root from 70.37.75.157 not allowed because not listed in AllowUsers Jan 16 00:10:57 host sshd[6881]: input_userauth_request: invalid user root [preauth] Jan 16 00:10:57 host unix_chkpwd[6885]: password check failed for user (root) Jan 16 00:10:57 host sshd[6879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.49.245.238 user=root Jan 16 00:10:57 host sshd[6879]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:10:57 host unix_chkpwd[6886]: password check failed for user (root) Jan 16 00:10:57 host sshd[6881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.37.75.157 user=root Jan 16 00:10:57 host sshd[6881]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:10:58 host sshd[6877]: Failed password for invalid user root from 146.19.24.89 port 55272 ssh2 Jan 16 00:10:58 host sshd[6877]: Received disconnect from 146.19.24.89 port 55272:11: Bye Bye [preauth] Jan 16 00:10:58 host sshd[6877]: Disconnected from 146.19.24.89 port 55272 [preauth] Jan 16 00:10:59 host sshd[6879]: Failed password for invalid user root from 69.49.245.238 port 46630 ssh2 Jan 16 00:10:59 host sshd[6881]: Failed password for invalid user root from 70.37.75.157 port 58482 ssh2 Jan 16 00:10:59 host sshd[6879]: Received disconnect from 69.49.245.238 port 46630:11: Bye Bye [preauth] Jan 16 00:10:59 host sshd[6879]: Disconnected from 69.49.245.238 port 46630 [preauth] Jan 16 00:10:59 host sshd[6881]: Received disconnect from 70.37.75.157 port 58482:11: Bye Bye [preauth] Jan 16 00:10:59 host sshd[6881]: Disconnected from 70.37.75.157 port 58482 [preauth] Jan 16 00:11:20 host sshd[7053]: User root from 51.68.94.192 not allowed because not listed in AllowUsers Jan 16 00:11:20 host sshd[7053]: input_userauth_request: invalid user root [preauth] Jan 16 00:11:20 host unix_chkpwd[7055]: password check failed for user (root) Jan 16 00:11:20 host sshd[7053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.94.192 user=root Jan 16 00:11:20 host sshd[7053]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:11:22 host sshd[7053]: Failed password for invalid user root from 51.68.94.192 port 60074 ssh2 Jan 16 00:11:22 host sshd[7053]: Received disconnect from 51.68.94.192 port 60074:11: Bye Bye [preauth] Jan 16 00:11:22 host sshd[7053]: Disconnected from 51.68.94.192 port 60074 [preauth] Jan 16 00:11:35 host sshd[7128]: User root from 51.91.254.109 not allowed because not listed in AllowUsers Jan 16 00:11:35 host sshd[7128]: input_userauth_request: invalid user root [preauth] Jan 16 00:11:35 host unix_chkpwd[7131]: password check failed for user (root) Jan 16 00:11:35 host sshd[7128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.254.109 user=root Jan 16 00:11:35 host sshd[7128]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:11:37 host sshd[7128]: Failed password for invalid user root from 51.91.254.109 port 56778 ssh2 Jan 16 00:11:37 host sshd[7128]: Received disconnect from 51.91.254.109 port 56778:11: Bye Bye [preauth] Jan 16 00:11:37 host sshd[7128]: Disconnected from 51.91.254.109 port 56778 [preauth] Jan 16 00:11:39 host sshd[7135]: User root from 149.7.16.55 not allowed because not listed in AllowUsers Jan 16 00:11:39 host sshd[7135]: input_userauth_request: invalid user root [preauth] Jan 16 00:11:39 host unix_chkpwd[7156]: password check failed for user (root) Jan 16 00:11:39 host sshd[7135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.7.16.55 user=root Jan 16 00:11:39 host sshd[7135]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:11:42 host sshd[7135]: Failed password for invalid user root from 149.7.16.55 port 47566 ssh2 Jan 16 00:11:42 host sshd[7135]: Received disconnect from 149.7.16.55 port 47566:11: Bye Bye [preauth] Jan 16 00:11:42 host sshd[7135]: Disconnected from 149.7.16.55 port 47566 [preauth] Jan 16 00:11:45 host sshd[7176]: User root from 196.11.86.104 not allowed because not listed in AllowUsers Jan 16 00:11:45 host sshd[7176]: input_userauth_request: invalid user root [preauth] Jan 16 00:11:45 host unix_chkpwd[7201]: password check failed for user (root) Jan 16 00:11:45 host sshd[7176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.11.86.104 user=root Jan 16 00:11:45 host sshd[7176]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:11:45 host sshd[7184]: User root from 51.83.27.205 not allowed because not listed in AllowUsers Jan 16 00:11:45 host sshd[7184]: input_userauth_request: invalid user root [preauth] Jan 16 00:11:45 host unix_chkpwd[7208]: password check failed for user (root) Jan 16 00:11:45 host sshd[7184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.27.205 user=root Jan 16 00:11:45 host sshd[7184]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:11:47 host sshd[7176]: Failed password for invalid user root from 196.11.86.104 port 1830 ssh2 Jan 16 00:11:47 host sshd[7184]: Failed password for invalid user root from 51.83.27.205 port 51956 ssh2 Jan 16 00:11:47 host sshd[7184]: Received disconnect from 51.83.27.205 port 51956:11: Bye Bye [preauth] Jan 16 00:11:47 host sshd[7184]: Disconnected from 51.83.27.205 port 51956 [preauth] Jan 16 00:11:47 host sshd[7176]: Received disconnect from 196.11.86.104 port 1830:11: Bye Bye [preauth] Jan 16 00:11:47 host sshd[7176]: Disconnected from 196.11.86.104 port 1830 [preauth] Jan 16 00:12:02 host sshd[7306]: User root from 84.201.156.194 not allowed because not listed in AllowUsers Jan 16 00:12:02 host sshd[7306]: input_userauth_request: invalid user root [preauth] Jan 16 00:12:02 host unix_chkpwd[7311]: password check failed for user (root) Jan 16 00:12:02 host sshd[7306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.156.194 user=root Jan 16 00:12:02 host sshd[7306]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:12:04 host sshd[7306]: Failed password for invalid user root from 84.201.156.194 port 42296 ssh2 Jan 16 00:12:04 host sshd[7306]: Received disconnect from 84.201.156.194 port 42296:11: Bye Bye [preauth] Jan 16 00:12:04 host sshd[7306]: Disconnected from 84.201.156.194 port 42296 [preauth] Jan 16 00:12:18 host sshd[7367]: User root from 51.75.124.212 not allowed because not listed in AllowUsers Jan 16 00:12:18 host sshd[7367]: input_userauth_request: invalid user root [preauth] Jan 16 00:12:18 host unix_chkpwd[7370]: password check failed for user (root) Jan 16 00:12:18 host sshd[7367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.124.212 user=root Jan 16 00:12:18 host sshd[7367]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:12:20 host sshd[7367]: Failed password for invalid user root from 51.75.124.212 port 47740 ssh2 Jan 16 00:12:27 host sshd[7408]: User root from 159.89.194.160 not allowed because not listed in AllowUsers Jan 16 00:12:27 host sshd[7408]: input_userauth_request: invalid user root [preauth] Jan 16 00:12:27 host unix_chkpwd[7410]: password check failed for user (root) Jan 16 00:12:27 host sshd[7408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.194.160 user=root Jan 16 00:12:27 host sshd[7408]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:12:29 host sshd[7408]: Failed password for invalid user root from 159.89.194.160 port 44986 ssh2 Jan 16 00:12:29 host sshd[7408]: Received disconnect from 159.89.194.160 port 44986:11: Bye Bye [preauth] Jan 16 00:12:29 host sshd[7408]: Disconnected from 159.89.194.160 port 44986 [preauth] Jan 16 00:12:36 host sshd[7472]: User root from 203.113.167.3 not allowed because not listed in AllowUsers Jan 16 00:12:36 host sshd[7472]: input_userauth_request: invalid user root [preauth] Jan 16 00:12:36 host unix_chkpwd[7475]: password check failed for user (root) Jan 16 00:12:36 host sshd[7472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.113.167.3 user=root Jan 16 00:12:36 host sshd[7472]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:12:38 host sshd[7472]: Failed password for invalid user root from 203.113.167.3 port 34906 ssh2 Jan 16 00:12:38 host sshd[7472]: Received disconnect from 203.113.167.3 port 34906:11: Bye Bye [preauth] Jan 16 00:12:38 host sshd[7472]: Disconnected from 203.113.167.3 port 34906 [preauth] Jan 16 00:12:44 host sshd[7521]: User root from 103.161.150.82 not allowed because not listed in AllowUsers Jan 16 00:12:44 host sshd[7521]: input_userauth_request: invalid user root [preauth] Jan 16 00:12:44 host unix_chkpwd[7523]: password check failed for user (root) Jan 16 00:12:44 host sshd[7521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.161.150.82 user=root Jan 16 00:12:44 host sshd[7521]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:12:46 host sshd[7521]: Failed password for invalid user root from 103.161.150.82 port 40740 ssh2 Jan 16 00:12:46 host sshd[7521]: Received disconnect from 103.161.150.82 port 40740:11: Bye Bye [preauth] Jan 16 00:12:46 host sshd[7521]: Disconnected from 103.161.150.82 port 40740 [preauth] Jan 16 00:12:51 host sshd[7547]: User root from 137.184.0.243 not allowed because not listed in AllowUsers Jan 16 00:12:51 host sshd[7547]: input_userauth_request: invalid user root [preauth] Jan 16 00:12:51 host unix_chkpwd[7562]: password check failed for user (root) Jan 16 00:12:51 host sshd[7547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.0.243 user=root Jan 16 00:12:51 host sshd[7547]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:12:53 host sshd[7547]: Failed password for invalid user root from 137.184.0.243 port 55080 ssh2 Jan 16 00:12:53 host sshd[7547]: Received disconnect from 137.184.0.243 port 55080:11: Bye Bye [preauth] Jan 16 00:12:53 host sshd[7547]: Disconnected from 137.184.0.243 port 55080 [preauth] Jan 16 00:12:55 host sshd[7567]: User root from 69.49.245.238 not allowed because not listed in AllowUsers Jan 16 00:12:55 host sshd[7567]: input_userauth_request: invalid user root [preauth] Jan 16 00:12:55 host unix_chkpwd[7591]: password check failed for user (root) Jan 16 00:12:55 host sshd[7567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.49.245.238 user=root Jan 16 00:12:55 host sshd[7567]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:12:55 host sshd[7575]: User root from 145.239.90.141 not allowed because not listed in AllowUsers Jan 16 00:12:55 host sshd[7575]: input_userauth_request: invalid user root [preauth] Jan 16 00:12:55 host unix_chkpwd[7603]: password check failed for user (root) Jan 16 00:12:55 host sshd[7575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.90.141 user=root Jan 16 00:12:55 host sshd[7575]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:12:57 host sshd[7567]: Failed password for invalid user root from 69.49.245.238 port 46350 ssh2 Jan 16 00:12:57 host sshd[7567]: Received disconnect from 69.49.245.238 port 46350:11: Bye Bye [preauth] Jan 16 00:12:57 host sshd[7567]: Disconnected from 69.49.245.238 port 46350 [preauth] Jan 16 00:12:57 host sshd[7575]: Failed password for invalid user root from 145.239.90.141 port 49102 ssh2 Jan 16 00:12:58 host sshd[7575]: Received disconnect from 145.239.90.141 port 49102:11: Bye Bye [preauth] Jan 16 00:12:58 host sshd[7575]: Disconnected from 145.239.90.141 port 49102 [preauth] Jan 16 00:14:24 host sshd[7962]: User root from 138.2.123.176 not allowed because not listed in AllowUsers Jan 16 00:14:24 host sshd[7962]: input_userauth_request: invalid user root [preauth] Jan 16 00:14:24 host unix_chkpwd[7965]: password check failed for user (root) Jan 16 00:14:24 host sshd[7962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.123.176 user=root Jan 16 00:14:24 host sshd[7962]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:14:26 host sshd[7962]: Failed password for invalid user root from 138.2.123.176 port 52092 ssh2 Jan 16 00:14:26 host sshd[7962]: Received disconnect from 138.2.123.176 port 52092:11: Bye Bye [preauth] Jan 16 00:14:26 host sshd[7962]: Disconnected from 138.2.123.176 port 52092 [preauth] Jan 16 00:14:30 host sshd[7981]: User root from 70.37.75.157 not allowed because not listed in AllowUsers Jan 16 00:14:30 host sshd[7981]: input_userauth_request: invalid user root [preauth] Jan 16 00:14:30 host unix_chkpwd[8047]: password check failed for user (root) Jan 16 00:14:30 host sshd[7981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.37.75.157 user=root Jan 16 00:14:30 host sshd[7981]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:14:31 host sshd[7981]: Failed password for invalid user root from 70.37.75.157 port 47088 ssh2 Jan 16 00:14:32 host sshd[7981]: Received disconnect from 70.37.75.157 port 47088:11: Bye Bye [preauth] Jan 16 00:14:32 host sshd[7981]: Disconnected from 70.37.75.157 port 47088 [preauth] Jan 16 00:16:45 host sshd[9148]: Connection reset by 118.169.137.92 port 33425 [preauth] Jan 16 00:17:08 host sshd[9194]: User root from 61.93.240.18 not allowed because not listed in AllowUsers Jan 16 00:17:08 host sshd[9194]: input_userauth_request: invalid user root [preauth] Jan 16 00:17:08 host unix_chkpwd[9196]: password check failed for user (root) Jan 16 00:17:08 host sshd[9194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.18 user=root Jan 16 00:17:08 host sshd[9194]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:17:10 host sshd[9194]: Failed password for invalid user root from 61.93.240.18 port 53844 ssh2 Jan 16 00:17:10 host sshd[9194]: Received disconnect from 61.93.240.18 port 53844:11: Bye Bye [preauth] Jan 16 00:17:10 host sshd[9194]: Disconnected from 61.93.240.18 port 53844 [preauth] Jan 16 00:17:25 host sshd[9211]: User root from 27.50.54.52 not allowed because not listed in AllowUsers Jan 16 00:17:25 host sshd[9211]: input_userauth_request: invalid user root [preauth] Jan 16 00:17:25 host unix_chkpwd[9213]: password check failed for user (root) Jan 16 00:17:25 host sshd[9211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.50.54.52 user=root Jan 16 00:17:25 host sshd[9211]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:17:27 host sshd[9215]: User root from 211.20.14.156 not allowed because not listed in AllowUsers Jan 16 00:17:27 host sshd[9215]: input_userauth_request: invalid user root [preauth] Jan 16 00:17:27 host unix_chkpwd[9219]: password check failed for user (root) Jan 16 00:17:27 host sshd[9215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.20.14.156 user=root Jan 16 00:17:27 host sshd[9215]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:17:27 host sshd[9211]: Failed password for invalid user root from 27.50.54.52 port 39100 ssh2 Jan 16 00:17:27 host sshd[9211]: Received disconnect from 27.50.54.52 port 39100:11: Bye Bye [preauth] Jan 16 00:17:27 host sshd[9211]: Disconnected from 27.50.54.52 port 39100 [preauth] Jan 16 00:17:28 host sshd[9215]: Failed password for invalid user root from 211.20.14.156 port 51688 ssh2 Jan 16 00:17:28 host sshd[9215]: Received disconnect from 211.20.14.156 port 51688:11: Bye Bye [preauth] Jan 16 00:17:28 host sshd[9215]: Disconnected from 211.20.14.156 port 51688 [preauth] Jan 16 00:18:18 host sshd[9310]: User root from 140.207.232.13 not allowed because not listed in AllowUsers Jan 16 00:18:18 host sshd[9310]: input_userauth_request: invalid user root [preauth] Jan 16 00:18:18 host unix_chkpwd[9313]: password check failed for user (root) Jan 16 00:18:18 host sshd[9310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.207.232.13 user=root Jan 16 00:18:18 host sshd[9310]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:18:20 host sshd[9310]: Failed password for invalid user root from 140.207.232.13 port 41108 ssh2 Jan 16 00:18:20 host sshd[9310]: Received disconnect from 140.207.232.13 port 41108:11: Bye Bye [preauth] Jan 16 00:18:20 host sshd[9310]: Disconnected from 140.207.232.13 port 41108 [preauth] Jan 16 00:19:09 host sshd[9516]: Invalid user admin from 107.211.202.196 port 60153 Jan 16 00:19:09 host sshd[9516]: input_userauth_request: invalid user admin [preauth] Jan 16 00:19:09 host sshd[9516]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:19:09 host sshd[9516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.211.202.196 Jan 16 00:19:11 host sshd[9516]: Failed password for invalid user admin from 107.211.202.196 port 60153 ssh2 Jan 16 00:19:11 host sshd[9516]: Connection closed by 107.211.202.196 port 60153 [preauth] Jan 16 00:19:12 host sshd[9522]: Connection closed by 172.105.128.12 port 51944 [preauth] Jan 16 00:19:14 host sshd[9526]: Connection closed by 172.105.128.12 port 51960 [preauth] Jan 16 00:19:15 host sshd[9530]: Connection closed by 172.105.128.12 port 51966 [preauth] Jan 16 00:19:25 host sshd[9542]: User root from 89.40.72.31 not allowed because not listed in AllowUsers Jan 16 00:19:25 host sshd[9542]: input_userauth_request: invalid user root [preauth] Jan 16 00:19:25 host unix_chkpwd[9545]: password check failed for user (root) Jan 16 00:19:25 host sshd[9542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.40.72.31 user=root Jan 16 00:19:25 host sshd[9542]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:19:28 host sshd[9542]: Failed password for invalid user root from 89.40.72.31 port 43852 ssh2 Jan 16 00:19:28 host sshd[9542]: Received disconnect from 89.40.72.31 port 43852:11: Bye Bye [preauth] Jan 16 00:19:28 host sshd[9542]: Disconnected from 89.40.72.31 port 43852 [preauth] Jan 16 00:21:11 host sshd[9770]: User root from 61.93.240.18 not allowed because not listed in AllowUsers Jan 16 00:21:11 host sshd[9770]: input_userauth_request: invalid user root [preauth] Jan 16 00:21:11 host unix_chkpwd[9773]: password check failed for user (root) Jan 16 00:21:11 host sshd[9770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.93.240.18 user=root Jan 16 00:21:11 host sshd[9770]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:21:14 host sshd[9770]: Failed password for invalid user root from 61.93.240.18 port 46834 ssh2 Jan 16 00:21:14 host sshd[9770]: Received disconnect from 61.93.240.18 port 46834:11: Bye Bye [preauth] Jan 16 00:21:14 host sshd[9770]: Disconnected from 61.93.240.18 port 46834 [preauth] Jan 16 00:21:30 host sshd[9845]: User root from 42.200.11.54 not allowed because not listed in AllowUsers Jan 16 00:21:30 host sshd[9845]: input_userauth_request: invalid user root [preauth] Jan 16 00:21:30 host unix_chkpwd[9847]: password check failed for user (root) Jan 16 00:21:30 host sshd[9845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.11.54 user=root Jan 16 00:21:30 host sshd[9845]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:21:32 host sshd[9845]: Failed password for invalid user root from 42.200.11.54 port 57370 ssh2 Jan 16 00:21:32 host sshd[9845]: Received disconnect from 42.200.11.54 port 57370:11: Bye Bye [preauth] Jan 16 00:21:32 host sshd[9845]: Disconnected from 42.200.11.54 port 57370 [preauth] Jan 16 00:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 00:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 00:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=keralaholi user-3=wwwresourcehunte user-4=wwwrmswll user-5=ugotscom user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=straightcurve user-13=wwwletsstalkfood user-14=bonifacegroup user-15=wwwevmhonda user-16=wwwnexidigital user-17=mrsclean user-18=palco123 user-19=gifterman user-20=phmetals user-21=kottayamcalldriv user-22=wwwkapin user-23=woodpeck user-24=disposeat user-25=remysagr user-26=wwwkmaorg user-27=pmcresources user-28=vfmassets user-29=shalinijames user-30=wwwtestugo feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 00:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 00:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-A0Nv2Sdp7qf3OvK0.~ Jan 16 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-A0Nv2Sdp7qf3OvK0.~' Jan 16 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-A0Nv2Sdp7qf3OvK0.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 00:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 00:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 00:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 00:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 00:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 00:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 00:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 00:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 00:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 00:22:41 host sshd[10222]: User root from 27.50.54.52 not allowed because not listed in AllowUsers Jan 16 00:22:41 host sshd[10222]: input_userauth_request: invalid user root [preauth] Jan 16 00:22:41 host unix_chkpwd[10224]: password check failed for user (root) Jan 16 00:22:41 host sshd[10222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.50.54.52 user=root Jan 16 00:22:41 host sshd[10222]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:22:42 host sshd[10222]: Failed password for invalid user root from 27.50.54.52 port 36592 ssh2 Jan 16 00:22:42 host sshd[10222]: Received disconnect from 27.50.54.52 port 36592:11: Bye Bye [preauth] Jan 16 00:22:42 host sshd[10222]: Disconnected from 27.50.54.52 port 36592 [preauth] Jan 16 00:22:48 host sshd[10262]: User root from 162.243.116.41 not allowed because not listed in AllowUsers Jan 16 00:22:48 host sshd[10262]: input_userauth_request: invalid user root [preauth] Jan 16 00:22:48 host unix_chkpwd[10267]: password check failed for user (root) Jan 16 00:22:48 host sshd[10262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.116.41 user=root Jan 16 00:22:48 host sshd[10262]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:22:51 host sshd[10262]: Failed password for invalid user root from 162.243.116.41 port 53526 ssh2 Jan 16 00:22:51 host sshd[10262]: Received disconnect from 162.243.116.41 port 53526:11: Bye Bye [preauth] Jan 16 00:22:51 host sshd[10262]: Disconnected from 162.243.116.41 port 53526 [preauth] Jan 16 00:23:05 host sshd[10294]: User root from 164.163.98.49 not allowed because not listed in AllowUsers Jan 16 00:23:05 host sshd[10294]: input_userauth_request: invalid user root [preauth] Jan 16 00:23:05 host unix_chkpwd[10306]: password check failed for user (root) Jan 16 00:23:05 host sshd[10294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.98.49 user=root Jan 16 00:23:05 host sshd[10294]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:23:07 host sshd[10294]: Failed password for invalid user root from 164.163.98.49 port 56806 ssh2 Jan 16 00:23:07 host sshd[10294]: Received disconnect from 164.163.98.49 port 56806:11: Bye Bye [preauth] Jan 16 00:23:07 host sshd[10294]: Disconnected from 164.163.98.49 port 56806 [preauth] Jan 16 00:23:07 host sshd[10308]: User root from 207.154.215.181 not allowed because not listed in AllowUsers Jan 16 00:23:07 host sshd[10308]: input_userauth_request: invalid user root [preauth] Jan 16 00:23:07 host unix_chkpwd[10312]: password check failed for user (root) Jan 16 00:23:07 host sshd[10308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.215.181 user=root Jan 16 00:23:07 host sshd[10308]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:23:10 host sshd[10308]: Failed password for invalid user root from 207.154.215.181 port 50988 ssh2 Jan 16 00:23:10 host sshd[10308]: Received disconnect from 207.154.215.181 port 50988:11: Bye Bye [preauth] Jan 16 00:23:10 host sshd[10308]: Disconnected from 207.154.215.181 port 50988 [preauth] Jan 16 00:23:27 host sshd[10338]: User root from 89.40.72.31 not allowed because not listed in AllowUsers Jan 16 00:23:27 host sshd[10338]: input_userauth_request: invalid user root [preauth] Jan 16 00:23:27 host unix_chkpwd[10362]: password check failed for user (root) Jan 16 00:23:27 host sshd[10338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.40.72.31 user=root Jan 16 00:23:27 host sshd[10338]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:23:29 host sshd[10338]: Failed password for invalid user root from 89.40.72.31 port 33618 ssh2 Jan 16 00:23:29 host sshd[10338]: Received disconnect from 89.40.72.31 port 33618:11: Bye Bye [preauth] Jan 16 00:23:29 host sshd[10338]: Disconnected from 89.40.72.31 port 33618 [preauth] Jan 16 00:23:36 host sshd[10502]: User root from 42.200.11.54 not allowed because not listed in AllowUsers Jan 16 00:23:36 host sshd[10502]: input_userauth_request: invalid user root [preauth] Jan 16 00:23:36 host unix_chkpwd[10508]: password check failed for user (root) Jan 16 00:23:36 host sshd[10502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.11.54 user=root Jan 16 00:23:36 host sshd[10502]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:23:38 host sshd[10502]: Failed password for invalid user root from 42.200.11.54 port 59486 ssh2 Jan 16 00:23:38 host sshd[10502]: Received disconnect from 42.200.11.54 port 59486:11: Bye Bye [preauth] Jan 16 00:23:38 host sshd[10502]: Disconnected from 42.200.11.54 port 59486 [preauth] Jan 16 00:23:47 host sshd[10556]: User root from 211.20.14.156 not allowed because not listed in AllowUsers Jan 16 00:23:47 host sshd[10556]: input_userauth_request: invalid user root [preauth] Jan 16 00:23:47 host unix_chkpwd[10560]: password check failed for user (root) Jan 16 00:23:47 host sshd[10556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.20.14.156 user=root Jan 16 00:23:47 host sshd[10556]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:23:48 host sshd[10562]: User root from 220.130.54.196 not allowed because not listed in AllowUsers Jan 16 00:23:48 host sshd[10562]: input_userauth_request: invalid user root [preauth] Jan 16 00:23:48 host unix_chkpwd[10565]: password check failed for user (root) Jan 16 00:23:48 host sshd[10562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.54.196 user=root Jan 16 00:23:48 host sshd[10562]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:23:49 host sshd[10556]: Failed password for invalid user root from 211.20.14.156 port 54297 ssh2 Jan 16 00:23:49 host sshd[10556]: Received disconnect from 211.20.14.156 port 54297:11: Bye Bye [preauth] Jan 16 00:23:49 host sshd[10556]: Disconnected from 211.20.14.156 port 54297 [preauth] Jan 16 00:23:50 host sshd[10562]: Failed password for invalid user root from 220.130.54.196 port 33057 ssh2 Jan 16 00:23:50 host sshd[10597]: User root from 103.115.24.11 not allowed because not listed in AllowUsers Jan 16 00:23:50 host sshd[10597]: input_userauth_request: invalid user root [preauth] Jan 16 00:23:50 host unix_chkpwd[10600]: password check failed for user (root) Jan 16 00:23:50 host sshd[10597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.24.11 user=root Jan 16 00:23:50 host sshd[10597]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:23:51 host unix_chkpwd[10601]: password check failed for user (root) Jan 16 00:23:51 host sshd[10562]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:23:52 host sshd[10562]: Failed password for invalid user root from 220.130.54.196 port 33057 ssh2 Jan 16 00:23:53 host unix_chkpwd[10606]: password check failed for user (root) Jan 16 00:23:53 host sshd[10562]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:23:53 host sshd[10597]: Failed password for invalid user root from 103.115.24.11 port 47298 ssh2 Jan 16 00:23:53 host sshd[10597]: Received disconnect from 103.115.24.11 port 47298:11: Bye Bye [preauth] Jan 16 00:23:53 host sshd[10597]: Disconnected from 103.115.24.11 port 47298 [preauth] Jan 16 00:23:55 host sshd[10562]: Failed password for invalid user root from 220.130.54.196 port 33057 ssh2 Jan 16 00:23:57 host sshd[10562]: Connection reset by 220.130.54.196 port 33057 [preauth] Jan 16 00:23:57 host sshd[10562]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.54.196 user=root Jan 16 00:24:26 host sshd[10723]: User root from 162.243.116.41 not allowed because not listed in AllowUsers Jan 16 00:24:26 host sshd[10723]: input_userauth_request: invalid user root [preauth] Jan 16 00:24:26 host unix_chkpwd[10727]: password check failed for user (root) Jan 16 00:24:26 host sshd[10723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.116.41 user=root Jan 16 00:24:26 host sshd[10723]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:24:28 host sshd[10723]: Failed password for invalid user root from 162.243.116.41 port 51568 ssh2 Jan 16 00:24:28 host sshd[10723]: Received disconnect from 162.243.116.41 port 51568:11: Bye Bye [preauth] Jan 16 00:24:28 host sshd[10723]: Disconnected from 162.243.116.41 port 51568 [preauth] Jan 16 00:24:39 host sshd[10814]: User root from 207.154.215.181 not allowed because not listed in AllowUsers Jan 16 00:24:39 host sshd[10814]: input_userauth_request: invalid user root [preauth] Jan 16 00:24:39 host unix_chkpwd[10817]: password check failed for user (root) Jan 16 00:24:39 host sshd[10814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.215.181 user=root Jan 16 00:24:39 host sshd[10814]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:24:40 host sshd[10814]: Failed password for invalid user root from 207.154.215.181 port 51128 ssh2 Jan 16 00:24:46 host sshd[10855]: User root from 164.163.98.49 not allowed because not listed in AllowUsers Jan 16 00:24:46 host sshd[10855]: input_userauth_request: invalid user root [preauth] Jan 16 00:24:46 host unix_chkpwd[10863]: password check failed for user (root) Jan 16 00:24:46 host sshd[10855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.163.98.49 user=root Jan 16 00:24:46 host sshd[10855]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:24:48 host sshd[10855]: Failed password for invalid user root from 164.163.98.49 port 42381 ssh2 Jan 16 00:24:48 host sshd[10855]: Received disconnect from 164.163.98.49 port 42381:11: Bye Bye [preauth] Jan 16 00:24:48 host sshd[10855]: Disconnected from 164.163.98.49 port 42381 [preauth] Jan 16 00:25:16 host sshd[10979]: User sshd from 194.169.175.102 not allowed because not listed in AllowUsers Jan 16 00:25:16 host sshd[10979]: input_userauth_request: invalid user sshd [preauth] Jan 16 00:25:16 host unix_chkpwd[10983]: password check failed for user (sshd) Jan 16 00:25:16 host sshd[10979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=sshd Jan 16 00:25:16 host sshd[10979]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sshd" Jan 16 00:25:18 host sshd[10979]: Failed password for invalid user sshd from 194.169.175.102 port 59523 ssh2 Jan 16 00:25:18 host sshd[10979]: Received disconnect from 194.169.175.102 port 59523:11: Client disconnecting normally [preauth] Jan 16 00:25:18 host sshd[10979]: Disconnected from 194.169.175.102 port 59523 [preauth] Jan 16 00:26:07 host sshd[11139]: User root from 103.115.24.11 not allowed because not listed in AllowUsers Jan 16 00:26:07 host sshd[11139]: input_userauth_request: invalid user root [preauth] Jan 16 00:26:08 host unix_chkpwd[11141]: password check failed for user (root) Jan 16 00:26:08 host sshd[11139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.24.11 user=root Jan 16 00:26:08 host sshd[11139]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:26:10 host sshd[11139]: Failed password for invalid user root from 103.115.24.11 port 52210 ssh2 Jan 16 00:26:10 host sshd[11139]: Received disconnect from 103.115.24.11 port 52210:11: Bye Bye [preauth] Jan 16 00:26:10 host sshd[11139]: Disconnected from 103.115.24.11 port 52210 [preauth] Jan 16 00:28:29 host sshd[11648]: User root from 140.207.232.13 not allowed because not listed in AllowUsers Jan 16 00:28:29 host sshd[11648]: input_userauth_request: invalid user root [preauth] Jan 16 00:28:29 host unix_chkpwd[11654]: password check failed for user (root) Jan 16 00:28:29 host sshd[11648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.207.232.13 user=root Jan 16 00:28:29 host sshd[11648]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:28:31 host sshd[11648]: Failed password for invalid user root from 140.207.232.13 port 48478 ssh2 Jan 16 00:38:15 host sshd[13603]: Invalid user engineer from 103.70.46.12 port 51875 Jan 16 00:38:15 host sshd[13603]: input_userauth_request: invalid user engineer [preauth] Jan 16 00:38:15 host sshd[13603]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:38:15 host sshd[13603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.70.46.12 Jan 16 00:38:17 host sshd[13603]: Failed password for invalid user engineer from 103.70.46.12 port 51875 ssh2 Jan 16 00:38:18 host sshd[13603]: Connection closed by 103.70.46.12 port 51875 [preauth] Jan 16 00:38:34 host sshd[13657]: Did not receive identification string from 3.38.214.0 port 37372 Jan 16 00:38:43 host sshd[13665]: Invalid user ubuntu from 3.38.214.0 port 37900 Jan 16 00:38:43 host sshd[13665]: input_userauth_request: invalid user ubuntu [preauth] Jan 16 00:38:43 host sshd[13673]: Invalid user user from 3.38.214.0 port 37890 Jan 16 00:38:43 host sshd[13673]: input_userauth_request: invalid user user [preauth] Jan 16 00:38:43 host sshd[13666]: Invalid user esuser from 3.38.214.0 port 37888 Jan 16 00:38:43 host sshd[13668]: Invalid user pi from 3.38.214.0 port 37904 Jan 16 00:38:43 host sshd[13671]: Invalid user pi from 3.38.214.0 port 37902 Jan 16 00:38:43 host sshd[13668]: input_userauth_request: invalid user pi [preauth] Jan 16 00:38:43 host sshd[13671]: input_userauth_request: invalid user pi [preauth] Jan 16 00:38:43 host sshd[13670]: Invalid user admin from 3.38.214.0 port 37886 Jan 16 00:38:43 host sshd[13670]: input_userauth_request: invalid user admin [preauth] Jan 16 00:38:43 host sshd[13666]: input_userauth_request: invalid user esuser [preauth] Jan 16 00:38:43 host sshd[13682]: Invalid user user from 3.38.214.0 port 37918 Jan 16 00:38:43 host sshd[13679]: Invalid user postgres from 3.38.214.0 port 37914 Jan 16 00:38:43 host sshd[13679]: input_userauth_request: invalid user postgres [preauth] Jan 16 00:38:43 host sshd[13685]: Invalid user test from 3.38.214.0 port 37912 Jan 16 00:38:43 host sshd[13686]: Invalid user esuser from 3.38.214.0 port 37954 Jan 16 00:38:43 host sshd[13684]: User root from 3.38.214.0 not allowed because not listed in AllowUsers Jan 16 00:38:43 host sshd[13686]: input_userauth_request: invalid user esuser [preauth] Jan 16 00:38:43 host sshd[13682]: input_userauth_request: invalid user user [preauth] Jan 16 00:38:43 host sshd[13680]: Invalid user test from 3.38.214.0 port 37908 Jan 16 00:38:43 host sshd[13680]: input_userauth_request: invalid user test [preauth] Jan 16 00:38:43 host sshd[13683]: Invalid user testuser from 3.38.214.0 port 37940 Jan 16 00:38:43 host sshd[13683]: input_userauth_request: invalid user testuser [preauth] Jan 16 00:38:43 host sshd[13685]: input_userauth_request: invalid user test [preauth] Jan 16 00:38:43 host sshd[13684]: input_userauth_request: invalid user root [preauth] Jan 16 00:38:43 host sshd[13689]: Invalid user tester from 3.38.214.0 port 37920 Jan 16 00:38:43 host sshd[13687]: User centos from 3.38.214.0 not allowed because not listed in AllowUsers Jan 16 00:38:43 host sshd[13689]: input_userauth_request: invalid user tester [preauth] Jan 16 00:38:43 host sshd[13687]: input_userauth_request: invalid user centos [preauth] Jan 16 00:38:44 host sshd[13667]: Invalid user hadoop from 3.38.214.0 port 37898 Jan 16 00:38:44 host sshd[13667]: input_userauth_request: invalid user hadoop [preauth] Jan 16 00:38:44 host sshd[13664]: Invalid user admin from 3.38.214.0 port 37892 Jan 16 00:38:44 host sshd[13672]: User root from 3.38.214.0 not allowed because not listed in AllowUsers Jan 16 00:38:44 host sshd[13664]: input_userauth_request: invalid user admin [preauth] Jan 16 00:38:44 host sshd[13672]: input_userauth_request: invalid user root [preauth] Jan 16 00:38:45 host sshd[13681]: Invalid user ec2-user from 3.38.214.0 port 37938 Jan 16 00:38:45 host sshd[13681]: input_userauth_request: invalid user ec2-user [preauth] Jan 16 00:38:45 host sshd[13675]: Invalid user devops from 3.38.214.0 port 37896 Jan 16 00:38:45 host sshd[13675]: input_userauth_request: invalid user devops [preauth] Jan 16 00:38:45 host sshd[13668]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:38:45 host sshd[13673]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:38:45 host sshd[13673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.38.214.0 Jan 16 00:38:45 host sshd[13668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.38.214.0 Jan 16 00:38:45 host sshd[13665]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:38:45 host sshd[13666]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:38:45 host sshd[13665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.38.214.0 Jan 16 00:38:45 host sshd[13666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.38.214.0 Jan 16 00:38:45 host sshd[13671]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:38:45 host sshd[13670]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:38:45 host sshd[13671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.38.214.0 Jan 16 00:38:45 host sshd[13670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.38.214.0 Jan 16 00:38:45 host sshd[13680]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:38:45 host sshd[13679]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:38:45 host sshd[13680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.38.214.0 Jan 16 00:38:45 host sshd[13679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.38.214.0 Jan 16 00:38:45 host sshd[13677]: Invalid user user from 3.38.214.0 port 37924 Jan 16 00:38:45 host sshd[13677]: input_userauth_request: invalid user user [preauth] Jan 16 00:38:45 host sshd[13676]: User root from 3.38.214.0 not allowed because not listed in AllowUsers Jan 16 00:38:45 host sshd[13683]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:38:45 host sshd[13683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.38.214.0 Jan 16 00:38:45 host sshd[13682]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:38:45 host sshd[13682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.38.214.0 Jan 16 00:38:45 host sshd[13686]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:38:45 host sshd[13686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.38.214.0 Jan 16 00:38:45 host sshd[13689]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:38:45 host sshd[13689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.38.214.0 Jan 16 00:38:45 host sshd[13676]: input_userauth_request: invalid user root [preauth] Jan 16 00:38:45 host sshd[13685]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:38:45 host sshd[13685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.38.214.0 Jan 16 00:38:45 host unix_chkpwd[13753]: password check failed for user (centos) Jan 16 00:38:45 host sshd[13687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.38.214.0 user=centos Jan 16 00:38:45 host unix_chkpwd[13754]: password check failed for user (root) Jan 16 00:38:45 host sshd[13684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.38.214.0 user=root Jan 16 00:38:45 host sshd[13684]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:38:48 host sshd[13668]: Failed password for invalid user pi from 3.38.214.0 port 37904 ssh2 Jan 16 00:38:48 host sshd[13673]: Failed password for invalid user user from 3.38.214.0 port 37890 ssh2 Jan 16 00:38:48 host sshd[13665]: Failed password for invalid user ubuntu from 3.38.214.0 port 37900 ssh2 Jan 16 00:38:48 host sshd[13666]: Failed password for invalid user esuser from 3.38.214.0 port 37888 ssh2 Jan 16 00:38:48 host sshd[13671]: Failed password for invalid user pi from 3.38.214.0 port 37902 ssh2 Jan 16 00:38:48 host sshd[13670]: Failed password for invalid user admin from 3.38.214.0 port 37886 ssh2 Jan 16 00:38:48 host sshd[13680]: Failed password for invalid user test from 3.38.214.0 port 37908 ssh2 Jan 16 00:38:48 host sshd[13679]: Failed password for invalid user postgres from 3.38.214.0 port 37914 ssh2 Jan 16 00:38:48 host sshd[13683]: Failed password for invalid user testuser from 3.38.214.0 port 37940 ssh2 Jan 16 00:38:48 host sshd[13682]: Failed password for invalid user user from 3.38.214.0 port 37918 ssh2 Jan 16 00:38:48 host sshd[13689]: Failed password for invalid user tester from 3.38.214.0 port 37920 ssh2 Jan 16 00:38:48 host sshd[13686]: Failed password for invalid user esuser from 3.38.214.0 port 37954 ssh2 Jan 16 00:38:48 host sshd[13685]: Failed password for invalid user test from 3.38.214.0 port 37912 ssh2 Jan 16 00:38:48 host sshd[13687]: Failed password for invalid user centos from 3.38.214.0 port 37910 ssh2 Jan 16 00:38:48 host sshd[13684]: Failed password for invalid user root from 3.38.214.0 port 37960 ssh2 Jan 16 00:40:39 host sshd[14213]: Invalid user gropher from 205.185.113.129 port 60128 Jan 16 00:40:39 host sshd[14213]: input_userauth_request: invalid user gropher [preauth] Jan 16 00:40:39 host sshd[14213]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:40:39 host sshd[14213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 16 00:40:42 host sshd[14213]: Failed password for invalid user gropher from 205.185.113.129 port 60128 ssh2 Jan 16 00:40:43 host sshd[14213]: Connection closed by 205.185.113.129 port 60128 [preauth] Jan 16 00:43:33 host sshd[14733]: Invalid user luis from 107.189.30.59 port 50712 Jan 16 00:43:33 host sshd[14733]: input_userauth_request: invalid user luis [preauth] Jan 16 00:43:33 host sshd[14733]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:43:33 host sshd[14733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 16 00:43:35 host sshd[14733]: Failed password for invalid user luis from 107.189.30.59 port 50712 ssh2 Jan 16 00:43:35 host sshd[14733]: Connection closed by 107.189.30.59 port 50712 [preauth] Jan 16 00:48:32 host sshd[15710]: Invalid user default from 175.139.95.181 port 44243 Jan 16 00:48:32 host sshd[15710]: input_userauth_request: invalid user default [preauth] Jan 16 00:48:32 host sshd[15710]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:48:32 host sshd[15710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.95.181 Jan 16 00:48:34 host sshd[15710]: Failed password for invalid user default from 175.139.95.181 port 44243 ssh2 Jan 16 00:48:34 host sshd[15710]: Connection reset by 175.139.95.181 port 44243 [preauth] Jan 16 00:52:09 host sshd[16364]: User root from 59.127.128.18 not allowed because not listed in AllowUsers Jan 16 00:52:09 host sshd[16364]: input_userauth_request: invalid user root [preauth] Jan 16 00:52:09 host unix_chkpwd[16371]: password check failed for user (root) Jan 16 00:52:09 host sshd[16364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.128.18 user=root Jan 16 00:52:09 host sshd[16364]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:52:10 host sshd[16364]: Failed password for invalid user root from 59.127.128.18 port 56319 ssh2 Jan 16 00:52:11 host unix_chkpwd[16377]: password check failed for user (root) Jan 16 00:52:11 host sshd[16364]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 00:52:14 host sshd[16364]: Failed password for invalid user root from 59.127.128.18 port 56319 ssh2 Jan 16 00:52:14 host sshd[16364]: Connection reset by 59.127.128.18 port 56319 [preauth] Jan 16 00:52:14 host sshd[16364]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.128.18 user=root Jan 16 00:54:34 host sshd[16727]: Invalid user pi from 174.105.178.110 port 55552 Jan 16 00:54:34 host sshd[16727]: input_userauth_request: invalid user pi [preauth] Jan 16 00:54:34 host sshd[16728]: Invalid user pi from 174.105.178.110 port 55556 Jan 16 00:54:34 host sshd[16728]: input_userauth_request: invalid user pi [preauth] Jan 16 00:54:34 host sshd[16727]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:54:34 host sshd[16727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.105.178.110 Jan 16 00:54:34 host sshd[16728]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:54:34 host sshd[16728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.105.178.110 Jan 16 00:54:36 host sshd[16727]: Failed password for invalid user pi from 174.105.178.110 port 55552 ssh2 Jan 16 00:54:36 host sshd[16728]: Failed password for invalid user pi from 174.105.178.110 port 55556 ssh2 Jan 16 00:54:36 host sshd[16727]: Connection closed by 174.105.178.110 port 55552 [preauth] Jan 16 00:54:36 host sshd[16728]: Connection closed by 174.105.178.110 port 55556 [preauth] Jan 16 00:57:32 host sshd[17179]: Invalid user admin from 162.255.125.71 port 57739 Jan 16 00:57:32 host sshd[17179]: input_userauth_request: invalid user admin [preauth] Jan 16 00:57:32 host sshd[17179]: pam_unix(sshd:auth): check pass; user unknown Jan 16 00:57:32 host sshd[17179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.255.125.71 Jan 16 00:57:35 host sshd[17179]: Failed password for invalid user admin from 162.255.125.71 port 57739 ssh2 Jan 16 00:57:38 host sshd[17179]: Connection closed by 162.255.125.71 port 57739 [preauth] Jan 16 01:00:21 host sshd[17717]: User root from 123.30.249.87 not allowed because not listed in AllowUsers Jan 16 01:00:21 host sshd[17717]: input_userauth_request: invalid user root [preauth] Jan 16 01:00:21 host unix_chkpwd[17720]: password check failed for user (root) Jan 16 01:00:21 host sshd[17717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.249.87 user=root Jan 16 01:00:21 host sshd[17717]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:00:24 host sshd[17717]: Failed password for invalid user root from 123.30.249.87 port 45394 ssh2 Jan 16 01:00:24 host sshd[17717]: Received disconnect from 123.30.249.87 port 45394:11: Bye Bye [preauth] Jan 16 01:00:24 host sshd[17717]: Disconnected from 123.30.249.87 port 45394 [preauth] Jan 16 01:00:52 host sshd[17786]: User root from 44.201.7.47 not allowed because not listed in AllowUsers Jan 16 01:00:52 host sshd[17786]: input_userauth_request: invalid user root [preauth] Jan 16 01:00:52 host unix_chkpwd[17790]: password check failed for user (root) Jan 16 01:00:52 host sshd[17786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.201.7.47 user=root Jan 16 01:00:52 host sshd[17786]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:00:53 host sshd[17786]: Failed password for invalid user root from 44.201.7.47 port 54002 ssh2 Jan 16 01:00:54 host sshd[17786]: Received disconnect from 44.201.7.47 port 54002:11: Bye Bye [preauth] Jan 16 01:00:54 host sshd[17786]: Disconnected from 44.201.7.47 port 54002 [preauth] Jan 16 01:01:25 host sshd[17881]: User root from 8.213.197.49 not allowed because not listed in AllowUsers Jan 16 01:01:25 host sshd[17881]: input_userauth_request: invalid user root [preauth] Jan 16 01:01:25 host unix_chkpwd[17883]: password check failed for user (root) Jan 16 01:01:25 host sshd[17881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.213.197.49 user=root Jan 16 01:01:25 host sshd[17881]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:01:27 host sshd[17881]: Failed password for invalid user root from 8.213.197.49 port 35892 ssh2 Jan 16 01:01:27 host sshd[17881]: Received disconnect from 8.213.197.49 port 35892:11: Bye Bye [preauth] Jan 16 01:01:27 host sshd[17881]: Disconnected from 8.213.197.49 port 35892 [preauth] Jan 16 01:02:12 host sshd[18000]: User root from 58.27.134.52 not allowed because not listed in AllowUsers Jan 16 01:02:12 host sshd[18000]: input_userauth_request: invalid user root [preauth] Jan 16 01:02:12 host unix_chkpwd[18006]: password check failed for user (root) Jan 16 01:02:12 host sshd[18000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.27.134.52 user=root Jan 16 01:02:12 host sshd[18000]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:02:14 host sshd[18000]: Failed password for invalid user root from 58.27.134.52 port 55562 ssh2 Jan 16 01:02:15 host sshd[18000]: Received disconnect from 58.27.134.52 port 55562:11: Bye Bye [preauth] Jan 16 01:02:15 host sshd[18000]: Disconnected from 58.27.134.52 port 55562 [preauth] Jan 16 01:03:04 host sshd[18123]: User root from 20.61.112.208 not allowed because not listed in AllowUsers Jan 16 01:03:04 host sshd[18123]: input_userauth_request: invalid user root [preauth] Jan 16 01:03:04 host unix_chkpwd[18126]: password check failed for user (root) Jan 16 01:03:04 host sshd[18123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.61.112.208 user=root Jan 16 01:03:04 host sshd[18123]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:03:06 host sshd[18123]: Failed password for invalid user root from 20.61.112.208 port 1024 ssh2 Jan 16 01:03:06 host sshd[18123]: Received disconnect from 20.61.112.208 port 1024:11: Bye Bye [preauth] Jan 16 01:03:06 host sshd[18123]: Disconnected from 20.61.112.208 port 1024 [preauth] Jan 16 01:03:41 host sshd[18191]: User root from 124.43.10.224 not allowed because not listed in AllowUsers Jan 16 01:03:41 host sshd[18191]: input_userauth_request: invalid user root [preauth] Jan 16 01:03:41 host unix_chkpwd[18193]: password check failed for user (root) Jan 16 01:03:41 host sshd[18191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.43.10.224 user=root Jan 16 01:03:41 host sshd[18191]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:03:43 host sshd[18191]: Failed password for invalid user root from 124.43.10.224 port 58026 ssh2 Jan 16 01:03:44 host sshd[18191]: Received disconnect from 124.43.10.224 port 58026:11: Bye Bye [preauth] Jan 16 01:03:44 host sshd[18191]: Disconnected from 124.43.10.224 port 58026 [preauth] Jan 16 01:03:59 host sshd[18227]: Invalid user sFTPUser from 114.33.2.29 port 37136 Jan 16 01:03:59 host sshd[18227]: input_userauth_request: invalid user sFTPUser [preauth] Jan 16 01:03:59 host sshd[18227]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:03:59 host sshd[18227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.2.29 Jan 16 01:04:01 host sshd[18227]: Failed password for invalid user sFTPUser from 114.33.2.29 port 37136 ssh2 Jan 16 01:04:02 host sshd[18227]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:04:04 host sshd[18227]: Failed password for invalid user sFTPUser from 114.33.2.29 port 37136 ssh2 Jan 16 01:04:06 host sshd[18227]: Connection reset by 114.33.2.29 port 37136 [preauth] Jan 16 01:04:06 host sshd[18227]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.2.29 Jan 16 01:04:32 host sshd[18332]: User root from 206.189.119.230 not allowed because not listed in AllowUsers Jan 16 01:04:32 host sshd[18332]: input_userauth_request: invalid user root [preauth] Jan 16 01:04:32 host unix_chkpwd[18335]: password check failed for user (root) Jan 16 01:04:32 host sshd[18332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.119.230 user=root Jan 16 01:04:32 host sshd[18332]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:04:35 host sshd[18332]: Failed password for invalid user root from 206.189.119.230 port 56536 ssh2 Jan 16 01:04:35 host sshd[18332]: Received disconnect from 206.189.119.230 port 56536:11: Bye Bye [preauth] Jan 16 01:04:35 host sshd[18332]: Disconnected from 206.189.119.230 port 56536 [preauth] Jan 16 01:04:49 host sshd[18359]: User root from 129.154.216.175 not allowed because not listed in AllowUsers Jan 16 01:04:49 host sshd[18359]: input_userauth_request: invalid user root [preauth] Jan 16 01:04:49 host unix_chkpwd[18362]: password check failed for user (root) Jan 16 01:04:49 host sshd[18359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.154.216.175 user=root Jan 16 01:04:49 host sshd[18359]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:04:51 host sshd[18359]: Failed password for invalid user root from 129.154.216.175 port 48696 ssh2 Jan 16 01:04:51 host sshd[18359]: Received disconnect from 129.154.216.175 port 48696:11: Bye Bye [preauth] Jan 16 01:04:51 host sshd[18359]: Disconnected from 129.154.216.175 port 48696 [preauth] Jan 16 01:05:03 host sshd[18401]: User root from 167.71.108.81 not allowed because not listed in AllowUsers Jan 16 01:05:03 host sshd[18401]: input_userauth_request: invalid user root [preauth] Jan 16 01:05:03 host unix_chkpwd[18404]: password check failed for user (root) Jan 16 01:05:03 host sshd[18401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.108.81 user=root Jan 16 01:05:03 host sshd[18401]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:05:05 host sshd[18401]: Failed password for invalid user root from 167.71.108.81 port 51358 ssh2 Jan 16 01:05:05 host sshd[18401]: Received disconnect from 167.71.108.81 port 51358:11: Bye Bye [preauth] Jan 16 01:05:05 host sshd[18401]: Disconnected from 167.71.108.81 port 51358 [preauth] Jan 16 01:06:24 host sshd[18661]: User root from 58.27.134.52 not allowed because not listed in AllowUsers Jan 16 01:06:24 host sshd[18661]: input_userauth_request: invalid user root [preauth] Jan 16 01:06:24 host unix_chkpwd[18665]: password check failed for user (root) Jan 16 01:06:24 host sshd[18661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.27.134.52 user=root Jan 16 01:06:24 host sshd[18661]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:06:26 host sshd[18661]: Failed password for invalid user root from 58.27.134.52 port 43312 ssh2 Jan 16 01:06:32 host sshd[18725]: User root from 44.201.7.47 not allowed because not listed in AllowUsers Jan 16 01:06:32 host sshd[18725]: input_userauth_request: invalid user root [preauth] Jan 16 01:06:32 host unix_chkpwd[18731]: password check failed for user (root) Jan 16 01:06:32 host sshd[18725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=44.201.7.47 user=root Jan 16 01:06:32 host sshd[18725]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:06:34 host sshd[18725]: Failed password for invalid user root from 44.201.7.47 port 54010 ssh2 Jan 16 01:06:34 host sshd[18725]: Received disconnect from 44.201.7.47 port 54010:11: Bye Bye [preauth] Jan 16 01:06:34 host sshd[18725]: Disconnected from 44.201.7.47 port 54010 [preauth] Jan 16 01:07:02 host sshd[18839]: User root from 206.189.119.230 not allowed because not listed in AllowUsers Jan 16 01:07:02 host sshd[18839]: input_userauth_request: invalid user root [preauth] Jan 16 01:07:02 host unix_chkpwd[18843]: password check failed for user (root) Jan 16 01:07:02 host sshd[18839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.119.230 user=root Jan 16 01:07:02 host sshd[18839]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:07:04 host sshd[18842]: User root from 167.71.108.81 not allowed because not listed in AllowUsers Jan 16 01:07:04 host sshd[18842]: input_userauth_request: invalid user root [preauth] Jan 16 01:07:04 host unix_chkpwd[18846]: password check failed for user (root) Jan 16 01:07:04 host sshd[18842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.108.81 user=root Jan 16 01:07:04 host sshd[18842]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:07:04 host sshd[18839]: Failed password for invalid user root from 206.189.119.230 port 35052 ssh2 Jan 16 01:07:05 host sshd[18839]: Received disconnect from 206.189.119.230 port 35052:11: Bye Bye [preauth] Jan 16 01:07:05 host sshd[18839]: Disconnected from 206.189.119.230 port 35052 [preauth] Jan 16 01:07:05 host sshd[18842]: Failed password for invalid user root from 167.71.108.81 port 33380 ssh2 Jan 16 01:07:06 host sshd[18842]: Received disconnect from 167.71.108.81 port 33380:11: Bye Bye [preauth] Jan 16 01:07:06 host sshd[18842]: Disconnected from 167.71.108.81 port 33380 [preauth] Jan 16 01:07:07 host sshd[18849]: User root from 124.43.10.224 not allowed because not listed in AllowUsers Jan 16 01:07:07 host sshd[18849]: input_userauth_request: invalid user root [preauth] Jan 16 01:07:07 host unix_chkpwd[18912]: password check failed for user (root) Jan 16 01:07:07 host sshd[18849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.43.10.224 user=root Jan 16 01:07:07 host sshd[18849]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:07:08 host sshd[18849]: Failed password for invalid user root from 124.43.10.224 port 39564 ssh2 Jan 16 01:07:08 host sshd[18849]: Received disconnect from 124.43.10.224 port 39564:11: Bye Bye [preauth] Jan 16 01:07:08 host sshd[18849]: Disconnected from 124.43.10.224 port 39564 [preauth] Jan 16 01:07:14 host sshd[18957]: User root from 123.30.249.87 not allowed because not listed in AllowUsers Jan 16 01:07:14 host sshd[18957]: input_userauth_request: invalid user root [preauth] Jan 16 01:07:14 host unix_chkpwd[18959]: password check failed for user (root) Jan 16 01:07:14 host sshd[18957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.249.87 user=root Jan 16 01:07:14 host sshd[18957]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:07:14 host sshd[18729]: Connection closed by 8.213.197.49 port 35648 [preauth] Jan 16 01:07:16 host sshd[18957]: Failed password for invalid user root from 123.30.249.87 port 48024 ssh2 Jan 16 01:07:16 host sshd[18957]: Received disconnect from 123.30.249.87 port 48024:11: Bye Bye [preauth] Jan 16 01:07:16 host sshd[18957]: Disconnected from 123.30.249.87 port 48024 [preauth] Jan 16 01:09:14 host sshd[19255]: User root from 8.213.197.49 not allowed because not listed in AllowUsers Jan 16 01:09:14 host sshd[19255]: input_userauth_request: invalid user root [preauth] Jan 16 01:09:14 host unix_chkpwd[19262]: password check failed for user (root) Jan 16 01:09:14 host sshd[19255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.213.197.49 user=root Jan 16 01:09:14 host sshd[19255]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:09:17 host sshd[19255]: Failed password for invalid user root from 8.213.197.49 port 60306 ssh2 Jan 16 01:09:21 host sshd[19303]: User root from 20.61.112.208 not allowed because not listed in AllowUsers Jan 16 01:09:21 host sshd[19303]: input_userauth_request: invalid user root [preauth] Jan 16 01:09:21 host unix_chkpwd[19307]: password check failed for user (root) Jan 16 01:09:21 host sshd[19303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.61.112.208 user=root Jan 16 01:09:21 host sshd[19303]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:09:23 host sshd[19303]: Failed password for invalid user root from 20.61.112.208 port 1024 ssh2 Jan 16 01:09:23 host sshd[19303]: Received disconnect from 20.61.112.208 port 1024:11: Bye Bye [preauth] Jan 16 01:09:23 host sshd[19303]: Disconnected from 20.61.112.208 port 1024 [preauth] Jan 16 01:09:24 host sshd[19310]: User root from 129.154.216.175 not allowed because not listed in AllowUsers Jan 16 01:09:24 host sshd[19310]: input_userauth_request: invalid user root [preauth] Jan 16 01:09:24 host unix_chkpwd[19313]: password check failed for user (root) Jan 16 01:09:24 host sshd[19310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.154.216.175 user=root Jan 16 01:09:24 host sshd[19310]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:09:26 host sshd[19310]: Failed password for invalid user root from 129.154.216.175 port 55802 ssh2 Jan 16 01:09:26 host sshd[19310]: Received disconnect from 129.154.216.175 port 55802:11: Bye Bye [preauth] Jan 16 01:09:26 host sshd[19310]: Disconnected from 129.154.216.175 port 55802 [preauth] Jan 16 01:10:57 host sshd[19571]: Invalid user gopher from 104.244.74.6 port 41082 Jan 16 01:10:57 host sshd[19571]: input_userauth_request: invalid user gopher [preauth] Jan 16 01:10:57 host sshd[19571]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:10:57 host sshd[19571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 16 01:11:00 host sshd[19571]: Failed password for invalid user gopher from 104.244.74.6 port 41082 ssh2 Jan 16 01:11:00 host sshd[19571]: Connection closed by 104.244.74.6 port 41082 [preauth] Jan 16 01:14:56 host sshd[20206]: Invalid user gopher from 104.244.74.6 port 54646 Jan 16 01:14:56 host sshd[20206]: input_userauth_request: invalid user gopher [preauth] Jan 16 01:14:56 host sshd[20206]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:14:56 host sshd[20206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 16 01:14:58 host sshd[20206]: Failed password for invalid user gopher from 104.244.74.6 port 54646 ssh2 Jan 16 01:14:58 host sshd[20206]: Connection closed by 104.244.74.6 port 54646 [preauth] Jan 16 01:15:14 host sshd[20257]: Invalid user sFTPUser from 122.117.61.138 port 46533 Jan 16 01:15:14 host sshd[20257]: input_userauth_request: invalid user sFTPUser [preauth] Jan 16 01:15:14 host sshd[20257]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:15:14 host sshd[20257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.61.138 Jan 16 01:15:17 host sshd[20257]: Failed password for invalid user sFTPUser from 122.117.61.138 port 46533 ssh2 Jan 16 01:15:17 host sshd[20257]: Connection reset by 122.117.61.138 port 46533 [preauth] Jan 16 01:16:42 host sshd[20447]: Invalid user admin from 178.183.68.178 port 49818 Jan 16 01:16:42 host sshd[20447]: input_userauth_request: invalid user admin [preauth] Jan 16 01:16:42 host sshd[20447]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:16:42 host sshd[20447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.183.68.178 Jan 16 01:16:44 host sshd[20447]: Failed password for invalid user admin from 178.183.68.178 port 49818 ssh2 Jan 16 01:16:45 host sshd[20447]: Connection closed by 178.183.68.178 port 49818 [preauth] Jan 16 01:21:25 host sshd[21283]: Invalid user user from 118.173.200.196 port 46538 Jan 16 01:21:25 host sshd[21283]: input_userauth_request: invalid user user [preauth] Jan 16 01:21:25 host sshd[21283]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:21:25 host sshd[21283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.173.200.196 Jan 16 01:21:26 host sshd[21283]: Failed password for invalid user user from 118.173.200.196 port 46538 ssh2 Jan 16 01:21:27 host sshd[21283]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:21:29 host sshd[21283]: Failed password for invalid user user from 118.173.200.196 port 46538 ssh2 Jan 16 01:21:30 host sshd[21283]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:21:32 host sshd[21283]: Failed password for invalid user user from 118.173.200.196 port 46538 ssh2 Jan 16 01:21:32 host sshd[21283]: Connection reset by 118.173.200.196 port 46538 [preauth] Jan 16 01:21:32 host sshd[21283]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.173.200.196 Jan 16 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 01:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:21:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=wwwkaretakers user-5=cochintaxi user-6=keralaholi user-7=wwwresourcehunte user-8=wwwrmswll user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=shalinijames user-15=wwwtestugo user-16=woodpeck user-17=wwwkapin user-18=remysagr user-19=disposeat user-20=wwwkmaorg user-21=wwwnexidigital user-22=mrsclean user-23=palco123 user-24=gifterman user-25=phmetals user-26=kottayamcalldriv user-27=wwwletsstalkfood user-28=straightcurve user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 01:22:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GpB2yaQcWLg9Vj4n.~ Jan 16 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GpB2yaQcWLg9Vj4n.~' Jan 16 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GpB2yaQcWLg9Vj4n.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 01:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 01:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 01:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 01:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 01:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 01:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 01:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 01:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 01:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 01:33:23 host sshd[23609]: Invalid user er from 194.110.203.109 port 50946 Jan 16 01:33:23 host sshd[23609]: input_userauth_request: invalid user er [preauth] Jan 16 01:33:23 host sshd[23609]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:33:23 host sshd[23609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 01:33:24 host sshd[23609]: Failed password for invalid user er from 194.110.203.109 port 50946 ssh2 Jan 16 01:33:28 host sshd[23609]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:33:30 host sshd[23609]: Failed password for invalid user er from 194.110.203.109 port 50946 ssh2 Jan 16 01:33:33 host sshd[23609]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:33:35 host sshd[23609]: Failed password for invalid user er from 194.110.203.109 port 50946 ssh2 Jan 16 01:33:38 host sshd[23609]: Connection closed by 194.110.203.109 port 50946 [preauth] Jan 16 01:33:38 host sshd[23609]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 01:34:26 host sshd[23900]: User root from 134.122.19.182 not allowed because not listed in AllowUsers Jan 16 01:34:26 host sshd[23900]: input_userauth_request: invalid user root [preauth] Jan 16 01:34:26 host unix_chkpwd[23904]: password check failed for user (root) Jan 16 01:34:26 host sshd[23900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.19.182 user=root Jan 16 01:34:26 host sshd[23900]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:34:27 host sshd[23900]: Failed password for invalid user root from 134.122.19.182 port 58874 ssh2 Jan 16 01:34:28 host sshd[23900]: Received disconnect from 134.122.19.182 port 58874:11: Bye Bye [preauth] Jan 16 01:34:28 host sshd[23900]: Disconnected from 134.122.19.182 port 58874 [preauth] Jan 16 01:34:38 host sshd[23942]: User root from 69.49.230.44 not allowed because not listed in AllowUsers Jan 16 01:34:38 host sshd[23942]: input_userauth_request: invalid user root [preauth] Jan 16 01:34:38 host unix_chkpwd[23948]: password check failed for user (root) Jan 16 01:34:38 host sshd[23942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.49.230.44 user=root Jan 16 01:34:38 host sshd[23942]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:34:40 host sshd[23942]: Failed password for invalid user root from 69.49.230.44 port 45048 ssh2 Jan 16 01:34:40 host sshd[23942]: Received disconnect from 69.49.230.44 port 45048:11: Bye Bye [preauth] Jan 16 01:34:40 host sshd[23942]: Disconnected from 69.49.230.44 port 45048 [preauth] Jan 16 01:35:09 host sshd[24077]: User root from 198.199.119.203 not allowed because not listed in AllowUsers Jan 16 01:35:09 host sshd[24077]: input_userauth_request: invalid user root [preauth] Jan 16 01:35:10 host unix_chkpwd[24089]: password check failed for user (root) Jan 16 01:35:10 host sshd[24077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.119.203 user=root Jan 16 01:35:10 host sshd[24077]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:35:11 host sshd[24077]: Failed password for invalid user root from 198.199.119.203 port 45690 ssh2 Jan 16 01:35:12 host sshd[24077]: Received disconnect from 198.199.119.203 port 45690:11: Bye Bye [preauth] Jan 16 01:35:12 host sshd[24077]: Disconnected from 198.199.119.203 port 45690 [preauth] Jan 16 01:35:51 host sshd[24209]: User root from 213.114.119.132 not allowed because not listed in AllowUsers Jan 16 01:35:51 host sshd[24209]: input_userauth_request: invalid user root [preauth] Jan 16 01:35:52 host unix_chkpwd[24212]: password check failed for user (root) Jan 16 01:35:52 host sshd[24209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.114.119.132 user=root Jan 16 01:35:52 host sshd[24209]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:35:54 host sshd[24209]: Failed password for invalid user root from 213.114.119.132 port 59443 ssh2 Jan 16 01:35:54 host sshd[24209]: Connection closed by 213.114.119.132 port 59443 [preauth] Jan 16 01:37:46 host sshd[24412]: User root from 67.207.85.118 not allowed because not listed in AllowUsers Jan 16 01:37:46 host sshd[24412]: input_userauth_request: invalid user root [preauth] Jan 16 01:37:46 host unix_chkpwd[24415]: password check failed for user (root) Jan 16 01:37:46 host sshd[24412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.85.118 user=root Jan 16 01:37:46 host sshd[24412]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:37:47 host sshd[24412]: Failed password for invalid user root from 67.207.85.118 port 41992 ssh2 Jan 16 01:37:48 host sshd[24412]: Received disconnect from 67.207.85.118 port 41992:11: Bye Bye [preauth] Jan 16 01:37:48 host sshd[24412]: Disconnected from 67.207.85.118 port 41992 [preauth] Jan 16 01:38:13 host sshd[24460]: User root from 178.128.220.159 not allowed because not listed in AllowUsers Jan 16 01:38:13 host sshd[24460]: input_userauth_request: invalid user root [preauth] Jan 16 01:38:13 host unix_chkpwd[24463]: password check failed for user (root) Jan 16 01:38:13 host sshd[24460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.220.159 user=root Jan 16 01:38:13 host sshd[24460]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:38:15 host sshd[24460]: Failed password for invalid user root from 178.128.220.159 port 48202 ssh2 Jan 16 01:38:15 host sshd[24460]: Received disconnect from 178.128.220.159 port 48202:11: Bye Bye [preauth] Jan 16 01:38:15 host sshd[24460]: Disconnected from 178.128.220.159 port 48202 [preauth] Jan 16 01:38:56 host sshd[24549]: User root from 122.116.194.28 not allowed because not listed in AllowUsers Jan 16 01:38:56 host sshd[24549]: input_userauth_request: invalid user root [preauth] Jan 16 01:38:56 host unix_chkpwd[24553]: password check failed for user (root) Jan 16 01:38:56 host sshd[24549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.194.28 user=root Jan 16 01:38:56 host sshd[24549]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:38:58 host sshd[24549]: Failed password for invalid user root from 122.116.194.28 port 40896 ssh2 Jan 16 01:38:58 host sshd[24549]: Connection reset by 122.116.194.28 port 40896 [preauth] Jan 16 01:38:59 host sshd[24556]: User root from 139.59.31.142 not allowed because not listed in AllowUsers Jan 16 01:38:59 host sshd[24556]: input_userauth_request: invalid user root [preauth] Jan 16 01:38:59 host unix_chkpwd[24558]: password check failed for user (root) Jan 16 01:38:59 host sshd[24556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.31.142 user=root Jan 16 01:38:59 host sshd[24556]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:39:01 host sshd[24556]: Failed password for invalid user root from 139.59.31.142 port 55602 ssh2 Jan 16 01:39:01 host sshd[24556]: Received disconnect from 139.59.31.142 port 55602:11: Bye Bye [preauth] Jan 16 01:39:01 host sshd[24556]: Disconnected from 139.59.31.142 port 55602 [preauth] Jan 16 01:39:06 host sshd[24583]: User root from 165.232.185.4 not allowed because not listed in AllowUsers Jan 16 01:39:06 host sshd[24583]: input_userauth_request: invalid user root [preauth] Jan 16 01:39:06 host unix_chkpwd[24585]: password check failed for user (root) Jan 16 01:39:06 host sshd[24583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.185.4 user=root Jan 16 01:39:06 host sshd[24583]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:39:08 host sshd[24583]: Failed password for invalid user root from 165.232.185.4 port 57446 ssh2 Jan 16 01:39:08 host sshd[24583]: Received disconnect from 165.232.185.4 port 57446:11: Bye Bye [preauth] Jan 16 01:39:08 host sshd[24583]: Disconnected from 165.232.185.4 port 57446 [preauth] Jan 16 01:39:53 host sshd[24661]: User root from 12.53.178.254 not allowed because not listed in AllowUsers Jan 16 01:39:53 host sshd[24661]: input_userauth_request: invalid user root [preauth] Jan 16 01:39:53 host unix_chkpwd[24664]: password check failed for user (root) Jan 16 01:39:53 host sshd[24661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=12.53.178.254 user=root Jan 16 01:39:53 host sshd[24661]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:39:55 host sshd[24661]: Failed password for invalid user root from 12.53.178.254 port 38532 ssh2 Jan 16 01:39:55 host sshd[24661]: Received disconnect from 12.53.178.254 port 38532:11: Bye Bye [preauth] Jan 16 01:39:55 host sshd[24661]: Disconnected from 12.53.178.254 port 38532 [preauth] Jan 16 01:40:12 host sshd[24718]: User root from 134.122.19.182 not allowed because not listed in AllowUsers Jan 16 01:40:12 host sshd[24718]: input_userauth_request: invalid user root [preauth] Jan 16 01:40:12 host unix_chkpwd[24721]: password check failed for user (root) Jan 16 01:40:12 host sshd[24718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.19.182 user=root Jan 16 01:40:12 host sshd[24718]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:40:14 host sshd[24718]: Failed password for invalid user root from 134.122.19.182 port 56158 ssh2 Jan 16 01:40:40 host sshd[24899]: User root from 198.199.119.203 not allowed because not listed in AllowUsers Jan 16 01:40:40 host sshd[24899]: input_userauth_request: invalid user root [preauth] Jan 16 01:40:40 host unix_chkpwd[24902]: password check failed for user (root) Jan 16 01:40:40 host sshd[24899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.119.203 user=root Jan 16 01:40:40 host sshd[24899]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:40:42 host sshd[24899]: Failed password for invalid user root from 198.199.119.203 port 56966 ssh2 Jan 16 01:40:42 host sshd[24899]: Received disconnect from 198.199.119.203 port 56966:11: Bye Bye [preauth] Jan 16 01:40:42 host sshd[24899]: Disconnected from 198.199.119.203 port 56966 [preauth] Jan 16 01:41:05 host sshd[24969]: User root from 69.49.230.44 not allowed because not listed in AllowUsers Jan 16 01:41:05 host sshd[24969]: input_userauth_request: invalid user root [preauth] Jan 16 01:41:05 host unix_chkpwd[24974]: password check failed for user (root) Jan 16 01:41:05 host sshd[24969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.49.230.44 user=root Jan 16 01:41:05 host sshd[24969]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:41:07 host sshd[24969]: Failed password for invalid user root from 69.49.230.44 port 47320 ssh2 Jan 16 01:41:07 host sshd[24969]: Received disconnect from 69.49.230.44 port 47320:11: Bye Bye [preauth] Jan 16 01:41:07 host sshd[24969]: Disconnected from 69.49.230.44 port 47320 [preauth] Jan 16 01:41:25 host sshd[25038]: User root from 165.232.185.4 not allowed because not listed in AllowUsers Jan 16 01:41:25 host sshd[25038]: input_userauth_request: invalid user root [preauth] Jan 16 01:41:25 host unix_chkpwd[25040]: password check failed for user (root) Jan 16 01:41:25 host sshd[25038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.185.4 user=root Jan 16 01:41:25 host sshd[25038]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:41:27 host sshd[25038]: Failed password for invalid user root from 165.232.185.4 port 33652 ssh2 Jan 16 01:41:27 host sshd[25038]: Received disconnect from 165.232.185.4 port 33652:11: Bye Bye [preauth] Jan 16 01:41:27 host sshd[25038]: Disconnected from 165.232.185.4 port 33652 [preauth] Jan 16 01:41:30 host sshd[25098]: User root from 67.207.85.118 not allowed because not listed in AllowUsers Jan 16 01:41:30 host sshd[25098]: input_userauth_request: invalid user root [preauth] Jan 16 01:41:30 host unix_chkpwd[25101]: password check failed for user (root) Jan 16 01:41:30 host sshd[25098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.85.118 user=root Jan 16 01:41:30 host sshd[25098]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:41:32 host sshd[25098]: Failed password for invalid user root from 67.207.85.118 port 50442 ssh2 Jan 16 01:41:32 host sshd[25098]: Received disconnect from 67.207.85.118 port 50442:11: Bye Bye [preauth] Jan 16 01:41:32 host sshd[25098]: Disconnected from 67.207.85.118 port 50442 [preauth] Jan 16 01:41:47 host sshd[25161]: User root from 178.128.220.159 not allowed because not listed in AllowUsers Jan 16 01:41:47 host sshd[25161]: input_userauth_request: invalid user root [preauth] Jan 16 01:41:47 host unix_chkpwd[25166]: password check failed for user (root) Jan 16 01:41:47 host sshd[25161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.220.159 user=root Jan 16 01:41:47 host sshd[25161]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:41:50 host sshd[25172]: User root from 139.59.31.142 not allowed because not listed in AllowUsers Jan 16 01:41:50 host sshd[25172]: input_userauth_request: invalid user root [preauth] Jan 16 01:41:50 host unix_chkpwd[25175]: password check failed for user (root) Jan 16 01:41:50 host sshd[25172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.31.142 user=root Jan 16 01:41:50 host sshd[25172]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:41:50 host sshd[25161]: Failed password for invalid user root from 178.128.220.159 port 56726 ssh2 Jan 16 01:41:50 host sshd[25161]: Received disconnect from 178.128.220.159 port 56726:11: Bye Bye [preauth] Jan 16 01:41:50 host sshd[25161]: Disconnected from 178.128.220.159 port 56726 [preauth] Jan 16 01:41:52 host sshd[25172]: Failed password for invalid user root from 139.59.31.142 port 59348 ssh2 Jan 16 01:41:52 host sshd[25172]: Received disconnect from 139.59.31.142 port 59348:11: Bye Bye [preauth] Jan 16 01:41:52 host sshd[25172]: Disconnected from 139.59.31.142 port 59348 [preauth] Jan 16 01:42:08 host sshd[25269]: User root from 12.53.178.254 not allowed because not listed in AllowUsers Jan 16 01:42:08 host sshd[25269]: input_userauth_request: invalid user root [preauth] Jan 16 01:42:08 host unix_chkpwd[25279]: password check failed for user (root) Jan 16 01:42:08 host sshd[25269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=12.53.178.254 user=root Jan 16 01:42:08 host sshd[25269]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:42:10 host sshd[25269]: Failed password for invalid user root from 12.53.178.254 port 49808 ssh2 Jan 16 01:42:10 host sshd[25269]: Received disconnect from 12.53.178.254 port 49808:11: Bye Bye [preauth] Jan 16 01:42:10 host sshd[25269]: Disconnected from 12.53.178.254 port 49808 [preauth] Jan 16 01:44:43 host sshd[25660]: Invalid user ubnt from 112.160.9.96 port 60860 Jan 16 01:44:43 host sshd[25660]: input_userauth_request: invalid user ubnt [preauth] Jan 16 01:44:43 host sshd[25660]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:44:43 host sshd[25660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.160.9.96 Jan 16 01:44:45 host sshd[25660]: Failed password for invalid user ubnt from 112.160.9.96 port 60860 ssh2 Jan 16 01:44:45 host sshd[25690]: Invalid user gopher from 104.244.74.6 port 59464 Jan 16 01:44:45 host sshd[25690]: input_userauth_request: invalid user gopher [preauth] Jan 16 01:44:45 host sshd[25690]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:44:45 host sshd[25690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 16 01:44:46 host sshd[25660]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:44:46 host sshd[25693]: Invalid user admin from 59.126.19.247 port 49717 Jan 16 01:44:46 host sshd[25693]: input_userauth_request: invalid user admin [preauth] Jan 16 01:44:46 host sshd[25693]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:44:46 host sshd[25693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.19.247 Jan 16 01:44:47 host sshd[25690]: Failed password for invalid user gopher from 104.244.74.6 port 59464 ssh2 Jan 16 01:44:47 host sshd[25690]: Connection closed by 104.244.74.6 port 59464 [preauth] Jan 16 01:44:47 host sshd[25660]: Failed password for invalid user ubnt from 112.160.9.96 port 60860 ssh2 Jan 16 01:44:48 host sshd[25693]: Failed password for invalid user admin from 59.126.19.247 port 49717 ssh2 Jan 16 01:44:48 host sshd[25660]: Failed password for invalid user ubnt from 112.160.9.96 port 60860 ssh2 Jan 16 01:44:48 host sshd[25693]: Connection reset by 59.126.19.247 port 49717 [preauth] Jan 16 01:44:48 host sshd[25660]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:44:50 host sshd[25660]: Failed password for invalid user ubnt from 112.160.9.96 port 60860 ssh2 Jan 16 01:44:51 host sshd[25660]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:44:52 host sshd[25660]: Failed password for invalid user ubnt from 112.160.9.96 port 60860 ssh2 Jan 16 01:50:15 host sshd[26800]: User root from 209.97.132.66 not allowed because not listed in AllowUsers Jan 16 01:50:15 host sshd[26800]: input_userauth_request: invalid user root [preauth] Jan 16 01:50:15 host unix_chkpwd[26803]: password check failed for user (root) Jan 16 01:50:15 host sshd[26800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.132.66 user=root Jan 16 01:50:15 host sshd[26800]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:50:17 host sshd[26800]: Failed password for invalid user root from 209.97.132.66 port 35858 ssh2 Jan 16 01:50:17 host sshd[26800]: Connection closed by 209.97.132.66 port 35858 [preauth] Jan 16 01:53:36 host sshd[27248]: User root from 118.161.136.63 not allowed because not listed in AllowUsers Jan 16 01:53:36 host sshd[27248]: input_userauth_request: invalid user root [preauth] Jan 16 01:53:36 host unix_chkpwd[27252]: password check failed for user (root) Jan 16 01:53:36 host sshd[27248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.161.136.63 user=root Jan 16 01:53:36 host sshd[27248]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:53:37 host sshd[27248]: Failed password for invalid user root from 118.161.136.63 port 41173 ssh2 Jan 16 01:53:38 host unix_chkpwd[27258]: password check failed for user (root) Jan 16 01:53:38 host sshd[27248]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:53:40 host sshd[27248]: Failed password for invalid user root from 118.161.136.63 port 41173 ssh2 Jan 16 01:53:41 host unix_chkpwd[27261]: password check failed for user (root) Jan 16 01:53:41 host sshd[27248]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:53:43 host sshd[27248]: Failed password for invalid user root from 118.161.136.63 port 41173 ssh2 Jan 16 01:53:44 host unix_chkpwd[27269]: password check failed for user (root) Jan 16 01:53:44 host sshd[27248]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:53:46 host sshd[27248]: Failed password for invalid user root from 118.161.136.63 port 41173 ssh2 Jan 16 01:53:47 host unix_chkpwd[27272]: password check failed for user (root) Jan 16 01:53:47 host sshd[27248]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:53:49 host sshd[27248]: Failed password for invalid user root from 118.161.136.63 port 41173 ssh2 Jan 16 01:55:30 host sshd[27657]: Invalid user ftpuser from 121.202.201.247 port 41211 Jan 16 01:55:30 host sshd[27657]: input_userauth_request: invalid user ftpuser [preauth] Jan 16 01:55:30 host sshd[27657]: pam_unix(sshd:auth): check pass; user unknown Jan 16 01:55:30 host sshd[27657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.202.201.247 Jan 16 01:55:32 host sshd[27657]: Failed password for invalid user ftpuser from 121.202.201.247 port 41211 ssh2 Jan 16 01:55:32 host sshd[27657]: Connection closed by 121.202.201.247 port 41211 [preauth] Jan 16 01:56:27 host sshd[27759]: User root from 209.97.132.66 not allowed because not listed in AllowUsers Jan 16 01:56:27 host sshd[27759]: input_userauth_request: invalid user root [preauth] Jan 16 01:56:27 host unix_chkpwd[27763]: password check failed for user (root) Jan 16 01:56:27 host sshd[27759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.132.66 user=root Jan 16 01:56:27 host sshd[27759]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 01:56:29 host sshd[27759]: Failed password for invalid user root from 209.97.132.66 port 41424 ssh2 Jan 16 02:01:33 host sshd[28639]: Invalid user default from 211.210.50.166 port 63622 Jan 16 02:01:33 host sshd[28639]: input_userauth_request: invalid user default [preauth] Jan 16 02:01:33 host sshd[28639]: pam_unix(sshd:auth): check pass; user unknown Jan 16 02:01:33 host sshd[28639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.210.50.166 Jan 16 02:01:35 host sshd[28639]: Failed password for invalid user default from 211.210.50.166 port 63622 ssh2 Jan 16 02:01:36 host sshd[28639]: pam_unix(sshd:auth): check pass; user unknown Jan 16 02:01:38 host sshd[28639]: Failed password for invalid user default from 211.210.50.166 port 63622 ssh2 Jan 16 02:01:39 host sshd[28639]: pam_unix(sshd:auth): check pass; user unknown Jan 16 02:01:41 host sshd[28639]: Failed password for invalid user default from 211.210.50.166 port 63622 ssh2 Jan 16 02:01:42 host sshd[28639]: pam_unix(sshd:auth): check pass; user unknown Jan 16 02:01:43 host sshd[28639]: Failed password for invalid user default from 211.210.50.166 port 63622 ssh2 Jan 16 02:01:44 host sshd[28639]: pam_unix(sshd:auth): check pass; user unknown Jan 16 02:01:46 host sshd[28639]: Failed password for invalid user default from 211.210.50.166 port 63622 ssh2 Jan 16 02:01:46 host sshd[28639]: pam_unix(sshd:auth): check pass; user unknown Jan 16 02:01:47 host sshd[28639]: Failed password for invalid user default from 211.210.50.166 port 63622 ssh2 Jan 16 02:01:47 host sshd[28639]: error: maximum authentication attempts exceeded for invalid user default from 211.210.50.166 port 63622 ssh2 [preauth] Jan 16 02:01:47 host sshd[28639]: Disconnecting: Too many authentication failures [preauth] Jan 16 02:01:47 host sshd[28639]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.210.50.166 Jan 16 02:01:47 host sshd[28639]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 16 02:06:19 host sshd[29403]: Invalid user super from 122.117.122.47 port 53060 Jan 16 02:06:19 host sshd[29403]: input_userauth_request: invalid user super [preauth] Jan 16 02:06:19 host sshd[29403]: pam_unix(sshd:auth): check pass; user unknown Jan 16 02:06:19 host sshd[29403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.122.47 Jan 16 02:06:21 host sshd[29403]: Failed password for invalid user super from 122.117.122.47 port 53060 ssh2 Jan 16 02:06:22 host sshd[29403]: pam_unix(sshd:auth): check pass; user unknown Jan 16 02:06:24 host sshd[29403]: Failed password for invalid user super from 122.117.122.47 port 53060 ssh2 Jan 16 02:06:24 host sshd[29403]: Connection reset by 122.117.122.47 port 53060 [preauth] Jan 16 02:06:24 host sshd[29403]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.122.47 Jan 16 02:10:15 host sshd[29851]: Invalid user nginx from 220.80.142.228 port 60732 Jan 16 02:10:15 host sshd[29851]: input_userauth_request: invalid user nginx [preauth] Jan 16 02:10:15 host sshd[29851]: pam_unix(sshd:auth): check pass; user unknown Jan 16 02:10:15 host sshd[29851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.80.142.228 Jan 16 02:10:17 host sshd[29851]: Failed password for invalid user nginx from 220.80.142.228 port 60732 ssh2 Jan 16 02:10:17 host sshd[29851]: pam_unix(sshd:auth): check pass; user unknown Jan 16 02:10:19 host sshd[29851]: Failed password for invalid user nginx from 220.80.142.228 port 60732 ssh2 Jan 16 02:10:21 host sshd[29851]: Connection reset by 220.80.142.228 port 60732 [preauth] Jan 16 02:10:21 host sshd[29851]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.80.142.228 Jan 16 02:15:10 host sshd[30503]: Invalid user uucp from 175.101.101.250 port 53594 Jan 16 02:15:10 host sshd[30503]: input_userauth_request: invalid user uucp [preauth] Jan 16 02:15:12 host sshd[30503]: pam_unix(sshd:auth): check pass; user unknown Jan 16 02:15:12 host sshd[30503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.101.101.250 Jan 16 02:15:14 host sshd[30503]: Failed password for invalid user uucp from 175.101.101.250 port 53594 ssh2 Jan 16 02:15:17 host sshd[30503]: Connection closed by 175.101.101.250 port 53594 [preauth] Jan 16 02:21:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 02:21:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 02:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=cochintaxi user-5=wwwkaretakers user-6=keralaholi user-7=wwwresourcehunte user-8=wwwrmswll user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=shalinijames user-15=wwwtestugo user-16=wwwkapin user-17=woodpeck user-18=disposeat user-19=remysagr user-20=wwwkmaorg user-21=wwwnexidigital user-22=mrsclean user-23=palco123 user-24=gifterman user-25=phmetals user-26=kottayamcalldriv user-27=straightcurve user-28=wwwletsstalkfood user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 02:22:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 02:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 02:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-uua2LlTJnsebcVlN.~ Jan 16 02:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-uua2LlTJnsebcVlN.~' Jan 16 02:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-uua2LlTJnsebcVlN.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 02:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 02:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 02:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 02:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 02:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 02:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 02:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 02:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 02:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 02:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 02:30:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:30:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 02:30:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:30:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 02:30:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:30:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 02:30:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:30:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 02:30:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:30:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=ugotscom user-8=keralaholi user-9=wwwresourcehunte user-10=wwwrmswll user-11=wwwpmcresource user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=pmcresources user-16=disposeat user-17=wwwkmaorg user-18=remysagr user-19=woodpeck user-20=wwwkapin user-21=phmetals user-22=kottayamcalldriv user-23=palco123 user-24=gifterman user-25=wwwnexidigital user-26=mrsclean user-27=wwwevmhonda user-28=bonifacegroup user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 02:30:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 02:30:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:30:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:30:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Jan 16 02:30:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:30:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:30:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 16 02:30:09 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 16 02:30:09 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 16 02:30:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Jan 16 02:30:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:30:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:30:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Jan 16 02:30:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:30:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:30:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Jan 16 02:30:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:30:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:30:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 16 02:30:42 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 16 02:30:42 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 16 02:30:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Jan 16 02:30:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:30:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Jan 16 02:30:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:30:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Jan 16 02:30:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:30:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Jan 16 02:30:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:30:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Jan 16 02:30:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:30:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:31:07 host sshd[584]: Invalid user pi from 114.35.11.92 port 44395 Jan 16 02:31:07 host sshd[584]: input_userauth_request: invalid user pi [preauth] Jan 16 02:31:07 host sshd[584]: pam_unix(sshd:auth): check pass; user unknown Jan 16 02:31:07 host sshd[584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.11.92 Jan 16 02:31:09 host sshd[584]: Failed password for invalid user pi from 114.35.11.92 port 44395 ssh2 Jan 16 02:31:11 host sshd[584]: pam_unix(sshd:auth): check pass; user unknown Jan 16 02:31:13 host sshd[584]: Failed password for invalid user pi from 114.35.11.92 port 44395 ssh2 Jan 16 02:31:13 host sshd[584]: Connection reset by 114.35.11.92 port 44395 [preauth] Jan 16 02:31:13 host sshd[584]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.11.92 Jan 16 02:31:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Jan 16 02:31:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:31:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Jan 16 02:31:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:31:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Jan 16 02:31:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:31:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Jan 16 02:31:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:31:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 16 02:31:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 16 02:31:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 16 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Jan 16 02:31:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:31:36 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 02:31:36 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 02:31:36 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 16 02:31:36 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 16 02:31:36 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 16 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Jan 16 02:31:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:31:36 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 16 02:31:44 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 16 02:31:44 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 16 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Jan 16 02:31:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:31:44 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Jan 16 02:31:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:31:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Jan 16 02:31:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:31:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:31:53 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Jan 16 02:31:53 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:31:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:31:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Jan 16 02:31:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:31:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 16 02:32:04 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 16 02:32:04 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 16 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Jan 16 02:32:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:32:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Jan 16 02:32:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:32:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:32:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Jan 16 02:32:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:32:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Jan 16 02:32:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:32:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 16 02:32:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 16 02:32:22 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 16 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Jan 16 02:32:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:32:28 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:32:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 16 02:32:38 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 16 02:32:38 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 16 02:32:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Jan 16 02:32:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:32:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:32:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Jan 16 02:32:49 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:32:49 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Jan 16 02:32:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:32:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Jan 16 02:32:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:32:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 16 02:32:50 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 02:32:50 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Jan 16 02:32:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:32:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 16 02:32:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 02:32:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 02:33:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Jan 16 02:33:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:33:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:33:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 16 02:33:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 02:33:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 02:33:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Jan 16 02:33:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:33:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Jan 16 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:33:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:33:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Jan 16 02:33:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Jan 16 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 16 02:33:24 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 16 02:33:24 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 16 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Jan 16 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:33:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Jan 16 02:33:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:33:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:33:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 16 02:33:38 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 16 02:33:38 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 16 02:33:38 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Jan 16 02:33:38 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:33:38 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:33:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Jan 16 02:33:39 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:33:39 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:33:39 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Jan 16 02:33:39 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:33:39 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:33:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Jan 16 02:33:52 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:33:53 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:33:57 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Jan 16 02:33:57 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:33:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 16 02:34:04 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 16 02:34:04 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 16 02:34:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Jan 16 02:34:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Jan 16 02:34:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Jan 16 02:34:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Jan 16 02:34:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=a2zgroup WpToolkitNotification send_admin_auto_updates_notification available_updates_text= available_updates_list= installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): Jan 16 02:34:15 host sudo: wp-toolkit : (command continued) require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012[error]FailedToExecuteWpCliCommand: Jan 16 02:34:15 host sudo: wp-toolkit : (command continued) exit status 1[/error]#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status Jan 16 02:34:15 host sudo: wp-toolkit : (command continued) 1[/error]#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: [error]FailedToExecuteWpCliCommand: chdir /home/woodpeck/public_html/wp: no such file or directory[/error]#012<br/><br/>' --output=json Jan 16 02:34:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 02:34:38 host sshd[3611]: User root from 114.32.145.23 not allowed because not listed in AllowUsers Jan 16 02:34:38 host sshd[3611]: input_userauth_request: invalid user root [preauth] Jan 16 02:34:38 host unix_chkpwd[3615]: password check failed for user (root) Jan 16 02:34:38 host sshd[3611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.145.23 user=root Jan 16 02:34:38 host sshd[3611]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 02:34:39 host sshd[3611]: Failed password for invalid user root from 114.32.145.23 port 50839 ssh2 Jan 16 02:34:40 host sshd[3611]: Connection reset by 114.32.145.23 port 50839 [preauth] Jan 16 02:36:04 host sshd[3875]: Invalid user admin from 59.126.117.83 port 33974 Jan 16 02:36:04 host sshd[3875]: input_userauth_request: invalid user admin [preauth] Jan 16 02:36:04 host sshd[3875]: pam_unix(sshd:auth): check pass; user unknown Jan 16 02:36:04 host sshd[3875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.117.83 Jan 16 02:36:05 host sshd[3875]: Failed password for invalid user admin from 59.126.117.83 port 33974 ssh2 Jan 16 02:36:07 host sshd[3875]: Failed password for invalid user admin from 59.126.117.83 port 33974 ssh2 Jan 16 02:36:07 host sshd[3875]: Connection reset by 59.126.117.83 port 33974 [preauth] Jan 16 02:40:33 host sshd[4501]: Invalid user operations@woodpeckerindia.com from 1.0.138.24 port 55133 Jan 16 02:40:33 host sshd[4501]: input_userauth_request: invalid user operations@woodpeckerindia.com [preauth] Jan 16 02:40:33 host sshd[4501]: pam_unix(sshd:auth): check pass; user unknown Jan 16 02:40:33 host sshd[4501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.0.138.24 Jan 16 02:40:35 host sshd[4501]: Failed password for invalid user operations@woodpeckerindia.com from 1.0.138.24 port 55133 ssh2 Jan 16 02:40:36 host sshd[4501]: Connection closed by 1.0.138.24 port 55133 [preauth] Jan 16 02:40:36 host sshd[4508]: User root from 1.0.138.24 not allowed because not listed in AllowUsers Jan 16 02:40:36 host sshd[4508]: input_userauth_request: invalid user root [preauth] Jan 16 02:40:37 host unix_chkpwd[4510]: password check failed for user (root) Jan 16 02:40:37 host sshd[4508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.0.138.24 user=root Jan 16 02:40:37 host sshd[4508]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 02:40:39 host sshd[4508]: Failed password for invalid user root from 1.0.138.24 port 55697 ssh2 Jan 16 02:40:39 host sshd[4508]: Connection closed by 1.0.138.24 port 55697 [preauth] Jan 16 02:40:40 host sshd[4518]: Invalid user operations from 1.0.138.24 port 56249 Jan 16 02:40:40 host sshd[4518]: input_userauth_request: invalid user operations [preauth] Jan 16 02:40:40 host sshd[4518]: pam_unix(sshd:auth): check pass; user unknown Jan 16 02:40:40 host sshd[4518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.0.138.24 Jan 16 02:40:42 host sshd[4518]: Failed password for invalid user operations from 1.0.138.24 port 56249 ssh2 Jan 16 02:49:24 host sshd[5860]: User root from 125.229.31.42 not allowed because not listed in AllowUsers Jan 16 02:49:24 host sshd[5860]: input_userauth_request: invalid user root [preauth] Jan 16 02:49:24 host unix_chkpwd[5865]: password check failed for user (root) Jan 16 02:49:24 host sshd[5860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.31.42 user=root Jan 16 02:49:24 host sshd[5860]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 02:49:26 host sshd[5860]: Failed password for invalid user root from 125.229.31.42 port 53901 ssh2 Jan 16 02:49:26 host sshd[5860]: Connection reset by 125.229.31.42 port 53901 [preauth] Jan 16 03:11:05 host sshd[8779]: Connection reset by 66.168.178.193 port 40791 [preauth] Jan 16 03:12:24 host sshd[8939]: User root from 218.152.37.209 not allowed because not listed in AllowUsers Jan 16 03:12:24 host sshd[8939]: input_userauth_request: invalid user root [preauth] Jan 16 03:12:25 host unix_chkpwd[8943]: password check failed for user (root) Jan 16 03:12:25 host sshd[8939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.152.37.209 user=root Jan 16 03:12:25 host sshd[8939]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 03:12:27 host sshd[8939]: Failed password for invalid user root from 218.152.37.209 port 62921 ssh2 Jan 16 03:12:27 host unix_chkpwd[8952]: password check failed for user (root) Jan 16 03:12:27 host sshd[8939]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 03:12:30 host sshd[8939]: Failed password for invalid user root from 218.152.37.209 port 62921 ssh2 Jan 16 03:12:30 host unix_chkpwd[8970]: password check failed for user (root) Jan 16 03:12:30 host sshd[8939]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 03:12:32 host sshd[8939]: Failed password for invalid user root from 218.152.37.209 port 62921 ssh2 Jan 16 03:12:32 host unix_chkpwd[8973]: password check failed for user (root) Jan 16 03:12:32 host sshd[8939]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 03:12:34 host sshd[8939]: Failed password for invalid user root from 218.152.37.209 port 62921 ssh2 Jan 16 03:12:35 host unix_chkpwd[8976]: password check failed for user (root) Jan 16 03:12:35 host sshd[8939]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 03:12:37 host sshd[8939]: Failed password for invalid user root from 218.152.37.209 port 62921 ssh2 Jan 16 03:18:34 host sshd[9804]: Invalid user user from 122.116.80.142 port 35524 Jan 16 03:18:34 host sshd[9804]: input_userauth_request: invalid user user [preauth] Jan 16 03:18:34 host sshd[9804]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:18:34 host sshd[9804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.80.142 Jan 16 03:18:36 host sshd[9804]: Failed password for invalid user user from 122.116.80.142 port 35524 ssh2 Jan 16 03:18:36 host sshd[9804]: Connection reset by 122.116.80.142 port 35524 [preauth] Jan 16 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=wwwkaretakers user-5=cochintaxi user-6=wwwrmswll user-7=wwwresourcehunte user-8=keralaholi user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=wwwtestugo user-15=shalinijames user-16=woodpeck user-17=wwwkapin user-18=wwwkmaorg user-19=disposeat user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=gifterman user-24=palco123 user-25=phmetals user-26=kottayamcalldriv user-27=wwwletsstalkfood user-28=straightcurve user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 03:21:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Wy0GXrIeqDkOBrKF.~ Jan 16 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Wy0GXrIeqDkOBrKF.~' Jan 16 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Wy0GXrIeqDkOBrKF.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 03:21:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 03:21:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 03:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 03:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 03:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 03:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 03:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 03:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 03:22:35 host sshd[10596]: Invalid user pi from 118.140.120.198 port 49830 Jan 16 03:22:35 host sshd[10596]: input_userauth_request: invalid user pi [preauth] Jan 16 03:22:35 host sshd[10596]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:22:35 host sshd[10596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.140.120.198 Jan 16 03:22:37 host sshd[10596]: Failed password for invalid user pi from 118.140.120.198 port 49830 ssh2 Jan 16 03:22:37 host sshd[10596]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:22:40 host sshd[10596]: Failed password for invalid user pi from 118.140.120.198 port 49830 ssh2 Jan 16 03:22:40 host sshd[10596]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:22:42 host sshd[10596]: Failed password for invalid user pi from 118.140.120.198 port 49830 ssh2 Jan 16 03:22:43 host sshd[10596]: Connection reset by 118.140.120.198 port 49830 [preauth] Jan 16 03:22:43 host sshd[10596]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.140.120.198 Jan 16 03:23:13 host sshd[10651]: Invalid user admin from 61.74.52.146 port 60460 Jan 16 03:23:13 host sshd[10651]: input_userauth_request: invalid user admin [preauth] Jan 16 03:23:13 host sshd[10651]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:23:13 host sshd[10651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.74.52.146 Jan 16 03:23:16 host sshd[10651]: Failed password for invalid user admin from 61.74.52.146 port 60460 ssh2 Jan 16 03:23:16 host sshd[10651]: Connection reset by 61.74.52.146 port 60460 [preauth] Jan 16 03:23:37 host sshd[10706]: Invalid user et from 194.110.203.109 port 41334 Jan 16 03:23:37 host sshd[10706]: input_userauth_request: invalid user et [preauth] Jan 16 03:23:37 host sshd[10706]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:23:37 host sshd[10706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 03:23:39 host sshd[10706]: Failed password for invalid user et from 194.110.203.109 port 41334 ssh2 Jan 16 03:23:42 host sshd[10706]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:23:44 host sshd[10706]: Failed password for invalid user et from 194.110.203.109 port 41334 ssh2 Jan 16 03:23:47 host sshd[10706]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:23:49 host sshd[10706]: Failed password for invalid user et from 194.110.203.109 port 41334 ssh2 Jan 16 03:23:52 host sshd[10706]: Connection closed by 194.110.203.109 port 41334 [preauth] Jan 16 03:23:52 host sshd[10706]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 03:26:44 host sshd[11150]: Invalid user admin from 121.181.51.34 port 57422 Jan 16 03:26:44 host sshd[11150]: input_userauth_request: invalid user admin [preauth] Jan 16 03:26:44 host sshd[11150]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:26:44 host sshd[11150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.181.51.34 Jan 16 03:26:45 host sshd[11150]: Failed password for invalid user admin from 121.181.51.34 port 57422 ssh2 Jan 16 03:26:48 host sshd[11150]: Failed password for invalid user admin from 121.181.51.34 port 57422 ssh2 Jan 16 03:26:48 host sshd[11150]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:26:50 host sshd[11150]: Failed password for invalid user admin from 121.181.51.34 port 57422 ssh2 Jan 16 03:26:51 host sshd[11150]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:26:53 host sshd[11150]: Failed password for invalid user admin from 121.181.51.34 port 57422 ssh2 Jan 16 03:26:54 host sshd[11150]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:26:56 host sshd[11150]: Failed password for invalid user admin from 121.181.51.34 port 57422 ssh2 Jan 16 03:44:39 host sshd[14102]: Invalid user admin from 222.109.92.68 port 37778 Jan 16 03:44:39 host sshd[14102]: input_userauth_request: invalid user admin [preauth] Jan 16 03:44:39 host sshd[14102]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:44:39 host sshd[14102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.109.92.68 Jan 16 03:44:41 host sshd[14102]: Failed password for invalid user admin from 222.109.92.68 port 37778 ssh2 Jan 16 03:44:42 host sshd[14102]: Failed password for invalid user admin from 222.109.92.68 port 37778 ssh2 Jan 16 03:44:42 host sshd[14102]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:44:44 host sshd[14102]: Failed password for invalid user admin from 222.109.92.68 port 37778 ssh2 Jan 16 03:44:45 host sshd[14102]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:44:47 host sshd[14102]: Failed password for invalid user admin from 222.109.92.68 port 37778 ssh2 Jan 16 03:44:47 host sshd[14102]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:44:49 host sshd[14102]: Failed password for invalid user admin from 222.109.92.68 port 37778 ssh2 Jan 16 03:47:10 host sshd[14490]: Invalid user ec2-user from 84.1.29.223 port 53690 Jan 16 03:47:10 host sshd[14490]: input_userauth_request: invalid user ec2-user [preauth] Jan 16 03:47:10 host sshd[14490]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:47:10 host sshd[14490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.1.29.223 Jan 16 03:47:12 host sshd[14490]: Failed password for invalid user ec2-user from 84.1.29.223 port 53690 ssh2 Jan 16 03:47:13 host sshd[14490]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:47:15 host sshd[14490]: Failed password for invalid user ec2-user from 84.1.29.223 port 53690 ssh2 Jan 16 03:47:15 host sshd[14490]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:47:18 host sshd[14490]: Failed password for invalid user ec2-user from 84.1.29.223 port 53690 ssh2 Jan 16 03:47:18 host sshd[14490]: Failed password for invalid user ec2-user from 84.1.29.223 port 53690 ssh2 Jan 16 03:47:19 host sshd[14490]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:47:21 host sshd[14490]: Failed password for invalid user ec2-user from 84.1.29.223 port 53690 ssh2 Jan 16 03:47:21 host sshd[14490]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:47:24 host sshd[14490]: Failed password for invalid user ec2-user from 84.1.29.223 port 53690 ssh2 Jan 16 03:47:24 host sshd[14490]: error: maximum authentication attempts exceeded for invalid user ec2-user from 84.1.29.223 port 53690 ssh2 [preauth] Jan 16 03:47:24 host sshd[14490]: Disconnecting: Too many authentication failures [preauth] Jan 16 03:47:24 host sshd[14490]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.1.29.223 Jan 16 03:47:24 host sshd[14490]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 16 03:49:17 host sshd[14798]: Invalid user pi from 203.232.71.113 port 44715 Jan 16 03:49:17 host sshd[14798]: input_userauth_request: invalid user pi [preauth] Jan 16 03:49:17 host sshd[14798]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:49:17 host sshd[14798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.232.71.113 Jan 16 03:49:19 host sshd[14798]: Failed password for invalid user pi from 203.232.71.113 port 44715 ssh2 Jan 16 03:49:20 host sshd[14798]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:49:22 host sshd[14798]: Failed password for invalid user pi from 203.232.71.113 port 44715 ssh2 Jan 16 03:49:23 host sshd[14798]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:49:24 host sshd[14798]: Failed password for invalid user pi from 203.232.71.113 port 44715 ssh2 Jan 16 03:49:26 host sshd[14798]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:49:28 host sshd[14798]: Failed password for invalid user pi from 203.232.71.113 port 44715 ssh2 Jan 16 03:49:30 host sshd[14798]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:49:32 host sshd[14798]: Failed password for invalid user pi from 203.232.71.113 port 44715 ssh2 Jan 16 03:49:33 host sshd[14798]: Connection reset by 203.232.71.113 port 44715 [preauth] Jan 16 03:49:33 host sshd[14798]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.232.71.113 Jan 16 03:49:33 host sshd[14798]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 16 03:50:15 host sshd[15094]: Invalid user pi from 114.34.167.227 port 44320 Jan 16 03:50:15 host sshd[15094]: input_userauth_request: invalid user pi [preauth] Jan 16 03:50:15 host sshd[15094]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:50:15 host sshd[15094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.167.227 Jan 16 03:50:18 host sshd[15094]: Failed password for invalid user pi from 114.34.167.227 port 44320 ssh2 Jan 16 03:50:19 host sshd[15094]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:50:21 host sshd[15094]: Failed password for invalid user pi from 114.34.167.227 port 44320 ssh2 Jan 16 03:50:22 host sshd[15094]: Connection reset by 114.34.167.227 port 44320 [preauth] Jan 16 03:50:22 host sshd[15094]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.167.227 Jan 16 03:53:33 host sshd[15628]: Invalid user admin from 219.74.237.153 port 55184 Jan 16 03:53:33 host sshd[15628]: input_userauth_request: invalid user admin [preauth] Jan 16 03:53:33 host sshd[15628]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:53:33 host sshd[15628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.74.237.153 Jan 16 03:53:36 host sshd[15628]: Failed password for invalid user admin from 219.74.237.153 port 55184 ssh2 Jan 16 03:53:36 host sshd[15628]: Failed password for invalid user admin from 219.74.237.153 port 55184 ssh2 Jan 16 03:53:36 host sshd[15628]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:53:38 host sshd[15628]: Failed password for invalid user admin from 219.74.237.153 port 55184 ssh2 Jan 16 03:54:33 host sshd[15777]: Invalid user usr from 190.249.148.118 port 36845 Jan 16 03:54:33 host sshd[15777]: input_userauth_request: invalid user usr [preauth] Jan 16 03:54:33 host sshd[15777]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:54:33 host sshd[15777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.249.148.118 Jan 16 03:54:36 host sshd[15777]: Failed password for invalid user usr from 190.249.148.118 port 36845 ssh2 Jan 16 03:54:36 host sshd[15777]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:54:38 host sshd[15777]: Failed password for invalid user usr from 190.249.148.118 port 36845 ssh2 Jan 16 03:54:40 host sshd[15777]: Connection reset by 190.249.148.118 port 36845 [preauth] Jan 16 03:54:40 host sshd[15777]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.249.148.118 Jan 16 03:55:41 host sshd[16080]: Invalid user admin from 1.34.76.249 port 53352 Jan 16 03:55:41 host sshd[16080]: input_userauth_request: invalid user admin [preauth] Jan 16 03:55:41 host sshd[16080]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:55:41 host sshd[16080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.76.249 Jan 16 03:55:43 host sshd[16080]: Failed password for invalid user admin from 1.34.76.249 port 53352 ssh2 Jan 16 03:55:44 host sshd[16080]: Failed password for invalid user admin from 1.34.76.249 port 53352 ssh2 Jan 16 03:55:44 host sshd[16080]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:55:46 host sshd[16080]: Failed password for invalid user admin from 1.34.76.249 port 53352 ssh2 Jan 16 03:55:46 host sshd[16080]: pam_unix(sshd:auth): check pass; user unknown Jan 16 03:55:48 host sshd[16080]: Failed password for invalid user admin from 1.34.76.249 port 53352 ssh2 Jan 16 03:55:48 host sshd[16080]: Connection reset by 1.34.76.249 port 53352 [preauth] Jan 16 03:55:48 host sshd[16080]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.76.249 Jan 16 04:00:33 host sshd[16939]: User root from 202.83.17.160 not allowed because not listed in AllowUsers Jan 16 04:00:33 host sshd[16939]: input_userauth_request: invalid user root [preauth] Jan 16 04:00:33 host unix_chkpwd[16941]: password check failed for user (root) Jan 16 04:00:33 host sshd[16939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.17.160 user=root Jan 16 04:00:33 host sshd[16939]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:00:36 host sshd[16939]: Failed password for invalid user root from 202.83.17.160 port 40768 ssh2 Jan 16 04:00:36 host sshd[16939]: Received disconnect from 202.83.17.160 port 40768:11: Bye Bye [preauth] Jan 16 04:00:36 host sshd[16939]: Disconnected from 202.83.17.160 port 40768 [preauth] Jan 16 04:03:17 host sshd[17472]: User root from 202.83.17.160 not allowed because not listed in AllowUsers Jan 16 04:03:17 host sshd[17472]: input_userauth_request: invalid user root [preauth] Jan 16 04:03:17 host unix_chkpwd[17474]: password check failed for user (root) Jan 16 04:03:17 host sshd[17472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.17.160 user=root Jan 16 04:03:17 host sshd[17472]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:03:19 host sshd[17472]: Failed password for invalid user root from 202.83.17.160 port 58505 ssh2 Jan 16 04:09:51 host sshd[18489]: Invalid user admin from 103.163.178.37 port 38501 Jan 16 04:09:51 host sshd[18489]: input_userauth_request: invalid user admin [preauth] Jan 16 04:09:51 host sshd[18489]: pam_unix(sshd:auth): check pass; user unknown Jan 16 04:09:51 host sshd[18489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.163.178.37 Jan 16 04:09:53 host sshd[18489]: Failed password for invalid user admin from 103.163.178.37 port 38501 ssh2 Jan 16 04:09:54 host sshd[18489]: Failed password for invalid user admin from 103.163.178.37 port 38501 ssh2 Jan 16 04:09:54 host sshd[18489]: pam_unix(sshd:auth): check pass; user unknown Jan 16 04:09:56 host sshd[18489]: Failed password for invalid user admin from 103.163.178.37 port 38501 ssh2 Jan 16 04:09:57 host sshd[18489]: pam_unix(sshd:auth): check pass; user unknown Jan 16 04:09:59 host sshd[18489]: Failed password for invalid user admin from 103.163.178.37 port 38501 ssh2 Jan 16 04:09:59 host sshd[18489]: Connection reset by 103.163.178.37 port 38501 [preauth] Jan 16 04:09:59 host sshd[18489]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.163.178.37 Jan 16 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=wwwevmhonda user-4=bonifacegroup user-5=wwwnexidigital user-6=mrsclean user-7=kottayamcalldriv user-8=phmetals user-9=palco123 user-10=gifterman user-11=wwwkapin user-12=woodpeck user-13=disposeat user-14=remysagr user-15=wwwkmaorg user-16=pmcresources user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 04:21:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 04:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GFONN28mqyYtIBWN.~ Jan 16 04:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GFONN28mqyYtIBWN.~' Jan 16 04:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GFONN28mqyYtIBWN.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 04:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 04:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 04:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 04:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 04:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 04:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 04:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 04:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 04:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 04:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 04:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 04:25:54 host sshd[21626]: Connection reset by 67.49.87.239 port 61653 [preauth] Jan 16 04:26:37 host sshd[21785]: User root from 118.41.29.149 not allowed because not listed in AllowUsers Jan 16 04:26:37 host sshd[21785]: input_userauth_request: invalid user root [preauth] Jan 16 04:26:37 host unix_chkpwd[21790]: password check failed for user (root) Jan 16 04:26:37 host sshd[21785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.41.29.149 user=root Jan 16 04:26:37 host sshd[21785]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:26:39 host sshd[21785]: Failed password for invalid user root from 118.41.29.149 port 55082 ssh2 Jan 16 04:26:40 host unix_chkpwd[21794]: password check failed for user (root) Jan 16 04:26:40 host sshd[21785]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:26:41 host sshd[21785]: Failed password for invalid user root from 118.41.29.149 port 55082 ssh2 Jan 16 04:26:42 host sshd[21785]: Connection reset by 118.41.29.149 port 55082 [preauth] Jan 16 04:26:42 host sshd[21785]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.41.29.149 user=root Jan 16 04:33:43 host sshd[23029]: User root from 191.241.32.246 not allowed because not listed in AllowUsers Jan 16 04:33:43 host sshd[23029]: input_userauth_request: invalid user root [preauth] Jan 16 04:33:44 host unix_chkpwd[23033]: password check failed for user (root) Jan 16 04:33:44 host sshd[23029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.241.32.246 user=root Jan 16 04:33:44 host sshd[23029]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:33:46 host sshd[23029]: Failed password for invalid user root from 191.241.32.246 port 27780 ssh2 Jan 16 04:33:46 host sshd[23029]: Received disconnect from 191.241.32.246 port 27780:11: Bye Bye [preauth] Jan 16 04:33:46 host sshd[23029]: Disconnected from 191.241.32.246 port 27780 [preauth] Jan 16 04:34:15 host sshd[23078]: User root from 213.6.203.226 not allowed because not listed in AllowUsers Jan 16 04:34:15 host sshd[23078]: input_userauth_request: invalid user root [preauth] Jan 16 04:34:15 host unix_chkpwd[23089]: password check failed for user (root) Jan 16 04:34:15 host sshd[23078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.203.226 user=root Jan 16 04:34:15 host sshd[23078]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:34:17 host sshd[23078]: Failed password for invalid user root from 213.6.203.226 port 64197 ssh2 Jan 16 04:34:17 host sshd[23078]: Received disconnect from 213.6.203.226 port 64197:11: Bye Bye [preauth] Jan 16 04:34:17 host sshd[23078]: Disconnected from 213.6.203.226 port 64197 [preauth] Jan 16 04:34:28 host sshd[23102]: User root from 165.227.175.44 not allowed because not listed in AllowUsers Jan 16 04:34:28 host sshd[23102]: input_userauth_request: invalid user root [preauth] Jan 16 04:34:28 host unix_chkpwd[23126]: password check failed for user (root) Jan 16 04:34:28 host sshd[23102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.175.44 user=root Jan 16 04:34:28 host sshd[23102]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:34:30 host sshd[23102]: Failed password for invalid user root from 165.227.175.44 port 54552 ssh2 Jan 16 04:34:30 host sshd[23102]: Received disconnect from 165.227.175.44 port 54552:11: Bye Bye [preauth] Jan 16 04:34:30 host sshd[23102]: Disconnected from 165.227.175.44 port 54552 [preauth] Jan 16 04:34:44 host sshd[23145]: User root from 72.240.125.133 not allowed because not listed in AllowUsers Jan 16 04:34:44 host sshd[23145]: input_userauth_request: invalid user root [preauth] Jan 16 04:34:44 host unix_chkpwd[23148]: password check failed for user (root) Jan 16 04:34:44 host sshd[23145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.240.125.133 user=root Jan 16 04:34:44 host sshd[23145]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:34:46 host sshd[23145]: Failed password for invalid user root from 72.240.125.133 port 39722 ssh2 Jan 16 04:34:47 host sshd[23145]: Received disconnect from 72.240.125.133 port 39722:11: Bye Bye [preauth] Jan 16 04:34:47 host sshd[23145]: Disconnected from 72.240.125.133 port 39722 [preauth] Jan 16 04:36:09 host sshd[23374]: User root from 144.22.161.37 not allowed because not listed in AllowUsers Jan 16 04:36:09 host sshd[23374]: input_userauth_request: invalid user root [preauth] Jan 16 04:36:09 host unix_chkpwd[23378]: password check failed for user (root) Jan 16 04:36:09 host sshd[23374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.22.161.37 user=root Jan 16 04:36:09 host sshd[23374]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:36:10 host sshd[23374]: Failed password for invalid user root from 144.22.161.37 port 36324 ssh2 Jan 16 04:36:11 host sshd[23374]: Received disconnect from 144.22.161.37 port 36324:11: Bye Bye [preauth] Jan 16 04:36:11 host sshd[23374]: Disconnected from 144.22.161.37 port 36324 [preauth] Jan 16 04:37:09 host sshd[23495]: User root from 91.66.4.163 not allowed because not listed in AllowUsers Jan 16 04:37:09 host sshd[23495]: input_userauth_request: invalid user root [preauth] Jan 16 04:37:09 host unix_chkpwd[23499]: password check failed for user (root) Jan 16 04:37:09 host sshd[23495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.66.4.163 user=root Jan 16 04:37:09 host sshd[23495]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:37:11 host sshd[23495]: Failed password for invalid user root from 91.66.4.163 port 65241 ssh2 Jan 16 04:37:11 host sshd[23495]: Received disconnect from 91.66.4.163 port 65241:11: Bye Bye [preauth] Jan 16 04:37:11 host sshd[23495]: Disconnected from 91.66.4.163 port 65241 [preauth] Jan 16 04:37:41 host sshd[23566]: User root from 157.230.36.91 not allowed because not listed in AllowUsers Jan 16 04:37:41 host sshd[23566]: input_userauth_request: invalid user root [preauth] Jan 16 04:37:41 host unix_chkpwd[23568]: password check failed for user (root) Jan 16 04:37:41 host sshd[23566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.36.91 user=root Jan 16 04:37:41 host sshd[23566]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:37:43 host sshd[23566]: Failed password for invalid user root from 157.230.36.91 port 42324 ssh2 Jan 16 04:37:43 host sshd[23566]: Received disconnect from 157.230.36.91 port 42324:11: Bye Bye [preauth] Jan 16 04:37:43 host sshd[23566]: Disconnected from 157.230.36.91 port 42324 [preauth] Jan 16 04:37:48 host sshd[23576]: User root from 165.227.175.44 not allowed because not listed in AllowUsers Jan 16 04:37:48 host sshd[23576]: input_userauth_request: invalid user root [preauth] Jan 16 04:37:48 host unix_chkpwd[23579]: password check failed for user (root) Jan 16 04:37:48 host sshd[23576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.175.44 user=root Jan 16 04:37:48 host sshd[23576]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:37:50 host sshd[23576]: Failed password for invalid user root from 165.227.175.44 port 40176 ssh2 Jan 16 04:37:50 host sshd[23576]: Received disconnect from 165.227.175.44 port 40176:11: Bye Bye [preauth] Jan 16 04:37:50 host sshd[23576]: Disconnected from 165.227.175.44 port 40176 [preauth] Jan 16 04:38:30 host sshd[23804]: User root from 72.240.125.133 not allowed because not listed in AllowUsers Jan 16 04:38:30 host sshd[23804]: input_userauth_request: invalid user root [preauth] Jan 16 04:38:30 host unix_chkpwd[23811]: password check failed for user (root) Jan 16 04:38:30 host sshd[23804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.240.125.133 user=root Jan 16 04:38:30 host sshd[23804]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:38:31 host sshd[23806]: User root from 191.241.32.246 not allowed because not listed in AllowUsers Jan 16 04:38:31 host sshd[23806]: input_userauth_request: invalid user root [preauth] Jan 16 04:38:31 host unix_chkpwd[23813]: password check failed for user (root) Jan 16 04:38:31 host sshd[23806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.241.32.246 user=root Jan 16 04:38:31 host sshd[23806]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:38:32 host sshd[23804]: Failed password for invalid user root from 72.240.125.133 port 54302 ssh2 Jan 16 04:38:32 host sshd[23804]: Received disconnect from 72.240.125.133 port 54302:11: Bye Bye [preauth] Jan 16 04:38:32 host sshd[23804]: Disconnected from 72.240.125.133 port 54302 [preauth] Jan 16 04:38:32 host sshd[23806]: Failed password for invalid user root from 191.241.32.246 port 63533 ssh2 Jan 16 04:38:33 host sshd[23806]: Received disconnect from 191.241.32.246 port 63533:11: Bye Bye [preauth] Jan 16 04:38:33 host sshd[23806]: Disconnected from 191.241.32.246 port 63533 [preauth] Jan 16 04:39:00 host sshd[23912]: User root from 213.6.203.226 not allowed because not listed in AllowUsers Jan 16 04:39:00 host sshd[23912]: input_userauth_request: invalid user root [preauth] Jan 16 04:39:00 host unix_chkpwd[23916]: password check failed for user (root) Jan 16 04:39:00 host sshd[23912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.203.226 user=root Jan 16 04:39:00 host sshd[23912]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:39:02 host sshd[23912]: Failed password for invalid user root from 213.6.203.226 port 34012 ssh2 Jan 16 04:39:02 host sshd[23912]: Received disconnect from 213.6.203.226 port 34012:11: Bye Bye [preauth] Jan 16 04:39:02 host sshd[23912]: Disconnected from 213.6.203.226 port 34012 [preauth] Jan 16 04:39:24 host sshd[24009]: User root from 91.66.4.163 not allowed because not listed in AllowUsers Jan 16 04:39:24 host sshd[24009]: input_userauth_request: invalid user root [preauth] Jan 16 04:39:24 host unix_chkpwd[24013]: password check failed for user (root) Jan 16 04:39:24 host sshd[24009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.66.4.163 user=root Jan 16 04:39:24 host sshd[24009]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:39:26 host sshd[24009]: Failed password for invalid user root from 91.66.4.163 port 59919 ssh2 Jan 16 04:39:31 host sshd[24073]: User root from 157.230.36.91 not allowed because not listed in AllowUsers Jan 16 04:39:31 host sshd[24073]: input_userauth_request: invalid user root [preauth] Jan 16 04:39:31 host unix_chkpwd[24075]: password check failed for user (root) Jan 16 04:39:31 host sshd[24073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.36.91 user=root Jan 16 04:39:31 host sshd[24073]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:39:33 host sshd[24073]: Failed password for invalid user root from 157.230.36.91 port 40016 ssh2 Jan 16 04:39:33 host sshd[24073]: Received disconnect from 157.230.36.91 port 40016:11: Bye Bye [preauth] Jan 16 04:39:33 host sshd[24073]: Disconnected from 157.230.36.91 port 40016 [preauth] Jan 16 04:39:34 host sshd[24078]: User root from 144.22.161.37 not allowed because not listed in AllowUsers Jan 16 04:39:34 host sshd[24078]: input_userauth_request: invalid user root [preauth] Jan 16 04:39:34 host unix_chkpwd[24082]: password check failed for user (root) Jan 16 04:39:34 host sshd[24078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.22.161.37 user=root Jan 16 04:39:34 host sshd[24078]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 04:39:37 host sshd[24078]: Failed password for invalid user root from 144.22.161.37 port 48400 ssh2 Jan 16 05:03:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 05:03:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:03:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:03:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 05:03:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:03:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:03:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 05:03:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:03:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:03:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 05:03:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:03:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:03:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 05:03:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:03:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:03:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 05:03:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:03:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:03:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 05:03:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:03:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:06:10 host sshd[28006]: Invalid user vadmin from 119.201.206.169 port 54718 Jan 16 05:06:10 host sshd[28006]: input_userauth_request: invalid user vadmin [preauth] Jan 16 05:06:10 host sshd[28006]: pam_unix(sshd:auth): check pass; user unknown Jan 16 05:06:10 host sshd[28006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.201.206.169 Jan 16 05:06:12 host sshd[28006]: Failed password for invalid user vadmin from 119.201.206.169 port 54718 ssh2 Jan 16 05:06:12 host sshd[28006]: Connection reset by 119.201.206.169 port 54718 [preauth] Jan 16 05:13:59 host sshd[29030]: Invalid user eu from 194.110.203.109 port 57170 Jan 16 05:13:59 host sshd[29030]: input_userauth_request: invalid user eu [preauth] Jan 16 05:13:59 host sshd[29030]: pam_unix(sshd:auth): check pass; user unknown Jan 16 05:13:59 host sshd[29030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 05:14:00 host sshd[29030]: Failed password for invalid user eu from 194.110.203.109 port 57170 ssh2 Jan 16 05:14:04 host sshd[29030]: pam_unix(sshd:auth): check pass; user unknown Jan 16 05:14:06 host sshd[29030]: Failed password for invalid user eu from 194.110.203.109 port 57170 ssh2 Jan 16 05:14:09 host sshd[29030]: pam_unix(sshd:auth): check pass; user unknown Jan 16 05:14:11 host sshd[29030]: Failed password for invalid user eu from 194.110.203.109 port 57170 ssh2 Jan 16 05:14:14 host sshd[29030]: Connection closed by 194.110.203.109 port 57170 [preauth] Jan 16 05:14:14 host sshd[29030]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 05:14:59 host sshd[29245]: User root from 200.111.101.210 not allowed because not listed in AllowUsers Jan 16 05:14:59 host sshd[29245]: input_userauth_request: invalid user root [preauth] Jan 16 05:15:00 host unix_chkpwd[29249]: password check failed for user (root) Jan 16 05:15:00 host sshd[29245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.111.101.210 user=root Jan 16 05:15:00 host sshd[29245]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 05:15:01 host sshd[29245]: Failed password for invalid user root from 200.111.101.210 port 21675 ssh2 Jan 16 05:15:01 host sshd[29245]: Received disconnect from 200.111.101.210 port 21675:11: Bye Bye [preauth] Jan 16 05:15:01 host sshd[29245]: Disconnected from 200.111.101.210 port 21675 [preauth] Jan 16 05:16:24 host sshd[29488]: Invalid user emcali from 186.189.141.232 port 38649 Jan 16 05:16:24 host sshd[29488]: input_userauth_request: invalid user emcali [preauth] Jan 16 05:16:24 host sshd[29488]: pam_unix(sshd:auth): check pass; user unknown Jan 16 05:16:24 host sshd[29488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.189.141.232 Jan 16 05:16:25 host sshd[29488]: Failed password for invalid user emcali from 186.189.141.232 port 38649 ssh2 Jan 16 05:16:26 host sshd[29488]: Failed password for invalid user emcali from 186.189.141.232 port 38649 ssh2 Jan 16 05:16:26 host sshd[29488]: Connection closed by 186.189.141.232 port 38649 [preauth] Jan 16 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=a2zgroup user-4=dartsimp user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=keralaholi user-10=wwwresourcehunte user-11=wwwrmswll user-12=remysagr user-13=disposeat user-14=wwwkmaorg user-15=wwwkapin user-16=woodpeck user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=wwwletsstalkfood user-24=straightcurve user-25=kottayamcalldriv user-26=phmetals user-27=palco123 user-28=gifterman user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 05:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 16 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 16 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 16 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 16 05:21:04 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 16 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 16 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 16 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 16 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 16 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 16 05:21:05 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 16 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 16 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 16 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Jan 16 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Jan 16 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Jan 16 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session closed for user dartsimp Jan 16 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Jan 16 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Jan 16 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session closed for user travelboniface Jan 16 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 16 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 16 05:21:06 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 16 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-DF9TqENDJo53vrEA.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-DF9TqENDJo53vrEA.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user remysagr Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user disposeat Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user vfmassets Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user pmcresources Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user straightcurve Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user phmetals Jan 16 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 16 05:21:07 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 16 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session closed for user gifterman Jan 16 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Jan 16 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 16 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 16 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 16 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-0jXN34wyGR7IUTr3.wp-toolkit-identifier Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 16 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-0jXN34wyGR7IUTr3.wp-toolkit-identifier Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 16 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wYbBG8RYCtZ7m8fN.~ Jan 16 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wYbBG8RYCtZ7m8fN.~' Jan 16 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wYbBG8RYCtZ7m8fN.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 05:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 05:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 05:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 05:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 05:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 05:22:02 host sshd[30886]: Connection reset by 98.143.227.205 port 62792 [preauth] Jan 16 05:22:13 host sshd[30913]: Invalid user sFTPUser from 175.183.85.113 port 38915 Jan 16 05:22:13 host sshd[30913]: input_userauth_request: invalid user sFTPUser [preauth] Jan 16 05:22:13 host sshd[30913]: pam_unix(sshd:auth): check pass; user unknown Jan 16 05:22:13 host sshd[30913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.183.85.113 Jan 16 05:22:15 host sshd[30913]: Failed password for invalid user sFTPUser from 175.183.85.113 port 38915 ssh2 Jan 16 05:22:15 host sshd[30913]: Connection reset by 175.183.85.113 port 38915 [preauth] Jan 16 05:28:04 host sshd[31685]: Invalid user juan from 209.141.56.48 port 55498 Jan 16 05:28:04 host sshd[31685]: input_userauth_request: invalid user juan [preauth] Jan 16 05:28:04 host sshd[31685]: pam_unix(sshd:auth): check pass; user unknown Jan 16 05:28:04 host sshd[31685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 16 05:28:05 host sshd[31685]: Failed password for invalid user juan from 209.141.56.48 port 55498 ssh2 Jan 16 05:28:06 host sshd[31685]: Connection closed by 209.141.56.48 port 55498 [preauth] Jan 16 05:28:45 host sshd[31774]: Invalid user mike from 107.189.30.59 port 37172 Jan 16 05:28:45 host sshd[31774]: input_userauth_request: invalid user mike [preauth] Jan 16 05:28:45 host sshd[31774]: pam_unix(sshd:auth): check pass; user unknown Jan 16 05:28:45 host sshd[31774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 16 05:28:47 host sshd[31774]: Failed password for invalid user mike from 107.189.30.59 port 37172 ssh2 Jan 16 05:28:48 host sshd[31774]: Connection closed by 107.189.30.59 port 37172 [preauth] Jan 16 05:31:48 host sshd[32283]: Connection reset by 171.6.78.101 port 37966 [preauth] Jan 16 05:32:06 host sshd[32356]: Invalid user juan from 209.141.56.48 port 40838 Jan 16 05:32:06 host sshd[32356]: input_userauth_request: invalid user juan [preauth] Jan 16 05:32:06 host sshd[32356]: pam_unix(sshd:auth): check pass; user unknown Jan 16 05:32:06 host sshd[32356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 16 05:32:09 host sshd[32356]: Failed password for invalid user juan from 209.141.56.48 port 40838 ssh2 Jan 16 05:32:09 host sshd[32356]: Connection closed by 209.141.56.48 port 40838 [preauth] Jan 16 05:37:07 host sshd[637]: Invalid user nginx from 14.42.53.181 port 60343 Jan 16 05:37:07 host sshd[637]: input_userauth_request: invalid user nginx [preauth] Jan 16 05:37:07 host sshd[637]: pam_unix(sshd:auth): check pass; user unknown Jan 16 05:37:07 host sshd[637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.42.53.181 Jan 16 05:37:09 host sshd[637]: Failed password for invalid user nginx from 14.42.53.181 port 60343 ssh2 Jan 16 05:37:10 host sshd[637]: Connection reset by 14.42.53.181 port 60343 [preauth] Jan 16 05:37:43 host sshd[737]: User root from 164.92.192.247 not allowed because not listed in AllowUsers Jan 16 05:37:43 host sshd[737]: input_userauth_request: invalid user root [preauth] Jan 16 05:37:43 host unix_chkpwd[741]: password check failed for user (root) Jan 16 05:37:43 host sshd[737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.192.247 user=root Jan 16 05:37:43 host sshd[737]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 05:37:45 host sshd[737]: Failed password for invalid user root from 164.92.192.247 port 46260 ssh2 Jan 16 05:37:46 host sshd[737]: Received disconnect from 164.92.192.247 port 46260:11: Bye Bye [preauth] Jan 16 05:37:46 host sshd[737]: Disconnected from 164.92.192.247 port 46260 [preauth] Jan 16 05:39:48 host sshd[992]: User root from 164.92.192.247 not allowed because not listed in AllowUsers Jan 16 05:39:48 host sshd[992]: input_userauth_request: invalid user root [preauth] Jan 16 05:39:48 host unix_chkpwd[996]: password check failed for user (root) Jan 16 05:39:48 host sshd[992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.192.247 user=root Jan 16 05:39:48 host sshd[992]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 05:39:51 host sshd[992]: Failed password for invalid user root from 164.92.192.247 port 47404 ssh2 Jan 16 05:39:51 host sshd[992]: Received disconnect from 164.92.192.247 port 47404:11: Bye Bye [preauth] Jan 16 05:39:51 host sshd[992]: Disconnected from 164.92.192.247 port 47404 [preauth] Jan 16 05:44:33 host sshd[1798]: Invalid user pi from 59.92.106.29 port 44285 Jan 16 05:44:33 host sshd[1798]: input_userauth_request: invalid user pi [preauth] Jan 16 05:44:33 host sshd[1798]: pam_unix(sshd:auth): check pass; user unknown Jan 16 05:44:33 host sshd[1798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.92.106.29 Jan 16 05:44:35 host sshd[1798]: Failed password for invalid user pi from 59.92.106.29 port 44285 ssh2 Jan 16 05:44:36 host sshd[1798]: pam_unix(sshd:auth): check pass; user unknown Jan 16 05:44:38 host sshd[1798]: Failed password for invalid user pi from 59.92.106.29 port 44285 ssh2 Jan 16 05:44:41 host sshd[1798]: Connection reset by 59.92.106.29 port 44285 [preauth] Jan 16 05:44:41 host sshd[1798]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.92.106.29 Jan 16 05:45:09 host sshd[1868]: Connection reset by 61.83.41.209 port 60492 [preauth] Jan 16 05:50:06 host sshd[2562]: User root from 202.131.233.35 not allowed because not listed in AllowUsers Jan 16 05:50:06 host sshd[2562]: input_userauth_request: invalid user root [preauth] Jan 16 05:50:06 host unix_chkpwd[2567]: password check failed for user (root) Jan 16 05:50:06 host sshd[2562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.233.35 user=root Jan 16 05:50:06 host sshd[2562]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 05:50:08 host sshd[2562]: Failed password for invalid user root from 202.131.233.35 port 34580 ssh2 Jan 16 05:50:08 host sshd[2562]: Received disconnect from 202.131.233.35 port 34580:11: Bye Bye [preauth] Jan 16 05:50:08 host sshd[2562]: Disconnected from 202.131.233.35 port 34580 [preauth] Jan 16 05:52:21 host sshd[2985]: User root from 202.131.233.35 not allowed because not listed in AllowUsers Jan 16 05:52:21 host sshd[2985]: input_userauth_request: invalid user root [preauth] Jan 16 05:52:21 host unix_chkpwd[2989]: password check failed for user (root) Jan 16 05:52:21 host sshd[2985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.233.35 user=root Jan 16 05:52:21 host sshd[2985]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 05:52:23 host sshd[2985]: Failed password for invalid user root from 202.131.233.35 port 55430 ssh2 Jan 16 05:57:21 host sshd[3721]: Connection reset by 139.9.5.44 port 46102 [preauth] Jan 16 05:57:21 host sshd[3723]: Connection reset by 139.9.5.44 port 46072 [preauth] Jan 16 05:57:27 host sshd[3742]: Did not receive identification string from 139.9.5.44 port 46058 Jan 16 05:57:28 host sshd[3743]: Did not receive identification string from 139.9.5.44 port 46056 Jan 16 05:57:29 host sshd[3769]: Connection reset by 139.9.5.44 port 46086 [preauth] Jan 16 05:57:30 host sshd[3777]: Did not receive identification string from 139.9.5.44 port 46062 Jan 16 05:57:36 host sshd[3806]: Connection reset by 139.9.5.44 port 46066 [preauth] Jan 16 05:57:41 host sshd[3745]: User root from 139.9.5.44 not allowed because not listed in AllowUsers Jan 16 05:57:41 host sshd[3745]: input_userauth_request: invalid user root [preauth] Jan 16 05:57:42 host sshd[3745]: Connection reset by 139.9.5.44 port 46078 [preauth] Jan 16 05:58:28 host sshd[3929]: Invalid user ec2-user from 122.117.98.41 port 49561 Jan 16 05:58:28 host sshd[3929]: input_userauth_request: invalid user ec2-user [preauth] Jan 16 05:58:28 host sshd[3929]: pam_unix(sshd:auth): check pass; user unknown Jan 16 05:58:28 host sshd[3929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.98.41 Jan 16 05:58:30 host sshd[3929]: Failed password for invalid user ec2-user from 122.117.98.41 port 49561 ssh2 Jan 16 05:58:30 host sshd[3929]: Connection reset by 122.117.98.41 port 49561 [preauth] Jan 16 05:58:48 host sshd[3960]: Connection reset by 139.9.5.44 port 46090 [preauth] Jan 16 05:58:50 host sshd[3728]: Connection reset by 139.9.5.44 port 46050 [preauth] Jan 16 06:01:18 host sshd[4466]: Invalid user bigipuser3 from 203.66.178.245 port 34546 Jan 16 06:01:18 host sshd[4466]: input_userauth_request: invalid user bigipuser3 [preauth] Jan 16 06:01:18 host sshd[4466]: pam_unix(sshd:auth): check pass; user unknown Jan 16 06:01:18 host sshd[4466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.66.178.245 Jan 16 06:01:21 host sshd[4466]: Failed password for invalid user bigipuser3 from 203.66.178.245 port 34546 ssh2 Jan 16 06:01:21 host sshd[4466]: pam_unix(sshd:auth): check pass; user unknown Jan 16 06:01:23 host sshd[4466]: Failed password for invalid user bigipuser3 from 203.66.178.245 port 34546 ssh2 Jan 16 06:01:24 host sshd[4466]: Connection reset by 203.66.178.245 port 34546 [preauth] Jan 16 06:01:24 host sshd[4466]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.66.178.245 Jan 16 06:02:17 host sshd[4594]: Invalid user juan from 209.141.56.48 port 45672 Jan 16 06:02:17 host sshd[4594]: input_userauth_request: invalid user juan [preauth] Jan 16 06:02:17 host sshd[4594]: pam_unix(sshd:auth): check pass; user unknown Jan 16 06:02:17 host sshd[4594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 16 06:02:19 host sshd[4594]: Failed password for invalid user juan from 209.141.56.48 port 45672 ssh2 Jan 16 06:02:59 host sshd[4704]: Connection reset by 14.56.24.201 port 60108 [preauth] Jan 16 06:11:12 host sshd[5847]: User root from 144.172.73.16 not allowed because not listed in AllowUsers Jan 16 06:11:12 host sshd[5847]: input_userauth_request: invalid user root [preauth] Jan 16 06:11:13 host sshd[5847]: Connection closed by 144.172.73.16 port 38788 [preauth] Jan 16 06:11:26 host sshd[5881]: User root from 185.220.102.241 not allowed because not listed in AllowUsers Jan 16 06:11:26 host sshd[5881]: input_userauth_request: invalid user root [preauth] Jan 16 06:11:26 host unix_chkpwd[5885]: password check failed for user (root) Jan 16 06:11:26 host sshd[5881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.241 user=root Jan 16 06:11:26 host sshd[5881]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:11:28 host sshd[5881]: Failed password for invalid user root from 185.220.102.241 port 15503 ssh2 Jan 16 06:11:29 host unix_chkpwd[5912]: password check failed for user (root) Jan 16 06:11:29 host sshd[5881]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:11:31 host sshd[5881]: Failed password for invalid user root from 185.220.102.241 port 15503 ssh2 Jan 16 06:11:32 host unix_chkpwd[5921]: password check failed for user (root) Jan 16 06:11:32 host sshd[5881]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:11:34 host sshd[5881]: Failed password for invalid user root from 185.220.102.241 port 15503 ssh2 Jan 16 06:11:35 host unix_chkpwd[5924]: password check failed for user (root) Jan 16 06:11:35 host sshd[5881]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:11:36 host sshd[5881]: Failed password for invalid user root from 185.220.102.241 port 15503 ssh2 Jan 16 06:11:39 host unix_chkpwd[5939]: password check failed for user (root) Jan 16 06:11:39 host sshd[5881]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:11:41 host sshd[5881]: Failed password for invalid user root from 185.220.102.241 port 15503 ssh2 Jan 16 06:11:46 host sshd[5871]: Did not receive identification string from 5.2.70.140 port 20769 Jan 16 06:12:14 host sshd[6120]: User root from 146.59.233.33 not allowed because not listed in AllowUsers Jan 16 06:12:14 host sshd[6120]: input_userauth_request: invalid user root [preauth] Jan 16 06:12:14 host unix_chkpwd[6130]: password check failed for user (root) Jan 16 06:12:14 host sshd[6120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.59.233.33 user=root Jan 16 06:12:14 host sshd[6120]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:12:15 host sshd[6120]: Failed password for invalid user root from 146.59.233.33 port 43470 ssh2 Jan 16 06:12:16 host unix_chkpwd[6133]: password check failed for user (root) Jan 16 06:12:16 host sshd[6120]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:12:18 host sshd[6120]: Failed password for invalid user root from 146.59.233.33 port 43470 ssh2 Jan 16 06:12:18 host unix_chkpwd[6135]: password check failed for user (root) Jan 16 06:12:18 host sshd[6120]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:12:19 host sshd[6120]: Failed password for invalid user root from 146.59.233.33 port 43470 ssh2 Jan 16 06:12:20 host unix_chkpwd[6144]: password check failed for user (root) Jan 16 06:12:20 host sshd[6120]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:12:22 host sshd[6120]: Failed password for invalid user root from 146.59.233.33 port 43470 ssh2 Jan 16 06:12:57 host sshd[6233]: User root from 185.220.102.245 not allowed because not listed in AllowUsers Jan 16 06:12:57 host sshd[6233]: input_userauth_request: invalid user root [preauth] Jan 16 06:12:57 host unix_chkpwd[6240]: password check failed for user (root) Jan 16 06:12:57 host sshd[6233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.245 user=root Jan 16 06:12:57 host sshd[6233]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:12:59 host sshd[6233]: Failed password for invalid user root from 185.220.102.245 port 10607 ssh2 Jan 16 06:13:00 host unix_chkpwd[6244]: password check failed for user (root) Jan 16 06:13:00 host sshd[6233]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:13:02 host sshd[6233]: Failed password for invalid user root from 185.220.102.245 port 10607 ssh2 Jan 16 06:13:03 host unix_chkpwd[6263]: password check failed for user (root) Jan 16 06:13:03 host sshd[6233]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:13:05 host sshd[6233]: Failed password for invalid user root from 185.220.102.245 port 10607 ssh2 Jan 16 06:13:06 host unix_chkpwd[6267]: password check failed for user (root) Jan 16 06:13:06 host sshd[6233]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:13:08 host sshd[6233]: Failed password for invalid user root from 185.220.102.245 port 10607 ssh2 Jan 16 06:13:09 host unix_chkpwd[6294]: password check failed for user (root) Jan 16 06:13:09 host sshd[6233]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:13:12 host sshd[6233]: Failed password for invalid user root from 185.220.102.245 port 10607 ssh2 Jan 16 06:13:44 host sshd[6384]: User root from 185.129.62.62 not allowed because not listed in AllowUsers Jan 16 06:13:44 host sshd[6384]: input_userauth_request: invalid user root [preauth] Jan 16 06:13:44 host unix_chkpwd[6395]: password check failed for user (root) Jan 16 06:13:44 host sshd[6384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.129.62.62 user=root Jan 16 06:13:44 host sshd[6384]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:13:46 host sshd[6384]: Failed password for invalid user root from 185.129.62.62 port 33328 ssh2 Jan 16 06:13:47 host unix_chkpwd[6411]: password check failed for user (root) Jan 16 06:13:47 host sshd[6384]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:13:49 host sshd[6384]: Failed password for invalid user root from 185.129.62.62 port 33328 ssh2 Jan 16 06:13:50 host unix_chkpwd[6430]: password check failed for user (root) Jan 16 06:13:50 host sshd[6384]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:13:52 host sshd[6384]: Failed password for invalid user root from 185.129.62.62 port 33328 ssh2 Jan 16 06:13:53 host unix_chkpwd[6434]: password check failed for user (root) Jan 16 06:13:53 host sshd[6384]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:13:55 host sshd[6384]: Failed password for invalid user root from 185.129.62.62 port 33328 ssh2 Jan 16 06:15:05 host sshd[6606]: User root from 185.220.102.243 not allowed because not listed in AllowUsers Jan 16 06:15:05 host sshd[6606]: input_userauth_request: invalid user root [preauth] Jan 16 06:15:05 host unix_chkpwd[6650]: password check failed for user (root) Jan 16 06:15:05 host sshd[6606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.243 user=root Jan 16 06:15:05 host sshd[6606]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:15:06 host sshd[6576]: Did not receive identification string from 203.28.246.101 port 45318 Jan 16 06:15:08 host sshd[6606]: Failed password for invalid user root from 185.220.102.243 port 34311 ssh2 Jan 16 06:15:08 host unix_chkpwd[6656]: password check failed for user (root) Jan 16 06:15:08 host sshd[6606]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:15:10 host sshd[6606]: Failed password for invalid user root from 185.220.102.243 port 34311 ssh2 Jan 16 06:15:11 host unix_chkpwd[6666]: password check failed for user (root) Jan 16 06:15:11 host sshd[6606]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:15:13 host sshd[6606]: Failed password for invalid user root from 185.220.102.243 port 34311 ssh2 Jan 16 06:15:14 host unix_chkpwd[6675]: password check failed for user (root) Jan 16 06:15:14 host sshd[6606]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:15:16 host sshd[6606]: Failed password for invalid user root from 185.220.102.243 port 34311 ssh2 Jan 16 06:15:36 host sshd[6751]: User root from 62.93.62.98 not allowed because not listed in AllowUsers Jan 16 06:15:36 host sshd[6751]: input_userauth_request: invalid user root [preauth] Jan 16 06:15:36 host unix_chkpwd[6755]: password check failed for user (root) Jan 16 06:15:36 host sshd[6751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.93.62.98 user=root Jan 16 06:15:36 host sshd[6751]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:15:37 host sshd[6751]: Failed password for invalid user root from 62.93.62.98 port 41496 ssh2 Jan 16 06:15:38 host unix_chkpwd[6758]: password check failed for user (root) Jan 16 06:15:38 host sshd[6751]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:15:40 host sshd[6751]: Failed password for invalid user root from 62.93.62.98 port 41496 ssh2 Jan 16 06:15:41 host sshd[6751]: Connection reset by 62.93.62.98 port 41496 [preauth] Jan 16 06:15:41 host sshd[6751]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.93.62.98 user=root Jan 16 06:15:47 host sshd[6766]: User root from 203.28.246.189 not allowed because not listed in AllowUsers Jan 16 06:15:47 host sshd[6766]: input_userauth_request: invalid user root [preauth] Jan 16 06:15:47 host unix_chkpwd[6771]: password check failed for user (root) Jan 16 06:15:47 host sshd[6766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.28.246.189 user=root Jan 16 06:15:47 host sshd[6766]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:15:50 host sshd[6766]: Failed password for invalid user root from 203.28.246.189 port 35436 ssh2 Jan 16 06:15:51 host unix_chkpwd[6777]: password check failed for user (root) Jan 16 06:15:51 host sshd[6766]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:15:53 host sshd[6766]: Failed password for invalid user root from 203.28.246.189 port 35436 ssh2 Jan 16 06:15:54 host unix_chkpwd[6780]: password check failed for user (root) Jan 16 06:15:54 host sshd[6766]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:15:56 host sshd[6766]: Failed password for invalid user root from 203.28.246.189 port 35436 ssh2 Jan 16 06:15:57 host unix_chkpwd[6784]: password check failed for user (root) Jan 16 06:15:57 host sshd[6766]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:15:59 host sshd[6766]: Failed password for invalid user root from 203.28.246.189 port 35436 ssh2 Jan 16 06:16:00 host unix_chkpwd[6794]: password check failed for user (root) Jan 16 06:16:00 host sshd[6766]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:16:01 host sshd[6766]: Failed password for invalid user root from 203.28.246.189 port 35436 ssh2 Jan 16 06:17:19 host sshd[7083]: User ftp from 58.123.137.76 not allowed because not listed in AllowUsers Jan 16 06:17:19 host sshd[7083]: input_userauth_request: invalid user ftp [preauth] Jan 16 06:17:19 host unix_chkpwd[7091]: password check failed for user (ftp) Jan 16 06:17:19 host sshd[7083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.123.137.76 user=ftp Jan 16 06:17:19 host sshd[7083]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 16 06:17:21 host sshd[7083]: Failed password for invalid user ftp from 58.123.137.76 port 63452 ssh2 Jan 16 06:17:21 host sshd[7083]: Connection reset by 58.123.137.76 port 63452 [preauth] Jan 16 06:17:41 host sshd[7045]: Connection reset by 107.189.5.241 port 38854 [preauth] Jan 16 06:17:43 host sshd[7141]: User root from 185.220.102.247 not allowed because not listed in AllowUsers Jan 16 06:17:43 host sshd[7141]: input_userauth_request: invalid user root [preauth] Jan 16 06:17:43 host unix_chkpwd[7150]: password check failed for user (root) Jan 16 06:17:43 host sshd[7141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.247 user=root Jan 16 06:17:43 host sshd[7141]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:17:45 host sshd[7141]: Failed password for invalid user root from 185.220.102.247 port 26683 ssh2 Jan 16 06:18:23 host sshd[7141]: Connection closed by 185.220.102.247 port 26683 [preauth] Jan 16 06:18:45 host sshd[7256]: User root from 23.129.64.131 not allowed because not listed in AllowUsers Jan 16 06:18:45 host sshd[7256]: input_userauth_request: invalid user root [preauth] Jan 16 06:18:45 host unix_chkpwd[7263]: password check failed for user (root) Jan 16 06:18:45 host sshd[7256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.131 user=root Jan 16 06:18:45 host sshd[7256]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:18:47 host sshd[7256]: Failed password for invalid user root from 23.129.64.131 port 13368 ssh2 Jan 16 06:18:47 host unix_chkpwd[7266]: password check failed for user (root) Jan 16 06:18:47 host sshd[7256]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:18:49 host sshd[7256]: Failed password for invalid user root from 23.129.64.131 port 13368 ssh2 Jan 16 06:18:50 host unix_chkpwd[7273]: password check failed for user (root) Jan 16 06:18:50 host sshd[7256]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:18:52 host sshd[7256]: Failed password for invalid user root from 23.129.64.131 port 13368 ssh2 Jan 16 06:18:52 host unix_chkpwd[7276]: password check failed for user (root) Jan 16 06:18:52 host sshd[7256]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:18:54 host sshd[7256]: Failed password for invalid user root from 23.129.64.131 port 13368 ssh2 Jan 16 06:18:55 host unix_chkpwd[7298]: password check failed for user (root) Jan 16 06:18:55 host sshd[7256]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:18:56 host sshd[7256]: Failed password for invalid user root from 23.129.64.131 port 13368 ssh2 Jan 16 06:19:38 host sshd[7365]: User root from 162.247.74.206 not allowed because not listed in AllowUsers Jan 16 06:19:38 host sshd[7365]: input_userauth_request: invalid user root [preauth] Jan 16 06:19:38 host unix_chkpwd[7400]: password check failed for user (root) Jan 16 06:19:38 host sshd[7365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.206 user=root Jan 16 06:19:38 host sshd[7365]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:19:40 host sshd[7365]: Failed password for invalid user root from 162.247.74.206 port 48952 ssh2 Jan 16 06:19:56 host unix_chkpwd[7437]: password check failed for user (root) Jan 16 06:19:56 host sshd[7365]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:19:58 host sshd[7365]: Failed password for invalid user root from 162.247.74.206 port 48952 ssh2 Jan 16 06:19:59 host unix_chkpwd[7444]: password check failed for user (root) Jan 16 06:19:59 host sshd[7365]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:20:01 host sshd[7365]: Failed password for invalid user root from 162.247.74.206 port 48952 ssh2 Jan 16 06:20:03 host unix_chkpwd[7477]: password check failed for user (root) Jan 16 06:20:03 host sshd[7365]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:20:05 host sshd[7365]: Failed password for invalid user root from 162.247.74.206 port 48952 ssh2 Jan 16 06:20:38 host sshd[7611]: User root from 185.220.103.7 not allowed because not listed in AllowUsers Jan 16 06:20:38 host sshd[7611]: input_userauth_request: invalid user root [preauth] Jan 16 06:20:38 host unix_chkpwd[7614]: password check failed for user (root) Jan 16 06:20:38 host sshd[7611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.103.7 user=root Jan 16 06:20:38 host sshd[7611]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:20:40 host sshd[7611]: Failed password for invalid user root from 185.220.103.7 port 57002 ssh2 Jan 16 06:20:41 host unix_chkpwd[7619]: password check failed for user (root) Jan 16 06:20:41 host sshd[7611]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:20:43 host sshd[7611]: Failed password for invalid user root from 185.220.103.7 port 57002 ssh2 Jan 16 06:20:44 host unix_chkpwd[7624]: password check failed for user (root) Jan 16 06:20:44 host sshd[7611]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:20:47 host sshd[7611]: Failed password for invalid user root from 185.220.103.7 port 57002 ssh2 Jan 16 06:20:47 host unix_chkpwd[7627]: password check failed for user (root) Jan 16 06:20:47 host sshd[7611]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:20:49 host sshd[7611]: Failed password for invalid user root from 185.220.103.7 port 57002 ssh2 Jan 16 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=ugotscom user-8=wwwrmswll user-9=wwwresourcehunte user-10=keralaholi user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=remysagr user-15=disposeat user-16=wwwkmaorg user-17=pmcresources user-18=wwwtestugo user-19=shalinijames user-20=vfmassets user-21=wwwletsstalkfood user-22=straightcurve user-23=wwwevmhonda user-24=bonifacegroup user-25=mrsclean user-26=wwwnexidigital user-27=phmetals user-28=kottayamcalldriv user-29=gifterman user-30=palco123 feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 06:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 06:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 06:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3jeK2WFhRDCNFwaV.~ Jan 16 06:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3jeK2WFhRDCNFwaV.~' Jan 16 06:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3jeK2WFhRDCNFwaV.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 06:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 06:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 06:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 06:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 06:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 06:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 06:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 06:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 06:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 06:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 06:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 06:22:27 host sshd[8032]: User root from 23.129.64.224 not allowed because not listed in AllowUsers Jan 16 06:22:27 host sshd[8032]: input_userauth_request: invalid user root [preauth] Jan 16 06:22:27 host unix_chkpwd[8041]: password check failed for user (root) Jan 16 06:22:27 host sshd[8032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.224 user=root Jan 16 06:22:27 host sshd[8032]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:22:29 host sshd[8032]: Failed password for invalid user root from 23.129.64.224 port 6746 ssh2 Jan 16 06:22:30 host unix_chkpwd[8065]: password check failed for user (root) Jan 16 06:22:30 host sshd[8032]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:22:32 host sshd[8032]: Failed password for invalid user root from 23.129.64.224 port 6746 ssh2 Jan 16 06:22:32 host unix_chkpwd[8068]: password check failed for user (root) Jan 16 06:22:32 host sshd[8032]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:22:35 host sshd[8032]: Failed password for invalid user root from 23.129.64.224 port 6746 ssh2 Jan 16 06:22:35 host unix_chkpwd[8072]: password check failed for user (root) Jan 16 06:22:35 host sshd[8032]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:22:38 host sshd[8032]: Failed password for invalid user root from 23.129.64.224 port 6746 ssh2 Jan 16 06:22:38 host unix_chkpwd[8076]: password check failed for user (root) Jan 16 06:22:38 host sshd[8032]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:22:40 host sshd[8032]: Failed password for invalid user root from 23.129.64.224 port 6746 ssh2 Jan 16 06:22:48 host sshd[8223]: Connection closed by 172.104.11.34 port 6318 [preauth] Jan 16 06:22:49 host sshd[8229]: Connection closed by 172.104.11.34 port 6332 [preauth] Jan 16 06:22:51 host sshd[8233]: Connection closed by 172.104.11.34 port 6338 [preauth] Jan 16 06:23:22 host sshd[8294]: User root from 185.220.102.250 not allowed because not listed in AllowUsers Jan 16 06:23:22 host sshd[8294]: input_userauth_request: invalid user root [preauth] Jan 16 06:23:22 host unix_chkpwd[8298]: password check failed for user (root) Jan 16 06:23:22 host sshd[8294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.250 user=root Jan 16 06:23:22 host sshd[8294]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:23:24 host sshd[8294]: Failed password for invalid user root from 185.220.102.250 port 48315 ssh2 Jan 16 06:23:25 host unix_chkpwd[8304]: password check failed for user (root) Jan 16 06:23:25 host sshd[8294]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:23:26 host sshd[8294]: Failed password for invalid user root from 185.220.102.250 port 48315 ssh2 Jan 16 06:23:27 host unix_chkpwd[8307]: password check failed for user (root) Jan 16 06:23:27 host sshd[8294]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:23:28 host sshd[8294]: Failed password for invalid user root from 185.220.102.250 port 48315 ssh2 Jan 16 06:23:29 host unix_chkpwd[8334]: password check failed for user (root) Jan 16 06:23:29 host sshd[8294]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:23:31 host sshd[8294]: Failed password for invalid user root from 185.220.102.250 port 48315 ssh2 Jan 16 06:24:16 host sshd[8452]: User root from 162.247.74.74 not allowed because not listed in AllowUsers Jan 16 06:24:16 host sshd[8452]: input_userauth_request: invalid user root [preauth] Jan 16 06:24:16 host unix_chkpwd[8529]: password check failed for user (root) Jan 16 06:24:16 host sshd[8452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.74 user=root Jan 16 06:24:16 host sshd[8452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:24:19 host sshd[8452]: Failed password for invalid user root from 162.247.74.74 port 46728 ssh2 Jan 16 06:24:19 host unix_chkpwd[8541]: password check failed for user (root) Jan 16 06:24:19 host sshd[8452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:24:21 host sshd[8452]: Failed password for invalid user root from 162.247.74.74 port 46728 ssh2 Jan 16 06:24:22 host unix_chkpwd[8544]: password check failed for user (root) Jan 16 06:24:22 host sshd[8452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:24:23 host sshd[8452]: Failed password for invalid user root from 162.247.74.74 port 46728 ssh2 Jan 16 06:24:24 host unix_chkpwd[8549]: password check failed for user (root) Jan 16 06:24:24 host sshd[8452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:24:26 host sshd[8452]: Failed password for invalid user root from 162.247.74.74 port 46728 ssh2 Jan 16 06:24:56 host sshd[8684]: User root from 162.247.74.216 not allowed because not listed in AllowUsers Jan 16 06:24:56 host sshd[8684]: input_userauth_request: invalid user root [preauth] Jan 16 06:24:56 host unix_chkpwd[8688]: password check failed for user (root) Jan 16 06:24:56 host sshd[8684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.216 user=root Jan 16 06:24:56 host sshd[8684]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:24:57 host sshd[8684]: Failed password for invalid user root from 162.247.74.216 port 33340 ssh2 Jan 16 06:24:58 host unix_chkpwd[8694]: password check failed for user (root) Jan 16 06:24:58 host sshd[8684]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:25:00 host sshd[8684]: Failed password for invalid user root from 162.247.74.216 port 33340 ssh2 Jan 16 06:25:00 host unix_chkpwd[8697]: password check failed for user (root) Jan 16 06:25:00 host sshd[8684]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:25:02 host sshd[8684]: Failed password for invalid user root from 162.247.74.216 port 33340 ssh2 Jan 16 06:25:03 host unix_chkpwd[8726]: password check failed for user (root) Jan 16 06:25:03 host sshd[8684]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:25:05 host sshd[8684]: Failed password for invalid user root from 162.247.74.216 port 33340 ssh2 Jan 16 06:26:00 host sshd[8891]: User root from 185.129.61.129 not allowed because not listed in AllowUsers Jan 16 06:26:00 host sshd[8891]: input_userauth_request: invalid user root [preauth] Jan 16 06:26:00 host unix_chkpwd[8897]: password check failed for user (root) Jan 16 06:26:00 host sshd[8891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.129.61.129 user=root Jan 16 06:26:00 host sshd[8891]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:26:02 host sshd[8891]: Failed password for invalid user root from 185.129.61.129 port 37222 ssh2 Jan 16 06:26:03 host unix_chkpwd[8912]: password check failed for user (root) Jan 16 06:26:03 host sshd[8891]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:26:05 host sshd[8891]: Failed password for invalid user root from 185.129.61.129 port 37222 ssh2 Jan 16 06:26:06 host unix_chkpwd[8917]: password check failed for user (root) Jan 16 06:26:06 host sshd[8891]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:26:08 host sshd[8891]: Failed password for invalid user root from 185.129.61.129 port 37222 ssh2 Jan 16 06:26:08 host unix_chkpwd[8920]: password check failed for user (root) Jan 16 06:26:08 host sshd[8891]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:26:10 host sshd[8891]: Failed password for invalid user root from 185.129.61.129 port 37222 ssh2 Jan 16 06:26:54 host sshd[9038]: User root from 185.220.103.8 not allowed because not listed in AllowUsers Jan 16 06:26:54 host sshd[9038]: input_userauth_request: invalid user root [preauth] Jan 16 06:26:54 host unix_chkpwd[9061]: password check failed for user (root) Jan 16 06:26:54 host sshd[9038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.103.8 user=root Jan 16 06:26:54 host sshd[9038]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:26:56 host sshd[9038]: Failed password for invalid user root from 185.220.103.8 port 59012 ssh2 Jan 16 06:26:57 host unix_chkpwd[9067]: password check failed for user (root) Jan 16 06:26:57 host sshd[9038]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:27:00 host sshd[9038]: Failed password for invalid user root from 185.220.103.8 port 59012 ssh2 Jan 16 06:27:00 host unix_chkpwd[9071]: password check failed for user (root) Jan 16 06:27:00 host sshd[9038]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:27:02 host sshd[9038]: Failed password for invalid user root from 185.220.103.8 port 59012 ssh2 Jan 16 06:27:03 host unix_chkpwd[9086]: password check failed for user (root) Jan 16 06:27:03 host sshd[9038]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:27:06 host sshd[9038]: Failed password for invalid user root from 185.220.103.8 port 59012 ssh2 Jan 16 06:27:35 host sshd[9174]: User root from 185.220.102.246 not allowed because not listed in AllowUsers Jan 16 06:27:35 host sshd[9174]: input_userauth_request: invalid user root [preauth] Jan 16 06:27:35 host unix_chkpwd[9178]: password check failed for user (root) Jan 16 06:27:35 host sshd[9174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.246 user=root Jan 16 06:27:35 host sshd[9174]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:27:37 host sshd[9174]: Failed password for invalid user root from 185.220.102.246 port 23917 ssh2 Jan 16 06:27:38 host unix_chkpwd[9182]: password check failed for user (root) Jan 16 06:27:38 host sshd[9174]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:27:40 host sshd[9174]: Failed password for invalid user root from 185.220.102.246 port 23917 ssh2 Jan 16 06:27:41 host unix_chkpwd[9189]: password check failed for user (root) Jan 16 06:27:41 host sshd[9174]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:27:43 host sshd[9174]: Failed password for invalid user root from 185.220.102.246 port 23917 ssh2 Jan 16 06:27:44 host unix_chkpwd[9192]: password check failed for user (root) Jan 16 06:27:44 host sshd[9174]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:27:46 host sshd[9174]: Failed password for invalid user root from 185.220.102.246 port 23917 ssh2 Jan 16 06:28:17 host sshd[9396]: User root from 185.220.102.253 not allowed because not listed in AllowUsers Jan 16 06:28:17 host sshd[9396]: input_userauth_request: invalid user root [preauth] Jan 16 06:28:17 host unix_chkpwd[9404]: password check failed for user (root) Jan 16 06:28:17 host sshd[9396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.253 user=root Jan 16 06:28:17 host sshd[9396]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:28:18 host sshd[9396]: Failed password for invalid user root from 185.220.102.253 port 5825 ssh2 Jan 16 06:28:19 host unix_chkpwd[9409]: password check failed for user (root) Jan 16 06:28:19 host sshd[9396]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:28:21 host sshd[9396]: Failed password for invalid user root from 185.220.102.253 port 5825 ssh2 Jan 16 06:28:22 host unix_chkpwd[9423]: password check failed for user (root) Jan 16 06:28:22 host sshd[9396]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:28:24 host sshd[9396]: Failed password for invalid user root from 185.220.102.253 port 5825 ssh2 Jan 16 06:28:25 host unix_chkpwd[9432]: password check failed for user (root) Jan 16 06:28:25 host sshd[9396]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:28:27 host sshd[9396]: Failed password for invalid user root from 185.220.102.253 port 5825 ssh2 Jan 16 06:28:57 host sshd[9531]: User root from 104.244.79.40 not allowed because not listed in AllowUsers Jan 16 06:28:57 host sshd[9531]: input_userauth_request: invalid user root [preauth] Jan 16 06:28:58 host unix_chkpwd[9537]: password check failed for user (root) Jan 16 06:28:58 host sshd[9531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.79.40 user=root Jan 16 06:28:58 host sshd[9531]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:29:00 host sshd[9531]: Failed password for invalid user root from 104.244.79.40 port 60973 ssh2 Jan 16 06:29:01 host unix_chkpwd[9546]: password check failed for user (root) Jan 16 06:29:01 host sshd[9531]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:29:03 host sshd[9531]: Failed password for invalid user root from 104.244.79.40 port 60973 ssh2 Jan 16 06:29:04 host unix_chkpwd[9564]: password check failed for user (root) Jan 16 06:29:04 host sshd[9531]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:29:06 host sshd[9531]: Failed password for invalid user root from 104.244.79.40 port 60973 ssh2 Jan 16 06:29:07 host unix_chkpwd[9570]: password check failed for user (root) Jan 16 06:29:07 host sshd[9531]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:29:09 host sshd[9531]: Failed password for invalid user root from 104.244.79.40 port 60973 ssh2 Jan 16 06:29:09 host unix_chkpwd[9573]: password check failed for user (root) Jan 16 06:29:09 host sshd[9531]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:29:12 host sshd[9531]: Failed password for invalid user root from 104.244.79.40 port 60973 ssh2 Jan 16 06:29:43 host sshd[9675]: User root from 185.220.102.254 not allowed because not listed in AllowUsers Jan 16 06:29:43 host sshd[9675]: input_userauth_request: invalid user root [preauth] Jan 16 06:29:43 host unix_chkpwd[9680]: password check failed for user (root) Jan 16 06:29:43 host sshd[9675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.254 user=root Jan 16 06:29:43 host sshd[9675]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:29:45 host sshd[9675]: Failed password for invalid user root from 185.220.102.254 port 12683 ssh2 Jan 16 06:29:46 host unix_chkpwd[9684]: password check failed for user (root) Jan 16 06:29:46 host sshd[9675]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:29:48 host sshd[9675]: Failed password for invalid user root from 185.220.102.254 port 12683 ssh2 Jan 16 06:29:49 host unix_chkpwd[9688]: password check failed for user (root) Jan 16 06:29:49 host sshd[9675]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:29:51 host sshd[9675]: Failed password for invalid user root from 185.220.102.254 port 12683 ssh2 Jan 16 06:29:51 host unix_chkpwd[9693]: password check failed for user (root) Jan 16 06:29:51 host sshd[9675]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:29:53 host sshd[9675]: Failed password for invalid user root from 185.220.102.254 port 12683 ssh2 Jan 16 06:29:54 host unix_chkpwd[9706]: password check failed for user (root) Jan 16 06:29:54 host sshd[9675]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:29:56 host sshd[9675]: Failed password for invalid user root from 185.220.102.254 port 12683 ssh2 Jan 16 06:30:26 host sshd[9821]: User root from 82.221.128.191 not allowed because not listed in AllowUsers Jan 16 06:30:26 host sshd[9821]: input_userauth_request: invalid user root [preauth] Jan 16 06:30:26 host unix_chkpwd[9827]: password check failed for user (root) Jan 16 06:30:26 host sshd[9821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.221.128.191 user=root Jan 16 06:30:26 host sshd[9821]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:30:28 host sshd[9821]: Failed password for invalid user root from 82.221.128.191 port 39729 ssh2 Jan 16 06:30:28 host unix_chkpwd[9853]: password check failed for user (root) Jan 16 06:30:28 host sshd[9821]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:30:30 host sshd[9821]: Failed password for invalid user root from 82.221.128.191 port 39729 ssh2 Jan 16 06:30:30 host unix_chkpwd[9858]: password check failed for user (root) Jan 16 06:30:30 host sshd[9821]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:30:33 host sshd[9821]: Failed password for invalid user root from 82.221.128.191 port 39729 ssh2 Jan 16 06:30:33 host unix_chkpwd[9865]: password check failed for user (root) Jan 16 06:30:33 host sshd[9821]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:30:35 host sshd[9821]: Failed password for invalid user root from 82.221.128.191 port 39729 ssh2 Jan 16 06:32:30 host sshd[10037]: User root from 185.146.232.168 not allowed because not listed in AllowUsers Jan 16 06:32:30 host sshd[10037]: input_userauth_request: invalid user root [preauth] Jan 16 06:32:30 host unix_chkpwd[10152]: password check failed for user (root) Jan 16 06:32:30 host sshd[10037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.146.232.168 user=root Jan 16 06:32:30 host sshd[10037]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:32:32 host sshd[10037]: Failed password for invalid user root from 185.146.232.168 port 42629 ssh2 Jan 16 06:32:34 host unix_chkpwd[10162]: password check failed for user (root) Jan 16 06:32:34 host sshd[10037]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:32:35 host sshd[10037]: Failed password for invalid user root from 185.146.232.168 port 42629 ssh2 Jan 16 06:32:36 host unix_chkpwd[10170]: password check failed for user (root) Jan 16 06:32:36 host sshd[10037]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:32:38 host sshd[10037]: Failed password for invalid user root from 185.146.232.168 port 42629 ssh2 Jan 16 06:32:39 host unix_chkpwd[10176]: password check failed for user (root) Jan 16 06:32:39 host sshd[10037]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:32:41 host sshd[10037]: Failed password for invalid user root from 185.146.232.168 port 42629 ssh2 Jan 16 06:33:34 host sshd[10371]: User root from 179.43.159.201 not allowed because not listed in AllowUsers Jan 16 06:33:34 host sshd[10371]: input_userauth_request: invalid user root [preauth] Jan 16 06:33:34 host unix_chkpwd[10377]: password check failed for user (root) Jan 16 06:33:34 host sshd[10371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.159.201 user=root Jan 16 06:33:34 host sshd[10371]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:33:36 host sshd[10371]: Failed password for invalid user root from 179.43.159.201 port 15106 ssh2 Jan 16 06:33:37 host unix_chkpwd[10380]: password check failed for user (root) Jan 16 06:33:37 host sshd[10371]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:33:39 host sshd[10371]: Failed password for invalid user root from 179.43.159.201 port 15106 ssh2 Jan 16 06:33:41 host unix_chkpwd[10385]: password check failed for user (root) Jan 16 06:33:41 host sshd[10371]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:33:43 host sshd[10371]: Failed password for invalid user root from 179.43.159.201 port 15106 ssh2 Jan 16 06:34:33 host sshd[10582]: User root from 23.129.64.149 not allowed because not listed in AllowUsers Jan 16 06:34:33 host sshd[10582]: input_userauth_request: invalid user root [preauth] Jan 16 06:34:33 host unix_chkpwd[10625]: password check failed for user (root) Jan 16 06:34:33 host sshd[10582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.149 user=root Jan 16 06:34:33 host sshd[10582]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:34:35 host sshd[10582]: Failed password for invalid user root from 23.129.64.149 port 10012 ssh2 Jan 16 06:34:36 host unix_chkpwd[10632]: password check failed for user (root) Jan 16 06:34:36 host sshd[10582]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:34:38 host sshd[10582]: Failed password for invalid user root from 23.129.64.149 port 10012 ssh2 Jan 16 06:34:39 host unix_chkpwd[10636]: password check failed for user (root) Jan 16 06:34:39 host sshd[10582]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:34:42 host sshd[10582]: Failed password for invalid user root from 23.129.64.149 port 10012 ssh2 Jan 16 06:34:43 host unix_chkpwd[10642]: password check failed for user (root) Jan 16 06:34:43 host sshd[10582]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:34:45 host sshd[10582]: Failed password for invalid user root from 23.129.64.149 port 10012 ssh2 Jan 16 06:34:46 host unix_chkpwd[10665]: password check failed for user (root) Jan 16 06:34:46 host sshd[10582]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:34:48 host sshd[10582]: Failed password for invalid user root from 23.129.64.149 port 10012 ssh2 Jan 16 06:35:14 host sshd[10743]: Invalid user steam from 60.251.222.93 port 56331 Jan 16 06:35:14 host sshd[10743]: input_userauth_request: invalid user steam [preauth] Jan 16 06:35:14 host sshd[10743]: pam_unix(sshd:auth): check pass; user unknown Jan 16 06:35:14 host sshd[10743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.251.222.93 Jan 16 06:35:16 host sshd[10743]: Failed password for invalid user steam from 60.251.222.93 port 56331 ssh2 Jan 16 06:35:17 host sshd[10743]: pam_unix(sshd:auth): check pass; user unknown Jan 16 06:35:18 host sshd[10751]: User root from 162.247.74.7 not allowed because not listed in AllowUsers Jan 16 06:35:18 host sshd[10751]: input_userauth_request: invalid user root [preauth] Jan 16 06:35:18 host unix_chkpwd[10755]: password check failed for user (root) Jan 16 06:35:18 host sshd[10751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.7 user=root Jan 16 06:35:18 host sshd[10751]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:35:19 host sshd[10743]: Failed password for invalid user steam from 60.251.222.93 port 56331 ssh2 Jan 16 06:35:19 host sshd[10743]: Failed password for invalid user steam from 60.251.222.93 port 56331 ssh2 Jan 16 06:35:20 host sshd[10743]: Connection closed by 60.251.222.93 port 56331 [preauth] Jan 16 06:35:20 host sshd[10743]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.251.222.93 Jan 16 06:35:20 host sshd[10751]: Failed password for invalid user root from 162.247.74.7 port 33862 ssh2 Jan 16 06:35:21 host unix_chkpwd[10769]: password check failed for user (root) Jan 16 06:35:21 host sshd[10751]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:35:23 host sshd[10751]: Failed password for invalid user root from 162.247.74.7 port 33862 ssh2 Jan 16 06:35:23 host unix_chkpwd[10772]: password check failed for user (root) Jan 16 06:35:23 host sshd[10751]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:35:25 host sshd[10751]: Failed password for invalid user root from 162.247.74.7 port 33862 ssh2 Jan 16 06:35:26 host unix_chkpwd[10776]: password check failed for user (root) Jan 16 06:35:26 host sshd[10751]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:35:28 host sshd[10751]: Failed password for invalid user root from 162.247.74.7 port 33862 ssh2 Jan 16 06:35:29 host unix_chkpwd[10800]: password check failed for user (root) Jan 16 06:35:29 host sshd[10751]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:35:31 host sshd[10751]: Failed password for invalid user root from 162.247.74.7 port 33862 ssh2 Jan 16 06:36:42 host sshd[10958]: User root from 185.220.102.240 not allowed because not listed in AllowUsers Jan 16 06:36:42 host sshd[10958]: input_userauth_request: invalid user root [preauth] Jan 16 06:36:42 host unix_chkpwd[10963]: password check failed for user (root) Jan 16 06:36:42 host sshd[10958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.240 user=root Jan 16 06:36:42 host sshd[10958]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:36:44 host sshd[10958]: Failed password for invalid user root from 185.220.102.240 port 22849 ssh2 Jan 16 06:36:44 host unix_chkpwd[10966]: password check failed for user (root) Jan 16 06:36:44 host sshd[10958]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:36:47 host sshd[10958]: Failed password for invalid user root from 185.220.102.240 port 22849 ssh2 Jan 16 06:36:47 host unix_chkpwd[10972]: password check failed for user (root) Jan 16 06:36:47 host sshd[10958]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:36:49 host sshd[10958]: Failed password for invalid user root from 185.220.102.240 port 22849 ssh2 Jan 16 06:36:50 host unix_chkpwd[10975]: password check failed for user (root) Jan 16 06:36:50 host sshd[10958]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:36:52 host sshd[10958]: Failed password for invalid user root from 185.220.102.240 port 22849 ssh2 Jan 16 06:37:57 host sshd[11117]: User root from 162.247.74.213 not allowed because not listed in AllowUsers Jan 16 06:37:57 host sshd[11117]: input_userauth_request: invalid user root [preauth] Jan 16 06:37:57 host unix_chkpwd[11121]: password check failed for user (root) Jan 16 06:37:57 host sshd[11117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.213 user=root Jan 16 06:37:57 host sshd[11117]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:37:59 host sshd[11117]: Failed password for invalid user root from 162.247.74.213 port 43502 ssh2 Jan 16 06:38:00 host unix_chkpwd[11123]: password check failed for user (root) Jan 16 06:38:00 host sshd[11117]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:38:01 host sshd[11117]: Failed password for invalid user root from 162.247.74.213 port 43502 ssh2 Jan 16 06:38:02 host unix_chkpwd[11137]: password check failed for user (root) Jan 16 06:38:02 host sshd[11117]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:38:04 host sshd[11117]: Failed password for invalid user root from 162.247.74.213 port 43502 ssh2 Jan 16 06:38:05 host unix_chkpwd[11140]: password check failed for user (root) Jan 16 06:38:05 host sshd[11117]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:38:07 host sshd[11117]: Failed password for invalid user root from 162.247.74.213 port 43502 ssh2 Jan 16 06:38:39 host sshd[11241]: User root from 185.220.102.252 not allowed because not listed in AllowUsers Jan 16 06:38:39 host sshd[11241]: input_userauth_request: invalid user root [preauth] Jan 16 06:38:39 host unix_chkpwd[11244]: password check failed for user (root) Jan 16 06:38:39 host sshd[11241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.252 user=root Jan 16 06:38:39 host sshd[11241]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:38:41 host sshd[11241]: Failed password for invalid user root from 185.220.102.252 port 36433 ssh2 Jan 16 06:38:42 host unix_chkpwd[11248]: password check failed for user (root) Jan 16 06:38:42 host sshd[11241]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:38:44 host sshd[11241]: Failed password for invalid user root from 185.220.102.252 port 36433 ssh2 Jan 16 06:38:44 host unix_chkpwd[11257]: password check failed for user (root) Jan 16 06:38:44 host sshd[11241]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:38:46 host sshd[11241]: Failed password for invalid user root from 185.220.102.252 port 36433 ssh2 Jan 16 06:38:47 host unix_chkpwd[11263]: password check failed for user (root) Jan 16 06:38:47 host sshd[11241]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:38:49 host sshd[11241]: Failed password for invalid user root from 185.220.102.252 port 36433 ssh2 Jan 16 06:38:49 host unix_chkpwd[11266]: password check failed for user (root) Jan 16 06:38:49 host sshd[11241]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:38:52 host sshd[11241]: Failed password for invalid user root from 185.220.102.252 port 36433 ssh2 Jan 16 06:39:05 host sshd[11411]: User root from 190.214.36.160 not allowed because not listed in AllowUsers Jan 16 06:39:05 host sshd[11411]: input_userauth_request: invalid user root [preauth] Jan 16 06:39:05 host unix_chkpwd[11443]: password check failed for user (root) Jan 16 06:39:05 host sshd[11411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.214.36.160 user=root Jan 16 06:39:05 host sshd[11411]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:39:07 host sshd[11411]: Failed password for invalid user root from 190.214.36.160 port 58262 ssh2 Jan 16 06:39:08 host unix_chkpwd[11447]: password check failed for user (root) Jan 16 06:39:08 host sshd[11411]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:39:10 host sshd[11411]: Failed password for invalid user root from 190.214.36.160 port 58262 ssh2 Jan 16 06:39:11 host unix_chkpwd[11450]: password check failed for user (root) Jan 16 06:39:11 host sshd[11411]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:39:13 host sshd[11411]: Failed password for invalid user root from 190.214.36.160 port 58262 ssh2 Jan 16 06:39:14 host unix_chkpwd[11455]: password check failed for user (root) Jan 16 06:39:14 host sshd[11411]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:39:16 host sshd[11411]: Failed password for invalid user root from 190.214.36.160 port 58262 ssh2 Jan 16 06:39:16 host unix_chkpwd[11478]: password check failed for user (root) Jan 16 06:39:16 host sshd[11411]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:39:19 host sshd[11411]: Failed password for invalid user root from 190.214.36.160 port 58262 ssh2 Jan 16 06:39:40 host sshd[11544]: User root from 179.43.159.198 not allowed because not listed in AllowUsers Jan 16 06:39:40 host sshd[11544]: input_userauth_request: invalid user root [preauth] Jan 16 06:39:40 host unix_chkpwd[11550]: password check failed for user (root) Jan 16 06:39:40 host sshd[11544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.43.159.198 user=root Jan 16 06:39:40 host sshd[11544]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:39:42 host sshd[11544]: Failed password for invalid user root from 179.43.159.198 port 16136 ssh2 Jan 16 06:39:43 host sshd[11544]: Connection closed by 179.43.159.198 port 16136 [preauth] Jan 16 06:46:18 host sshd[12462]: User root from 125.138.44.175 not allowed because not listed in AllowUsers Jan 16 06:46:18 host sshd[12462]: input_userauth_request: invalid user root [preauth] Jan 16 06:46:19 host unix_chkpwd[12466]: password check failed for user (root) Jan 16 06:46:19 host sshd[12462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.138.44.175 user=root Jan 16 06:46:19 host sshd[12462]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:46:21 host sshd[12462]: Failed password for invalid user root from 125.138.44.175 port 61371 ssh2 Jan 16 06:46:21 host unix_chkpwd[12474]: password check failed for user (root) Jan 16 06:46:21 host sshd[12462]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:46:23 host sshd[12462]: Failed password for invalid user root from 125.138.44.175 port 61371 ssh2 Jan 16 06:46:24 host unix_chkpwd[12477]: password check failed for user (root) Jan 16 06:46:24 host sshd[12462]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:46:26 host sshd[12462]: Failed password for invalid user root from 125.138.44.175 port 61371 ssh2 Jan 16 06:46:27 host unix_chkpwd[12485]: password check failed for user (root) Jan 16 06:46:27 host sshd[12462]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:46:29 host sshd[12462]: Failed password for invalid user root from 125.138.44.175 port 61371 ssh2 Jan 16 06:51:45 host sshd[13327]: Invalid user pi from 79.122.55.186 port 40998 Jan 16 06:51:45 host sshd[13327]: input_userauth_request: invalid user pi [preauth] Jan 16 06:51:45 host sshd[13327]: pam_unix(sshd:auth): check pass; user unknown Jan 16 06:51:45 host sshd[13327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.122.55.186 Jan 16 06:51:45 host sshd[13330]: Invalid user pi from 79.122.55.186 port 41000 Jan 16 06:51:45 host sshd[13330]: input_userauth_request: invalid user pi [preauth] Jan 16 06:51:45 host sshd[13330]: pam_unix(sshd:auth): check pass; user unknown Jan 16 06:51:45 host sshd[13330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.122.55.186 Jan 16 06:51:47 host sshd[13327]: Failed password for invalid user pi from 79.122.55.186 port 40998 ssh2 Jan 16 06:51:47 host sshd[13327]: Connection closed by 79.122.55.186 port 40998 [preauth] Jan 16 06:51:48 host sshd[13330]: Failed password for invalid user pi from 79.122.55.186 port 41000 ssh2 Jan 16 06:51:48 host sshd[13330]: Connection closed by 79.122.55.186 port 41000 [preauth] Jan 16 06:56:12 host sshd[13995]: User root from 61.82.205.196 not allowed because not listed in AllowUsers Jan 16 06:56:12 host sshd[13995]: input_userauth_request: invalid user root [preauth] Jan 16 06:56:12 host unix_chkpwd[13998]: password check failed for user (root) Jan 16 06:56:12 host sshd[13995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.82.205.196 user=root Jan 16 06:56:12 host sshd[13995]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:56:13 host sshd[13995]: Failed password for invalid user root from 61.82.205.196 port 62657 ssh2 Jan 16 06:56:14 host unix_chkpwd[14001]: password check failed for user (root) Jan 16 06:56:14 host sshd[13995]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:56:16 host sshd[13995]: Failed password for invalid user root from 61.82.205.196 port 62657 ssh2 Jan 16 06:56:17 host unix_chkpwd[14005]: password check failed for user (root) Jan 16 06:56:17 host sshd[13995]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:56:19 host sshd[13995]: Failed password for invalid user root from 61.82.205.196 port 62657 ssh2 Jan 16 06:56:19 host sshd[13995]: Connection reset by 61.82.205.196 port 62657 [preauth] Jan 16 06:56:19 host sshd[13995]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.82.205.196 user=root Jan 16 06:58:49 host sshd[14322]: User root from 180.252.167.158 not allowed because not listed in AllowUsers Jan 16 06:58:49 host sshd[14322]: input_userauth_request: invalid user root [preauth] Jan 16 06:58:49 host unix_chkpwd[14325]: password check failed for user (root) Jan 16 06:58:49 host sshd[14322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.252.167.158 user=root Jan 16 06:58:49 host sshd[14322]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 06:58:51 host sshd[14322]: Failed password for invalid user root from 180.252.167.158 port 42384 ssh2 Jan 16 06:58:51 host sshd[14322]: Received disconnect from 180.252.167.158 port 42384:11: Bye Bye [preauth] Jan 16 06:58:51 host sshd[14322]: Disconnected from 180.252.167.158 port 42384 [preauth] Jan 16 07:00:25 host sshd[14513]: User root from 222.252.11.10 not allowed because not listed in AllowUsers Jan 16 07:00:25 host sshd[14513]: input_userauth_request: invalid user root [preauth] Jan 16 07:00:25 host unix_chkpwd[14516]: password check failed for user (root) Jan 16 07:00:25 host sshd[14513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.11.10 user=root Jan 16 07:00:25 host sshd[14513]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:00:27 host sshd[14513]: Failed password for invalid user root from 222.252.11.10 port 57957 ssh2 Jan 16 07:00:27 host sshd[14513]: Received disconnect from 222.252.11.10 port 57957:11: Bye Bye [preauth] Jan 16 07:00:27 host sshd[14513]: Disconnected from 222.252.11.10 port 57957 [preauth] Jan 16 07:00:40 host sshd[14552]: Invalid user ev from 194.110.203.109 port 55454 Jan 16 07:00:40 host sshd[14552]: input_userauth_request: invalid user ev [preauth] Jan 16 07:00:40 host sshd[14552]: pam_unix(sshd:auth): check pass; user unknown Jan 16 07:00:40 host sshd[14552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 07:00:42 host sshd[14552]: Failed password for invalid user ev from 194.110.203.109 port 55454 ssh2 Jan 16 07:00:42 host sshd[14558]: User root from 211.44.198.209 not allowed because not listed in AllowUsers Jan 16 07:00:42 host sshd[14558]: input_userauth_request: invalid user root [preauth] Jan 16 07:00:42 host unix_chkpwd[14561]: password check failed for user (root) Jan 16 07:00:42 host sshd[14558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.44.198.209 user=root Jan 16 07:00:42 host sshd[14558]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:00:44 host sshd[14558]: Failed password for invalid user root from 211.44.198.209 port 4596 ssh2 Jan 16 07:00:44 host sshd[14562]: User root from 74.94.234.151 not allowed because not listed in AllowUsers Jan 16 07:00:44 host sshd[14562]: input_userauth_request: invalid user root [preauth] Jan 16 07:00:44 host sshd[14558]: Received disconnect from 211.44.198.209 port 4596:11: Bye Bye [preauth] Jan 16 07:00:44 host sshd[14558]: Disconnected from 211.44.198.209 port 4596 [preauth] Jan 16 07:00:44 host unix_chkpwd[14575]: password check failed for user (root) Jan 16 07:00:44 host sshd[14562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.94.234.151 user=root Jan 16 07:00:44 host sshd[14562]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:00:45 host sshd[14552]: pam_unix(sshd:auth): check pass; user unknown Jan 16 07:00:47 host sshd[14562]: Failed password for invalid user root from 74.94.234.151 port 43170 ssh2 Jan 16 07:00:47 host sshd[14562]: Received disconnect from 74.94.234.151 port 43170:11: Bye Bye [preauth] Jan 16 07:00:47 host sshd[14562]: Disconnected from 74.94.234.151 port 43170 [preauth] Jan 16 07:00:47 host sshd[14552]: Failed password for invalid user ev from 194.110.203.109 port 55454 ssh2 Jan 16 07:00:50 host sshd[14552]: pam_unix(sshd:auth): check pass; user unknown Jan 16 07:00:52 host sshd[14552]: Failed password for invalid user ev from 194.110.203.109 port 55454 ssh2 Jan 16 07:00:55 host sshd[14552]: Connection closed by 194.110.203.109 port 55454 [preauth] Jan 16 07:00:55 host sshd[14552]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 07:01:50 host sshd[14824]: User root from 164.52.12.102 not allowed because not listed in AllowUsers Jan 16 07:01:50 host sshd[14824]: input_userauth_request: invalid user root [preauth] Jan 16 07:01:50 host unix_chkpwd[14826]: password check failed for user (root) Jan 16 07:01:50 host sshd[14824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.52.12.102 user=root Jan 16 07:01:50 host sshd[14824]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:01:52 host sshd[14824]: Failed password for invalid user root from 164.52.12.102 port 53794 ssh2 Jan 16 07:01:52 host sshd[14824]: Received disconnect from 164.52.12.102 port 53794:11: Bye Bye [preauth] Jan 16 07:01:52 host sshd[14824]: Disconnected from 164.52.12.102 port 53794 [preauth] Jan 16 07:02:16 host sshd[14866]: User root from 180.252.167.158 not allowed because not listed in AllowUsers Jan 16 07:02:16 host sshd[14866]: input_userauth_request: invalid user root [preauth] Jan 16 07:02:16 host unix_chkpwd[14869]: password check failed for user (root) Jan 16 07:02:16 host sshd[14866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.252.167.158 user=root Jan 16 07:02:16 host sshd[14866]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:02:18 host sshd[14866]: Failed password for invalid user root from 180.252.167.158 port 42388 ssh2 Jan 16 07:02:18 host sshd[14866]: Received disconnect from 180.252.167.158 port 42388:11: Bye Bye [preauth] Jan 16 07:02:18 host sshd[14866]: Disconnected from 180.252.167.158 port 42388 [preauth] Jan 16 07:02:21 host sshd[14885]: User root from 143.110.188.7 not allowed because not listed in AllowUsers Jan 16 07:02:21 host sshd[14885]: input_userauth_request: invalid user root [preauth] Jan 16 07:02:21 host unix_chkpwd[14887]: password check failed for user (root) Jan 16 07:02:21 host sshd[14885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.188.7 user=root Jan 16 07:02:21 host sshd[14885]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:02:23 host sshd[14885]: Failed password for invalid user root from 143.110.188.7 port 52110 ssh2 Jan 16 07:02:23 host sshd[14885]: Received disconnect from 143.110.188.7 port 52110:11: Bye Bye [preauth] Jan 16 07:02:23 host sshd[14885]: Disconnected from 143.110.188.7 port 52110 [preauth] Jan 16 07:04:41 host sshd[15200]: Connection reset by 69.118.48.182 port 48047 [preauth] Jan 16 07:04:48 host sshd[15212]: User root from 211.44.198.209 not allowed because not listed in AllowUsers Jan 16 07:04:48 host sshd[15212]: input_userauth_request: invalid user root [preauth] Jan 16 07:04:48 host unix_chkpwd[15214]: password check failed for user (root) Jan 16 07:04:48 host sshd[15212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.44.198.209 user=root Jan 16 07:04:48 host sshd[15212]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:04:50 host sshd[15212]: Failed password for invalid user root from 211.44.198.209 port 58624 ssh2 Jan 16 07:04:50 host sshd[15212]: Received disconnect from 211.44.198.209 port 58624:11: Bye Bye [preauth] Jan 16 07:04:50 host sshd[15212]: Disconnected from 211.44.198.209 port 58624 [preauth] Jan 16 07:05:02 host sshd[15262]: User root from 41.57.68.2 not allowed because not listed in AllowUsers Jan 16 07:05:02 host sshd[15262]: input_userauth_request: invalid user root [preauth] Jan 16 07:05:02 host unix_chkpwd[15289]: password check failed for user (root) Jan 16 07:05:02 host sshd[15262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.57.68.2 user=root Jan 16 07:05:02 host sshd[15262]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:05:04 host sshd[15262]: Failed password for invalid user root from 41.57.68.2 port 59054 ssh2 Jan 16 07:05:04 host sshd[15262]: Received disconnect from 41.57.68.2 port 59054:11: Bye Bye [preauth] Jan 16 07:05:04 host sshd[15262]: Disconnected from 41.57.68.2 port 59054 [preauth] Jan 16 07:05:27 host sshd[15364]: User root from 143.110.188.7 not allowed because not listed in AllowUsers Jan 16 07:05:27 host sshd[15364]: input_userauth_request: invalid user root [preauth] Jan 16 07:05:27 host unix_chkpwd[15366]: password check failed for user (root) Jan 16 07:05:27 host sshd[15364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.188.7 user=root Jan 16 07:05:27 host sshd[15364]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:05:29 host sshd[15364]: Failed password for invalid user root from 143.110.188.7 port 33918 ssh2 Jan 16 07:05:29 host sshd[15364]: Received disconnect from 143.110.188.7 port 33918:11: Bye Bye [preauth] Jan 16 07:05:29 host sshd[15364]: Disconnected from 143.110.188.7 port 33918 [preauth] Jan 16 07:05:30 host sshd[15370]: User root from 222.252.11.10 not allowed because not listed in AllowUsers Jan 16 07:05:30 host sshd[15370]: input_userauth_request: invalid user root [preauth] Jan 16 07:05:30 host unix_chkpwd[15372]: password check failed for user (root) Jan 16 07:05:30 host sshd[15370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.11.10 user=root Jan 16 07:05:30 host sshd[15370]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:05:32 host sshd[15370]: Failed password for invalid user root from 222.252.11.10 port 52479 ssh2 Jan 16 07:05:53 host sshd[15475]: User root from 164.52.12.102 not allowed because not listed in AllowUsers Jan 16 07:05:53 host sshd[15475]: input_userauth_request: invalid user root [preauth] Jan 16 07:05:53 host unix_chkpwd[15477]: password check failed for user (root) Jan 16 07:05:53 host sshd[15475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.52.12.102 user=root Jan 16 07:05:53 host sshd[15475]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:05:55 host sshd[15475]: Failed password for invalid user root from 164.52.12.102 port 60294 ssh2 Jan 16 07:05:55 host sshd[15475]: Received disconnect from 164.52.12.102 port 60294:11: Bye Bye [preauth] Jan 16 07:05:55 host sshd[15475]: Disconnected from 164.52.12.102 port 60294 [preauth] Jan 16 07:06:40 host sshd[15704]: User root from 41.57.68.2 not allowed because not listed in AllowUsers Jan 16 07:06:40 host sshd[15704]: input_userauth_request: invalid user root [preauth] Jan 16 07:06:40 host unix_chkpwd[15709]: password check failed for user (root) Jan 16 07:06:40 host sshd[15704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.57.68.2 user=root Jan 16 07:06:40 host sshd[15704]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:06:43 host sshd[15704]: Failed password for invalid user root from 41.57.68.2 port 41564 ssh2 Jan 16 07:07:05 host sshd[15815]: User root from 74.94.234.151 not allowed because not listed in AllowUsers Jan 16 07:07:05 host sshd[15815]: input_userauth_request: invalid user root [preauth] Jan 16 07:07:05 host unix_chkpwd[15822]: password check failed for user (root) Jan 16 07:07:05 host sshd[15815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.94.234.151 user=root Jan 16 07:07:05 host sshd[15815]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:07:07 host sshd[15815]: Failed password for invalid user root from 74.94.234.151 port 39780 ssh2 Jan 16 07:09:38 host sshd[16215]: Invalid user vadmin from 183.104.247.190 port 39346 Jan 16 07:09:38 host sshd[16215]: input_userauth_request: invalid user vadmin [preauth] Jan 16 07:09:38 host sshd[16215]: pam_unix(sshd:auth): check pass; user unknown Jan 16 07:09:38 host sshd[16215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.104.247.190 Jan 16 07:09:40 host sshd[16215]: Failed password for invalid user vadmin from 183.104.247.190 port 39346 ssh2 Jan 16 07:09:40 host sshd[16215]: pam_unix(sshd:auth): check pass; user unknown Jan 16 07:09:42 host sshd[16215]: Failed password for invalid user vadmin from 183.104.247.190 port 39346 ssh2 Jan 16 07:09:43 host sshd[16215]: Failed password for invalid user vadmin from 183.104.247.190 port 39346 ssh2 Jan 16 07:09:43 host sshd[16215]: Connection closed by 183.104.247.190 port 39346 [preauth] Jan 16 07:09:43 host sshd[16215]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.104.247.190 Jan 16 07:15:09 host sshd[16996]: Invalid user dmdba from 112.166.176.21 port 61030 Jan 16 07:15:09 host sshd[16996]: input_userauth_request: invalid user dmdba [preauth] Jan 16 07:15:09 host sshd[16996]: pam_unix(sshd:auth): check pass; user unknown Jan 16 07:15:09 host sshd[16996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.166.176.21 Jan 16 07:15:11 host sshd[16996]: Failed password for invalid user dmdba from 112.166.176.21 port 61030 ssh2 Jan 16 07:15:11 host sshd[16996]: Failed password for invalid user dmdba from 112.166.176.21 port 61030 ssh2 Jan 16 07:15:15 host sshd[17007]: Invalid user vipin@ugotechnologies.com from 117.236.177.223 port 58913 Jan 16 07:15:15 host sshd[17007]: input_userauth_request: invalid user vipin@ugotechnologies.com [preauth] Jan 16 07:15:15 host sshd[17007]: pam_unix(sshd:auth): check pass; user unknown Jan 16 07:15:15 host sshd[17007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.236.177.223 Jan 16 07:15:18 host sshd[17007]: Failed password for invalid user vipin@ugotechnologies.com from 117.236.177.223 port 58913 ssh2 Jan 16 07:15:18 host sshd[17007]: Connection closed by 117.236.177.223 port 58913 [preauth] Jan 16 07:15:18 host sshd[17012]: User root from 117.236.177.223 not allowed because not listed in AllowUsers Jan 16 07:15:18 host sshd[17012]: input_userauth_request: invalid user root [preauth] Jan 16 07:15:18 host unix_chkpwd[17014]: password check failed for user (root) Jan 16 07:15:18 host sshd[17012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.236.177.223 user=root Jan 16 07:15:18 host sshd[17012]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:15:20 host sshd[17012]: Failed password for invalid user root from 117.236.177.223 port 59837 ssh2 Jan 16 07:15:20 host sshd[17012]: Connection closed by 117.236.177.223 port 59837 [preauth] Jan 16 07:15:20 host unix_chkpwd[17020]: password check failed for user (vipin) Jan 16 07:15:20 host sshd[17018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.236.177.223 user=vipin Jan 16 07:15:22 host sshd[17018]: Failed password for vipin from 117.236.177.223 port 60188 ssh2 Jan 16 07:19:53 host sshd[17667]: User root from 109.249.179.219 not allowed because not listed in AllowUsers Jan 16 07:19:53 host sshd[17667]: input_userauth_request: invalid user root [preauth] Jan 16 07:19:53 host unix_chkpwd[17673]: password check failed for user (root) Jan 16 07:19:53 host sshd[17667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.249.179.219 user=root Jan 16 07:19:53 host sshd[17667]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:19:55 host sshd[17667]: Failed password for invalid user root from 109.249.179.219 port 44944 ssh2 Jan 16 07:19:55 host sshd[17667]: Received disconnect from 109.249.179.219 port 44944:11: Bye Bye [preauth] Jan 16 07:19:55 host sshd[17667]: Disconnected from 109.249.179.219 port 44944 [preauth] Jan 16 07:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=woodpeck user-2=wwwkapin user-3=disposeat user-4=remysagr user-5=wwwkmaorg user-6=pmcresources user-7=shalinijames user-8=wwwtestugo user-9=vfmassets user-10=wwwletsstalkfood user-11=straightcurve user-12=wwwevmhonda user-13=bonifacegroup user-14=mrsclean user-15=wwwnexidigital user-16=phmetals user-17=kottayamcalldriv user-18=palco123 user-19=gifterman user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=ugotscom user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 07:21:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HNiDSK3lMKpsgCCv.~ Jan 16 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HNiDSK3lMKpsgCCv.~' Jan 16 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HNiDSK3lMKpsgCCv.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 07:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 07:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 07:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 07:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 07:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 07:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 07:21:48 host sshd[18189]: User root from 34.123.234.91 not allowed because not listed in AllowUsers Jan 16 07:21:48 host sshd[18189]: input_userauth_request: invalid user root [preauth] Jan 16 07:21:48 host unix_chkpwd[18192]: password check failed for user (root) Jan 16 07:21:48 host sshd[18189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.123.234.91 user=root Jan 16 07:21:48 host sshd[18189]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:21:50 host sshd[18189]: Failed password for invalid user root from 34.123.234.91 port 33406 ssh2 Jan 16 07:21:51 host sshd[18189]: Received disconnect from 34.123.234.91 port 33406:11: Bye Bye [preauth] Jan 16 07:21:51 host sshd[18189]: Disconnected from 34.123.234.91 port 33406 [preauth] Jan 16 07:22:22 host sshd[18261]: User root from 109.249.179.219 not allowed because not listed in AllowUsers Jan 16 07:22:22 host sshd[18261]: input_userauth_request: invalid user root [preauth] Jan 16 07:22:22 host unix_chkpwd[18266]: password check failed for user (root) Jan 16 07:22:22 host sshd[18261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.249.179.219 user=root Jan 16 07:22:22 host sshd[18261]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:22:24 host sshd[18261]: Failed password for invalid user root from 109.249.179.219 port 52300 ssh2 Jan 16 07:22:25 host sshd[18261]: Received disconnect from 109.249.179.219 port 52300:11: Bye Bye [preauth] Jan 16 07:22:25 host sshd[18261]: Disconnected from 109.249.179.219 port 52300 [preauth] Jan 16 07:24:43 host sshd[18580]: User root from 58.64.193.176 not allowed because not listed in AllowUsers Jan 16 07:24:43 host sshd[18580]: input_userauth_request: invalid user root [preauth] Jan 16 07:24:43 host unix_chkpwd[18582]: password check failed for user (root) Jan 16 07:24:43 host sshd[18580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.64.193.176 user=root Jan 16 07:24:43 host sshd[18580]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:24:45 host sshd[18580]: Failed password for invalid user root from 58.64.193.176 port 61000 ssh2 Jan 16 07:24:45 host sshd[18580]: Received disconnect from 58.64.193.176 port 61000:11: Bye Bye [preauth] Jan 16 07:24:45 host sshd[18580]: Disconnected from 58.64.193.176 port 61000 [preauth] Jan 16 07:25:17 host sshd[18633]: User root from 182.75.65.22 not allowed because not listed in AllowUsers Jan 16 07:25:17 host sshd[18633]: input_userauth_request: invalid user root [preauth] Jan 16 07:25:17 host unix_chkpwd[18635]: password check failed for user (root) Jan 16 07:25:17 host sshd[18633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.65.22 user=root Jan 16 07:25:17 host sshd[18633]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:25:18 host sshd[18633]: Failed password for invalid user root from 182.75.65.22 port 51746 ssh2 Jan 16 07:25:18 host sshd[18633]: Received disconnect from 182.75.65.22 port 51746:11: Bye Bye [preauth] Jan 16 07:25:18 host sshd[18633]: Disconnected from 182.75.65.22 port 51746 [preauth] Jan 16 07:26:34 host sshd[18908]: Did not receive identification string from 45.79.132.80 port 34570 Jan 16 07:27:00 host sshd[18941]: User root from 34.123.234.91 not allowed because not listed in AllowUsers Jan 16 07:27:00 host sshd[18941]: input_userauth_request: invalid user root [preauth] Jan 16 07:27:01 host unix_chkpwd[18944]: password check failed for user (root) Jan 16 07:27:01 host sshd[18941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.123.234.91 user=root Jan 16 07:27:01 host sshd[18941]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:27:02 host sshd[18941]: Failed password for invalid user root from 34.123.234.91 port 60390 ssh2 Jan 16 07:27:02 host sshd[18941]: Received disconnect from 34.123.234.91 port 60390:11: Bye Bye [preauth] Jan 16 07:27:02 host sshd[18941]: Disconnected from 34.123.234.91 port 60390 [preauth] Jan 16 07:27:45 host sshd[19063]: User root from 152.32.171.15 not allowed because not listed in AllowUsers Jan 16 07:27:45 host sshd[19063]: input_userauth_request: invalid user root [preauth] Jan 16 07:27:45 host unix_chkpwd[19065]: password check failed for user (root) Jan 16 07:27:45 host sshd[19063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.171.15 user=root Jan 16 07:27:45 host sshd[19063]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:27:47 host sshd[19063]: Failed password for invalid user root from 152.32.171.15 port 11850 ssh2 Jan 16 07:27:47 host sshd[19063]: Received disconnect from 152.32.171.15 port 11850:11: Bye Bye [preauth] Jan 16 07:27:47 host sshd[19063]: Disconnected from 152.32.171.15 port 11850 [preauth] Jan 16 07:29:00 host sshd[19238]: User root from 182.75.65.22 not allowed because not listed in AllowUsers Jan 16 07:29:00 host sshd[19238]: input_userauth_request: invalid user root [preauth] Jan 16 07:29:00 host unix_chkpwd[19240]: password check failed for user (root) Jan 16 07:29:00 host sshd[19238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.65.22 user=root Jan 16 07:29:00 host sshd[19238]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:29:01 host sshd[19238]: Failed password for invalid user root from 182.75.65.22 port 33302 ssh2 Jan 16 07:29:01 host sshd[19238]: Received disconnect from 182.75.65.22 port 33302:11: Bye Bye [preauth] Jan 16 07:29:01 host sshd[19238]: Disconnected from 182.75.65.22 port 33302 [preauth] Jan 16 07:30:32 host sshd[19537]: User root from 152.32.171.15 not allowed because not listed in AllowUsers Jan 16 07:30:32 host sshd[19537]: input_userauth_request: invalid user root [preauth] Jan 16 07:30:32 host unix_chkpwd[19540]: password check failed for user (root) Jan 16 07:30:32 host sshd[19537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.171.15 user=root Jan 16 07:30:32 host sshd[19537]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:30:34 host sshd[19537]: Failed password for invalid user root from 152.32.171.15 port 38220 ssh2 Jan 16 07:31:16 host sshd[19762]: User root from 58.64.193.176 not allowed because not listed in AllowUsers Jan 16 07:31:16 host sshd[19762]: input_userauth_request: invalid user root [preauth] Jan 16 07:31:16 host unix_chkpwd[19766]: password check failed for user (root) Jan 16 07:31:16 host sshd[19762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.64.193.176 user=root Jan 16 07:31:16 host sshd[19762]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:31:18 host sshd[19762]: Failed password for invalid user root from 58.64.193.176 port 33037 ssh2 Jan 16 07:32:06 host sshd[19906]: Invalid user sFTPUser from 175.196.131.122 port 61255 Jan 16 07:32:06 host sshd[19906]: input_userauth_request: invalid user sFTPUser [preauth] Jan 16 07:32:06 host sshd[19906]: pam_unix(sshd:auth): check pass; user unknown Jan 16 07:32:06 host sshd[19906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.196.131.122 Jan 16 07:32:07 host sshd[19911]: User root from 165.227.204.174 not allowed because not listed in AllowUsers Jan 16 07:32:07 host sshd[19911]: input_userauth_request: invalid user root [preauth] Jan 16 07:32:07 host unix_chkpwd[19915]: password check failed for user (root) Jan 16 07:32:07 host sshd[19911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.204.174 user=root Jan 16 07:32:07 host sshd[19911]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:32:08 host sshd[19906]: Failed password for invalid user sFTPUser from 175.196.131.122 port 61255 ssh2 Jan 16 07:32:08 host sshd[19911]: Failed password for invalid user root from 165.227.204.174 port 50478 ssh2 Jan 16 07:32:08 host sshd[19911]: Received disconnect from 165.227.204.174 port 50478:11: Bye Bye [preauth] Jan 16 07:32:08 host sshd[19911]: Disconnected from 165.227.204.174 port 50478 [preauth] Jan 16 07:32:08 host sshd[19906]: pam_unix(sshd:auth): check pass; user unknown Jan 16 07:32:09 host sshd[19916]: User root from 165.227.59.243 not allowed because not listed in AllowUsers Jan 16 07:32:09 host sshd[19916]: input_userauth_request: invalid user root [preauth] Jan 16 07:32:09 host unix_chkpwd[19921]: password check failed for user (root) Jan 16 07:32:09 host sshd[19916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.59.243 user=root Jan 16 07:32:09 host sshd[19916]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:32:11 host sshd[19906]: Failed password for invalid user sFTPUser from 175.196.131.122 port 61255 ssh2 Jan 16 07:32:11 host sshd[19916]: Failed password for invalid user root from 165.227.59.243 port 49438 ssh2 Jan 16 07:32:11 host sshd[19916]: Received disconnect from 165.227.59.243 port 49438:11: Bye Bye [preauth] Jan 16 07:32:11 host sshd[19916]: Disconnected from 165.227.59.243 port 49438 [preauth] Jan 16 07:32:11 host sshd[19906]: pam_unix(sshd:auth): check pass; user unknown Jan 16 07:32:14 host sshd[19906]: Failed password for invalid user sFTPUser from 175.196.131.122 port 61255 ssh2 Jan 16 07:32:15 host sshd[19906]: Connection reset by 175.196.131.122 port 61255 [preauth] Jan 16 07:32:15 host sshd[19906]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.196.131.122 Jan 16 07:34:37 host sshd[20342]: Connection reset by 114.158.41.69 port 60688 [preauth] Jan 16 07:34:39 host sshd[20346]: User root from 167.71.16.200 not allowed because not listed in AllowUsers Jan 16 07:34:39 host sshd[20346]: input_userauth_request: invalid user root [preauth] Jan 16 07:34:39 host unix_chkpwd[20349]: password check failed for user (root) Jan 16 07:34:39 host sshd[20346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.16.200 user=root Jan 16 07:34:39 host sshd[20346]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:34:41 host sshd[20346]: Failed password for invalid user root from 167.71.16.200 port 51762 ssh2 Jan 16 07:34:42 host sshd[20346]: Received disconnect from 167.71.16.200 port 51762:11: Bye Bye [preauth] Jan 16 07:34:42 host sshd[20346]: Disconnected from 167.71.16.200 port 51762 [preauth] Jan 16 07:34:42 host sshd[20353]: User root from 202.89.73.85 not allowed because not listed in AllowUsers Jan 16 07:34:42 host sshd[20353]: input_userauth_request: invalid user root [preauth] Jan 16 07:34:42 host unix_chkpwd[20355]: password check failed for user (root) Jan 16 07:34:42 host sshd[20353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.89.73.85 user=root Jan 16 07:34:42 host sshd[20353]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:34:44 host sshd[20353]: Failed password for invalid user root from 202.89.73.85 port 40737 ssh2 Jan 16 07:34:44 host sshd[20353]: Received disconnect from 202.89.73.85 port 40737:11: Bye Bye [preauth] Jan 16 07:34:44 host sshd[20353]: Disconnected from 202.89.73.85 port 40737 [preauth] Jan 16 07:34:56 host sshd[20371]: User root from 143.244.190.90 not allowed because not listed in AllowUsers Jan 16 07:34:56 host sshd[20371]: input_userauth_request: invalid user root [preauth] Jan 16 07:34:56 host unix_chkpwd[20378]: password check failed for user (root) Jan 16 07:34:56 host sshd[20371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.190.90 user=root Jan 16 07:34:56 host sshd[20371]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:34:58 host sshd[20371]: Failed password for invalid user root from 143.244.190.90 port 56326 ssh2 Jan 16 07:34:58 host sshd[20371]: Received disconnect from 143.244.190.90 port 56326:11: Bye Bye [preauth] Jan 16 07:34:58 host sshd[20371]: Disconnected from 143.244.190.90 port 56326 [preauth] Jan 16 07:36:26 host sshd[20695]: User root from 64.225.108.130 not allowed because not listed in AllowUsers Jan 16 07:36:26 host sshd[20695]: input_userauth_request: invalid user root [preauth] Jan 16 07:36:26 host unix_chkpwd[20699]: password check failed for user (root) Jan 16 07:36:26 host sshd[20695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.108.130 user=root Jan 16 07:36:26 host sshd[20695]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:36:27 host sshd[20695]: Failed password for invalid user root from 64.225.108.130 port 50504 ssh2 Jan 16 07:36:28 host sshd[20695]: Received disconnect from 64.225.108.130 port 50504:11: Bye Bye [preauth] Jan 16 07:36:28 host sshd[20695]: Disconnected from 64.225.108.130 port 50504 [preauth] Jan 16 07:36:55 host sshd[20764]: User root from 174.138.5.151 not allowed because not listed in AllowUsers Jan 16 07:36:55 host sshd[20764]: input_userauth_request: invalid user root [preauth] Jan 16 07:36:55 host unix_chkpwd[20767]: password check failed for user (root) Jan 16 07:36:55 host sshd[20764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.5.151 user=root Jan 16 07:36:55 host sshd[20764]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:36:57 host sshd[20764]: Failed password for invalid user root from 174.138.5.151 port 53300 ssh2 Jan 16 07:36:57 host sshd[20764]: Received disconnect from 174.138.5.151 port 53300:11: Bye Bye [preauth] Jan 16 07:36:57 host sshd[20764]: Disconnected from 174.138.5.151 port 53300 [preauth] Jan 16 07:37:51 host sshd[20870]: User root from 165.227.59.243 not allowed because not listed in AllowUsers Jan 16 07:37:51 host sshd[20870]: input_userauth_request: invalid user root [preauth] Jan 16 07:37:51 host unix_chkpwd[20873]: password check failed for user (root) Jan 16 07:37:51 host sshd[20870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.59.243 user=root Jan 16 07:37:51 host sshd[20870]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:37:53 host sshd[20870]: Failed password for invalid user root from 165.227.59.243 port 63400 ssh2 Jan 16 07:37:53 host sshd[20870]: Received disconnect from 165.227.59.243 port 63400:11: Bye Bye [preauth] Jan 16 07:37:53 host sshd[20870]: Disconnected from 165.227.59.243 port 63400 [preauth] Jan 16 07:37:53 host sshd[20875]: User root from 165.227.204.174 not allowed because not listed in AllowUsers Jan 16 07:37:53 host sshd[20875]: input_userauth_request: invalid user root [preauth] Jan 16 07:37:53 host unix_chkpwd[20909]: password check failed for user (root) Jan 16 07:37:53 host sshd[20875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.204.174 user=root Jan 16 07:37:53 host sshd[20875]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:37:56 host sshd[20875]: Failed password for invalid user root from 165.227.204.174 port 52858 ssh2 Jan 16 07:37:56 host sshd[20875]: Received disconnect from 165.227.204.174 port 52858:11: Bye Bye [preauth] Jan 16 07:37:56 host sshd[20875]: Disconnected from 165.227.204.174 port 52858 [preauth] Jan 16 07:38:09 host sshd[21005]: User root from 174.138.5.151 not allowed because not listed in AllowUsers Jan 16 07:38:09 host sshd[21005]: input_userauth_request: invalid user root [preauth] Jan 16 07:38:09 host unix_chkpwd[21008]: password check failed for user (root) Jan 16 07:38:09 host sshd[21005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.5.151 user=root Jan 16 07:38:09 host sshd[21005]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:38:11 host sshd[21005]: Failed password for invalid user root from 174.138.5.151 port 51938 ssh2 Jan 16 07:38:12 host sshd[21005]: Received disconnect from 174.138.5.151 port 51938:11: Bye Bye [preauth] Jan 16 07:38:12 host sshd[21005]: Disconnected from 174.138.5.151 port 51938 [preauth] Jan 16 07:38:16 host sshd[21043]: User root from 143.244.190.90 not allowed because not listed in AllowUsers Jan 16 07:38:16 host sshd[21043]: input_userauth_request: invalid user root [preauth] Jan 16 07:38:16 host unix_chkpwd[21046]: password check failed for user (root) Jan 16 07:38:16 host sshd[21043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.190.90 user=root Jan 16 07:38:16 host sshd[21043]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:38:18 host sshd[21043]: Failed password for invalid user root from 143.244.190.90 port 35642 ssh2 Jan 16 07:38:59 host sshd[21168]: User root from 167.71.16.200 not allowed because not listed in AllowUsers Jan 16 07:38:59 host sshd[21168]: input_userauth_request: invalid user root [preauth] Jan 16 07:38:59 host unix_chkpwd[21172]: password check failed for user (root) Jan 16 07:38:59 host sshd[21168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.16.200 user=root Jan 16 07:38:59 host sshd[21168]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:39:01 host sshd[21173]: User root from 64.225.108.130 not allowed because not listed in AllowUsers Jan 16 07:39:01 host sshd[21173]: input_userauth_request: invalid user root [preauth] Jan 16 07:39:01 host unix_chkpwd[21176]: password check failed for user (root) Jan 16 07:39:01 host sshd[21173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.108.130 user=root Jan 16 07:39:01 host sshd[21173]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:39:02 host sshd[21168]: Failed password for invalid user root from 167.71.16.200 port 39142 ssh2 Jan 16 07:39:02 host sshd[21168]: Received disconnect from 167.71.16.200 port 39142:11: Bye Bye [preauth] Jan 16 07:39:02 host sshd[21168]: Disconnected from 167.71.16.200 port 39142 [preauth] Jan 16 07:39:03 host sshd[21173]: Failed password for invalid user root from 64.225.108.130 port 43148 ssh2 Jan 16 07:39:37 host sshd[21345]: User root from 202.89.73.85 not allowed because not listed in AllowUsers Jan 16 07:39:37 host sshd[21345]: input_userauth_request: invalid user root [preauth] Jan 16 07:39:37 host unix_chkpwd[21348]: password check failed for user (root) Jan 16 07:39:37 host sshd[21345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.89.73.85 user=root Jan 16 07:39:37 host sshd[21345]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:39:39 host sshd[21345]: Failed password for invalid user root from 202.89.73.85 port 62368 ssh2 Jan 16 07:39:39 host sshd[21345]: Received disconnect from 202.89.73.85 port 62368:11: Bye Bye [preauth] Jan 16 07:39:39 host sshd[21345]: Disconnected from 202.89.73.85 port 62368 [preauth] Jan 16 07:40:10 host sshd[21486]: User root from 158.160.38.134 not allowed because not listed in AllowUsers Jan 16 07:40:10 host sshd[21486]: input_userauth_request: invalid user root [preauth] Jan 16 07:40:10 host unix_chkpwd[21488]: password check failed for user (root) Jan 16 07:40:10 host sshd[21486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.38.134 user=root Jan 16 07:40:10 host sshd[21486]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:40:12 host sshd[21486]: Failed password for invalid user root from 158.160.38.134 port 55754 ssh2 Jan 16 07:40:12 host sshd[21486]: Received disconnect from 158.160.38.134 port 55754:11: Bye Bye [preauth] Jan 16 07:40:12 host sshd[21486]: Disconnected from 158.160.38.134 port 55754 [preauth] Jan 16 07:43:13 host sshd[21912]: User root from 158.160.38.134 not allowed because not listed in AllowUsers Jan 16 07:43:13 host sshd[21912]: input_userauth_request: invalid user root [preauth] Jan 16 07:43:13 host unix_chkpwd[21917]: password check failed for user (root) Jan 16 07:43:13 host sshd[21912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.38.134 user=root Jan 16 07:43:13 host sshd[21912]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 07:43:15 host sshd[21912]: Failed password for invalid user root from 158.160.38.134 port 48736 ssh2 Jan 16 07:43:15 host sshd[21912]: Received disconnect from 158.160.38.134 port 48736:11: Bye Bye [preauth] Jan 16 07:43:15 host sshd[21912]: Disconnected from 158.160.38.134 port 48736 [preauth] Jan 16 07:43:45 host sshd[22130]: User ftp from 112.166.10.205 not allowed because not listed in AllowUsers Jan 16 07:43:45 host sshd[22130]: input_userauth_request: invalid user ftp [preauth] Jan 16 07:43:45 host unix_chkpwd[22135]: password check failed for user (ftp) Jan 16 07:43:45 host sshd[22130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.166.10.205 user=ftp Jan 16 07:43:45 host sshd[22130]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 16 07:43:48 host sshd[22130]: Failed password for invalid user ftp from 112.166.10.205 port 43932 ssh2 Jan 16 07:43:49 host unix_chkpwd[22141]: password check failed for user (ftp) Jan 16 07:43:49 host sshd[22130]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 16 07:43:51 host sshd[22130]: Failed password for invalid user ftp from 112.166.10.205 port 43932 ssh2 Jan 16 07:43:51 host unix_chkpwd[22147]: password check failed for user (ftp) Jan 16 07:43:51 host sshd[22130]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 16 07:43:53 host sshd[22130]: Failed password for invalid user ftp from 112.166.10.205 port 43932 ssh2 Jan 16 07:43:53 host sshd[22130]: Failed password for invalid user ftp from 112.166.10.205 port 43932 ssh2 Jan 16 07:43:55 host sshd[22185]: Connection reset by 211.192.41.14 port 42132 [preauth] Jan 16 07:46:49 host sshd[22895]: Connection reset by 96.56.99.75 port 55214 [preauth] Jan 16 07:53:22 host sshd[23838]: ssh_dispatch_run_fatal: Connection from 207.229.167.36 port 37500: Connection corrupted [preauth] Jan 16 08:09:49 host sshd[26307]: Invalid user support from 59.120.15.107 port 39263 Jan 16 08:09:49 host sshd[26307]: input_userauth_request: invalid user support [preauth] Jan 16 08:09:49 host sshd[26307]: pam_unix(sshd:auth): check pass; user unknown Jan 16 08:09:49 host sshd[26307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.15.107 Jan 16 08:09:52 host sshd[26307]: Failed password for invalid user support from 59.120.15.107 port 39263 ssh2 Jan 16 08:09:52 host sshd[26307]: pam_unix(sshd:auth): check pass; user unknown Jan 16 08:09:54 host sshd[26307]: Failed password for invalid user support from 59.120.15.107 port 39263 ssh2 Jan 16 08:09:55 host sshd[26307]: Connection reset by 59.120.15.107 port 39263 [preauth] Jan 16 08:09:55 host sshd[26307]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.15.107 Jan 16 08:10:15 host sshd[26363]: Invalid user admin from 36.3.236.17 port 60037 Jan 16 08:10:15 host sshd[26363]: input_userauth_request: invalid user admin [preauth] Jan 16 08:10:15 host sshd[26363]: pam_unix(sshd:auth): check pass; user unknown Jan 16 08:10:15 host sshd[26363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.3.236.17 Jan 16 08:10:17 host sshd[26363]: Failed password for invalid user admin from 36.3.236.17 port 60037 ssh2 Jan 16 08:10:17 host sshd[26363]: Failed password for invalid user admin from 36.3.236.17 port 60037 ssh2 Jan 16 08:10:18 host sshd[26363]: pam_unix(sshd:auth): check pass; user unknown Jan 16 08:10:20 host sshd[26363]: Failed password for invalid user admin from 36.3.236.17 port 60037 ssh2 Jan 16 08:10:20 host sshd[26363]: pam_unix(sshd:auth): check pass; user unknown Jan 16 08:10:22 host sshd[26363]: Failed password for invalid user admin from 36.3.236.17 port 60037 ssh2 Jan 16 08:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 08:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 08:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 08:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=remysagr user-2=disposeat user-3=wwwkmaorg user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=shalinijames user-8=wwwtestugo user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=palco123 user-15=gifterman user-16=phmetals user-17=kottayamcalldriv user-18=wwwnexidigital user-19=mrsclean user-20=wwwkaretakers user-21=cochintaxi user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 08:21:07 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 08:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 08:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8c53ZUguvLXqlfcK.~ Jan 16 08:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8c53ZUguvLXqlfcK.~' Jan 16 08:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8c53ZUguvLXqlfcK.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 08:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 08:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 08:21:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 08:21:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 08:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 08:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 08:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 08:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 08:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 08:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 08:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 08:22:18 host sshd[28267]: Connection reset by 125.227.205.53 port 33743 [preauth] Jan 16 08:33:46 host sshd[29909]: Invalid user pi from 77.170.59.124 port 36296 Jan 16 08:33:46 host sshd[29909]: input_userauth_request: invalid user pi [preauth] Jan 16 08:33:46 host sshd[29911]: Invalid user pi from 77.170.59.124 port 36304 Jan 16 08:33:46 host sshd[29911]: input_userauth_request: invalid user pi [preauth] Jan 16 08:33:46 host sshd[29909]: pam_unix(sshd:auth): check pass; user unknown Jan 16 08:33:46 host sshd[29909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.170.59.124 Jan 16 08:33:46 host sshd[29911]: pam_unix(sshd:auth): check pass; user unknown Jan 16 08:33:46 host sshd[29911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.170.59.124 Jan 16 08:33:48 host sshd[29909]: Failed password for invalid user pi from 77.170.59.124 port 36296 ssh2 Jan 16 08:33:48 host sshd[29911]: Failed password for invalid user pi from 77.170.59.124 port 36304 ssh2 Jan 16 08:33:48 host sshd[29909]: Connection closed by 77.170.59.124 port 36296 [preauth] Jan 16 08:33:48 host sshd[29911]: Connection closed by 77.170.59.124 port 36304 [preauth] Jan 16 08:51:30 host sshd[32671]: Invalid user ew from 194.110.203.109 port 48314 Jan 16 08:51:30 host sshd[32671]: input_userauth_request: invalid user ew [preauth] Jan 16 08:51:30 host sshd[32671]: pam_unix(sshd:auth): check pass; user unknown Jan 16 08:51:30 host sshd[32671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 08:51:31 host sshd[32671]: Failed password for invalid user ew from 194.110.203.109 port 48314 ssh2 Jan 16 08:51:34 host sshd[32671]: pam_unix(sshd:auth): check pass; user unknown Jan 16 08:51:36 host sshd[32671]: Failed password for invalid user ew from 194.110.203.109 port 48314 ssh2 Jan 16 08:51:39 host sshd[32671]: pam_unix(sshd:auth): check pass; user unknown Jan 16 08:51:41 host sshd[32671]: Failed password for invalid user ew from 194.110.203.109 port 48314 ssh2 Jan 16 08:51:44 host sshd[32671]: Connection closed by 194.110.203.109 port 48314 [preauth] Jan 16 08:51:44 host sshd[32671]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 09:12:24 host sshd[3925]: Invalid user admin from 87.20.232.105 port 36436 Jan 16 09:12:24 host sshd[3925]: input_userauth_request: invalid user admin [preauth] Jan 16 09:12:24 host sshd[3925]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:12:24 host sshd[3925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.20.232.105 Jan 16 09:12:26 host sshd[3925]: Failed password for invalid user admin from 87.20.232.105 port 36436 ssh2 Jan 16 09:12:27 host sshd[3925]: Failed password for invalid user admin from 87.20.232.105 port 36436 ssh2 Jan 16 09:12:27 host sshd[3925]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:12:29 host sshd[3925]: Failed password for invalid user admin from 87.20.232.105 port 36436 ssh2 Jan 16 09:12:30 host sshd[3925]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:12:32 host sshd[3925]: Failed password for invalid user admin from 87.20.232.105 port 36436 ssh2 Jan 16 09:12:32 host sshd[3925]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:12:34 host sshd[3925]: Failed password for invalid user admin from 87.20.232.105 port 36436 ssh2 Jan 16 09:12:34 host sshd[3925]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:12:36 host sshd[3925]: Failed password for invalid user admin from 87.20.232.105 port 36436 ssh2 Jan 16 09:12:36 host sshd[3925]: error: maximum authentication attempts exceeded for invalid user admin from 87.20.232.105 port 36436 ssh2 [preauth] Jan 16 09:12:36 host sshd[3925]: Disconnecting: Too many authentication failures [preauth] Jan 16 09:12:36 host sshd[3925]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.20.232.105 Jan 16 09:12:36 host sshd[3925]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 16 09:15:05 host sshd[4286]: Invalid user sFTPUser from 218.164.37.138 port 38124 Jan 16 09:15:05 host sshd[4286]: input_userauth_request: invalid user sFTPUser [preauth] Jan 16 09:15:05 host sshd[4286]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:15:05 host sshd[4286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.164.37.138 Jan 16 09:15:07 host sshd[4286]: Failed password for invalid user sFTPUser from 218.164.37.138 port 38124 ssh2 Jan 16 09:15:09 host sshd[4286]: Connection reset by 218.164.37.138 port 38124 [preauth] Jan 16 09:17:30 host sshd[4758]: Did not receive identification string from 46.101.97.107 port 61000 Jan 16 09:17:48 host sshd[4779]: Did not receive identification string from 195.19.96.168 port 33852 Jan 16 09:17:49 host sshd[4784]: User mysql from 195.19.96.168 not allowed because not listed in AllowUsers Jan 16 09:17:49 host sshd[4782]: User root from 195.19.96.168 not allowed because not listed in AllowUsers Jan 16 09:17:49 host sshd[4800]: User root from 195.19.96.168 not allowed because not listed in AllowUsers Jan 16 09:17:49 host sshd[4798]: Invalid user user from 195.19.96.168 port 34950 Jan 16 09:17:49 host sshd[4799]: Invalid user oracle from 195.19.96.168 port 35010 Jan 16 09:17:49 host sshd[4783]: Invalid user steam from 195.19.96.168 port 34414 Jan 16 09:17:49 host sshd[4800]: input_userauth_request: invalid user root [preauth] Jan 16 09:17:49 host sshd[4783]: input_userauth_request: invalid user steam [preauth] Jan 16 09:17:49 host sshd[4801]: Invalid user www from 195.19.96.168 port 34942 Jan 16 09:17:49 host sshd[4782]: input_userauth_request: invalid user root [preauth] Jan 16 09:17:49 host sshd[4799]: input_userauth_request: invalid user oracle [preauth] Jan 16 09:17:49 host sshd[4784]: input_userauth_request: invalid user mysql [preauth] Jan 16 09:17:49 host sshd[4788]: Invalid user ansadmin from 195.19.96.168 port 34420 Jan 16 09:17:49 host sshd[4790]: User root from 195.19.96.168 not allowed because not listed in AllowUsers Jan 16 09:17:49 host sshd[4790]: input_userauth_request: invalid user root [preauth] Jan 16 09:17:49 host sshd[4786]: Invalid user ansadmin from 195.19.96.168 port 34418 Jan 16 09:17:49 host sshd[4788]: input_userauth_request: invalid user ansadmin [preauth] Jan 16 09:17:49 host sshd[4786]: input_userauth_request: invalid user ansadmin [preauth] Jan 16 09:17:49 host sshd[4789]: Invalid user ubuntu from 195.19.96.168 port 34416 Jan 16 09:17:49 host sshd[4789]: input_userauth_request: invalid user ubuntu [preauth] Jan 16 09:17:49 host sshd[4798]: input_userauth_request: invalid user user [preauth] Jan 16 09:17:49 host sshd[4785]: Invalid user tester from 195.19.96.168 port 34422 Jan 16 09:17:49 host sshd[4785]: input_userauth_request: invalid user tester [preauth] Jan 16 09:17:49 host sshd[4801]: input_userauth_request: invalid user www [preauth] Jan 16 09:17:49 host sshd[4806]: Invalid user devops from 195.19.96.168 port 34982 Jan 16 09:17:49 host sshd[4807]: Invalid user pi from 195.19.96.168 port 34978 Jan 16 09:17:49 host sshd[4806]: input_userauth_request: invalid user devops [preauth] Jan 16 09:17:49 host sshd[4804]: Invalid user guest from 195.19.96.168 port 35012 Jan 16 09:17:49 host sshd[4808]: User centos from 195.19.96.168 not allowed because not listed in AllowUsers Jan 16 09:17:49 host sshd[4804]: input_userauth_request: invalid user guest [preauth] Jan 16 09:17:49 host sshd[4808]: input_userauth_request: invalid user centos [preauth] Jan 16 09:17:49 host sshd[4807]: input_userauth_request: invalid user pi [preauth] Jan 16 09:17:49 host sshd[4811]: User centos from 195.19.96.168 not allowed because not listed in AllowUsers Jan 16 09:17:49 host sshd[4811]: input_userauth_request: invalid user centos [preauth] Jan 16 09:17:49 host sshd[4805]: User root from 195.19.96.168 not allowed because not listed in AllowUsers Jan 16 09:17:49 host sshd[4803]: Invalid user user from 195.19.96.168 port 34966 Jan 16 09:17:49 host sshd[4803]: input_userauth_request: invalid user user [preauth] Jan 16 09:17:49 host sshd[4805]: input_userauth_request: invalid user root [preauth] Jan 16 09:17:49 host sshd[4802]: Invalid user emqx from 195.19.96.168 port 34976 Jan 16 09:17:49 host sshd[4802]: input_userauth_request: invalid user emqx [preauth] Jan 16 09:17:49 host sshd[4809]: Invalid user postgres from 195.19.96.168 port 34960 Jan 16 09:17:49 host sshd[4809]: input_userauth_request: invalid user postgres [preauth] Jan 16 09:17:49 host sshd[4810]: User root from 195.19.96.168 not allowed because not listed in AllowUsers Jan 16 09:17:49 host sshd[4810]: input_userauth_request: invalid user root [preauth] Jan 16 09:17:49 host sshd[4815]: Invalid user postgres from 195.19.96.168 port 34924 Jan 16 09:17:49 host sshd[4813]: Invalid user admin from 195.19.96.168 port 34954 Jan 16 09:17:49 host sshd[4815]: input_userauth_request: invalid user postgres [preauth] Jan 16 09:17:49 host sshd[4813]: input_userauth_request: invalid user admin [preauth] Jan 16 09:17:49 host sshd[4812]: Invalid user test from 195.19.96.168 port 34962 Jan 16 09:17:49 host sshd[4814]: Invalid user ubuntu from 195.19.96.168 port 35026 Jan 16 09:17:49 host sshd[4812]: input_userauth_request: invalid user test [preauth] Jan 16 09:17:49 host sshd[4814]: input_userauth_request: invalid user ubuntu [preauth] Jan 16 09:17:49 host sshd[4816]: Invalid user postgres from 195.19.96.168 port 34920 Jan 16 09:17:49 host sshd[4816]: input_userauth_request: invalid user postgres [preauth] Jan 16 09:17:49 host sshd[4817]: Invalid user ec2-user from 195.19.96.168 port 35022 Jan 16 09:17:49 host sshd[4817]: input_userauth_request: invalid user ec2-user [preauth] Jan 16 09:17:49 host sshd[4799]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:49 host sshd[4798]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:49 host sshd[4799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:49 host sshd[4798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:49 host sshd[4783]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:49 host sshd[4783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:49 host sshd[4786]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:49 host sshd[4786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:49 host sshd[4801]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:49 host sshd[4801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:49 host sshd[4789]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:49 host sshd[4789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:49 host sshd[4788]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:49 host sshd[4788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:49 host sshd[4785]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:49 host sshd[4785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:49 host unix_chkpwd[4843]: password check failed for user (mysql) Jan 16 09:17:49 host sshd[4784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 user=mysql Jan 16 09:17:49 host sshd[4784]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 16 09:17:49 host sshd[4804]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:49 host sshd[4804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:49 host sshd[4807]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:49 host sshd[4807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:49 host sshd[4806]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:49 host sshd[4806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:49 host unix_chkpwd[4845]: password check failed for user (centos) Jan 16 09:17:49 host sshd[4808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 user=centos Jan 16 09:17:49 host unix_chkpwd[4841]: password check failed for user (root) Jan 16 09:17:49 host sshd[4782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 user=root Jan 16 09:17:49 host sshd[4782]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 09:17:49 host unix_chkpwd[4842]: password check failed for user (root) Jan 16 09:17:49 host sshd[4800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 user=root Jan 16 09:17:49 host sshd[4800]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 09:17:49 host unix_chkpwd[4846]: password check failed for user (centos) Jan 16 09:17:49 host sshd[4811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 user=centos Jan 16 09:17:49 host unix_chkpwd[4844]: password check failed for user (root) Jan 16 09:17:49 host sshd[4790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 user=root Jan 16 09:17:49 host sshd[4790]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 09:17:50 host sshd[4802]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:50 host sshd[4803]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:50 host sshd[4802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:50 host sshd[4803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:50 host sshd[4813]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:50 host sshd[4813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:50 host sshd[4815]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:50 host sshd[4815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:50 host sshd[4816]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:50 host sshd[4816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:50 host sshd[4817]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:50 host sshd[4817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:50 host sshd[4809]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:50 host sshd[4809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:50 host sshd[4812]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:50 host sshd[4812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:50 host sshd[4814]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:17:50 host sshd[4814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 Jan 16 09:17:50 host unix_chkpwd[4847]: password check failed for user (root) Jan 16 09:17:50 host sshd[4805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 user=root Jan 16 09:17:50 host sshd[4805]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 09:17:50 host unix_chkpwd[4848]: password check failed for user (root) Jan 16 09:17:50 host sshd[4810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.96.168 user=root Jan 16 09:17:50 host sshd[4810]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 09:17:51 host sshd[4798]: Failed password for invalid user user from 195.19.96.168 port 34950 ssh2 Jan 16 09:17:51 host sshd[4799]: Failed password for invalid user oracle from 195.19.96.168 port 35010 ssh2 Jan 16 09:17:51 host sshd[4783]: Failed password for invalid user steam from 195.19.96.168 port 34414 ssh2 Jan 16 09:17:51 host sshd[4786]: Failed password for invalid user ansadmin from 195.19.96.168 port 34418 ssh2 Jan 16 09:17:51 host sshd[4801]: Failed password for invalid user www from 195.19.96.168 port 34942 ssh2 Jan 16 09:17:51 host sshd[4789]: Failed password for invalid user ubuntu from 195.19.96.168 port 34416 ssh2 Jan 16 09:17:51 host sshd[4802]: Failed password for invalid user emqx from 195.19.96.168 port 34976 ssh2 Jan 16 09:17:51 host sshd[4803]: Failed password for invalid user user from 195.19.96.168 port 34966 ssh2 Jan 16 09:17:51 host sshd[4788]: Failed password for invalid user ansadmin from 195.19.96.168 port 34420 ssh2 Jan 16 09:17:51 host sshd[4785]: Failed password for invalid user tester from 195.19.96.168 port 34422 ssh2 Jan 16 09:17:51 host sshd[4784]: Failed password for invalid user mysql from 195.19.96.168 port 34426 ssh2 Jan 16 09:17:51 host sshd[4813]: Failed password for invalid user admin from 195.19.96.168 port 34954 ssh2 Jan 16 09:17:51 host sshd[4815]: Failed password for invalid user postgres from 195.19.96.168 port 34924 ssh2 Jan 16 09:17:51 host sshd[4816]: Failed password for invalid user postgres from 195.19.96.168 port 34920 ssh2 Jan 16 09:17:51 host sshd[4804]: Failed password for invalid user guest from 195.19.96.168 port 35012 ssh2 Jan 16 09:17:51 host sshd[4817]: Failed password for invalid user ec2-user from 195.19.96.168 port 35022 ssh2 Jan 16 09:17:51 host sshd[4809]: Failed password for invalid user postgres from 195.19.96.168 port 34960 ssh2 Jan 16 09:17:51 host sshd[4807]: Failed password for invalid user pi from 195.19.96.168 port 34978 ssh2 Jan 16 09:17:51 host sshd[4812]: Failed password for invalid user test from 195.19.96.168 port 34962 ssh2 Jan 16 09:17:51 host sshd[4806]: Failed password for invalid user devops from 195.19.96.168 port 34982 ssh2 Jan 16 09:17:51 host sshd[4814]: Failed password for invalid user ubuntu from 195.19.96.168 port 35026 ssh2 Jan 16 09:17:51 host sshd[4808]: Failed password for invalid user centos from 195.19.96.168 port 34990 ssh2 Jan 16 09:17:51 host sshd[4782]: Failed password for invalid user root from 195.19.96.168 port 34424 ssh2 Jan 16 09:17:51 host sshd[4800]: Failed password for invalid user root from 195.19.96.168 port 34930 ssh2 Jan 16 09:17:51 host sshd[4805]: Failed password for invalid user root from 195.19.96.168 port 34946 ssh2 Jan 16 09:17:51 host sshd[4811]: Failed password for invalid user centos from 195.19.96.168 port 35018 ssh2 Jan 16 09:17:51 host sshd[4790]: Failed password for invalid user root from 195.19.96.168 port 34312 ssh2 Jan 16 09:17:51 host sshd[4810]: Failed password for invalid user root from 195.19.96.168 port 35014 ssh2 Jan 16 09:17:52 host sshd[4804]: Connection closed by 195.19.96.168 port 35012 [preauth] Jan 16 09:17:52 host sshd[4801]: Connection closed by 195.19.96.168 port 34942 [preauth] Jan 16 09:17:52 host sshd[4798]: Connection closed by 195.19.96.168 port 34950 [preauth] Jan 16 09:17:52 host sshd[4817]: Connection closed by 195.19.96.168 port 35022 [preauth] Jan 16 09:17:52 host sshd[4788]: Connection closed by 195.19.96.168 port 34420 [preauth] Jan 16 09:17:52 host sshd[4790]: Connection closed by 195.19.96.168 port 34312 [preauth] Jan 16 09:17:52 host sshd[4785]: Connection closed by 195.19.96.168 port 34422 [preauth] Jan 16 09:17:52 host sshd[4816]: Connection closed by 195.19.96.168 port 34920 [preauth] Jan 16 09:17:52 host sshd[4784]: Connection closed by 195.19.96.168 port 34426 [preauth] Jan 16 09:17:52 host sshd[4806]: Connection closed by 195.19.96.168 port 34982 [preauth] Jan 16 09:17:52 host sshd[4800]: Connection closed by 195.19.96.168 port 34930 [preauth] Jan 16 09:17:52 host sshd[4799]: Connection closed by 195.19.96.168 port 35010 [preauth] Jan 16 09:17:52 host sshd[4805]: Connection closed by 195.19.96.168 port 34946 [preauth] Jan 16 09:17:52 host sshd[4803]: Connection closed by 195.19.96.168 port 34966 [preauth] Jan 16 09:17:52 host sshd[4783]: Connection closed by 195.19.96.168 port 34414 [preauth] Jan 16 09:17:52 host sshd[4810]: Connection closed by 195.19.96.168 port 35014 [preauth] Jan 16 09:17:52 host sshd[4782]: Connection closed by 195.19.96.168 port 34424 [preauth] Jan 16 09:17:52 host sshd[4809]: Connection closed by 195.19.96.168 port 34960 [preauth] Jan 16 09:17:52 host sshd[4807]: Connection closed by 195.19.96.168 port 34978 [preauth] Jan 16 09:17:52 host sshd[4808]: Connection closed by 195.19.96.168 port 34990 [preauth] Jan 16 09:17:52 host sshd[4811]: Connection closed by 195.19.96.168 port 35018 [preauth] Jan 16 09:17:52 host sshd[4786]: Connection closed by 195.19.96.168 port 34418 [preauth] Jan 16 09:17:52 host sshd[4789]: Connection closed by 195.19.96.168 port 34416 [preauth] Jan 16 09:17:52 host sshd[4812]: Connection closed by 195.19.96.168 port 34962 [preauth] Jan 16 09:17:52 host sshd[4802]: Connection closed by 195.19.96.168 port 34976 [preauth] Jan 16 09:17:52 host sshd[4815]: Connection closed by 195.19.96.168 port 34924 [preauth] Jan 16 09:17:52 host sshd[4813]: Connection closed by 195.19.96.168 port 34954 [preauth] Jan 16 09:17:52 host sshd[4814]: Connection closed by 195.19.96.168 port 35026 [preauth] Jan 16 09:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 09:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 09:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 09:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 09:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 09:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 09:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 09:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwrmswll user-2=keralaholi user-3=wwwresourcehunte user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=wwwkaretakers user-11=cochintaxi user-12=wwwnexidigital user-13=mrsclean user-14=gifterman user-15=palco123 user-16=kottayamcalldriv user-17=phmetals user-18=straightcurve user-19=wwwletsstalkfood user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=wwwtestugo user-25=shalinijames user-26=woodpeck user-27=wwwkapin user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 09:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 09:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 09:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EquLB8ljlxby9ysG.~ Jan 16 09:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EquLB8ljlxby9ysG.~' Jan 16 09:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EquLB8ljlxby9ysG.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 09:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 09:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 09:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 09:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 09:22:16 host sshd[5749]: Invalid user pi from 95.160.144.251 port 58690 Jan 16 09:22:16 host sshd[5749]: input_userauth_request: invalid user pi [preauth] Jan 16 09:22:16 host sshd[5749]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:22:16 host sshd[5749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.160.144.251 Jan 16 09:22:17 host sshd[5749]: Failed password for invalid user pi from 95.160.144.251 port 58690 ssh2 Jan 16 09:22:18 host sshd[5749]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:22:21 host sshd[5749]: Failed password for invalid user pi from 95.160.144.251 port 58690 ssh2 Jan 16 09:22:22 host sshd[5749]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:22:24 host sshd[5749]: Failed password for invalid user pi from 95.160.144.251 port 58690 ssh2 Jan 16 09:22:24 host sshd[5749]: Connection reset by 95.160.144.251 port 58690 [preauth] Jan 16 09:22:24 host sshd[5749]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.160.144.251 Jan 16 09:22:39 host sshd[5848]: User root from 190.144.139.235 not allowed because not listed in AllowUsers Jan 16 09:22:39 host sshd[5848]: input_userauth_request: invalid user root [preauth] Jan 16 09:22:39 host unix_chkpwd[5854]: password check failed for user (root) Jan 16 09:22:39 host sshd[5848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.139.235 user=root Jan 16 09:22:39 host sshd[5848]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 09:22:40 host sshd[5848]: Failed password for invalid user root from 190.144.139.235 port 47011 ssh2 Jan 16 09:22:41 host sshd[5848]: Received disconnect from 190.144.139.235 port 47011:11: Bye Bye [preauth] Jan 16 09:22:41 host sshd[5848]: Disconnected from 190.144.139.235 port 47011 [preauth] Jan 16 09:28:40 host sshd[6890]: User root from 190.144.139.235 not allowed because not listed in AllowUsers Jan 16 09:28:40 host sshd[6890]: input_userauth_request: invalid user root [preauth] Jan 16 09:28:40 host unix_chkpwd[6893]: password check failed for user (root) Jan 16 09:28:40 host sshd[6890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.139.235 user=root Jan 16 09:28:40 host sshd[6890]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 09:28:42 host sshd[6890]: Failed password for invalid user root from 190.144.139.235 port 46894 ssh2 Jan 16 09:28:42 host sshd[6890]: Received disconnect from 190.144.139.235 port 46894:11: Bye Bye [preauth] Jan 16 09:28:42 host sshd[6890]: Disconnected from 190.144.139.235 port 46894 [preauth] Jan 16 09:33:56 host sshd[7698]: Invalid user Admin from 121.188.124.131 port 61701 Jan 16 09:33:56 host sshd[7698]: input_userauth_request: invalid user Admin [preauth] Jan 16 09:33:56 host sshd[7698]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:33:56 host sshd[7698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.188.124.131 Jan 16 09:33:58 host sshd[7698]: Failed password for invalid user Admin from 121.188.124.131 port 61701 ssh2 Jan 16 09:33:58 host sshd[7698]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:34:00 host sshd[7698]: Failed password for invalid user Admin from 121.188.124.131 port 61701 ssh2 Jan 16 09:34:00 host sshd[7698]: Connection reset by 121.188.124.131 port 61701 [preauth] Jan 16 09:34:00 host sshd[7698]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.188.124.131 Jan 16 09:38:47 host sshd[8457]: Invalid user pi from 185.122.204.242 port 41602 Jan 16 09:38:47 host sshd[8457]: input_userauth_request: invalid user pi [preauth] Jan 16 09:38:47 host sshd[8457]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:38:47 host sshd[8457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.122.204.242 Jan 16 09:38:47 host sshd[8460]: Invalid user pi from 185.122.204.242 port 46246 Jan 16 09:38:47 host sshd[8460]: input_userauth_request: invalid user pi [preauth] Jan 16 09:38:47 host sshd[8460]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:38:47 host sshd[8460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.122.204.242 Jan 16 09:38:50 host sshd[8457]: Failed password for invalid user pi from 185.122.204.242 port 41602 ssh2 Jan 16 09:38:50 host sshd[8460]: Failed password for invalid user pi from 185.122.204.242 port 46246 ssh2 Jan 16 09:38:50 host sshd[8457]: Connection closed by 185.122.204.242 port 41602 [preauth] Jan 16 09:38:50 host sshd[8460]: Connection closed by 185.122.204.242 port 46246 [preauth] Jan 16 09:38:52 host sshd[8468]: Invalid user pi from 185.122.204.242 port 53334 Jan 16 09:38:52 host sshd[8468]: input_userauth_request: invalid user pi [preauth] Jan 16 09:38:52 host sshd[8468]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:38:52 host sshd[8468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.122.204.242 Jan 16 09:38:54 host sshd[8468]: Failed password for invalid user pi from 185.122.204.242 port 53334 ssh2 Jan 16 09:38:56 host sshd[8491]: User root from 125.229.80.19 not allowed because not listed in AllowUsers Jan 16 09:38:56 host sshd[8491]: input_userauth_request: invalid user root [preauth] Jan 16 09:38:56 host unix_chkpwd[8508]: password check failed for user (root) Jan 16 09:38:56 host sshd[8491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.80.19 user=root Jan 16 09:38:56 host sshd[8491]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 09:38:58 host sshd[8491]: Failed password for invalid user root from 125.229.80.19 port 37093 ssh2 Jan 16 09:38:59 host unix_chkpwd[8513]: password check failed for user (root) Jan 16 09:38:59 host sshd[8491]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 09:39:01 host sshd[8491]: Failed password for invalid user root from 125.229.80.19 port 37093 ssh2 Jan 16 09:39:02 host unix_chkpwd[8533]: password check failed for user (root) Jan 16 09:39:02 host sshd[8491]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 09:39:04 host sshd[8491]: Failed password for invalid user root from 125.229.80.19 port 37093 ssh2 Jan 16 09:39:05 host sshd[8491]: Connection reset by 125.229.80.19 port 37093 [preauth] Jan 16 09:39:05 host sshd[8491]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.80.19 user=root Jan 16 09:49:09 host sshd[10234]: Invalid user zyfwp from 183.99.143.30 port 56535 Jan 16 09:49:09 host sshd[10234]: input_userauth_request: invalid user zyfwp [preauth] Jan 16 09:49:09 host sshd[10234]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:49:09 host sshd[10234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.99.143.30 Jan 16 09:49:11 host sshd[10234]: Failed password for invalid user zyfwp from 183.99.143.30 port 56535 ssh2 Jan 16 09:49:12 host sshd[10234]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:49:14 host sshd[10234]: Failed password for invalid user zyfwp from 183.99.143.30 port 56535 ssh2 Jan 16 09:49:15 host sshd[10234]: pam_unix(sshd:auth): check pass; user unknown Jan 16 09:49:17 host sshd[10234]: Failed password for invalid user zyfwp from 183.99.143.30 port 56535 ssh2 Jan 16 09:49:17 host sshd[10234]: Connection closed by 183.99.143.30 port 56535 [preauth] Jan 16 09:49:17 host sshd[10234]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.99.143.30 Jan 16 10:03:11 host sshd[12455]: User root from 141.98.11.66 not allowed because not listed in AllowUsers Jan 16 10:03:11 host sshd[12455]: input_userauth_request: invalid user root [preauth] Jan 16 10:03:11 host unix_chkpwd[12458]: password check failed for user (root) Jan 16 10:03:11 host sshd[12455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.66 user=root Jan 16 10:03:11 host sshd[12455]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:03:13 host sshd[12455]: Failed password for invalid user root from 141.98.11.66 port 47952 ssh2 Jan 16 10:03:13 host sshd[12455]: Received disconnect from 141.98.11.66 port 47952:11: Normal Shutdown, Thank you for playing [preauth] Jan 16 10:03:13 host sshd[12455]: Disconnected from 141.98.11.66 port 47952 [preauth] Jan 16 10:10:07 host sshd[13461]: User root from 141.98.11.66 not allowed because not listed in AllowUsers Jan 16 10:10:07 host sshd[13461]: input_userauth_request: invalid user root [preauth] Jan 16 10:10:07 host unix_chkpwd[13470]: password check failed for user (root) Jan 16 10:10:07 host sshd[13461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.66 user=root Jan 16 10:10:07 host sshd[13461]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:10:09 host sshd[13461]: Failed password for invalid user root from 141.98.11.66 port 35014 ssh2 Jan 16 10:10:09 host sshd[13461]: Received disconnect from 141.98.11.66 port 35014:11: Normal Shutdown, Thank you for playing [preauth] Jan 16 10:10:09 host sshd[13461]: Disconnected from 141.98.11.66 port 35014 [preauth] Jan 16 10:10:11 host sshd[13507]: User root from 61.57.118.54 not allowed because not listed in AllowUsers Jan 16 10:10:11 host sshd[13507]: input_userauth_request: invalid user root [preauth] Jan 16 10:10:11 host unix_chkpwd[13511]: password check failed for user (root) Jan 16 10:10:11 host sshd[13507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.57.118.54 user=root Jan 16 10:10:11 host sshd[13507]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:10:14 host sshd[13507]: Failed password for invalid user root from 61.57.118.54 port 37280 ssh2 Jan 16 10:10:15 host sshd[13512]: Invalid user admin from 61.57.118.54 port 37295 Jan 16 10:10:15 host sshd[13512]: input_userauth_request: invalid user admin [preauth] Jan 16 10:10:15 host sshd[13512]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:10:15 host sshd[13512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.57.118.54 Jan 16 10:10:15 host unix_chkpwd[13519]: password check failed for user (root) Jan 16 10:10:15 host sshd[13507]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:10:17 host sshd[13512]: Failed password for invalid user admin from 61.57.118.54 port 37295 ssh2 Jan 16 10:10:17 host sshd[13507]: Failed password for invalid user root from 61.57.118.54 port 37280 ssh2 Jan 16 10:10:18 host sshd[13507]: Connection reset by 61.57.118.54 port 37280 [preauth] Jan 16 10:10:18 host sshd[13507]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.57.118.54 user=root Jan 16 10:10:18 host sshd[13512]: Failed password for invalid user admin from 61.57.118.54 port 37295 ssh2 Jan 16 10:10:18 host sshd[13512]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:10:20 host sshd[13512]: Failed password for invalid user admin from 61.57.118.54 port 37295 ssh2 Jan 16 10:19:24 host sshd[14950]: User root from 59.31.129.33 not allowed because not listed in AllowUsers Jan 16 10:19:24 host sshd[14950]: input_userauth_request: invalid user root [preauth] Jan 16 10:19:24 host unix_chkpwd[14954]: password check failed for user (root) Jan 16 10:19:24 host sshd[14950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.31.129.33 user=root Jan 16 10:19:24 host sshd[14950]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:19:26 host sshd[14950]: Failed password for invalid user root from 59.31.129.33 port 61235 ssh2 Jan 16 10:19:26 host unix_chkpwd[14957]: password check failed for user (root) Jan 16 10:19:26 host sshd[14950]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:19:28 host sshd[14950]: Failed password for invalid user root from 59.31.129.33 port 61235 ssh2 Jan 16 10:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 10:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 10:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 10:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 10:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 10:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 10:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 10:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 10:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=shalinijames user-3=wwwtestugo user-4=vfmassets user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=wwwkmaorg user-9=remysagr user-10=wwwnexidigital user-11=mrsclean user-12=phmetals user-13=kottayamcalldriv user-14=palco123 user-15=gifterman user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=ugotscom user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 10:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 10:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 10:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bynyOHfTLaFTzZSD.~ Jan 16 10:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bynyOHfTLaFTzZSD.~' Jan 16 10:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bynyOHfTLaFTzZSD.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 10:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 10:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 10:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 10:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 10:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 10:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 10:21:22 host sshd[15372]: Invalid user stanley from 107.189.30.59 port 51864 Jan 16 10:21:22 host sshd[15372]: input_userauth_request: invalid user stanley [preauth] Jan 16 10:21:22 host sshd[15372]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:21:22 host sshd[15372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 16 10:21:25 host sshd[15372]: Failed password for invalid user stanley from 107.189.30.59 port 51864 ssh2 Jan 16 10:21:26 host sshd[15372]: Connection closed by 107.189.30.59 port 51864 [preauth] Jan 16 10:23:43 host sshd[15703]: User root from 20.246.90.161 not allowed because not listed in AllowUsers Jan 16 10:23:43 host sshd[15703]: input_userauth_request: invalid user root [preauth] Jan 16 10:23:43 host unix_chkpwd[15706]: password check failed for user (root) Jan 16 10:23:43 host sshd[15703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.246.90.161 user=root Jan 16 10:23:43 host sshd[15703]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:23:45 host sshd[15703]: Failed password for invalid user root from 20.246.90.161 port 64623 ssh2 Jan 16 10:24:05 host sshd[15751]: Invalid user usr from 147.158.214.55 port 58013 Jan 16 10:24:05 host sshd[15751]: input_userauth_request: invalid user usr [preauth] Jan 16 10:24:05 host sshd[15751]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:24:05 host sshd[15751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.158.214.55 Jan 16 10:24:07 host sshd[15751]: Failed password for invalid user usr from 147.158.214.55 port 58013 ssh2 Jan 16 10:24:07 host sshd[15751]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:24:09 host sshd[15751]: Failed password for invalid user usr from 147.158.214.55 port 58013 ssh2 Jan 16 10:24:10 host sshd[15751]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:24:13 host sshd[15751]: Failed password for invalid user usr from 147.158.214.55 port 58013 ssh2 Jan 16 10:24:14 host sshd[15751]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:24:16 host sshd[15751]: Failed password for invalid user usr from 147.158.214.55 port 58013 ssh2 Jan 16 10:24:18 host sshd[15751]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:24:20 host sshd[15751]: Failed password for invalid user usr from 147.158.214.55 port 58013 ssh2 Jan 16 10:27:57 host sshd[16448]: Invalid user oracle from 220.132.211.140 port 39786 Jan 16 10:27:57 host sshd[16448]: input_userauth_request: invalid user oracle [preauth] Jan 16 10:27:57 host sshd[16448]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:27:57 host sshd[16448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.211.140 Jan 16 10:27:59 host sshd[16448]: Failed password for invalid user oracle from 220.132.211.140 port 39786 ssh2 Jan 16 10:27:59 host sshd[16448]: Connection reset by 220.132.211.140 port 39786 [preauth] Jan 16 10:28:09 host sshd[16482]: Invalid user dlxuser from 192.72.191.27 port 35199 Jan 16 10:28:09 host sshd[16482]: input_userauth_request: invalid user dlxuser [preauth] Jan 16 10:28:09 host sshd[16482]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:28:09 host sshd[16482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.72.191.27 Jan 16 10:28:11 host sshd[16482]: Failed password for invalid user dlxuser from 192.72.191.27 port 35199 ssh2 Jan 16 10:28:12 host sshd[16482]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:28:15 host sshd[16482]: Failed password for invalid user dlxuser from 192.72.191.27 port 35199 ssh2 Jan 16 10:28:16 host sshd[16482]: Failed password for invalid user dlxuser from 192.72.191.27 port 35199 ssh2 Jan 16 10:28:16 host sshd[16482]: Connection closed by 192.72.191.27 port 35199 [preauth] Jan 16 10:28:16 host sshd[16482]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.72.191.27 Jan 16 10:29:54 host sshd[16802]: Connection reset by 125.229.100.222 port 44785 [preauth] Jan 16 10:32:20 host sshd[17138]: Invalid user admin from 111.94.71.206 port 44831 Jan 16 10:32:20 host sshd[17138]: input_userauth_request: invalid user admin [preauth] Jan 16 10:32:20 host sshd[17138]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:32:20 host sshd[17138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.94.71.206 Jan 16 10:32:22 host sshd[17138]: Failed password for invalid user admin from 111.94.71.206 port 44831 ssh2 Jan 16 10:32:22 host sshd[17138]: Failed password for invalid user admin from 111.94.71.206 port 44831 ssh2 Jan 16 10:32:23 host sshd[17138]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:32:25 host sshd[17138]: Failed password for invalid user admin from 111.94.71.206 port 44831 ssh2 Jan 16 10:32:25 host sshd[17138]: Connection reset by 111.94.71.206 port 44831 [preauth] Jan 16 10:32:25 host sshd[17138]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.94.71.206 Jan 16 10:35:22 host sshd[17499]: Invalid user ex from 194.110.203.109 port 42988 Jan 16 10:35:22 host sshd[17499]: input_userauth_request: invalid user ex [preauth] Jan 16 10:35:22 host sshd[17499]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:35:22 host sshd[17499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 10:35:24 host sshd[17499]: Failed password for invalid user ex from 194.110.203.109 port 42988 ssh2 Jan 16 10:35:27 host sshd[17499]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:35:29 host sshd[17499]: Failed password for invalid user ex from 194.110.203.109 port 42988 ssh2 Jan 16 10:35:32 host sshd[17499]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:35:34 host sshd[17499]: Failed password for invalid user ex from 194.110.203.109 port 42988 ssh2 Jan 16 10:35:37 host sshd[17499]: Connection closed by 194.110.203.109 port 42988 [preauth] Jan 16 10:35:37 host sshd[17499]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 10:41:51 host sshd[18524]: User root from 107.150.119.232 not allowed because not listed in AllowUsers Jan 16 10:41:51 host sshd[18524]: input_userauth_request: invalid user root [preauth] Jan 16 10:41:51 host unix_chkpwd[18527]: password check failed for user (root) Jan 16 10:41:51 host sshd[18524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.150.119.232 user=root Jan 16 10:41:51 host sshd[18524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:41:52 host sshd[18524]: Failed password for invalid user root from 107.150.119.232 port 50448 ssh2 Jan 16 10:41:53 host sshd[18524]: Received disconnect from 107.150.119.232 port 50448:11: Bye Bye [preauth] Jan 16 10:41:53 host sshd[18524]: Disconnected from 107.150.119.232 port 50448 [preauth] Jan 16 10:44:57 host sshd[18914]: User root from 43.153.5.126 not allowed because not listed in AllowUsers Jan 16 10:44:57 host sshd[18914]: input_userauth_request: invalid user root [preauth] Jan 16 10:44:57 host unix_chkpwd[18917]: password check failed for user (root) Jan 16 10:44:57 host sshd[18914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.5.126 user=root Jan 16 10:44:57 host sshd[18914]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:44:58 host sshd[18914]: Failed password for invalid user root from 43.153.5.126 port 40972 ssh2 Jan 16 10:44:59 host sshd[18914]: Received disconnect from 43.153.5.126 port 40972:11: Bye Bye [preauth] Jan 16 10:44:59 host sshd[18914]: Disconnected from 43.153.5.126 port 40972 [preauth] Jan 16 10:45:15 host sshd[18968]: User root from 128.199.182.19 not allowed because not listed in AllowUsers Jan 16 10:45:15 host sshd[18968]: input_userauth_request: invalid user root [preauth] Jan 16 10:45:15 host unix_chkpwd[18970]: password check failed for user (root) Jan 16 10:45:15 host sshd[18968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.182.19 user=root Jan 16 10:45:15 host sshd[18968]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:45:17 host sshd[18968]: Failed password for invalid user root from 128.199.182.19 port 48344 ssh2 Jan 16 10:45:17 host sshd[18968]: Received disconnect from 128.199.182.19 port 48344:11: Bye Bye [preauth] Jan 16 10:45:17 host sshd[18968]: Disconnected from 128.199.182.19 port 48344 [preauth] Jan 16 10:45:40 host sshd[19049]: User root from 159.223.95.95 not allowed because not listed in AllowUsers Jan 16 10:45:40 host sshd[19049]: input_userauth_request: invalid user root [preauth] Jan 16 10:45:40 host unix_chkpwd[19051]: password check failed for user (root) Jan 16 10:45:40 host sshd[19049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.95.95 user=root Jan 16 10:45:40 host sshd[19049]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:45:42 host sshd[19049]: Failed password for invalid user root from 159.223.95.95 port 51942 ssh2 Jan 16 10:45:42 host sshd[19049]: Received disconnect from 159.223.95.95 port 51942:11: Bye Bye [preauth] Jan 16 10:45:42 host sshd[19049]: Disconnected from 159.223.95.95 port 51942 [preauth] Jan 16 10:45:48 host sshd[19060]: User root from 129.154.217.134 not allowed because not listed in AllowUsers Jan 16 10:45:48 host sshd[19060]: input_userauth_request: invalid user root [preauth] Jan 16 10:45:48 host unix_chkpwd[19063]: password check failed for user (root) Jan 16 10:45:48 host sshd[19060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.154.217.134 user=root Jan 16 10:45:48 host sshd[19060]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:45:50 host sshd[19060]: Failed password for invalid user root from 129.154.217.134 port 43578 ssh2 Jan 16 10:45:50 host sshd[19060]: Received disconnect from 129.154.217.134 port 43578:11: Bye Bye [preauth] Jan 16 10:45:50 host sshd[19060]: Disconnected from 129.154.217.134 port 43578 [preauth] Jan 16 10:46:05 host sshd[19091]: User root from 81.89.110.244 not allowed because not listed in AllowUsers Jan 16 10:46:05 host sshd[19091]: input_userauth_request: invalid user root [preauth] Jan 16 10:46:05 host unix_chkpwd[19094]: password check failed for user (root) Jan 16 10:46:05 host sshd[19091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.89.110.244 user=root Jan 16 10:46:05 host sshd[19091]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:46:07 host sshd[19091]: Failed password for invalid user root from 81.89.110.244 port 36872 ssh2 Jan 16 10:46:07 host sshd[19091]: Received disconnect from 81.89.110.244 port 36872:11: Bye Bye [preauth] Jan 16 10:46:07 host sshd[19091]: Disconnected from 81.89.110.244 port 36872 [preauth] Jan 16 10:46:49 host sshd[19305]: User root from 35.223.246.35 not allowed because not listed in AllowUsers Jan 16 10:46:49 host sshd[19305]: input_userauth_request: invalid user root [preauth] Jan 16 10:46:49 host unix_chkpwd[19309]: password check failed for user (root) Jan 16 10:46:49 host sshd[19305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.223.246.35 user=root Jan 16 10:46:49 host sshd[19305]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:46:51 host sshd[19305]: Failed password for invalid user root from 35.223.246.35 port 35212 ssh2 Jan 16 10:46:51 host sshd[19305]: Received disconnect from 35.223.246.35 port 35212:11: Bye Bye [preauth] Jan 16 10:46:51 host sshd[19305]: Disconnected from 35.223.246.35 port 35212 [preauth] Jan 16 10:47:12 host sshd[19366]: User root from 159.223.95.95 not allowed because not listed in AllowUsers Jan 16 10:47:12 host sshd[19366]: input_userauth_request: invalid user root [preauth] Jan 16 10:47:12 host unix_chkpwd[19369]: password check failed for user (root) Jan 16 10:47:12 host sshd[19366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.95.95 user=root Jan 16 10:47:12 host sshd[19366]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:47:14 host sshd[19366]: Failed password for invalid user root from 159.223.95.95 port 38322 ssh2 Jan 16 10:47:14 host sshd[19366]: Received disconnect from 159.223.95.95 port 38322:11: Bye Bye [preauth] Jan 16 10:47:14 host sshd[19366]: Disconnected from 159.223.95.95 port 38322 [preauth] Jan 16 10:47:18 host sshd[19408]: User root from 128.199.182.19 not allowed because not listed in AllowUsers Jan 16 10:47:18 host sshd[19408]: input_userauth_request: invalid user root [preauth] Jan 16 10:47:18 host unix_chkpwd[19410]: password check failed for user (root) Jan 16 10:47:18 host sshd[19408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.182.19 user=root Jan 16 10:47:18 host sshd[19408]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:47:19 host sshd[19408]: Failed password for invalid user root from 128.199.182.19 port 51576 ssh2 Jan 16 10:47:19 host sshd[19408]: Received disconnect from 128.199.182.19 port 51576:11: Bye Bye [preauth] Jan 16 10:47:19 host sshd[19408]: Disconnected from 128.199.182.19 port 51576 [preauth] Jan 16 10:48:26 host sshd[19591]: User root from 35.223.246.35 not allowed because not listed in AllowUsers Jan 16 10:48:26 host sshd[19591]: input_userauth_request: invalid user root [preauth] Jan 16 10:48:26 host unix_chkpwd[19599]: password check failed for user (root) Jan 16 10:48:26 host sshd[19591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.223.246.35 user=root Jan 16 10:48:26 host sshd[19591]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:48:27 host sshd[19588]: Invalid user super from 67.221.122.74 port 63428 Jan 16 10:48:27 host sshd[19588]: input_userauth_request: invalid user super [preauth] Jan 16 10:48:27 host sshd[19588]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:48:27 host sshd[19588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.221.122.74 Jan 16 10:48:27 host sshd[19601]: User root from 107.150.119.232 not allowed because not listed in AllowUsers Jan 16 10:48:27 host sshd[19601]: input_userauth_request: invalid user root [preauth] Jan 16 10:48:27 host unix_chkpwd[19603]: password check failed for user (root) Jan 16 10:48:27 host sshd[19601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.150.119.232 user=root Jan 16 10:48:27 host sshd[19601]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:48:28 host sshd[19591]: Failed password for invalid user root from 35.223.246.35 port 35850 ssh2 Jan 16 10:48:28 host sshd[19591]: Received disconnect from 35.223.246.35 port 35850:11: Bye Bye [preauth] Jan 16 10:48:28 host sshd[19591]: Disconnected from 35.223.246.35 port 35850 [preauth] Jan 16 10:48:29 host sshd[19588]: Failed password for invalid user super from 67.221.122.74 port 63428 ssh2 Jan 16 10:48:30 host sshd[19601]: Failed password for invalid user root from 107.150.119.232 port 45190 ssh2 Jan 16 10:48:30 host sshd[19601]: Received disconnect from 107.150.119.232 port 45190:11: Bye Bye [preauth] Jan 16 10:48:30 host sshd[19601]: Disconnected from 107.150.119.232 port 45190 [preauth] Jan 16 10:48:30 host sshd[19588]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:48:32 host sshd[19588]: Failed password for invalid user super from 67.221.122.74 port 63428 ssh2 Jan 16 10:48:32 host sshd[19588]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:48:35 host sshd[19588]: Failed password for invalid user super from 67.221.122.74 port 63428 ssh2 Jan 16 10:48:36 host sshd[19588]: pam_unix(sshd:auth): check pass; user unknown Jan 16 10:48:38 host sshd[19588]: Failed password for invalid user super from 67.221.122.74 port 63428 ssh2 Jan 16 10:48:38 host sshd[19588]: Connection reset by 67.221.122.74 port 63428 [preauth] Jan 16 10:48:38 host sshd[19588]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.221.122.74 Jan 16 10:48:38 host sshd[19588]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 16 10:48:46 host sshd[19748]: User root from 43.153.5.126 not allowed because not listed in AllowUsers Jan 16 10:48:46 host sshd[19748]: input_userauth_request: invalid user root [preauth] Jan 16 10:48:46 host unix_chkpwd[19751]: password check failed for user (root) Jan 16 10:48:46 host sshd[19748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.5.126 user=root Jan 16 10:48:46 host sshd[19748]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:48:49 host sshd[19748]: Failed password for invalid user root from 43.153.5.126 port 40908 ssh2 Jan 16 10:48:49 host sshd[19748]: Received disconnect from 43.153.5.126 port 40908:11: Bye Bye [preauth] Jan 16 10:48:49 host sshd[19748]: Disconnected from 43.153.5.126 port 40908 [preauth] Jan 16 10:51:30 host sshd[20183]: User root from 81.89.110.244 not allowed because not listed in AllowUsers Jan 16 10:51:30 host sshd[20183]: input_userauth_request: invalid user root [preauth] Jan 16 10:51:30 host unix_chkpwd[20186]: password check failed for user (root) Jan 16 10:51:30 host sshd[20183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.89.110.244 user=root Jan 16 10:51:30 host sshd[20183]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:51:31 host sshd[20183]: Failed password for invalid user root from 81.89.110.244 port 57844 ssh2 Jan 16 10:51:32 host sshd[20183]: Received disconnect from 81.89.110.244 port 57844:11: Bye Bye [preauth] Jan 16 10:51:32 host sshd[20183]: Disconnected from 81.89.110.244 port 57844 [preauth] Jan 16 10:52:23 host sshd[20390]: User root from 129.154.217.134 not allowed because not listed in AllowUsers Jan 16 10:52:23 host sshd[20390]: input_userauth_request: invalid user root [preauth] Jan 16 10:52:23 host unix_chkpwd[20393]: password check failed for user (root) Jan 16 10:52:23 host sshd[20390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.154.217.134 user=root Jan 16 10:52:23 host sshd[20390]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 10:52:25 host sshd[20390]: Failed password for invalid user root from 129.154.217.134 port 51610 ssh2 Jan 16 10:52:25 host sshd[20390]: Received disconnect from 129.154.217.134 port 51610:11: Bye Bye [preauth] Jan 16 10:52:25 host sshd[20390]: Disconnected from 129.154.217.134 port 51610 [preauth] Jan 16 11:15:11 host sshd[24046]: User root from 124.11.82.91 not allowed because not listed in AllowUsers Jan 16 11:15:11 host sshd[24046]: input_userauth_request: invalid user root [preauth] Jan 16 11:15:11 host unix_chkpwd[24051]: password check failed for user (root) Jan 16 11:15:11 host sshd[24046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.11.82.91 user=root Jan 16 11:15:11 host sshd[24046]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 11:15:13 host sshd[24046]: Failed password for invalid user root from 124.11.82.91 port 52323 ssh2 Jan 16 11:15:14 host unix_chkpwd[24056]: password check failed for user (root) Jan 16 11:15:14 host sshd[24046]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 11:15:16 host sshd[24046]: Failed password for invalid user root from 124.11.82.91 port 52323 ssh2 Jan 16 11:15:17 host unix_chkpwd[24062]: password check failed for user (root) Jan 16 11:15:17 host sshd[24046]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 11:15:19 host sshd[24046]: Failed password for invalid user root from 124.11.82.91 port 52323 ssh2 Jan 16 11:15:20 host unix_chkpwd[24066]: password check failed for user (root) Jan 16 11:15:20 host sshd[24046]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 11:15:21 host sshd[24046]: Failed password for invalid user root from 124.11.82.91 port 52323 ssh2 Jan 16 11:15:22 host unix_chkpwd[24089]: password check failed for user (root) Jan 16 11:15:22 host sshd[24046]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 11:15:24 host sshd[24046]: Failed password for invalid user root from 124.11.82.91 port 52323 ssh2 Jan 16 11:16:45 host sshd[24304]: User root from 148.72.247.138 not allowed because not listed in AllowUsers Jan 16 11:16:45 host sshd[24304]: input_userauth_request: invalid user root [preauth] Jan 16 11:16:45 host unix_chkpwd[24307]: password check failed for user (root) Jan 16 11:16:45 host sshd[24304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.247.138 user=root Jan 16 11:16:45 host sshd[24304]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 11:16:47 host sshd[24304]: Failed password for invalid user root from 148.72.247.138 port 35746 ssh2 Jan 16 11:16:47 host sshd[24304]: Received disconnect from 148.72.247.138 port 35746:11: Bye Bye [preauth] Jan 16 11:16:47 host sshd[24304]: Disconnected from 148.72.247.138 port 35746 [preauth] Jan 16 11:16:47 host sshd[24312]: User root from 148.72.247.138 not allowed because not listed in AllowUsers Jan 16 11:16:47 host sshd[24312]: input_userauth_request: invalid user root [preauth] Jan 16 11:16:47 host unix_chkpwd[24314]: password check failed for user (root) Jan 16 11:16:47 host sshd[24312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.247.138 user=root Jan 16 11:16:47 host sshd[24312]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 11:16:50 host sshd[24312]: Failed password for invalid user root from 148.72.247.138 port 35772 ssh2 Jan 16 11:16:50 host sshd[24312]: Received disconnect from 148.72.247.138 port 35772:11: Bye Bye [preauth] Jan 16 11:16:50 host sshd[24312]: Disconnected from 148.72.247.138 port 35772 [preauth] Jan 16 11:16:50 host sshd[24319]: User root from 148.72.247.138 not allowed because not listed in AllowUsers Jan 16 11:16:50 host sshd[24319]: input_userauth_request: invalid user root [preauth] Jan 16 11:16:50 host unix_chkpwd[24321]: password check failed for user (root) Jan 16 11:16:50 host sshd[24319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.247.138 user=root Jan 16 11:16:50 host sshd[24319]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 11:16:52 host sshd[24319]: Failed password for invalid user root from 148.72.247.138 port 35778 ssh2 Jan 16 11:16:52 host sshd[24319]: Received disconnect from 148.72.247.138 port 35778:11: Bye Bye [preauth] Jan 16 11:16:52 host sshd[24319]: Disconnected from 148.72.247.138 port 35778 [preauth] Jan 16 11:16:52 host sshd[24332]: User root from 148.72.247.138 not allowed because not listed in AllowUsers Jan 16 11:16:52 host sshd[24332]: input_userauth_request: invalid user root [preauth] Jan 16 11:16:52 host unix_chkpwd[24346]: password check failed for user (root) Jan 16 11:16:52 host sshd[24332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.247.138 user=root Jan 16 11:16:52 host sshd[24332]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 11:16:54 host sshd[24332]: Failed password for invalid user root from 148.72.247.138 port 35834 ssh2 Jan 16 11:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 11:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 11:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 11:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 11:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 11:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 11:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=wwwrmswll user-3=wwwresourcehunte user-4=keralaholi user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=wwwkaretakers user-11=cochintaxi user-12=mrsclean user-13=wwwnexidigital user-14=phmetals user-15=kottayamcalldriv user-16=gifterman user-17=palco123 user-18=wwwletsstalkfood user-19=straightcurve user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=wwwtestugo user-24=shalinijames user-25=vfmassets user-26=woodpeck user-27=wwwkapin user-28=wwwkmaorg user-29=disposeat user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 11:21:10 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 11:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 11:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4HDLYpNrHON2VwoG.~ Jan 16 11:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4HDLYpNrHON2VwoG.~' Jan 16 11:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4HDLYpNrHON2VwoG.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 11:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 11:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 11:21:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 11:21:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 11:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 11:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 11:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 11:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 11:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 11:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 11:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 11:44:03 host sshd[28931]: User sshd from 194.169.175.102 not allowed because not listed in AllowUsers Jan 16 11:44:03 host sshd[28931]: input_userauth_request: invalid user sshd [preauth] Jan 16 11:44:03 host unix_chkpwd[28934]: password check failed for user (sshd) Jan 16 11:44:03 host sshd[28931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=sshd Jan 16 11:44:03 host sshd[28931]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sshd" Jan 16 11:44:05 host sshd[28931]: Failed password for invalid user sshd from 194.169.175.102 port 53145 ssh2 Jan 16 11:44:05 host sshd[28931]: Received disconnect from 194.169.175.102 port 53145:11: Client disconnecting normally [preauth] Jan 16 11:44:05 host sshd[28931]: Disconnected from 194.169.175.102 port 53145 [preauth] Jan 16 11:49:16 host sshd[29702]: Invalid user admin from 211.230.166.110 port 60565 Jan 16 11:49:16 host sshd[29702]: input_userauth_request: invalid user admin [preauth] Jan 16 11:49:16 host sshd[29702]: pam_unix(sshd:auth): check pass; user unknown Jan 16 11:49:16 host sshd[29702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.230.166.110 Jan 16 11:49:18 host sshd[29702]: Failed password for invalid user admin from 211.230.166.110 port 60565 ssh2 Jan 16 11:49:18 host sshd[29702]: Failed password for invalid user admin from 211.230.166.110 port 60565 ssh2 Jan 16 11:49:18 host sshd[29702]: pam_unix(sshd:auth): check pass; user unknown Jan 16 11:49:20 host sshd[29702]: Failed password for invalid user admin from 211.230.166.110 port 60565 ssh2 Jan 16 11:49:21 host sshd[29702]: pam_unix(sshd:auth): check pass; user unknown Jan 16 11:49:23 host sshd[29702]: Failed password for invalid user admin from 211.230.166.110 port 60565 ssh2 Jan 16 11:49:24 host sshd[29702]: pam_unix(sshd:auth): check pass; user unknown Jan 16 11:49:26 host sshd[29702]: Failed password for invalid user admin from 211.230.166.110 port 60565 ssh2 Jan 16 12:10:10 host sshd[387]: Invalid user gitlab-runner from 222.114.241.4 port 48800 Jan 16 12:10:10 host sshd[387]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 16 12:10:10 host sshd[387]: pam_unix(sshd:auth): check pass; user unknown Jan 16 12:10:10 host sshd[387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.114.241.4 Jan 16 12:10:12 host sshd[387]: Failed password for invalid user gitlab-runner from 222.114.241.4 port 48800 ssh2 Jan 16 12:10:13 host sshd[387]: pam_unix(sshd:auth): check pass; user unknown Jan 16 12:10:15 host sshd[387]: Failed password for invalid user gitlab-runner from 222.114.241.4 port 48800 ssh2 Jan 16 12:10:16 host sshd[387]: pam_unix(sshd:auth): check pass; user unknown Jan 16 12:10:18 host sshd[387]: Failed password for invalid user gitlab-runner from 222.114.241.4 port 48800 ssh2 Jan 16 12:10:19 host sshd[387]: Failed password for invalid user gitlab-runner from 222.114.241.4 port 48800 ssh2 Jan 16 12:10:20 host sshd[387]: Connection closed by 222.114.241.4 port 48800 [preauth] Jan 16 12:10:20 host sshd[387]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.114.241.4 Jan 16 12:10:44 host sshd[620]: Did not receive identification string from 92.255.85.115 port 14084 Jan 16 12:19:12 host sshd[2767]: Invalid user ey from 194.110.203.109 port 57752 Jan 16 12:19:12 host sshd[2767]: input_userauth_request: invalid user ey [preauth] Jan 16 12:19:12 host sshd[2767]: pam_unix(sshd:auth): check pass; user unknown Jan 16 12:19:12 host sshd[2767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 12:19:15 host sshd[2767]: Failed password for invalid user ey from 194.110.203.109 port 57752 ssh2 Jan 16 12:19:18 host sshd[2767]: pam_unix(sshd:auth): check pass; user unknown Jan 16 12:19:21 host sshd[2767]: Failed password for invalid user ey from 194.110.203.109 port 57752 ssh2 Jan 16 12:19:24 host sshd[2767]: pam_unix(sshd:auth): check pass; user unknown Jan 16 12:19:26 host sshd[2767]: Failed password for invalid user ey from 194.110.203.109 port 57752 ssh2 Jan 16 12:19:30 host sshd[2767]: Connection closed by 194.110.203.109 port 57752 [preauth] Jan 16 12:19:30 host sshd[2767]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 12:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 12:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 12:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 12:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 12:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=ugotscom user-12=remysagr user-13=disposeat user-14=wwwkmaorg user-15=woodpeck user-16=wwwkapin user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=pmcresources user-21=bonifacegroup user-22=wwwevmhonda user-23=wwwletsstalkfood user-24=straightcurve user-25=gifterman user-26=palco123 user-27=phmetals user-28=kottayamcalldriv user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 12:21:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 12:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HVwgceWVebCJRIA1.~ Jan 16 12:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HVwgceWVebCJRIA1.~' Jan 16 12:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HVwgceWVebCJRIA1.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 12:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 12:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 12:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 12:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 12:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 12:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 12:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 12:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 12:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 12:24:48 host sshd[3805]: Connection closed by 45.79.172.21 port 53600 [preauth] Jan 16 12:24:50 host sshd[3812]: Connection closed by 45.79.172.21 port 64684 [preauth] Jan 16 12:24:53 host sshd[3818]: Connection closed by 45.79.172.21 port 64700 [preauth] Jan 16 12:41:07 host sshd[6201]: Invalid user bzrx1098ui from 92.255.85.115 port 6841 Jan 16 12:41:07 host sshd[6201]: input_userauth_request: invalid user bzrx1098ui [preauth] Jan 16 12:41:07 host sshd[6201]: pam_unix(sshd:auth): check pass; user unknown Jan 16 12:41:07 host sshd[6201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 16 12:41:09 host sshd[6201]: Failed password for invalid user bzrx1098ui from 92.255.85.115 port 6841 ssh2 Jan 16 12:41:10 host sshd[6201]: Connection reset by 92.255.85.115 port 6841 [preauth] Jan 16 12:41:13 host sshd[6208]: User root from 154.120.242.70 not allowed because not listed in AllowUsers Jan 16 12:41:13 host sshd[6208]: input_userauth_request: invalid user root [preauth] Jan 16 12:41:13 host unix_chkpwd[6215]: password check failed for user (root) Jan 16 12:41:13 host sshd[6208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.120.242.70 user=root Jan 16 12:41:13 host sshd[6208]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 12:41:16 host sshd[6208]: Failed password for invalid user root from 154.120.242.70 port 59944 ssh2 Jan 16 12:41:16 host sshd[6208]: Received disconnect from 154.120.242.70 port 59944:11: Bye Bye [preauth] Jan 16 12:41:16 host sshd[6208]: Disconnected from 154.120.242.70 port 59944 [preauth] Jan 16 12:45:47 host sshd[6892]: Invalid user ec2-user from 103.250.144.169 port 39317 Jan 16 12:45:47 host sshd[6892]: input_userauth_request: invalid user ec2-user [preauth] Jan 16 12:45:47 host sshd[6892]: pam_unix(sshd:auth): check pass; user unknown Jan 16 12:45:47 host sshd[6892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.250.144.169 Jan 16 12:45:49 host sshd[6892]: Failed password for invalid user ec2-user from 103.250.144.169 port 39317 ssh2 Jan 16 12:45:49 host sshd[6892]: pam_unix(sshd:auth): check pass; user unknown Jan 16 12:45:50 host sshd[6892]: Failed password for invalid user ec2-user from 103.250.144.169 port 39317 ssh2 Jan 16 12:45:52 host sshd[6892]: pam_unix(sshd:auth): check pass; user unknown Jan 16 12:45:53 host sshd[6892]: Failed password for invalid user ec2-user from 103.250.144.169 port 39317 ssh2 Jan 16 12:45:55 host sshd[6892]: Failed password for invalid user ec2-user from 103.250.144.169 port 39317 ssh2 Jan 16 12:45:55 host sshd[6892]: pam_unix(sshd:auth): check pass; user unknown Jan 16 12:45:58 host sshd[6892]: Failed password for invalid user ec2-user from 103.250.144.169 port 39317 ssh2 Jan 16 12:48:41 host sshd[7273]: User root from 154.120.242.70 not allowed because not listed in AllowUsers Jan 16 12:48:41 host sshd[7273]: input_userauth_request: invalid user root [preauth] Jan 16 12:48:42 host unix_chkpwd[7283]: password check failed for user (root) Jan 16 12:48:42 host sshd[7273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.120.242.70 user=root Jan 16 12:48:42 host sshd[7273]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 12:48:43 host sshd[7273]: Failed password for invalid user root from 154.120.242.70 port 46794 ssh2 Jan 16 12:48:44 host sshd[7273]: Received disconnect from 154.120.242.70 port 46794:11: Bye Bye [preauth] Jan 16 12:48:44 host sshd[7273]: Disconnected from 154.120.242.70 port 46794 [preauth] Jan 16 12:51:38 host sshd[7813]: User root from 220.134.125.95 not allowed because not listed in AllowUsers Jan 16 12:51:38 host sshd[7813]: input_userauth_request: invalid user root [preauth] Jan 16 12:51:38 host unix_chkpwd[7816]: password check failed for user (root) Jan 16 12:51:38 host sshd[7813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.125.95 user=root Jan 16 12:51:38 host sshd[7813]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 12:51:40 host sshd[7813]: Failed password for invalid user root from 220.134.125.95 port 40278 ssh2 Jan 16 12:51:41 host unix_chkpwd[7827]: password check failed for user (root) Jan 16 12:51:41 host sshd[7813]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 12:51:42 host sshd[7813]: Failed password for invalid user root from 220.134.125.95 port 40278 ssh2 Jan 16 12:51:43 host unix_chkpwd[7832]: password check failed for user (root) Jan 16 12:51:43 host sshd[7813]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 12:51:45 host sshd[7813]: Failed password for invalid user root from 220.134.125.95 port 40278 ssh2 Jan 16 12:51:46 host unix_chkpwd[7836]: password check failed for user (root) Jan 16 12:51:46 host sshd[7813]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 12:51:48 host sshd[7813]: Failed password for invalid user root from 220.134.125.95 port 40278 ssh2 Jan 16 12:52:09 host sshd[7909]: Invalid user admin from 92.255.85.115 port 46607 Jan 16 12:52:09 host sshd[7909]: input_userauth_request: invalid user admin [preauth] Jan 16 12:52:09 host sshd[7909]: pam_unix(sshd:auth): check pass; user unknown Jan 16 12:52:09 host sshd[7909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 16 12:52:11 host sshd[7909]: Failed password for invalid user admin from 92.255.85.115 port 46607 ssh2 Jan 16 12:52:11 host sshd[7909]: Connection reset by 92.255.85.115 port 46607 [preauth] Jan 16 13:08:24 host sshd[10257]: Connection reset by 220.120.48.109 port 63933 [preauth] Jan 16 13:09:36 host sshd[10402]: Invalid user service from 31.41.244.124 port 38412 Jan 16 13:09:36 host sshd[10402]: input_userauth_request: invalid user service [preauth] Jan 16 13:09:36 host sshd[10402]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:09:36 host sshd[10402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 16 13:09:39 host sshd[10402]: Failed password for invalid user service from 31.41.244.124 port 38412 ssh2 Jan 16 13:09:39 host sshd[10402]: Received disconnect from 31.41.244.124 port 38412:11: Client disconnecting normally [preauth] Jan 16 13:09:39 host sshd[10402]: Disconnected from 31.41.244.124 port 38412 [preauth] Jan 16 13:09:40 host sshd[10414]: Invalid user backup from 31.41.244.124 port 42424 Jan 16 13:09:40 host sshd[10414]: input_userauth_request: invalid user backup [preauth] Jan 16 13:09:40 host sshd[10414]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:09:40 host sshd[10414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 16 13:09:42 host sshd[10414]: Failed password for invalid user backup from 31.41.244.124 port 42424 ssh2 Jan 16 13:09:42 host sshd[10414]: Received disconnect from 31.41.244.124 port 42424:11: Client disconnecting normally [preauth] Jan 16 13:09:42 host sshd[10414]: Disconnected from 31.41.244.124 port 42424 [preauth] Jan 16 13:09:43 host sshd[10418]: Invalid user ftpuser from 31.41.244.124 port 46397 Jan 16 13:09:43 host sshd[10418]: input_userauth_request: invalid user ftpuser [preauth] Jan 16 13:09:43 host sshd[10418]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:09:43 host sshd[10418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 16 13:09:46 host sshd[10418]: Failed password for invalid user ftpuser from 31.41.244.124 port 46397 ssh2 Jan 16 13:09:46 host sshd[10418]: Received disconnect from 31.41.244.124 port 46397:11: Client disconnecting normally [preauth] Jan 16 13:09:46 host sshd[10418]: Disconnected from 31.41.244.124 port 46397 [preauth] Jan 16 13:12:51 host sshd[10917]: User root from 103.121.197.82 not allowed because not listed in AllowUsers Jan 16 13:12:51 host sshd[10917]: input_userauth_request: invalid user root [preauth] Jan 16 13:12:51 host unix_chkpwd[10919]: password check failed for user (root) Jan 16 13:12:51 host sshd[10917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.121.197.82 user=root Jan 16 13:12:51 host sshd[10917]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:12:53 host sshd[10917]: Failed password for invalid user root from 103.121.197.82 port 46792 ssh2 Jan 16 13:12:53 host sshd[10917]: Received disconnect from 103.121.197.82 port 46792:11: Bye Bye [preauth] Jan 16 13:12:53 host sshd[10917]: Disconnected from 103.121.197.82 port 46792 [preauth] Jan 16 13:14:25 host sshd[11081]: User root from 118.101.192.62 not allowed because not listed in AllowUsers Jan 16 13:14:25 host sshd[11081]: input_userauth_request: invalid user root [preauth] Jan 16 13:14:25 host unix_chkpwd[11084]: password check failed for user (root) Jan 16 13:14:25 host sshd[11081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.101.192.62 user=root Jan 16 13:14:25 host sshd[11081]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:14:27 host sshd[11081]: Failed password for invalid user root from 118.101.192.62 port 52404 ssh2 Jan 16 13:14:27 host sshd[11081]: Received disconnect from 118.101.192.62 port 52404:11: Bye Bye [preauth] Jan 16 13:14:27 host sshd[11081]: Disconnected from 118.101.192.62 port 52404 [preauth] Jan 16 13:15:05 host sshd[11174]: User root from 43.135.48.212 not allowed because not listed in AllowUsers Jan 16 13:15:05 host sshd[11174]: input_userauth_request: invalid user root [preauth] Jan 16 13:15:05 host unix_chkpwd[11180]: password check failed for user (root) Jan 16 13:15:05 host sshd[11174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.48.212 user=root Jan 16 13:15:05 host sshd[11174]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:15:07 host sshd[11174]: Failed password for invalid user root from 43.135.48.212 port 36144 ssh2 Jan 16 13:15:07 host sshd[11174]: Received disconnect from 43.135.48.212 port 36144:11: Bye Bye [preauth] Jan 16 13:15:07 host sshd[11174]: Disconnected from 43.135.48.212 port 36144 [preauth] Jan 16 13:16:00 host sshd[11277]: User root from 114.33.106.103 not allowed because not listed in AllowUsers Jan 16 13:16:00 host sshd[11277]: input_userauth_request: invalid user root [preauth] Jan 16 13:16:00 host unix_chkpwd[11290]: password check failed for user (root) Jan 16 13:16:00 host sshd[11277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.106.103 user=root Jan 16 13:16:00 host sshd[11277]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:16:03 host sshd[11277]: Failed password for invalid user root from 114.33.106.103 port 33649 ssh2 Jan 16 13:16:03 host sshd[11277]: Connection reset by 114.33.106.103 port 33649 [preauth] Jan 16 13:17:33 host sshd[11483]: User root from 43.135.48.212 not allowed because not listed in AllowUsers Jan 16 13:17:33 host sshd[11483]: input_userauth_request: invalid user root [preauth] Jan 16 13:17:33 host unix_chkpwd[11485]: password check failed for user (root) Jan 16 13:17:33 host sshd[11483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.48.212 user=root Jan 16 13:17:33 host sshd[11483]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:17:35 host sshd[11483]: Failed password for invalid user root from 43.135.48.212 port 42470 ssh2 Jan 16 13:17:35 host sshd[11483]: Received disconnect from 43.135.48.212 port 42470:11: Bye Bye [preauth] Jan 16 13:17:35 host sshd[11483]: Disconnected from 43.135.48.212 port 42470 [preauth] Jan 16 13:17:39 host sshd[11562]: User root from 103.121.197.82 not allowed because not listed in AllowUsers Jan 16 13:17:39 host sshd[11562]: input_userauth_request: invalid user root [preauth] Jan 16 13:17:39 host unix_chkpwd[11583]: password check failed for user (root) Jan 16 13:17:39 host sshd[11562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.121.197.82 user=root Jan 16 13:17:39 host sshd[11562]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:17:40 host sshd[11562]: Failed password for invalid user root from 103.121.197.82 port 38246 ssh2 Jan 16 13:17:40 host sshd[11562]: Received disconnect from 103.121.197.82 port 38246:11: Bye Bye [preauth] Jan 16 13:17:40 host sshd[11562]: Disconnected from 103.121.197.82 port 38246 [preauth] Jan 16 13:17:42 host sshd[11596]: User root from 118.101.192.62 not allowed because not listed in AllowUsers Jan 16 13:17:42 host sshd[11596]: input_userauth_request: invalid user root [preauth] Jan 16 13:17:42 host unix_chkpwd[11612]: password check failed for user (root) Jan 16 13:17:42 host sshd[11596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.101.192.62 user=root Jan 16 13:17:42 host sshd[11596]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:17:44 host sshd[11596]: Failed password for invalid user root from 118.101.192.62 port 59812 ssh2 Jan 16 13:19:42 host sshd[11921]: User root from 221.160.148.227 not allowed because not listed in AllowUsers Jan 16 13:19:42 host sshd[11921]: input_userauth_request: invalid user root [preauth] Jan 16 13:19:42 host unix_chkpwd[11924]: password check failed for user (root) Jan 16 13:19:42 host sshd[11921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.160.148.227 user=root Jan 16 13:19:42 host sshd[11921]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:19:44 host sshd[11921]: Failed password for invalid user root from 221.160.148.227 port 61032 ssh2 Jan 16 13:19:45 host sshd[11921]: Connection reset by 221.160.148.227 port 61032 [preauth] Jan 16 13:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 13:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 13:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 13:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 13:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwtestugo user-2=shalinijames user-3=vfmassets user-4=pmcresources user-5=remysagr user-6=disposeat user-7=wwwkmaorg user-8=woodpeck user-9=wwwkapin user-10=kottayamcalldriv user-11=phmetals user-12=gifterman user-13=palco123 user-14=wwwnexidigital user-15=mrsclean user-16=wwwevmhonda user-17=bonifacegroup user-18=wwwletsstalkfood user-19=straightcurve user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=ugotscom user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 13:21:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 13:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-E3PjlIPTmlZAJbt7.~ Jan 16 13:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-E3PjlIPTmlZAJbt7.~' Jan 16 13:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-E3PjlIPTmlZAJbt7.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 13:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 13:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 13:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 13:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 13:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 13:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 13:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 13:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 13:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 13:27:57 host sshd[13219]: User root from 103.70.31.101 not allowed because not listed in AllowUsers Jan 16 13:27:57 host sshd[13219]: input_userauth_request: invalid user root [preauth] Jan 16 13:27:57 host unix_chkpwd[13222]: password check failed for user (root) Jan 16 13:27:57 host sshd[13219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.70.31.101 user=root Jan 16 13:27:57 host sshd[13219]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:27:59 host sshd[13219]: Failed password for invalid user root from 103.70.31.101 port 35820 ssh2 Jan 16 13:27:59 host sshd[13219]: Received disconnect from 103.70.31.101 port 35820:11: Bye Bye [preauth] Jan 16 13:27:59 host sshd[13219]: Disconnected from 103.70.31.101 port 35820 [preauth] Jan 16 13:30:11 host sshd[13485]: Invalid user readonly from 205.185.113.129 port 47740 Jan 16 13:30:11 host sshd[13485]: input_userauth_request: invalid user readonly [preauth] Jan 16 13:30:11 host sshd[13485]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:30:11 host sshd[13485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 16 13:30:13 host sshd[13485]: Failed password for invalid user readonly from 205.185.113.129 port 47740 ssh2 Jan 16 13:30:13 host sshd[13485]: Connection closed by 205.185.113.129 port 47740 [preauth] Jan 16 13:30:19 host sshd[13500]: User root from 103.70.31.101 not allowed because not listed in AllowUsers Jan 16 13:30:19 host sshd[13500]: input_userauth_request: invalid user root [preauth] Jan 16 13:30:19 host unix_chkpwd[13503]: password check failed for user (root) Jan 16 13:30:19 host sshd[13500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.70.31.101 user=root Jan 16 13:30:19 host sshd[13500]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:30:21 host sshd[13500]: Failed password for invalid user root from 103.70.31.101 port 34640 ssh2 Jan 16 13:30:21 host sshd[13500]: Received disconnect from 103.70.31.101 port 34640:11: Bye Bye [preauth] Jan 16 13:30:21 host sshd[13500]: Disconnected from 103.70.31.101 port 34640 [preauth] Jan 16 13:32:10 host sshd[13879]: User root from 186.31.94.189 not allowed because not listed in AllowUsers Jan 16 13:32:10 host sshd[13879]: input_userauth_request: invalid user root [preauth] Jan 16 13:32:10 host unix_chkpwd[13883]: password check failed for user (root) Jan 16 13:32:10 host sshd[13879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.31.94.189 user=root Jan 16 13:32:10 host sshd[13879]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:32:12 host sshd[13879]: Failed password for invalid user root from 186.31.94.189 port 52703 ssh2 Jan 16 13:32:13 host sshd[13879]: Connection reset by 186.31.94.189 port 52703 [preauth] Jan 16 13:32:50 host sshd[13945]: User root from 159.223.208.228 not allowed because not listed in AllowUsers Jan 16 13:32:50 host sshd[13945]: input_userauth_request: invalid user root [preauth] Jan 16 13:32:50 host unix_chkpwd[13948]: password check failed for user (root) Jan 16 13:32:50 host sshd[13945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.208.228 user=root Jan 16 13:32:50 host sshd[13945]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:32:52 host sshd[13945]: Failed password for invalid user root from 159.223.208.228 port 44910 ssh2 Jan 16 13:32:52 host sshd[13945]: Received disconnect from 159.223.208.228 port 44910:11: Bye Bye [preauth] Jan 16 13:32:52 host sshd[13945]: Disconnected from 159.223.208.228 port 44910 [preauth] Jan 16 13:34:01 host sshd[14059]: Invalid user grp from 46.101.2.4 port 50640 Jan 16 13:34:01 host sshd[14059]: input_userauth_request: invalid user grp [preauth] Jan 16 13:34:01 host sshd[14059]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:34:01 host sshd[14059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.2.4 Jan 16 13:34:03 host sshd[14059]: Failed password for invalid user grp from 46.101.2.4 port 50640 ssh2 Jan 16 13:34:04 host sshd[14059]: Received disconnect from 46.101.2.4 port 50640:11: Bye Bye [preauth] Jan 16 13:34:04 host sshd[14059]: Disconnected from 46.101.2.4 port 50640 [preauth] Jan 16 13:35:06 host sshd[14213]: Invalid user tbv from 147.161.2.3 port 39640 Jan 16 13:35:06 host sshd[14213]: input_userauth_request: invalid user tbv [preauth] Jan 16 13:35:06 host sshd[14213]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:35:06 host sshd[14213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.161.2.3 Jan 16 13:35:09 host sshd[14213]: Failed password for invalid user tbv from 147.161.2.3 port 39640 ssh2 Jan 16 13:35:09 host sshd[14213]: Received disconnect from 147.161.2.3 port 39640:11: Bye Bye [preauth] Jan 16 13:35:09 host sshd[14213]: Disconnected from 147.161.2.3 port 39640 [preauth] Jan 16 13:36:12 host sshd[14435]: User root from 159.223.208.228 not allowed because not listed in AllowUsers Jan 16 13:36:12 host sshd[14435]: input_userauth_request: invalid user root [preauth] Jan 16 13:36:12 host unix_chkpwd[14442]: password check failed for user (root) Jan 16 13:36:12 host sshd[14435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.208.228 user=root Jan 16 13:36:12 host sshd[14435]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:36:15 host sshd[14435]: Failed password for invalid user root from 159.223.208.228 port 35978 ssh2 Jan 16 13:37:25 host sshd[14601]: Invalid user vyq from 43.159.39.194 port 42950 Jan 16 13:37:25 host sshd[14601]: input_userauth_request: invalid user vyq [preauth] Jan 16 13:37:25 host sshd[14601]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:37:25 host sshd[14601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.39.194 Jan 16 13:37:26 host sshd[14601]: Failed password for invalid user vyq from 43.159.39.194 port 42950 ssh2 Jan 16 13:37:26 host sshd[14601]: Received disconnect from 43.159.39.194 port 42950:11: Bye Bye [preauth] Jan 16 13:37:26 host sshd[14601]: Disconnected from 43.159.39.194 port 42950 [preauth] Jan 16 13:37:55 host sshd[14663]: Invalid user org from 137.184.96.200 port 47496 Jan 16 13:37:55 host sshd[14663]: input_userauth_request: invalid user org [preauth] Jan 16 13:37:55 host sshd[14663]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:37:55 host sshd[14663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.96.200 Jan 16 13:37:57 host sshd[14663]: Failed password for invalid user org from 137.184.96.200 port 47496 ssh2 Jan 16 13:37:57 host sshd[14663]: Received disconnect from 137.184.96.200 port 47496:11: Bye Bye [preauth] Jan 16 13:37:57 host sshd[14663]: Disconnected from 137.184.96.200 port 47496 [preauth] Jan 16 13:38:38 host sshd[14764]: Invalid user mlz from 178.128.55.198 port 47238 Jan 16 13:38:38 host sshd[14764]: input_userauth_request: invalid user mlz [preauth] Jan 16 13:38:38 host sshd[14764]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:38:38 host sshd[14764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.198 Jan 16 13:38:40 host sshd[14764]: Failed password for invalid user mlz from 178.128.55.198 port 47238 ssh2 Jan 16 13:38:40 host sshd[14764]: Received disconnect from 178.128.55.198 port 47238:11: Bye Bye [preauth] Jan 16 13:38:40 host sshd[14764]: Disconnected from 178.128.55.198 port 47238 [preauth] Jan 16 13:39:54 host sshd[14918]: Invalid user qem from 212.83.137.137 port 60910 Jan 16 13:39:54 host sshd[14918]: input_userauth_request: invalid user qem [preauth] Jan 16 13:39:54 host sshd[14918]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:39:54 host sshd[14918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.83.137.137 Jan 16 13:39:56 host sshd[14918]: Failed password for invalid user qem from 212.83.137.137 port 60910 ssh2 Jan 16 13:39:56 host sshd[14918]: Received disconnect from 212.83.137.137 port 60910:11: Bye Bye [preauth] Jan 16 13:39:56 host sshd[14918]: Disconnected from 212.83.137.137 port 60910 [preauth] Jan 16 13:40:02 host sshd[14931]: Invalid user tzq from 46.101.2.4 port 39200 Jan 16 13:40:02 host sshd[14931]: input_userauth_request: invalid user tzq [preauth] Jan 16 13:40:02 host sshd[14931]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:40:02 host sshd[14931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.2.4 Jan 16 13:40:04 host sshd[14931]: Failed password for invalid user tzq from 46.101.2.4 port 39200 ssh2 Jan 16 13:40:04 host sshd[14931]: Received disconnect from 46.101.2.4 port 39200:11: Bye Bye [preauth] Jan 16 13:40:04 host sshd[14931]: Disconnected from 46.101.2.4 port 39200 [preauth] Jan 16 13:40:34 host sshd[15035]: Invalid user admin from 122.116.163.124 port 36969 Jan 16 13:40:34 host sshd[15035]: input_userauth_request: invalid user admin [preauth] Jan 16 13:40:34 host sshd[15035]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:40:34 host sshd[15035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.163.124 Jan 16 13:40:37 host sshd[15035]: Failed password for invalid user admin from 122.116.163.124 port 36969 ssh2 Jan 16 13:40:38 host sshd[15035]: Failed password for invalid user admin from 122.116.163.124 port 36969 ssh2 Jan 16 13:40:38 host sshd[15035]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:40:40 host sshd[15035]: Failed password for invalid user admin from 122.116.163.124 port 36969 ssh2 Jan 16 13:40:42 host sshd[15035]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:40:44 host sshd[15035]: Failed password for invalid user admin from 122.116.163.124 port 36969 ssh2 Jan 16 13:40:44 host sshd[15035]: Connection reset by 122.116.163.124 port 36969 [preauth] Jan 16 13:40:44 host sshd[15035]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.163.124 Jan 16 13:40:54 host sshd[15213]: Invalid user zns from 43.159.39.194 port 59620 Jan 16 13:40:54 host sshd[15213]: input_userauth_request: invalid user zns [preauth] Jan 16 13:40:54 host sshd[15213]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:40:54 host sshd[15213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.39.194 Jan 16 13:40:56 host sshd[15213]: Failed password for invalid user zns from 43.159.39.194 port 59620 ssh2 Jan 16 13:40:56 host sshd[15216]: Invalid user tza from 137.184.96.200 port 54932 Jan 16 13:40:56 host sshd[15216]: input_userauth_request: invalid user tza [preauth] Jan 16 13:40:56 host sshd[15216]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:40:56 host sshd[15216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.96.200 Jan 16 13:40:56 host sshd[15213]: Received disconnect from 43.159.39.194 port 59620:11: Bye Bye [preauth] Jan 16 13:40:56 host sshd[15213]: Disconnected from 43.159.39.194 port 59620 [preauth] Jan 16 13:40:58 host sshd[15216]: Failed password for invalid user tza from 137.184.96.200 port 54932 ssh2 Jan 16 13:40:59 host sshd[15216]: Received disconnect from 137.184.96.200 port 54932:11: Bye Bye [preauth] Jan 16 13:40:59 host sshd[15216]: Disconnected from 137.184.96.200 port 54932 [preauth] Jan 16 13:41:11 host sshd[15256]: Invalid user tbv from 46.101.2.4 port 33432 Jan 16 13:41:11 host sshd[15256]: input_userauth_request: invalid user tbv [preauth] Jan 16 13:41:11 host sshd[15256]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:41:11 host sshd[15256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.2.4 Jan 16 13:41:13 host sshd[15256]: Failed password for invalid user tbv from 46.101.2.4 port 33432 ssh2 Jan 16 13:41:14 host sshd[15256]: Received disconnect from 46.101.2.4 port 33432:11: Bye Bye [preauth] Jan 16 13:41:14 host sshd[15256]: Disconnected from 46.101.2.4 port 33432 [preauth] Jan 16 13:41:22 host sshd[15310]: Invalid user stb from 212.83.137.137 port 57896 Jan 16 13:41:22 host sshd[15310]: input_userauth_request: invalid user stb [preauth] Jan 16 13:41:22 host sshd[15310]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:41:22 host sshd[15310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.83.137.137 Jan 16 13:41:24 host sshd[15310]: Failed password for invalid user stb from 212.83.137.137 port 57896 ssh2 Jan 16 13:41:24 host sshd[15310]: Received disconnect from 212.83.137.137 port 57896:11: Bye Bye [preauth] Jan 16 13:41:24 host sshd[15310]: Disconnected from 212.83.137.137 port 57896 [preauth] Jan 16 13:41:49 host sshd[15384]: Invalid user org from 147.161.2.3 port 59868 Jan 16 13:41:49 host sshd[15384]: input_userauth_request: invalid user org [preauth] Jan 16 13:41:49 host sshd[15384]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:41:49 host sshd[15384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.161.2.3 Jan 16 13:41:51 host sshd[15384]: Failed password for invalid user org from 147.161.2.3 port 59868 ssh2 Jan 16 13:41:51 host sshd[15384]: Received disconnect from 147.161.2.3 port 59868:11: Bye Bye [preauth] Jan 16 13:41:51 host sshd[15384]: Disconnected from 147.161.2.3 port 59868 [preauth] Jan 16 13:42:03 host sshd[15417]: Invalid user fzb from 137.184.96.200 port 49866 Jan 16 13:42:03 host sshd[15417]: input_userauth_request: invalid user fzb [preauth] Jan 16 13:42:03 host sshd[15417]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:42:03 host sshd[15417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.96.200 Jan 16 13:42:05 host sshd[15417]: Failed password for invalid user fzb from 137.184.96.200 port 49866 ssh2 Jan 16 13:42:05 host sshd[15417]: Received disconnect from 137.184.96.200 port 49866:11: Bye Bye [preauth] Jan 16 13:42:05 host sshd[15417]: Disconnected from 137.184.96.200 port 49866 [preauth] Jan 16 13:42:08 host sshd[15426]: Invalid user vre from 178.128.55.198 port 55108 Jan 16 13:42:08 host sshd[15426]: input_userauth_request: invalid user vre [preauth] Jan 16 13:42:08 host sshd[15426]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:42:08 host sshd[15426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.198 Jan 16 13:42:10 host sshd[15426]: Failed password for invalid user vre from 178.128.55.198 port 55108 ssh2 Jan 16 13:42:10 host sshd[15426]: Received disconnect from 178.128.55.198 port 55108:11: Bye Bye [preauth] Jan 16 13:42:10 host sshd[15426]: Disconnected from 178.128.55.198 port 55108 [preauth] Jan 16 13:42:24 host sshd[15482]: Invalid user prl from 212.83.137.137 port 52688 Jan 16 13:42:24 host sshd[15482]: input_userauth_request: invalid user prl [preauth] Jan 16 13:42:25 host sshd[15482]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:42:25 host sshd[15482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.83.137.137 Jan 16 13:42:25 host sshd[15485]: Invalid user xfu from 43.159.39.194 port 48620 Jan 16 13:42:25 host sshd[15485]: input_userauth_request: invalid user xfu [preauth] Jan 16 13:42:25 host sshd[15485]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:42:25 host sshd[15485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.39.194 Jan 16 13:42:26 host sshd[15482]: Failed password for invalid user prl from 212.83.137.137 port 52688 ssh2 Jan 16 13:42:26 host sshd[15482]: Received disconnect from 212.83.137.137 port 52688:11: Bye Bye [preauth] Jan 16 13:42:26 host sshd[15482]: Disconnected from 212.83.137.137 port 52688 [preauth] Jan 16 13:42:26 host sshd[15485]: Failed password for invalid user xfu from 43.159.39.194 port 48620 ssh2 Jan 16 13:42:26 host sshd[15485]: Received disconnect from 43.159.39.194 port 48620:11: Bye Bye [preauth] Jan 16 13:42:26 host sshd[15485]: Disconnected from 43.159.39.194 port 48620 [preauth] Jan 16 13:43:02 host sshd[15642]: Invalid user ukz from 147.161.2.3 port 55624 Jan 16 13:43:02 host sshd[15642]: input_userauth_request: invalid user ukz [preauth] Jan 16 13:43:02 host sshd[15642]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:43:02 host sshd[15642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.161.2.3 Jan 16 13:43:04 host sshd[15642]: Failed password for invalid user ukz from 147.161.2.3 port 55624 ssh2 Jan 16 13:43:31 host sshd[15763]: Invalid user qem from 178.128.55.198 port 49364 Jan 16 13:43:31 host sshd[15763]: input_userauth_request: invalid user qem [preauth] Jan 16 13:43:31 host sshd[15763]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:43:31 host sshd[15763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.55.198 Jan 16 13:43:32 host sshd[15763]: Failed password for invalid user qem from 178.128.55.198 port 49364 ssh2 Jan 16 13:43:32 host sshd[15763]: Received disconnect from 178.128.55.198 port 49364:11: Bye Bye [preauth] Jan 16 13:43:32 host sshd[15763]: Disconnected from 178.128.55.198 port 49364 [preauth] Jan 16 13:45:41 host sshd[16413]: User root from 122.116.158.4 not allowed because not listed in AllowUsers Jan 16 13:45:41 host sshd[16413]: input_userauth_request: invalid user root [preauth] Jan 16 13:45:41 host unix_chkpwd[16431]: password check failed for user (root) Jan 16 13:45:41 host sshd[16413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.158.4 user=root Jan 16 13:45:41 host sshd[16413]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:45:43 host sshd[16413]: Failed password for invalid user root from 122.116.158.4 port 57617 ssh2 Jan 16 13:45:44 host unix_chkpwd[16439]: password check failed for user (root) Jan 16 13:45:44 host sshd[16413]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:45:46 host sshd[16413]: Failed password for invalid user root from 122.116.158.4 port 57617 ssh2 Jan 16 13:45:47 host unix_chkpwd[16445]: password check failed for user (root) Jan 16 13:45:47 host sshd[16413]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:45:49 host sshd[16413]: Failed password for invalid user root from 122.116.158.4 port 57617 ssh2 Jan 16 13:45:50 host unix_chkpwd[16453]: password check failed for user (root) Jan 16 13:45:50 host sshd[16413]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:45:52 host sshd[16413]: Failed password for invalid user root from 122.116.158.4 port 57617 ssh2 Jan 16 13:45:53 host unix_chkpwd[16458]: password check failed for user (root) Jan 16 13:45:53 host sshd[16413]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:45:55 host sshd[16413]: Failed password for invalid user root from 122.116.158.4 port 57617 ssh2 Jan 16 13:53:49 host sshd[17910]: Did not receive identification string from 154.212.146.1 port 36242 Jan 16 13:53:49 host sshd[17912]: Invalid user admin from 154.212.146.1 port 37329 Jan 16 13:53:49 host sshd[17912]: input_userauth_request: invalid user admin [preauth] Jan 16 13:53:49 host sshd[17911]: Invalid user tester from 154.212.146.1 port 37296 Jan 16 13:53:49 host sshd[17911]: input_userauth_request: invalid user tester [preauth] Jan 16 13:53:49 host sshd[17913]: Invalid user testuser from 154.212.146.1 port 37268 Jan 16 13:53:49 host sshd[17913]: input_userauth_request: invalid user testuser [preauth] Jan 16 13:53:49 host sshd[17918]: Invalid user steam from 154.212.146.1 port 37276 Jan 16 13:53:49 host sshd[17918]: input_userauth_request: invalid user steam [preauth] Jan 16 13:53:49 host sshd[17917]: User mysql from 154.212.146.1 not allowed because not listed in AllowUsers Jan 16 13:53:49 host sshd[17917]: input_userauth_request: invalid user mysql [preauth] Jan 16 13:53:49 host sshd[17914]: Invalid user ec2-user from 154.212.146.1 port 37300 Jan 16 13:53:49 host sshd[17914]: input_userauth_request: invalid user ec2-user [preauth] Jan 16 13:53:49 host sshd[17916]: User root from 154.212.146.1 not allowed because not listed in AllowUsers Jan 16 13:53:49 host sshd[17916]: input_userauth_request: invalid user root [preauth] Jan 16 13:53:49 host sshd[17921]: Invalid user postgres from 154.212.146.1 port 37323 Jan 16 13:53:49 host sshd[17921]: input_userauth_request: invalid user postgres [preauth] Jan 16 13:53:49 host sshd[17919]: User root from 154.212.146.1 not allowed because not listed in AllowUsers Jan 16 13:53:49 host sshd[17915]: Invalid user steam from 154.212.146.1 port 37284 Jan 16 13:53:49 host sshd[17919]: input_userauth_request: invalid user root [preauth] Jan 16 13:53:49 host sshd[17915]: input_userauth_request: invalid user steam [preauth] Jan 16 13:53:49 host sshd[17924]: Invalid user postgres from 154.212.146.1 port 37304 Jan 16 13:53:49 host sshd[17924]: input_userauth_request: invalid user postgres [preauth] Jan 16 13:53:49 host sshd[17920]: Invalid user dockeradmin from 154.212.146.1 port 37294 Jan 16 13:53:49 host sshd[17923]: Invalid user steam from 154.212.146.1 port 37312 Jan 16 13:53:49 host sshd[17920]: input_userauth_request: invalid user dockeradmin [preauth] Jan 16 13:53:49 host sshd[17923]: input_userauth_request: invalid user steam [preauth] Jan 16 13:53:49 host sshd[17922]: Invalid user devops from 154.212.146.1 port 37320 Jan 16 13:53:49 host sshd[17922]: input_userauth_request: invalid user devops [preauth] Jan 16 13:53:49 host sshd[17912]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:53:49 host sshd[17912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.212.146.1 Jan 16 13:53:49 host sshd[17913]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:53:49 host sshd[17911]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:53:49 host sshd[17913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.212.146.1 Jan 16 13:53:49 host sshd[17911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.212.146.1 Jan 16 13:53:49 host sshd[17918]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:53:49 host sshd[17918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.212.146.1 Jan 16 13:53:49 host sshd[17914]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:53:49 host sshd[17914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.212.146.1 Jan 16 13:53:49 host sshd[17921]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:53:49 host sshd[17921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.212.146.1 Jan 16 13:53:49 host unix_chkpwd[17941]: password check failed for user (mysql) Jan 16 13:53:49 host sshd[17915]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:53:49 host sshd[17915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.212.146.1 Jan 16 13:53:49 host sshd[17917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.212.146.1 user=mysql Jan 16 13:53:49 host sshd[17917]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 16 13:53:49 host sshd[17924]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:53:49 host sshd[17924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.212.146.1 Jan 16 13:53:49 host sshd[17920]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:53:49 host sshd[17920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.212.146.1 Jan 16 13:53:49 host sshd[17922]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:53:49 host sshd[17922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.212.146.1 Jan 16 13:53:49 host unix_chkpwd[17942]: password check failed for user (root) Jan 16 13:53:49 host sshd[17916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.212.146.1 user=root Jan 16 13:53:49 host sshd[17916]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:53:49 host sshd[17923]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:53:49 host sshd[17923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.212.146.1 Jan 16 13:53:49 host unix_chkpwd[17943]: password check failed for user (root) Jan 16 13:53:49 host sshd[17919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.212.146.1 user=root Jan 16 13:53:49 host sshd[17919]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:53:52 host sshd[17912]: Failed password for invalid user admin from 154.212.146.1 port 37329 ssh2 Jan 16 13:53:52 host sshd[17913]: Failed password for invalid user testuser from 154.212.146.1 port 37268 ssh2 Jan 16 13:53:52 host sshd[17911]: Failed password for invalid user tester from 154.212.146.1 port 37296 ssh2 Jan 16 13:53:52 host sshd[17918]: Failed password for invalid user steam from 154.212.146.1 port 37276 ssh2 Jan 16 13:53:52 host sshd[17914]: Failed password for invalid user ec2-user from 154.212.146.1 port 37300 ssh2 Jan 16 13:53:52 host sshd[17921]: Failed password for invalid user postgres from 154.212.146.1 port 37323 ssh2 Jan 16 13:53:52 host sshd[17915]: Failed password for invalid user steam from 154.212.146.1 port 37284 ssh2 Jan 16 13:53:52 host sshd[17917]: Failed password for invalid user mysql from 154.212.146.1 port 37282 ssh2 Jan 16 13:53:52 host sshd[17924]: Failed password for invalid user postgres from 154.212.146.1 port 37304 ssh2 Jan 16 13:53:52 host sshd[17920]: Failed password for invalid user dockeradmin from 154.212.146.1 port 37294 ssh2 Jan 16 13:53:52 host sshd[17922]: Failed password for invalid user devops from 154.212.146.1 port 37320 ssh2 Jan 16 13:53:52 host sshd[17916]: Failed password for invalid user root from 154.212.146.1 port 37278 ssh2 Jan 16 13:53:52 host sshd[17923]: Failed password for invalid user steam from 154.212.146.1 port 37312 ssh2 Jan 16 13:53:52 host sshd[17919]: Failed password for invalid user root from 154.212.146.1 port 37310 ssh2 Jan 16 13:53:52 host sshd[17912]: Connection closed by 154.212.146.1 port 37329 [preauth] Jan 16 13:53:52 host sshd[17913]: Connection closed by 154.212.146.1 port 37268 [preauth] Jan 16 13:53:52 host sshd[17911]: Connection closed by 154.212.146.1 port 37296 [preauth] Jan 16 13:53:52 host sshd[17918]: Connection closed by 154.212.146.1 port 37276 [preauth] Jan 16 13:53:52 host sshd[17914]: Connection closed by 154.212.146.1 port 37300 [preauth] Jan 16 13:53:52 host sshd[17921]: Connection closed by 154.212.146.1 port 37323 [preauth] Jan 16 13:53:52 host sshd[17915]: Connection closed by 154.212.146.1 port 37284 [preauth] Jan 16 13:53:52 host sshd[17917]: Connection closed by 154.212.146.1 port 37282 [preauth] Jan 16 13:53:52 host sshd[17920]: Connection closed by 154.212.146.1 port 37294 [preauth] Jan 16 13:53:52 host sshd[17922]: Connection closed by 154.212.146.1 port 37320 [preauth] Jan 16 13:53:52 host sshd[17924]: Connection closed by 154.212.146.1 port 37304 [preauth] Jan 16 13:53:52 host sshd[17916]: Connection closed by 154.212.146.1 port 37278 [preauth] Jan 16 13:53:52 host sshd[17923]: Connection closed by 154.212.146.1 port 37312 [preauth] Jan 16 13:53:52 host sshd[17919]: Connection closed by 154.212.146.1 port 37310 [preauth] Jan 16 13:53:52 host sshd[17952]: Invalid user test from 154.212.146.1 port 37291 Jan 16 13:53:52 host sshd[17952]: input_userauth_request: invalid user test [preauth] Jan 16 13:53:52 host sshd[17953]: User root from 154.212.146.1 not allowed because not listed in AllowUsers Jan 16 13:53:52 host sshd[17953]: input_userauth_request: invalid user root [preauth] Jan 16 13:53:52 host sshd[17952]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:53:52 host sshd[17952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.212.146.1 Jan 16 13:53:52 host unix_chkpwd[17956]: password check failed for user (root) Jan 16 13:53:52 host sshd[17953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.212.146.1 user=root Jan 16 13:53:52 host sshd[17953]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 13:53:55 host sshd[17952]: Failed password for invalid user test from 154.212.146.1 port 37291 ssh2 Jan 16 13:53:55 host sshd[17953]: Failed password for invalid user root from 154.212.146.1 port 37251 ssh2 Jan 16 13:54:32 host sshd[18088]: Did not receive identification string from 46.101.97.107 port 61000 Jan 16 13:55:38 host sshd[18218]: Did not receive identification string from 113.250.61.242 port 53086 Jan 16 13:55:41 host sshd[18219]: Invalid user devops from 113.250.61.242 port 54594 Jan 16 13:55:41 host sshd[18219]: input_userauth_request: invalid user devops [preauth] Jan 16 13:55:41 host sshd[18219]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:55:41 host sshd[18219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.250.61.242 Jan 16 13:55:42 host sshd[18230]: Invalid user git from 113.250.61.242 port 54608 Jan 16 13:55:42 host sshd[18230]: input_userauth_request: invalid user git [preauth] Jan 16 13:55:42 host sshd[18230]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:55:42 host sshd[18230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.250.61.242 Jan 16 13:55:42 host sshd[18223]: Invalid user dmdba from 113.250.61.242 port 54626 Jan 16 13:55:42 host sshd[18223]: input_userauth_request: invalid user dmdba [preauth] Jan 16 13:55:42 host sshd[18236]: Invalid user a from 113.250.61.242 port 54622 Jan 16 13:55:42 host sshd[18236]: input_userauth_request: invalid user a [preauth] Jan 16 13:55:42 host sshd[18233]: Invalid user guest from 113.250.61.242 port 54554 Jan 16 13:55:42 host sshd[18233]: input_userauth_request: invalid user guest [preauth] Jan 16 13:55:43 host sshd[18219]: Failed password for invalid user devops from 113.250.61.242 port 54594 ssh2 Jan 16 13:55:43 host sshd[18260]: Invalid user ftpuser from 113.250.61.242 port 54556 Jan 16 13:55:43 host sshd[18260]: input_userauth_request: invalid user ftpuser [preauth] Jan 16 13:55:43 host sshd[18233]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:55:43 host sshd[18233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.250.61.242 Jan 16 13:55:43 host sshd[18236]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:55:43 host sshd[18236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.250.61.242 Jan 16 13:55:43 host sshd[18219]: Connection closed by 113.250.61.242 port 54594 [preauth] Jan 16 13:55:43 host sshd[18260]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:55:43 host sshd[18260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.250.61.242 Jan 16 13:55:44 host sshd[18224]: Invalid user esuser from 113.250.61.242 port 54616 Jan 16 13:55:44 host sshd[18224]: input_userauth_request: invalid user esuser [preauth] Jan 16 13:55:44 host sshd[18247]: Invalid user elastic from 113.250.61.242 port 54592 Jan 16 13:55:44 host sshd[18245]: Invalid user oracle from 113.250.61.242 port 54598 Jan 16 13:55:44 host sshd[18247]: input_userauth_request: invalid user elastic [preauth] Jan 16 13:55:44 host sshd[18245]: input_userauth_request: invalid user oracle [preauth] Jan 16 13:55:44 host sshd[18248]: Invalid user teamspeak3 from 113.250.61.242 port 54574 Jan 16 13:55:44 host sshd[18248]: input_userauth_request: invalid user teamspeak3 [preauth] Jan 16 13:55:44 host sshd[18256]: Invalid user admin from 113.250.61.242 port 54586 Jan 16 13:55:44 host sshd[18256]: input_userauth_request: invalid user admin [preauth] Jan 16 13:55:44 host sshd[18230]: Failed password for invalid user git from 113.250.61.242 port 54608 ssh2 Jan 16 13:55:44 host sshd[18249]: Invalid user user from 113.250.61.242 port 54572 Jan 16 13:55:44 host sshd[18249]: input_userauth_request: invalid user user [preauth] Jan 16 13:55:44 host sshd[18245]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:55:44 host sshd[18245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.250.61.242 Jan 16 13:55:44 host sshd[18247]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:55:44 host sshd[18247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.250.61.242 Jan 16 13:55:44 host sshd[18248]: pam_unix(sshd:auth): check pass; user unknown Jan 16 13:55:44 host sshd[18248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.250.61.242 Jan 16 13:55:44 host sshd[18230]: Connection closed by 113.250.61.242 port 54608 [preauth] Jan 16 13:55:46 host sshd[18233]: Failed password for invalid user guest from 113.250.61.242 port 54554 ssh2 Jan 16 13:55:46 host sshd[18236]: Failed password for invalid user a from 113.250.61.242 port 54622 ssh2 Jan 16 13:55:46 host sshd[18245]: Failed password for invalid user oracle from 113.250.61.242 port 54598 ssh2 Jan 16 13:55:46 host sshd[18247]: Failed password for invalid user elastic from 113.250.61.242 port 54592 ssh2 Jan 16 13:55:46 host sshd[18248]: Failed password for invalid user teamspeak3 from 113.250.61.242 port 54574 ssh2 Jan 16 13:55:46 host sshd[18260]: Failed password for invalid user ftpuser from 113.250.61.242 port 54556 ssh2 Jan 16 14:05:34 host sshd[19978]: Invalid user admin from 39.112.0.147 port 62778 Jan 16 14:05:34 host sshd[19978]: input_userauth_request: invalid user admin [preauth] Jan 16 14:05:34 host sshd[19978]: pam_unix(sshd:auth): check pass; user unknown Jan 16 14:05:34 host sshd[19978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.112.0.147 Jan 16 14:05:36 host sshd[19978]: Failed password for invalid user admin from 39.112.0.147 port 62778 ssh2 Jan 16 14:05:37 host sshd[19978]: Failed password for invalid user admin from 39.112.0.147 port 62778 ssh2 Jan 16 14:05:37 host sshd[19978]: pam_unix(sshd:auth): check pass; user unknown Jan 16 14:05:39 host sshd[19978]: Failed password for invalid user admin from 39.112.0.147 port 62778 ssh2 Jan 16 14:05:41 host sshd[19978]: pam_unix(sshd:auth): check pass; user unknown Jan 16 14:05:42 host sshd[19978]: Failed password for invalid user admin from 39.112.0.147 port 62778 ssh2 Jan 16 14:05:43 host sshd[19978]: pam_unix(sshd:auth): check pass; user unknown Jan 16 14:05:46 host sshd[19978]: Failed password for invalid user admin from 39.112.0.147 port 62778 ssh2 Jan 16 14:06:06 host sshd[20097]: Invalid user ez from 194.110.203.109 port 40426 Jan 16 14:06:06 host sshd[20097]: input_userauth_request: invalid user ez [preauth] Jan 16 14:06:06 host sshd[20097]: pam_unix(sshd:auth): check pass; user unknown Jan 16 14:06:06 host sshd[20097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 14:06:09 host sshd[20097]: Failed password for invalid user ez from 194.110.203.109 port 40426 ssh2 Jan 16 14:06:12 host sshd[20097]: pam_unix(sshd:auth): check pass; user unknown Jan 16 14:06:14 host sshd[20097]: Failed password for invalid user ez from 194.110.203.109 port 40426 ssh2 Jan 16 14:06:17 host sshd[20097]: pam_unix(sshd:auth): check pass; user unknown Jan 16 14:06:19 host sshd[20097]: Failed password for invalid user ez from 194.110.203.109 port 40426 ssh2 Jan 16 14:06:22 host sshd[20097]: Connection closed by 194.110.203.109 port 40426 [preauth] Jan 16 14:06:22 host sshd[20097]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 14:11:26 host sshd[21069]: Invalid user admin from 220.134.21.67 port 60736 Jan 16 14:11:26 host sshd[21069]: input_userauth_request: invalid user admin [preauth] Jan 16 14:11:26 host sshd[21069]: pam_unix(sshd:auth): check pass; user unknown Jan 16 14:11:26 host sshd[21069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.21.67 Jan 16 14:11:28 host sshd[21069]: Failed password for invalid user admin from 220.134.21.67 port 60736 ssh2 Jan 16 14:11:33 host sshd[21069]: Failed password for invalid user admin from 220.134.21.67 port 60736 ssh2 Jan 16 14:11:34 host sshd[21069]: pam_unix(sshd:auth): check pass; user unknown Jan 16 14:11:35 host sshd[21069]: Failed password for invalid user admin from 220.134.21.67 port 60736 ssh2 Jan 16 14:11:36 host sshd[21069]: Connection reset by 220.134.21.67 port 60736 [preauth] Jan 16 14:11:36 host sshd[21069]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.21.67 Jan 16 14:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 14:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 14:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 14:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 14:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 14:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=a2zgroup user-5=dartsimp user-6=wwwpmcresource user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=ugotscom user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=disposeat user-15=wwwkmaorg user-16=remysagr user-17=pmcresources user-18=vfmassets user-19=shalinijames user-20=wwwtestugo user-21=wwwletsstalkfood user-22=straightcurve user-23=bonifacegroup user-24=wwwevmhonda user-25=mrsclean user-26=wwwnexidigital user-27=palco123 user-28=gifterman user-29=phmetals user-30=kottayamcalldriv feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 14:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 14:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 14:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-R4C9S6IK4q05Y3eN.~ Jan 16 14:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-R4C9S6IK4q05Y3eN.~' Jan 16 14:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-R4C9S6IK4q05Y3eN.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 14:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 14:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 14:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 14:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 14:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 14:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 14:32:50 host sshd[24031]: Invalid user ubnt from 210.68.242.196 port 50601 Jan 16 14:32:50 host sshd[24031]: input_userauth_request: invalid user ubnt [preauth] Jan 16 14:32:50 host sshd[24031]: pam_unix(sshd:auth): check pass; user unknown Jan 16 14:32:50 host sshd[24031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.68.242.196 Jan 16 14:32:52 host sshd[24031]: Failed password for invalid user ubnt from 210.68.242.196 port 50601 ssh2 Jan 16 14:32:53 host sshd[24031]: pam_unix(sshd:auth): check pass; user unknown Jan 16 14:32:55 host sshd[24031]: Failed password for invalid user ubnt from 210.68.242.196 port 50601 ssh2 Jan 16 14:32:55 host sshd[24031]: Connection reset by 210.68.242.196 port 50601 [preauth] Jan 16 14:32:55 host sshd[24031]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.68.242.196 Jan 16 14:35:30 host sshd[24352]: Did not receive identification string from 196.179.238.249 port 33730 Jan 16 14:36:07 host sshd[24557]: Invalid user admin from 196.179.238.249 port 58494 Jan 16 14:36:07 host sshd[24557]: input_userauth_request: invalid user admin [preauth] Jan 16 14:36:07 host sshd[24557]: pam_unix(sshd:auth): check pass; user unknown Jan 16 14:36:07 host sshd[24557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.238.249 Jan 16 14:36:09 host sshd[24557]: Failed password for invalid user admin from 196.179.238.249 port 58494 ssh2 Jan 16 14:36:10 host sshd[24557]: Connection closed by 196.179.238.249 port 58494 [preauth] Jan 16 14:36:58 host sshd[24664]: Invalid user admin from 196.179.238.249 port 48036 Jan 16 14:36:58 host sshd[24664]: input_userauth_request: invalid user admin [preauth] Jan 16 14:36:59 host sshd[24664]: pam_unix(sshd:auth): check pass; user unknown Jan 16 14:36:59 host sshd[24664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.238.249 Jan 16 14:37:01 host sshd[24664]: Failed password for invalid user admin from 196.179.238.249 port 48036 ssh2 Jan 16 14:37:01 host sshd[24664]: Connection closed by 196.179.238.249 port 48036 [preauth] Jan 16 14:40:17 host sshd[25085]: User root from 59.126.114.190 not allowed because not listed in AllowUsers Jan 16 14:40:17 host sshd[25085]: input_userauth_request: invalid user root [preauth] Jan 16 14:40:17 host unix_chkpwd[25088]: password check failed for user (root) Jan 16 14:40:17 host sshd[25085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.114.190 user=root Jan 16 14:40:17 host sshd[25085]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 14:40:19 host sshd[25085]: Failed password for invalid user root from 59.126.114.190 port 52680 ssh2 Jan 16 14:40:19 host unix_chkpwd[25091]: password check failed for user (root) Jan 16 14:40:19 host sshd[25085]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 14:40:21 host sshd[25085]: Failed password for invalid user root from 59.126.114.190 port 52680 ssh2 Jan 16 14:40:22 host sshd[25085]: Connection reset by 59.126.114.190 port 52680 [preauth] Jan 16 14:40:22 host sshd[25085]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.114.190 user=root Jan 16 14:57:49 host sshd[27470]: Invalid user Admin from 112.149.177.166 port 51572 Jan 16 14:57:49 host sshd[27470]: input_userauth_request: invalid user Admin [preauth] Jan 16 14:57:49 host sshd[27470]: pam_unix(sshd:auth): check pass; user unknown Jan 16 14:57:49 host sshd[27470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.149.177.166 Jan 16 14:57:52 host sshd[27470]: Failed password for invalid user Admin from 112.149.177.166 port 51572 ssh2 Jan 16 14:57:52 host sshd[27470]: Connection reset by 112.149.177.166 port 51572 [preauth] Jan 16 15:08:10 host sshd[29013]: Invalid user Admin from 1.34.107.46 port 50024 Jan 16 15:08:10 host sshd[29013]: input_userauth_request: invalid user Admin [preauth] Jan 16 15:08:10 host sshd[29013]: pam_unix(sshd:auth): check pass; user unknown Jan 16 15:08:10 host sshd[29013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.107.46 Jan 16 15:08:12 host sshd[29013]: Failed password for invalid user Admin from 1.34.107.46 port 50024 ssh2 Jan 16 15:08:12 host sshd[29013]: pam_unix(sshd:auth): check pass; user unknown Jan 16 15:08:14 host sshd[29013]: Failed password for invalid user Admin from 1.34.107.46 port 50024 ssh2 Jan 16 15:08:15 host sshd[29013]: Connection reset by 1.34.107.46 port 50024 [preauth] Jan 16 15:08:15 host sshd[29013]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.107.46 Jan 16 15:14:02 host sshd[29778]: Invalid user admin from 119.193.209.204 port 48034 Jan 16 15:14:02 host sshd[29778]: input_userauth_request: invalid user admin [preauth] Jan 16 15:14:02 host sshd[29778]: pam_unix(sshd:auth): check pass; user unknown Jan 16 15:14:02 host sshd[29778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.193.209.204 Jan 16 15:14:03 host sshd[29778]: Failed password for invalid user admin from 119.193.209.204 port 48034 ssh2 Jan 16 15:14:04 host sshd[29778]: Failed password for invalid user admin from 119.193.209.204 port 48034 ssh2 Jan 16 15:14:04 host sshd[29778]: pam_unix(sshd:auth): check pass; user unknown Jan 16 15:14:07 host sshd[29778]: Failed password for invalid user admin from 119.193.209.204 port 48034 ssh2 Jan 16 15:14:07 host sshd[29778]: pam_unix(sshd:auth): check pass; user unknown Jan 16 15:14:09 host sshd[29778]: Failed password for invalid user admin from 119.193.209.204 port 48034 ssh2 Jan 16 15:14:10 host sshd[29778]: Connection reset by 119.193.209.204 port 48034 [preauth] Jan 16 15:14:10 host sshd[29778]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.193.209.204 Jan 16 15:15:44 host sshd[29985]: Invalid user dmdba from 211.47.118.140 port 39347 Jan 16 15:15:44 host sshd[29985]: input_userauth_request: invalid user dmdba [preauth] Jan 16 15:15:44 host sshd[29985]: pam_unix(sshd:auth): check pass; user unknown Jan 16 15:15:44 host sshd[29985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.47.118.140 Jan 16 15:15:46 host sshd[29985]: Failed password for invalid user dmdba from 211.47.118.140 port 39347 ssh2 Jan 16 15:15:49 host sshd[29985]: Failed password for invalid user dmdba from 211.47.118.140 port 39347 ssh2 Jan 16 15:15:49 host sshd[29985]: Connection closed by 211.47.118.140 port 39347 [preauth] Jan 16 15:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 15:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 15:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 15:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=ugotscom user-8=keralaholi user-9=wwwresourcehunte user-10=wwwrmswll user-11=wwwpmcresource user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=pmcresources user-16=remysagr user-17=disposeat user-18=wwwkmaorg user-19=woodpeck user-20=wwwkapin user-21=kottayamcalldriv user-22=phmetals user-23=palco123 user-24=gifterman user-25=mrsclean user-26=wwwnexidigital user-27=wwwevmhonda user-28=bonifacegroup user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 15:21:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 15:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-io3QaZHTQuwh3dmI.~ Jan 16 15:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-io3QaZHTQuwh3dmI.~' Jan 16 15:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-io3QaZHTQuwh3dmI.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 15:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 15:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 15:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 15:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 15:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 15:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 15:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 15:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 15:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 15:26:29 host sshd[31564]: Invalid user leonard from 107.189.30.59 port 38324 Jan 16 15:26:29 host sshd[31564]: input_userauth_request: invalid user leonard [preauth] Jan 16 15:26:29 host sshd[31564]: pam_unix(sshd:auth): check pass; user unknown Jan 16 15:26:29 host sshd[31564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 16 15:26:30 host sshd[31564]: Failed password for invalid user leonard from 107.189.30.59 port 38324 ssh2 Jan 16 15:26:31 host sshd[31564]: Connection closed by 107.189.30.59 port 38324 [preauth] Jan 16 15:31:20 host sshd[32236]: Invalid user admin from 222.120.209.218 port 63537 Jan 16 15:31:20 host sshd[32236]: input_userauth_request: invalid user admin [preauth] Jan 16 15:31:20 host sshd[32236]: pam_unix(sshd:auth): check pass; user unknown Jan 16 15:31:20 host sshd[32236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.120.209.218 Jan 16 15:31:22 host sshd[32236]: Failed password for invalid user admin from 222.120.209.218 port 63537 ssh2 Jan 16 15:31:25 host sshd[32236]: Failed password for invalid user admin from 222.120.209.218 port 63537 ssh2 Jan 16 15:31:25 host sshd[32236]: pam_unix(sshd:auth): check pass; user unknown Jan 16 15:31:27 host sshd[32236]: Failed password for invalid user admin from 222.120.209.218 port 63537 ssh2 Jan 16 15:31:29 host sshd[32236]: pam_unix(sshd:auth): check pass; user unknown Jan 16 15:31:31 host sshd[32236]: Failed password for invalid user admin from 222.120.209.218 port 63537 ssh2 Jan 16 15:38:36 host sshd[786]: Connection reset by 123.240.163.237 port 55195 [preauth] Jan 16 15:42:09 host sshd[1367]: Invalid user admin from 121.166.213.186 port 62278 Jan 16 15:42:09 host sshd[1367]: input_userauth_request: invalid user admin [preauth] Jan 16 15:42:09 host sshd[1367]: pam_unix(sshd:auth): check pass; user unknown Jan 16 15:42:09 host sshd[1367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.166.213.186 Jan 16 15:42:11 host sshd[1367]: Failed password for invalid user admin from 121.166.213.186 port 62278 ssh2 Jan 16 15:42:12 host sshd[1367]: Failed password for invalid user admin from 121.166.213.186 port 62278 ssh2 Jan 16 15:42:12 host sshd[1367]: pam_unix(sshd:auth): check pass; user unknown Jan 16 15:42:14 host sshd[1367]: Failed password for invalid user admin from 121.166.213.186 port 62278 ssh2 Jan 16 15:51:47 host sshd[2710]: Invalid user f from 194.110.203.109 port 50612 Jan 16 15:51:47 host sshd[2710]: input_userauth_request: invalid user f [preauth] Jan 16 15:51:47 host sshd[2710]: pam_unix(sshd:auth): check pass; user unknown Jan 16 15:51:47 host sshd[2710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 15:51:49 host sshd[2710]: Failed password for invalid user f from 194.110.203.109 port 50612 ssh2 Jan 16 15:51:52 host sshd[2710]: pam_unix(sshd:auth): check pass; user unknown Jan 16 15:51:54 host sshd[2710]: Failed password for invalid user f from 194.110.203.109 port 50612 ssh2 Jan 16 15:51:57 host sshd[2710]: pam_unix(sshd:auth): check pass; user unknown Jan 16 15:51:59 host sshd[2710]: Failed password for invalid user f from 194.110.203.109 port 50612 ssh2 Jan 16 15:52:03 host sshd[2710]: Connection closed by 194.110.203.109 port 50612 [preauth] Jan 16 15:52:03 host sshd[2710]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 16:12:27 host sshd[5835]: Invalid user talasam from 195.226.194.142 port 47742 Jan 16 16:12:27 host sshd[5835]: input_userauth_request: invalid user talasam [preauth] Jan 16 16:12:27 host sshd[5835]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:12:27 host sshd[5835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 16 16:12:30 host sshd[5835]: Failed password for invalid user talasam from 195.226.194.142 port 47742 ssh2 Jan 16 16:12:30 host sshd[5835]: Received disconnect from 195.226.194.142 port 47742:11: Bye Bye [preauth] Jan 16 16:12:30 host sshd[5835]: Disconnected from 195.226.194.142 port 47742 [preauth] Jan 16 16:15:30 host sshd[6317]: User root from 71.200.58.137 not allowed because not listed in AllowUsers Jan 16 16:15:30 host sshd[6317]: input_userauth_request: invalid user root [preauth] Jan 16 16:15:30 host unix_chkpwd[6344]: password check failed for user (root) Jan 16 16:15:30 host sshd[6317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.200.58.137 user=root Jan 16 16:15:30 host sshd[6317]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 16:15:31 host sshd[6317]: Failed password for invalid user root from 71.200.58.137 port 44159 ssh2 Jan 16 16:15:32 host unix_chkpwd[6348]: password check failed for user (root) Jan 16 16:15:32 host sshd[6317]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 16:15:35 host sshd[6317]: Failed password for invalid user root from 71.200.58.137 port 44159 ssh2 Jan 16 16:15:36 host unix_chkpwd[6351]: password check failed for user (root) Jan 16 16:15:36 host sshd[6317]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 16:15:38 host sshd[6317]: Failed password for invalid user root from 71.200.58.137 port 44159 ssh2 Jan 16 16:15:38 host sshd[6317]: Connection reset by 71.200.58.137 port 44159 [preauth] Jan 16 16:15:38 host sshd[6317]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.200.58.137 user=root Jan 16 16:16:14 host sshd[6456]: Invalid user super from 103.54.41.197 port 41093 Jan 16 16:16:14 host sshd[6456]: input_userauth_request: invalid user super [preauth] Jan 16 16:16:14 host sshd[6456]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:16:14 host sshd[6456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.54.41.197 Jan 16 16:16:16 host sshd[6456]: Failed password for invalid user super from 103.54.41.197 port 41093 ssh2 Jan 16 16:16:17 host sshd[6456]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:16:18 host sshd[6456]: Failed password for invalid user super from 103.54.41.197 port 41093 ssh2 Jan 16 16:16:19 host sshd[6456]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:16:21 host sshd[6456]: Failed password for invalid user super from 103.54.41.197 port 41093 ssh2 Jan 16 16:16:21 host sshd[6456]: Connection reset by 103.54.41.197 port 41093 [preauth] Jan 16 16:16:21 host sshd[6456]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.54.41.197 Jan 16 16:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 16:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 16:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 16:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=ugotscom user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=straightcurve user-13=wwwletsstalkfood user-14=bonifacegroup user-15=wwwevmhonda user-16=mrsclean user-17=wwwnexidigital user-18=gifterman user-19=palco123 user-20=phmetals user-21=kottayamcalldriv user-22=wwwkapin user-23=woodpeck user-24=disposeat user-25=wwwkmaorg user-26=remysagr user-27=pmcresources user-28=vfmassets user-29=wwwtestugo user-30=shalinijames feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 16:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 16:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 16:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-za9kiDIVzi7E9eSE.~ Jan 16 16:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-za9kiDIVzi7E9eSE.~' Jan 16 16:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-za9kiDIVzi7E9eSE.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 16:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 16:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 16:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 16:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 16:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 16:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 16:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 16:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 16:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 16:26:53 host sshd[8483]: Invalid user default from 119.201.126.100 port 63005 Jan 16 16:26:53 host sshd[8483]: input_userauth_request: invalid user default [preauth] Jan 16 16:26:53 host sshd[8483]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:26:53 host sshd[8483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.201.126.100 Jan 16 16:26:55 host sshd[8483]: Failed password for invalid user default from 119.201.126.100 port 63005 ssh2 Jan 16 16:26:57 host sshd[8483]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:26:59 host sshd[8483]: Failed password for invalid user default from 119.201.126.100 port 63005 ssh2 Jan 16 16:28:02 host sshd[8607]: Invalid user hadoop from 114.35.2.131 port 58218 Jan 16 16:28:02 host sshd[8607]: input_userauth_request: invalid user hadoop [preauth] Jan 16 16:28:02 host sshd[8607]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:28:02 host sshd[8607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.2.131 Jan 16 16:28:04 host sshd[8607]: Failed password for invalid user hadoop from 114.35.2.131 port 58218 ssh2 Jan 16 16:28:04 host sshd[8607]: Failed password for invalid user hadoop from 114.35.2.131 port 58218 ssh2 Jan 16 16:28:05 host sshd[8607]: Connection closed by 114.35.2.131 port 58218 [preauth] Jan 16 16:31:12 host sshd[8956]: Invalid user pi from 60.248.221.112 port 50023 Jan 16 16:31:12 host sshd[8956]: input_userauth_request: invalid user pi [preauth] Jan 16 16:31:12 host sshd[8956]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:31:12 host sshd[8956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.248.221.112 Jan 16 16:31:15 host sshd[8956]: Failed password for invalid user pi from 60.248.221.112 port 50023 ssh2 Jan 16 16:31:15 host sshd[8956]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:31:17 host sshd[8956]: Failed password for invalid user pi from 60.248.221.112 port 50023 ssh2 Jan 16 16:31:17 host sshd[8956]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:31:20 host sshd[8956]: Failed password for invalid user pi from 60.248.221.112 port 50023 ssh2 Jan 16 16:31:20 host sshd[8956]: Connection reset by 60.248.221.112 port 50023 [preauth] Jan 16 16:31:20 host sshd[8956]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.248.221.112 Jan 16 16:43:36 host sshd[10546]: Invalid user admin from 153.175.41.125 port 44788 Jan 16 16:43:36 host sshd[10546]: input_userauth_request: invalid user admin [preauth] Jan 16 16:43:36 host sshd[10546]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:43:36 host sshd[10546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.175.41.125 Jan 16 16:43:38 host sshd[10546]: Failed password for invalid user admin from 153.175.41.125 port 44788 ssh2 Jan 16 16:43:39 host sshd[10546]: Failed password for invalid user admin from 153.175.41.125 port 44788 ssh2 Jan 16 16:43:39 host sshd[10546]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:43:41 host sshd[10546]: Failed password for invalid user admin from 153.175.41.125 port 44788 ssh2 Jan 16 16:43:42 host sshd[10546]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:43:44 host sshd[10546]: Failed password for invalid user admin from 153.175.41.125 port 44788 ssh2 Jan 16 16:43:45 host sshd[10546]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:43:47 host sshd[10546]: Failed password for invalid user admin from 153.175.41.125 port 44788 ssh2 Jan 16 16:47:39 host sshd[11140]: Invalid user ec2-user from 220.134.126.145 port 40586 Jan 16 16:47:39 host sshd[11140]: input_userauth_request: invalid user ec2-user [preauth] Jan 16 16:47:39 host sshd[11140]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:47:39 host sshd[11140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.126.145 Jan 16 16:47:41 host sshd[11140]: Failed password for invalid user ec2-user from 220.134.126.145 port 40586 ssh2 Jan 16 16:47:41 host sshd[11140]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:47:43 host sshd[11140]: Failed password for invalid user ec2-user from 220.134.126.145 port 40586 ssh2 Jan 16 16:47:43 host sshd[11140]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:47:45 host sshd[11140]: Failed password for invalid user ec2-user from 220.134.126.145 port 40586 ssh2 Jan 16 16:47:46 host sshd[11140]: Failed password for invalid user ec2-user from 220.134.126.145 port 40586 ssh2 Jan 16 16:47:47 host sshd[11140]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:47:48 host sshd[11140]: Failed password for invalid user ec2-user from 220.134.126.145 port 40586 ssh2 Jan 16 16:47:49 host sshd[11140]: Connection reset by 220.134.126.145 port 40586 [preauth] Jan 16 16:47:49 host sshd[11140]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.126.145 Jan 16 16:47:49 host sshd[11140]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 16 16:47:53 host sshd[11157]: Invalid user pi from 220.95.113.36 port 54022 Jan 16 16:47:53 host sshd[11157]: input_userauth_request: invalid user pi [preauth] Jan 16 16:47:53 host sshd[11157]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:47:53 host sshd[11157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.95.113.36 Jan 16 16:47:54 host sshd[11157]: Failed password for invalid user pi from 220.95.113.36 port 54022 ssh2 Jan 16 16:47:55 host sshd[11157]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:47:57 host sshd[11157]: Failed password for invalid user pi from 220.95.113.36 port 54022 ssh2 Jan 16 16:47:58 host sshd[11157]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:48:00 host sshd[11157]: Failed password for invalid user pi from 220.95.113.36 port 54022 ssh2 Jan 16 16:49:13 host sshd[11339]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 16 16:49:13 host sshd[11339]: input_userauth_request: invalid user root [preauth] Jan 16 16:49:13 host unix_chkpwd[11342]: password check failed for user (root) Jan 16 16:49:13 host sshd[11339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 16 16:49:13 host sshd[11339]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 16:49:15 host sshd[11339]: Failed password for invalid user root from 195.226.194.242 port 43924 ssh2 Jan 16 16:49:15 host sshd[11339]: Received disconnect from 195.226.194.242 port 43924:11: Bye Bye [preauth] Jan 16 16:49:15 host sshd[11339]: Disconnected from 195.226.194.242 port 43924 [preauth] Jan 16 16:52:13 host sshd[11759]: Invalid user zyfwp from 121.155.129.59 port 61441 Jan 16 16:52:13 host sshd[11759]: input_userauth_request: invalid user zyfwp [preauth] Jan 16 16:52:13 host sshd[11759]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:52:13 host sshd[11759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.155.129.59 Jan 16 16:52:16 host sshd[11759]: Failed password for invalid user zyfwp from 121.155.129.59 port 61441 ssh2 Jan 16 16:52:16 host sshd[11759]: Connection reset by 121.155.129.59 port 61441 [preauth] Jan 16 16:54:30 host sshd[11994]: Invalid user admin from 220.135.191.217 port 41202 Jan 16 16:54:30 host sshd[11994]: input_userauth_request: invalid user admin [preauth] Jan 16 16:54:30 host sshd[11994]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:54:30 host sshd[11994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.191.217 Jan 16 16:54:32 host sshd[11994]: Failed password for invalid user admin from 220.135.191.217 port 41202 ssh2 Jan 16 16:54:33 host sshd[11994]: Failed password for invalid user admin from 220.135.191.217 port 41202 ssh2 Jan 16 16:54:34 host sshd[11994]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:54:35 host sshd[11994]: Failed password for invalid user admin from 220.135.191.217 port 41202 ssh2 Jan 16 16:54:36 host sshd[11994]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:54:38 host sshd[11994]: Failed password for invalid user admin from 220.135.191.217 port 41202 ssh2 Jan 16 16:54:39 host sshd[11994]: pam_unix(sshd:auth): check pass; user unknown Jan 16 16:54:41 host sshd[11994]: Failed password for invalid user admin from 220.135.191.217 port 41202 ssh2 Jan 16 17:03:20 host sshd[13207]: Did not receive identification string from 58.72.18.130 port 39388 Jan 16 17:14:48 host sshd[14736]: Invalid user uucp from 195.226.194.142 port 23124 Jan 16 17:14:48 host sshd[14736]: input_userauth_request: invalid user uucp [preauth] Jan 16 17:14:48 host sshd[14736]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:14:48 host sshd[14736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 16 17:14:50 host sshd[14736]: Failed password for invalid user uucp from 195.226.194.142 port 23124 ssh2 Jan 16 17:14:50 host sshd[14736]: Received disconnect from 195.226.194.142 port 23124:11: Bye Bye [preauth] Jan 16 17:14:50 host sshd[14736]: Disconnected from 195.226.194.142 port 23124 [preauth] Jan 16 17:15:31 host sshd[14831]: Invalid user admin from 78.152.236.82 port 60308 Jan 16 17:15:31 host sshd[14831]: input_userauth_request: invalid user admin [preauth] Jan 16 17:15:31 host sshd[14831]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:15:31 host sshd[14831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.152.236.82 Jan 16 17:15:33 host sshd[14831]: Failed password for invalid user admin from 78.152.236.82 port 60308 ssh2 Jan 16 17:15:34 host sshd[14831]: Failed password for invalid user admin from 78.152.236.82 port 60308 ssh2 Jan 16 17:15:34 host sshd[14831]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:15:36 host sshd[14831]: Failed password for invalid user admin from 78.152.236.82 port 60308 ssh2 Jan 16 17:15:37 host sshd[14831]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:15:39 host sshd[14831]: Failed password for invalid user admin from 78.152.236.82 port 60308 ssh2 Jan 16 17:15:40 host sshd[14831]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:15:41 host sshd[14831]: Failed password for invalid user admin from 78.152.236.82 port 60308 ssh2 Jan 16 17:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 17:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 17:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 17:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=wwwkapin user-5=woodpeck user-6=shalinijames user-7=wwwtestugo user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=wwwletsstalkfood user-13=straightcurve user-14=kottayamcalldriv user-15=phmetals user-16=palco123 user-17=gifterman user-18=wwwnexidigital user-19=mrsclean user-20=cochintaxi user-21=wwwkaretakers user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=keralaholi user-29=wwwresourcehunte user-30=wwwrmswll feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 17:21:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-2rneM5UTEfGXbOvk.~ Jan 16 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-2rneM5UTEfGXbOvk.~' Jan 16 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-2rneM5UTEfGXbOvk.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 17:21:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 17:21:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 17:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 17:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 17:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 17:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 17:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 17:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 17:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 17:26:52 host sshd[16490]: Invalid user admin from 180.75.49.182 port 39662 Jan 16 17:26:52 host sshd[16490]: input_userauth_request: invalid user admin [preauth] Jan 16 17:26:52 host sshd[16490]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:26:52 host sshd[16490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.75.49.182 Jan 16 17:26:54 host sshd[16490]: Failed password for invalid user admin from 180.75.49.182 port 39662 ssh2 Jan 16 17:26:55 host sshd[16490]: Failed password for invalid user admin from 180.75.49.182 port 39662 ssh2 Jan 16 17:26:55 host sshd[16490]: Connection reset by 180.75.49.182 port 39662 [preauth] Jan 16 17:28:26 host sshd[16638]: Invalid user wbs from 61.240.138.52 port 43900 Jan 16 17:28:26 host sshd[16638]: input_userauth_request: invalid user wbs [preauth] Jan 16 17:28:26 host sshd[16638]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:28:26 host sshd[16638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.240.138.52 Jan 16 17:28:29 host sshd[16638]: Failed password for invalid user wbs from 61.240.138.52 port 43900 ssh2 Jan 16 17:28:29 host sshd[16638]: Received disconnect from 61.240.138.52 port 43900:11: Bye Bye [preauth] Jan 16 17:28:29 host sshd[16638]: Disconnected from 61.240.138.52 port 43900 [preauth] Jan 16 17:32:54 host sshd[17285]: Invalid user len from 61.240.138.52 port 34408 Jan 16 17:32:54 host sshd[17285]: input_userauth_request: invalid user len [preauth] Jan 16 17:32:54 host sshd[17285]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:32:54 host sshd[17285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.240.138.52 Jan 16 17:32:55 host sshd[17285]: Failed password for invalid user len from 61.240.138.52 port 34408 ssh2 Jan 16 17:32:56 host sshd[17285]: Received disconnect from 61.240.138.52 port 34408:11: Bye Bye [preauth] Jan 16 17:32:56 host sshd[17285]: Disconnected from 61.240.138.52 port 34408 [preauth] Jan 16 17:35:18 host sshd[17570]: Invalid user cgn from 61.240.138.52 port 42664 Jan 16 17:35:18 host sshd[17570]: input_userauth_request: invalid user cgn [preauth] Jan 16 17:35:18 host sshd[17570]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:35:18 host sshd[17570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.240.138.52 Jan 16 17:35:20 host sshd[17570]: Failed password for invalid user cgn from 61.240.138.52 port 42664 ssh2 Jan 16 17:35:20 host sshd[17570]: Received disconnect from 61.240.138.52 port 42664:11: Bye Bye [preauth] Jan 16 17:35:20 host sshd[17570]: Disconnected from 61.240.138.52 port 42664 [preauth] Jan 16 17:35:45 host sshd[17659]: Invalid user pi from 174.50.70.188 port 37868 Jan 16 17:35:45 host sshd[17659]: input_userauth_request: invalid user pi [preauth] Jan 16 17:35:45 host sshd[17660]: Invalid user pi from 174.50.70.188 port 37890 Jan 16 17:35:45 host sshd[17660]: input_userauth_request: invalid user pi [preauth] Jan 16 17:35:45 host sshd[17659]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:35:45 host sshd[17659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.50.70.188 Jan 16 17:35:46 host sshd[17660]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:35:46 host sshd[17660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.50.70.188 Jan 16 17:35:47 host sshd[17660]: Failed password for invalid user pi from 174.50.70.188 port 37890 ssh2 Jan 16 17:35:48 host sshd[17660]: Connection closed by 174.50.70.188 port 37890 [preauth] Jan 16 17:35:48 host sshd[17659]: Failed password for invalid user pi from 174.50.70.188 port 37868 ssh2 Jan 16 17:35:48 host sshd[17659]: Connection closed by 174.50.70.188 port 37868 [preauth] Jan 16 17:36:50 host sshd[17787]: Invalid user fa from 194.110.203.109 port 38736 Jan 16 17:36:50 host sshd[17787]: input_userauth_request: invalid user fa [preauth] Jan 16 17:36:50 host sshd[17787]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:36:50 host sshd[17787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 17:36:51 host sshd[17787]: Failed password for invalid user fa from 194.110.203.109 port 38736 ssh2 Jan 16 17:36:55 host sshd[17787]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:36:57 host sshd[17787]: Failed password for invalid user fa from 194.110.203.109 port 38736 ssh2 Jan 16 17:37:00 host sshd[17787]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:37:02 host sshd[17787]: Failed password for invalid user fa from 194.110.203.109 port 38736 ssh2 Jan 16 17:37:05 host sshd[17787]: Connection closed by 194.110.203.109 port 38736 [preauth] Jan 16 17:37:05 host sshd[17787]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 17:40:32 host sshd[18330]: User root from 218.35.169.102 not allowed because not listed in AllowUsers Jan 16 17:40:32 host sshd[18330]: input_userauth_request: invalid user root [preauth] Jan 16 17:40:32 host unix_chkpwd[18333]: password check failed for user (root) Jan 16 17:40:32 host sshd[18330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.35.169.102 user=root Jan 16 17:40:32 host sshd[18330]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 17:40:35 host sshd[18330]: Failed password for invalid user root from 218.35.169.102 port 34344 ssh2 Jan 16 17:40:35 host unix_chkpwd[18336]: password check failed for user (root) Jan 16 17:40:35 host sshd[18330]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 17:40:37 host sshd[18330]: Failed password for invalid user root from 218.35.169.102 port 34344 ssh2 Jan 16 17:40:37 host unix_chkpwd[18339]: password check failed for user (root) Jan 16 17:40:37 host sshd[18330]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 17:40:39 host sshd[18330]: Failed password for invalid user root from 218.35.169.102 port 34344 ssh2 Jan 16 17:40:39 host unix_chkpwd[18345]: password check failed for user (root) Jan 16 17:40:39 host sshd[18330]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 17:40:42 host sshd[18330]: Failed password for invalid user root from 218.35.169.102 port 34344 ssh2 Jan 16 17:40:42 host unix_chkpwd[18348]: password check failed for user (root) Jan 16 17:40:42 host sshd[18330]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 17:40:44 host sshd[18330]: Failed password for invalid user root from 218.35.169.102 port 34344 ssh2 Jan 16 17:40:54 host sshd[18409]: User root from 183.97.192.131 not allowed because not listed in AllowUsers Jan 16 17:40:54 host sshd[18409]: input_userauth_request: invalid user root [preauth] Jan 16 17:40:54 host unix_chkpwd[18414]: password check failed for user (root) Jan 16 17:40:54 host sshd[18409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.97.192.131 user=root Jan 16 17:40:54 host sshd[18409]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 17:40:56 host sshd[18409]: Failed password for invalid user root from 183.97.192.131 port 56642 ssh2 Jan 16 17:40:56 host unix_chkpwd[18416]: password check failed for user (root) Jan 16 17:40:56 host sshd[18409]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 17:40:58 host sshd[18409]: Failed password for invalid user root from 183.97.192.131 port 56642 ssh2 Jan 16 17:40:59 host sshd[18409]: Connection reset by 183.97.192.131 port 56642 [preauth] Jan 16 17:40:59 host sshd[18409]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.97.192.131 user=root Jan 16 17:45:08 host sshd[18903]: User sync from 195.226.194.142 not allowed because not listed in AllowUsers Jan 16 17:45:08 host sshd[18903]: input_userauth_request: invalid user sync [preauth] Jan 16 17:45:08 host unix_chkpwd[18906]: password check failed for user (sync) Jan 16 17:45:08 host sshd[18903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 user=sync Jan 16 17:45:08 host sshd[18903]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sync" Jan 16 17:45:10 host sshd[18903]: Failed password for invalid user sync from 195.226.194.142 port 30806 ssh2 Jan 16 17:45:10 host sshd[18903]: Received disconnect from 195.226.194.142 port 30806:11: Bye Bye [preauth] Jan 16 17:45:10 host sshd[18903]: Disconnected from 195.226.194.142 port 30806 [preauth] Jan 16 17:45:29 host sshd[18957]: Invalid user oracle from 39.126.176.31 port 61874 Jan 16 17:45:29 host sshd[18957]: input_userauth_request: invalid user oracle [preauth] Jan 16 17:45:29 host sshd[18957]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:45:29 host sshd[18957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.126.176.31 Jan 16 17:45:30 host sshd[18957]: Failed password for invalid user oracle from 39.126.176.31 port 61874 ssh2 Jan 16 17:45:31 host sshd[18957]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:45:33 host sshd[18957]: Failed password for invalid user oracle from 39.126.176.31 port 61874 ssh2 Jan 16 17:45:34 host sshd[18957]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:45:35 host sshd[18957]: Failed password for invalid user oracle from 39.126.176.31 port 61874 ssh2 Jan 16 17:45:36 host sshd[18957]: Failed password for invalid user oracle from 39.126.176.31 port 61874 ssh2 Jan 16 17:45:36 host sshd[18957]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:45:38 host sshd[18957]: Failed password for invalid user oracle from 39.126.176.31 port 61874 ssh2 Jan 16 17:46:20 host sshd[19200]: User root from 121.150.20.165 not allowed because not listed in AllowUsers Jan 16 17:46:20 host sshd[19200]: input_userauth_request: invalid user root [preauth] Jan 16 17:46:20 host unix_chkpwd[19204]: password check failed for user (root) Jan 16 17:46:20 host sshd[19200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.150.20.165 user=root Jan 16 17:46:20 host sshd[19200]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 17:46:22 host sshd[19200]: Failed password for invalid user root from 121.150.20.165 port 61408 ssh2 Jan 16 17:46:22 host sshd[19200]: Connection reset by 121.150.20.165 port 61408 [preauth] Jan 16 17:47:35 host sshd[19347]: Invalid user admin from 211.75.194.227 port 45515 Jan 16 17:47:35 host sshd[19347]: input_userauth_request: invalid user admin [preauth] Jan 16 17:47:35 host sshd[19347]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:47:35 host sshd[19347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.75.194.227 Jan 16 17:47:37 host sshd[19347]: Failed password for invalid user admin from 211.75.194.227 port 45515 ssh2 Jan 16 17:47:37 host sshd[19347]: Failed password for invalid user admin from 211.75.194.227 port 45515 ssh2 Jan 16 17:47:38 host sshd[19347]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:47:40 host sshd[19347]: Failed password for invalid user admin from 211.75.194.227 port 45515 ssh2 Jan 16 17:47:40 host sshd[19347]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:47:43 host sshd[19347]: Failed password for invalid user admin from 211.75.194.227 port 45515 ssh2 Jan 16 17:47:44 host sshd[19347]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:47:46 host sshd[19347]: Failed password for invalid user admin from 211.75.194.227 port 45515 ssh2 Jan 16 17:47:47 host sshd[19347]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:47:48 host sshd[19347]: Failed password for invalid user admin from 211.75.194.227 port 45515 ssh2 Jan 16 17:47:48 host sshd[19347]: error: maximum authentication attempts exceeded for invalid user admin from 211.75.194.227 port 45515 ssh2 [preauth] Jan 16 17:47:48 host sshd[19347]: Disconnecting: Too many authentication failures [preauth] Jan 16 17:47:48 host sshd[19347]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.75.194.227 Jan 16 17:47:48 host sshd[19347]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 16 17:54:00 host sshd[20161]: Invalid user vadmin from 121.147.18.165 port 63719 Jan 16 17:54:00 host sshd[20161]: input_userauth_request: invalid user vadmin [preauth] Jan 16 17:54:00 host sshd[20161]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:54:00 host sshd[20161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.147.18.165 Jan 16 17:54:02 host sshd[20161]: Failed password for invalid user vadmin from 121.147.18.165 port 63719 ssh2 Jan 16 17:54:03 host sshd[20161]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:54:05 host sshd[20161]: Failed password for invalid user vadmin from 121.147.18.165 port 63719 ssh2 Jan 16 17:54:05 host sshd[20161]: Failed password for invalid user vadmin from 121.147.18.165 port 63719 ssh2 Jan 16 17:54:06 host sshd[20161]: Connection closed by 121.147.18.165 port 63719 [preauth] Jan 16 17:54:06 host sshd[20161]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.147.18.165 Jan 16 17:55:10 host sshd[20343]: Invalid user squid from 62.233.50.248 port 41876 Jan 16 17:55:10 host sshd[20343]: input_userauth_request: invalid user squid [preauth] Jan 16 17:55:11 host sshd[20343]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:55:11 host sshd[20343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 16 17:55:13 host sshd[20343]: Failed password for invalid user squid from 62.233.50.248 port 41876 ssh2 Jan 16 17:55:13 host sshd[20343]: Received disconnect from 62.233.50.248 port 41876:11: Client disconnecting normally [preauth] Jan 16 17:55:13 host sshd[20343]: Disconnected from 62.233.50.248 port 41876 [preauth] Jan 16 17:55:14 host sshd[20350]: Invalid user listd from 62.233.50.248 port 45771 Jan 16 17:55:14 host sshd[20350]: input_userauth_request: invalid user listd [preauth] Jan 16 17:55:14 host sshd[20350]: pam_unix(sshd:auth): check pass; user unknown Jan 16 17:55:14 host sshd[20350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 16 17:55:17 host sshd[20350]: Failed password for invalid user listd from 62.233.50.248 port 45771 ssh2 Jan 16 17:55:17 host sshd[20350]: Received disconnect from 62.233.50.248 port 45771:11: Client disconnecting normally [preauth] Jan 16 17:55:17 host sshd[20350]: Disconnected from 62.233.50.248 port 45771 [preauth] Jan 16 17:55:18 host sshd[20360]: User root from 62.233.50.248 not allowed because not listed in AllowUsers Jan 16 17:55:18 host sshd[20360]: input_userauth_request: invalid user root [preauth] Jan 16 17:55:18 host unix_chkpwd[20366]: password check failed for user (root) Jan 16 17:55:18 host sshd[20360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 user=root Jan 16 17:55:18 host sshd[20360]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 17:55:20 host sshd[20360]: Failed password for invalid user root from 62.233.50.248 port 49283 ssh2 Jan 16 17:55:20 host sshd[20360]: Received disconnect from 62.233.50.248 port 49283:11: Client disconnecting normally [preauth] Jan 16 17:55:20 host sshd[20360]: Disconnected from 62.233.50.248 port 49283 [preauth] Jan 16 18:18:15 host sshd[23688]: Invalid user nexidigital from 51.222.32.202 port 50518 Jan 16 18:18:15 host sshd[23688]: input_userauth_request: invalid user nexidigital [preauth] Jan 16 18:18:15 host sshd[23688]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:18:15 host sshd[23688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.222.32.202 Jan 16 18:18:17 host sshd[23688]: Failed password for invalid user nexidigital from 51.222.32.202 port 50518 ssh2 Jan 16 18:18:18 host sshd[23688]: Connection closed by 51.222.32.202 port 50518 [preauth] Jan 16 18:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 18:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 18:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 18:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 18:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=a2zgroup user-4=dartsimp user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=wwwresourcehunte user-10=keralaholi user-11=wwwrmswll user-12=disposeat user-13=wwwkmaorg user-14=remysagr user-15=woodpeck user-16=wwwkapin user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=straightcurve user-24=wwwletsstalkfood user-25=kottayamcalldriv user-26=phmetals user-27=palco123 user-28=gifterman user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 18:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 18:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 18:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-eFVVeMJR0gGDp1Cr.~ Jan 16 18:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-eFVVeMJR0gGDp1Cr.~' Jan 16 18:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-eFVVeMJR0gGDp1Cr.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 18:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 18:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 18:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 18:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 18:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 18:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 18:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 18:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 18:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 18:23:31 host sshd[24587]: Invalid user admin from 125.228.195.106 port 38651 Jan 16 18:23:31 host sshd[24587]: input_userauth_request: invalid user admin [preauth] Jan 16 18:23:31 host sshd[24587]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:23:31 host sshd[24587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.195.106 Jan 16 18:23:33 host sshd[24587]: Failed password for invalid user admin from 125.228.195.106 port 38651 ssh2 Jan 16 18:23:34 host sshd[24587]: Connection reset by 125.228.195.106 port 38651 [preauth] Jan 16 18:25:21 host sshd[24768]: Connection closed by 172.105.128.11 port 49932 [preauth] Jan 16 18:25:22 host sshd[24774]: Did not receive identification string from 172.105.128.11 port 57870 Jan 16 18:25:23 host sshd[24776]: Did not receive identification string from 172.105.128.11 port 57876 Jan 16 18:32:53 host sshd[25760]: Invalid user support from 121.183.220.151 port 41444 Jan 16 18:32:53 host sshd[25760]: input_userauth_request: invalid user support [preauth] Jan 16 18:32:53 host sshd[25760]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:32:53 host sshd[25760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.183.220.151 Jan 16 18:32:55 host sshd[25760]: Failed password for invalid user support from 121.183.220.151 port 41444 ssh2 Jan 16 18:32:56 host sshd[25760]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:32:58 host sshd[25760]: Failed password for invalid user support from 121.183.220.151 port 41444 ssh2 Jan 16 18:33:00 host sshd[25760]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:33:02 host sshd[25760]: Failed password for invalid user support from 121.183.220.151 port 41444 ssh2 Jan 16 18:33:03 host sshd[25760]: Failed password for invalid user support from 121.183.220.151 port 41444 ssh2 Jan 16 18:36:16 host sshd[26296]: Connection reset by 59.127.237.234 port 45926 [preauth] Jan 16 18:44:07 host sshd[27360]: Invalid user puy from 58.75.221.5 port 37220 Jan 16 18:44:07 host sshd[27360]: input_userauth_request: invalid user puy [preauth] Jan 16 18:44:07 host sshd[27360]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:44:07 host sshd[27360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.75.221.5 Jan 16 18:44:09 host sshd[27360]: Failed password for invalid user puy from 58.75.221.5 port 37220 ssh2 Jan 16 18:44:09 host sshd[27360]: Received disconnect from 58.75.221.5 port 37220:11: Bye Bye [preauth] Jan 16 18:44:09 host sshd[27360]: Disconnected from 58.75.221.5 port 37220 [preauth] Jan 16 18:44:20 host sshd[27398]: Invalid user xqe from 66.98.112.247 port 43952 Jan 16 18:44:20 host sshd[27398]: input_userauth_request: invalid user xqe [preauth] Jan 16 18:44:20 host sshd[27398]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:44:20 host sshd[27398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.98.112.247 Jan 16 18:44:22 host sshd[27398]: Failed password for invalid user xqe from 66.98.112.247 port 43952 ssh2 Jan 16 18:44:23 host sshd[27398]: Received disconnect from 66.98.112.247 port 43952:11: Bye Bye [preauth] Jan 16 18:44:23 host sshd[27398]: Disconnected from 66.98.112.247 port 43952 [preauth] Jan 16 18:44:23 host sshd[27408]: Invalid user rnq from 167.99.78.16 port 45272 Jan 16 18:44:23 host sshd[27408]: input_userauth_request: invalid user rnq [preauth] Jan 16 18:44:23 host sshd[27408]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:44:23 host sshd[27408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.78.16 Jan 16 18:44:25 host sshd[27408]: Failed password for invalid user rnq from 167.99.78.16 port 45272 ssh2 Jan 16 18:44:25 host sshd[27408]: Received disconnect from 167.99.78.16 port 45272:11: Bye Bye [preauth] Jan 16 18:44:25 host sshd[27408]: Disconnected from 167.99.78.16 port 45272 [preauth] Jan 16 18:44:35 host sshd[27445]: Invalid user sdt from 157.230.178.127 port 58270 Jan 16 18:44:35 host sshd[27445]: input_userauth_request: invalid user sdt [preauth] Jan 16 18:44:35 host sshd[27445]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:44:35 host sshd[27445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.178.127 Jan 16 18:44:36 host sshd[27445]: Failed password for invalid user sdt from 157.230.178.127 port 58270 ssh2 Jan 16 18:44:37 host sshd[27445]: Received disconnect from 157.230.178.127 port 58270:11: Bye Bye [preauth] Jan 16 18:44:37 host sshd[27445]: Disconnected from 157.230.178.127 port 58270 [preauth] Jan 16 18:46:35 host sshd[27830]: Invalid user admin from 113.169.124.61 port 47163 Jan 16 18:46:35 host sshd[27830]: input_userauth_request: invalid user admin [preauth] Jan 16 18:46:35 host sshd[27830]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:46:35 host sshd[27830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.169.124.61 Jan 16 18:46:38 host sshd[27830]: Failed password for invalid user admin from 113.169.124.61 port 47163 ssh2 Jan 16 18:46:38 host sshd[27830]: Failed password for invalid user admin from 113.169.124.61 port 47163 ssh2 Jan 16 18:46:38 host sshd[27830]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:46:41 host sshd[27830]: Failed password for invalid user admin from 113.169.124.61 port 47163 ssh2 Jan 16 18:46:41 host sshd[27830]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:46:42 host sshd[27842]: Invalid user admin from 195.226.194.242 port 16578 Jan 16 18:46:42 host sshd[27842]: input_userauth_request: invalid user admin [preauth] Jan 16 18:46:42 host sshd[27842]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:46:42 host sshd[27842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 16 18:46:44 host sshd[27842]: Failed password for invalid user admin from 195.226.194.242 port 16578 ssh2 Jan 16 18:46:44 host sshd[27830]: Failed password for invalid user admin from 113.169.124.61 port 47163 ssh2 Jan 16 18:46:44 host sshd[27847]: Invalid user ili from 37.44.238.165 port 59436 Jan 16 18:46:44 host sshd[27847]: input_userauth_request: invalid user ili [preauth] Jan 16 18:46:44 host sshd[27847]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:46:44 host sshd[27847]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.44.238.165 Jan 16 18:46:44 host sshd[27842]: Received disconnect from 195.226.194.242 port 16578:11: Bye Bye [preauth] Jan 16 18:46:44 host sshd[27842]: Disconnected from 195.226.194.242 port 16578 [preauth] Jan 16 18:46:44 host sshd[27830]: Connection reset by 113.169.124.61 port 47163 [preauth] Jan 16 18:46:44 host sshd[27830]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.169.124.61 Jan 16 18:46:46 host sshd[27847]: Failed password for invalid user ili from 37.44.238.165 port 59436 ssh2 Jan 16 18:46:46 host sshd[27847]: Received disconnect from 37.44.238.165 port 59436:11: Bye Bye [preauth] Jan 16 18:46:46 host sshd[27847]: Disconnected from 37.44.238.165 port 59436 [preauth] Jan 16 18:48:35 host sshd[28123]: Invalid user oyw from 43.153.81.142 port 34310 Jan 16 18:48:35 host sshd[28123]: input_userauth_request: invalid user oyw [preauth] Jan 16 18:48:35 host sshd[28123]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:48:35 host sshd[28123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.81.142 Jan 16 18:48:37 host sshd[28123]: Failed password for invalid user oyw from 43.153.81.142 port 34310 ssh2 Jan 16 18:48:37 host sshd[28123]: Received disconnect from 43.153.81.142 port 34310:11: Bye Bye [preauth] Jan 16 18:48:37 host sshd[28123]: Disconnected from 43.153.81.142 port 34310 [preauth] Jan 16 18:49:06 host sshd[28194]: Invalid user zhh from 201.48.78.29 port 37262 Jan 16 18:49:06 host sshd[28194]: input_userauth_request: invalid user zhh [preauth] Jan 16 18:49:06 host sshd[28194]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:49:06 host sshd[28194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.78.29 Jan 16 18:49:08 host sshd[28194]: Failed password for invalid user zhh from 201.48.78.29 port 37262 ssh2 Jan 16 18:49:08 host sshd[28194]: Received disconnect from 201.48.78.29 port 37262:11: Bye Bye [preauth] Jan 16 18:49:08 host sshd[28194]: Disconnected from 201.48.78.29 port 37262 [preauth] Jan 16 18:49:42 host sshd[28276]: Invalid user wno from 66.98.112.247 port 43550 Jan 16 18:49:42 host sshd[28276]: input_userauth_request: invalid user wno [preauth] Jan 16 18:49:42 host sshd[28276]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:49:42 host sshd[28276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.98.112.247 Jan 16 18:49:44 host sshd[28276]: Failed password for invalid user wno from 66.98.112.247 port 43550 ssh2 Jan 16 18:49:45 host sshd[28276]: Received disconnect from 66.98.112.247 port 43550:11: Bye Bye [preauth] Jan 16 18:49:45 host sshd[28276]: Disconnected from 66.98.112.247 port 43550 [preauth] Jan 16 18:49:45 host sshd[28281]: Invalid user myf from 58.75.221.5 port 36248 Jan 16 18:49:45 host sshd[28281]: input_userauth_request: invalid user myf [preauth] Jan 16 18:49:45 host sshd[28281]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:49:45 host sshd[28281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.75.221.5 Jan 16 18:49:47 host sshd[28281]: Failed password for invalid user myf from 58.75.221.5 port 36248 ssh2 Jan 16 18:49:47 host sshd[28281]: Received disconnect from 58.75.221.5 port 36248:11: Bye Bye [preauth] Jan 16 18:49:47 host sshd[28281]: Disconnected from 58.75.221.5 port 36248 [preauth] Jan 16 18:49:59 host sshd[28313]: Invalid user asx from 8.213.129.130 port 37568 Jan 16 18:49:59 host sshd[28313]: input_userauth_request: invalid user asx [preauth] Jan 16 18:49:59 host sshd[28313]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:49:59 host sshd[28313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.213.129.130 Jan 16 18:50:01 host sshd[28313]: Failed password for invalid user asx from 8.213.129.130 port 37568 ssh2 Jan 16 18:50:02 host sshd[28345]: Invalid user urv from 37.44.238.165 port 51678 Jan 16 18:50:02 host sshd[28345]: input_userauth_request: invalid user urv [preauth] Jan 16 18:50:02 host sshd[28345]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:50:02 host sshd[28345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.44.238.165 Jan 16 18:50:02 host sshd[28313]: Received disconnect from 8.213.129.130 port 37568:11: Bye Bye [preauth] Jan 16 18:50:02 host sshd[28313]: Disconnected from 8.213.129.130 port 37568 [preauth] Jan 16 18:50:04 host sshd[28345]: Failed password for invalid user urv from 37.44.238.165 port 51678 ssh2 Jan 16 18:50:04 host sshd[28345]: Received disconnect from 37.44.238.165 port 51678:11: Bye Bye [preauth] Jan 16 18:50:04 host sshd[28345]: Disconnected from 37.44.238.165 port 51678 [preauth] Jan 16 18:50:17 host sshd[28378]: Invalid user nqn from 157.230.178.127 port 55080 Jan 16 18:50:17 host sshd[28378]: input_userauth_request: invalid user nqn [preauth] Jan 16 18:50:17 host sshd[28378]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:50:17 host sshd[28378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.178.127 Jan 16 18:50:18 host sshd[28378]: Failed password for invalid user nqn from 157.230.178.127 port 55080 ssh2 Jan 16 18:50:19 host sshd[28378]: Received disconnect from 157.230.178.127 port 55080:11: Bye Bye [preauth] Jan 16 18:50:19 host sshd[28378]: Disconnected from 157.230.178.127 port 55080 [preauth] Jan 16 18:50:48 host sshd[28451]: Invalid user stu from 66.98.112.247 port 42006 Jan 16 18:50:48 host sshd[28451]: input_userauth_request: invalid user stu [preauth] Jan 16 18:50:48 host sshd[28451]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:50:48 host sshd[28451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.98.112.247 Jan 16 18:50:50 host sshd[28451]: Failed password for invalid user stu from 66.98.112.247 port 42006 ssh2 Jan 16 18:50:50 host sshd[28451]: Received disconnect from 66.98.112.247 port 42006:11: Bye Bye [preauth] Jan 16 18:50:50 host sshd[28451]: Disconnected from 66.98.112.247 port 42006 [preauth] Jan 16 18:51:06 host sshd[28635]: Invalid user stu from 37.44.238.165 port 38416 Jan 16 18:51:06 host sshd[28635]: input_userauth_request: invalid user stu [preauth] Jan 16 18:51:06 host sshd[28635]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:51:06 host sshd[28635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.44.238.165 Jan 16 18:51:07 host sshd[28638]: Invalid user sdt from 43.153.81.142 port 38802 Jan 16 18:51:07 host sshd[28638]: input_userauth_request: invalid user sdt [preauth] Jan 16 18:51:07 host sshd[28638]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:51:07 host sshd[28638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.81.142 Jan 16 18:51:07 host sshd[28640]: Invalid user wre from 58.75.221.5 port 32950 Jan 16 18:51:07 host sshd[28640]: input_userauth_request: invalid user wre [preauth] Jan 16 18:51:07 host sshd[28640]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:51:07 host sshd[28640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.75.221.5 Jan 16 18:51:07 host sshd[28635]: Failed password for invalid user stu from 37.44.238.165 port 38416 ssh2 Jan 16 18:51:08 host sshd[28635]: Received disconnect from 37.44.238.165 port 38416:11: Bye Bye [preauth] Jan 16 18:51:08 host sshd[28635]: Disconnected from 37.44.238.165 port 38416 [preauth] Jan 16 18:51:09 host sshd[28638]: Failed password for invalid user sdt from 43.153.81.142 port 38802 ssh2 Jan 16 18:51:10 host sshd[28640]: Failed password for invalid user wre from 58.75.221.5 port 32950 ssh2 Jan 16 18:51:10 host sshd[28638]: Received disconnect from 43.153.81.142 port 38802:11: Bye Bye [preauth] Jan 16 18:51:10 host sshd[28638]: Disconnected from 43.153.81.142 port 38802 [preauth] Jan 16 18:51:10 host sshd[28640]: Received disconnect from 58.75.221.5 port 32950:11: Bye Bye [preauth] Jan 16 18:51:10 host sshd[28640]: Disconnected from 58.75.221.5 port 32950 [preauth] Jan 16 18:51:17 host sshd[28712]: Invalid user xqe from 157.230.178.127 port 49310 Jan 16 18:51:17 host sshd[28712]: input_userauth_request: invalid user xqe [preauth] Jan 16 18:51:17 host sshd[28712]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:51:17 host sshd[28712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.178.127 Jan 16 18:51:19 host sshd[28712]: Failed password for invalid user xqe from 157.230.178.127 port 49310 ssh2 Jan 16 18:51:19 host sshd[28712]: Received disconnect from 157.230.178.127 port 49310:11: Bye Bye [preauth] Jan 16 18:51:19 host sshd[28712]: Disconnected from 157.230.178.127 port 49310 [preauth] Jan 16 18:51:20 host sshd[28721]: Invalid user stu from 167.99.78.16 port 44202 Jan 16 18:51:20 host sshd[28721]: input_userauth_request: invalid user stu [preauth] Jan 16 18:51:20 host sshd[28721]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:51:20 host sshd[28721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.78.16 Jan 16 18:51:22 host sshd[28721]: Failed password for invalid user stu from 167.99.78.16 port 44202 ssh2 Jan 16 18:51:22 host sshd[28721]: Received disconnect from 167.99.78.16 port 44202:11: Bye Bye [preauth] Jan 16 18:51:22 host sshd[28721]: Disconnected from 167.99.78.16 port 44202 [preauth] Jan 16 18:51:40 host sshd[28815]: Invalid user myf from 201.48.78.29 port 52391 Jan 16 18:51:40 host sshd[28815]: input_userauth_request: invalid user myf [preauth] Jan 16 18:51:40 host sshd[28815]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:51:40 host sshd[28815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.78.29 Jan 16 18:51:42 host sshd[28815]: Failed password for invalid user myf from 201.48.78.29 port 52391 ssh2 Jan 16 18:51:42 host sshd[28815]: Received disconnect from 201.48.78.29 port 52391:11: Bye Bye [preauth] Jan 16 18:51:42 host sshd[28815]: Disconnected from 201.48.78.29 port 52391 [preauth] Jan 16 18:52:11 host sshd[28895]: Invalid user yuu from 43.153.81.142 port 33508 Jan 16 18:52:11 host sshd[28895]: input_userauth_request: invalid user yuu [preauth] Jan 16 18:52:11 host sshd[28895]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:52:11 host sshd[28895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.81.142 Jan 16 18:52:13 host sshd[28895]: Failed password for invalid user yuu from 43.153.81.142 port 33508 ssh2 Jan 16 18:52:13 host sshd[28895]: Received disconnect from 43.153.81.142 port 33508:11: Bye Bye [preauth] Jan 16 18:52:13 host sshd[28895]: Disconnected from 43.153.81.142 port 33508 [preauth] Jan 16 18:52:41 host sshd[28980]: Invalid user phj from 167.99.78.16 port 38332 Jan 16 18:52:41 host sshd[28980]: input_userauth_request: invalid user phj [preauth] Jan 16 18:52:41 host sshd[28980]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:52:41 host sshd[28980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.78.16 Jan 16 18:52:43 host sshd[28980]: Failed password for invalid user phj from 167.99.78.16 port 38332 ssh2 Jan 16 18:52:43 host sshd[28980]: Received disconnect from 167.99.78.16 port 38332:11: Bye Bye [preauth] Jan 16 18:52:43 host sshd[28980]: Disconnected from 167.99.78.16 port 38332 [preauth] Jan 16 18:53:01 host sshd[29047]: Invalid user uxc from 201.48.78.29 port 35431 Jan 16 18:53:01 host sshd[29047]: input_userauth_request: invalid user uxc [preauth] Jan 16 18:53:01 host sshd[29047]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:53:01 host sshd[29047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.78.29 Jan 16 18:53:03 host sshd[29047]: Failed password for invalid user uxc from 201.48.78.29 port 35431 ssh2 Jan 16 18:53:03 host sshd[29047]: Received disconnect from 201.48.78.29 port 35431:11: Bye Bye [preauth] Jan 16 18:53:03 host sshd[29047]: Disconnected from 201.48.78.29 port 35431 [preauth] Jan 16 18:54:17 host sshd[29223]: Did not receive identification string from 87.236.176.114 port 34229 Jan 16 18:54:18 host sshd[29227]: Connection closed by 87.236.176.114 port 40369 [preauth] Jan 16 18:54:38 host sshd[29276]: Invalid user zyfwp from 106.105.164.18 port 54507 Jan 16 18:54:38 host sshd[29276]: input_userauth_request: invalid user zyfwp [preauth] Jan 16 18:54:38 host sshd[29276]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:54:38 host sshd[29276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.105.164.18 Jan 16 18:54:40 host sshd[29276]: Failed password for invalid user zyfwp from 106.105.164.18 port 54507 ssh2 Jan 16 18:54:40 host sshd[29276]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:54:42 host sshd[29276]: Failed password for invalid user zyfwp from 106.105.164.18 port 54507 ssh2 Jan 16 18:54:43 host sshd[29276]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:54:46 host sshd[29276]: Failed password for invalid user zyfwp from 106.105.164.18 port 54507 ssh2 Jan 16 18:54:46 host sshd[29276]: Connection closed by 106.105.164.18 port 54507 [preauth] Jan 16 18:54:46 host sshd[29276]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.105.164.18 Jan 16 18:56:52 host sshd[29599]: Invalid user phs from 8.213.129.130 port 55128 Jan 16 18:56:52 host sshd[29599]: input_userauth_request: invalid user phs [preauth] Jan 16 18:56:52 host sshd[29599]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:56:52 host sshd[29599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.213.129.130 Jan 16 18:56:54 host sshd[29599]: Failed password for invalid user phs from 8.213.129.130 port 55128 ssh2 Jan 16 18:56:54 host sshd[29599]: Received disconnect from 8.213.129.130 port 55128:11: Bye Bye [preauth] Jan 16 18:56:54 host sshd[29599]: Disconnected from 8.213.129.130 port 55128 [preauth] Jan 16 18:57:27 host sshd[29659]: Invalid user xcj from 91.122.197.235 port 58032 Jan 16 18:57:27 host sshd[29659]: input_userauth_request: invalid user xcj [preauth] Jan 16 18:57:27 host sshd[29659]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:57:27 host sshd[29659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.122.197.235 Jan 16 18:57:29 host sshd[29659]: Failed password for invalid user xcj from 91.122.197.235 port 58032 ssh2 Jan 16 18:57:29 host sshd[29659]: Received disconnect from 91.122.197.235 port 58032:11: Bye Bye [preauth] Jan 16 18:57:29 host sshd[29659]: Disconnected from 91.122.197.235 port 58032 [preauth] Jan 16 18:58:12 host sshd[29772]: Invalid user tau from 62.84.125.211 port 39694 Jan 16 18:58:12 host sshd[29772]: input_userauth_request: invalid user tau [preauth] Jan 16 18:58:12 host sshd[29772]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:58:12 host sshd[29772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.84.125.211 Jan 16 18:58:13 host sshd[29775]: Invalid user one from 80.85.241.81 port 56124 Jan 16 18:58:13 host sshd[29775]: input_userauth_request: invalid user one [preauth] Jan 16 18:58:13 host sshd[29775]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:58:13 host sshd[29775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.85.241.81 Jan 16 18:58:13 host sshd[29772]: Failed password for invalid user tau from 62.84.125.211 port 39694 ssh2 Jan 16 18:58:13 host sshd[29772]: Received disconnect from 62.84.125.211 port 39694:11: Bye Bye [preauth] Jan 16 18:58:13 host sshd[29772]: Disconnected from 62.84.125.211 port 39694 [preauth] Jan 16 18:58:14 host sshd[29775]: Failed password for invalid user one from 80.85.241.81 port 56124 ssh2 Jan 16 18:58:15 host sshd[29775]: Received disconnect from 80.85.241.81 port 56124:11: Bye Bye [preauth] Jan 16 18:58:15 host sshd[29775]: Disconnected from 80.85.241.81 port 56124 [preauth] Jan 16 18:58:54 host sshd[29851]: Connection reset by 58.187.63.131 port 48198 [preauth] Jan 16 18:59:09 host sshd[29878]: Invalid user rdl from 158.69.111.17 port 45460 Jan 16 18:59:09 host sshd[29878]: input_userauth_request: invalid user rdl [preauth] Jan 16 18:59:09 host sshd[29878]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:59:09 host sshd[29878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.111.17 Jan 16 18:59:12 host sshd[29878]: Failed password for invalid user rdl from 158.69.111.17 port 45460 ssh2 Jan 16 18:59:12 host sshd[29878]: Received disconnect from 158.69.111.17 port 45460:11: Bye Bye [preauth] Jan 16 18:59:12 host sshd[29878]: Disconnected from 158.69.111.17 port 45460 [preauth] Jan 16 18:59:44 host sshd[29938]: Invalid user slp from 147.182.185.141 port 44160 Jan 16 18:59:44 host sshd[29938]: input_userauth_request: invalid user slp [preauth] Jan 16 18:59:44 host sshd[29938]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:59:44 host sshd[29938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.185.141 Jan 16 18:59:46 host sshd[29938]: Failed password for invalid user slp from 147.182.185.141 port 44160 ssh2 Jan 16 18:59:46 host sshd[29938]: Received disconnect from 147.182.185.141 port 44160:11: Bye Bye [preauth] Jan 16 18:59:46 host sshd[29938]: Disconnected from 147.182.185.141 port 44160 [preauth] Jan 16 18:59:53 host sshd[29957]: Invalid user xpy from 8.213.129.130 port 49684 Jan 16 18:59:53 host sshd[29957]: input_userauth_request: invalid user xpy [preauth] Jan 16 18:59:53 host sshd[29957]: pam_unix(sshd:auth): check pass; user unknown Jan 16 18:59:53 host sshd[29957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=8.213.129.130 Jan 16 18:59:55 host sshd[29957]: Failed password for invalid user xpy from 8.213.129.130 port 49684 ssh2 Jan 16 18:59:55 host sshd[29957]: Received disconnect from 8.213.129.130 port 49684:11: Bye Bye [preauth] Jan 16 18:59:55 host sshd[29957]: Disconnected from 8.213.129.130 port 49684 [preauth] Jan 16 19:00:09 host sshd[30054]: Invalid user cry from 128.199.33.46 port 42838 Jan 16 19:00:09 host sshd[30054]: input_userauth_request: invalid user cry [preauth] Jan 16 19:00:09 host sshd[30054]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:00:09 host sshd[30054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.33.46 Jan 16 19:00:11 host sshd[30054]: Failed password for invalid user cry from 128.199.33.46 port 42838 ssh2 Jan 16 19:00:12 host sshd[30054]: Received disconnect from 128.199.33.46 port 42838:11: Bye Bye [preauth] Jan 16 19:00:12 host sshd[30054]: Disconnected from 128.199.33.46 port 42838 [preauth] Jan 16 19:02:31 host sshd[30450]: Invalid user her from 80.85.241.81 port 47534 Jan 16 19:02:31 host sshd[30450]: input_userauth_request: invalid user her [preauth] Jan 16 19:02:31 host sshd[30450]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:02:31 host sshd[30450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.85.241.81 Jan 16 19:02:32 host sshd[30450]: Failed password for invalid user her from 80.85.241.81 port 47534 ssh2 Jan 16 19:02:33 host sshd[30450]: Received disconnect from 80.85.241.81 port 47534:11: Bye Bye [preauth] Jan 16 19:02:33 host sshd[30450]: Disconnected from 80.85.241.81 port 47534 [preauth] Jan 16 19:02:39 host sshd[30459]: Invalid user gvt from 91.122.197.235 port 42600 Jan 16 19:02:39 host sshd[30459]: input_userauth_request: invalid user gvt [preauth] Jan 16 19:02:39 host sshd[30459]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:02:39 host sshd[30459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.122.197.235 Jan 16 19:02:42 host sshd[30459]: Failed password for invalid user gvt from 91.122.197.235 port 42600 ssh2 Jan 16 19:02:42 host sshd[30459]: Received disconnect from 91.122.197.235 port 42600:11: Bye Bye [preauth] Jan 16 19:02:42 host sshd[30459]: Disconnected from 91.122.197.235 port 42600 [preauth] Jan 16 19:03:13 host sshd[30531]: Invalid user yhv from 128.199.33.46 port 54590 Jan 16 19:03:13 host sshd[30531]: input_userauth_request: invalid user yhv [preauth] Jan 16 19:03:13 host sshd[30531]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:03:13 host sshd[30531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.33.46 Jan 16 19:03:14 host sshd[30535]: Invalid user blm from 158.69.111.17 port 37586 Jan 16 19:03:14 host sshd[30535]: input_userauth_request: invalid user blm [preauth] Jan 16 19:03:14 host sshd[30535]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:03:14 host sshd[30535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.111.17 Jan 16 19:03:15 host sshd[30531]: Failed password for invalid user yhv from 128.199.33.46 port 54590 ssh2 Jan 16 19:03:15 host sshd[30531]: Received disconnect from 128.199.33.46 port 54590:11: Bye Bye [preauth] Jan 16 19:03:15 host sshd[30531]: Disconnected from 128.199.33.46 port 54590 [preauth] Jan 16 19:03:17 host sshd[30535]: Failed password for invalid user blm from 158.69.111.17 port 37586 ssh2 Jan 16 19:03:17 host sshd[30535]: Received disconnect from 158.69.111.17 port 37586:11: Bye Bye [preauth] Jan 16 19:03:17 host sshd[30535]: Disconnected from 158.69.111.17 port 37586 [preauth] Jan 16 19:03:32 host sshd[30584]: Invalid user het from 62.84.125.211 port 36296 Jan 16 19:03:32 host sshd[30584]: input_userauth_request: invalid user het [preauth] Jan 16 19:03:32 host sshd[30584]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:03:32 host sshd[30584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.84.125.211 Jan 16 19:03:34 host sshd[30584]: Failed password for invalid user het from 62.84.125.211 port 36296 ssh2 Jan 16 19:03:34 host sshd[30584]: Received disconnect from 62.84.125.211 port 36296:11: Bye Bye [preauth] Jan 16 19:03:34 host sshd[30584]: Disconnected from 62.84.125.211 port 36296 [preauth] Jan 16 19:03:39 host sshd[30599]: Invalid user brl from 80.85.241.81 port 45914 Jan 16 19:03:39 host sshd[30599]: input_userauth_request: invalid user brl [preauth] Jan 16 19:03:39 host sshd[30599]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:03:39 host sshd[30599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.85.241.81 Jan 16 19:03:41 host sshd[30599]: Failed password for invalid user brl from 80.85.241.81 port 45914 ssh2 Jan 16 19:03:46 host sshd[30637]: Invalid user sop from 147.182.185.141 port 44312 Jan 16 19:03:46 host sshd[30637]: input_userauth_request: invalid user sop [preauth] Jan 16 19:03:46 host sshd[30637]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:03:46 host sshd[30637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.185.141 Jan 16 19:03:48 host sshd[30637]: Failed password for invalid user sop from 147.182.185.141 port 44312 ssh2 Jan 16 19:03:48 host sshd[30637]: Received disconnect from 147.182.185.141 port 44312:11: Bye Bye [preauth] Jan 16 19:03:48 host sshd[30637]: Disconnected from 147.182.185.141 port 44312 [preauth] Jan 16 19:04:02 host sshd[30657]: Invalid user iwx from 91.122.197.235 port 49602 Jan 16 19:04:02 host sshd[30657]: input_userauth_request: invalid user iwx [preauth] Jan 16 19:04:02 host sshd[30657]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:04:02 host sshd[30657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.122.197.235 Jan 16 19:04:04 host sshd[30657]: Failed password for invalid user iwx from 91.122.197.235 port 49602 ssh2 Jan 16 19:04:04 host sshd[30657]: Received disconnect from 91.122.197.235 port 49602:11: Bye Bye [preauth] Jan 16 19:04:04 host sshd[30657]: Disconnected from 91.122.197.235 port 49602 [preauth] Jan 16 19:04:15 host sshd[30712]: Invalid user rjd from 158.69.111.17 port 33048 Jan 16 19:04:15 host sshd[30712]: input_userauth_request: invalid user rjd [preauth] Jan 16 19:04:15 host sshd[30712]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:04:15 host sshd[30712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.111.17 Jan 16 19:04:17 host sshd[30712]: Failed password for invalid user rjd from 158.69.111.17 port 33048 ssh2 Jan 16 19:04:19 host sshd[30748]: Invalid user het from 128.199.33.46 port 53102 Jan 16 19:04:19 host sshd[30748]: input_userauth_request: invalid user het [preauth] Jan 16 19:04:19 host sshd[30748]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:04:19 host sshd[30748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.33.46 Jan 16 19:04:21 host sshd[30748]: Failed password for invalid user het from 128.199.33.46 port 53102 ssh2 Jan 16 19:04:40 host sshd[30829]: Invalid user mwo from 62.84.125.211 port 33196 Jan 16 19:04:40 host sshd[30829]: input_userauth_request: invalid user mwo [preauth] Jan 16 19:04:40 host sshd[30829]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:04:40 host sshd[30829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.84.125.211 Jan 16 19:04:43 host sshd[30829]: Failed password for invalid user mwo from 62.84.125.211 port 33196 ssh2 Jan 16 19:05:44 host sshd[30986]: Invalid user rdc from 147.182.185.141 port 44404 Jan 16 19:05:44 host sshd[30986]: input_userauth_request: invalid user rdc [preauth] Jan 16 19:05:44 host sshd[30986]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:05:44 host sshd[30986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.185.141 Jan 16 19:05:47 host sshd[30986]: Failed password for invalid user rdc from 147.182.185.141 port 44404 ssh2 Jan 16 19:09:01 host sshd[31451]: Invalid user admin from 61.65.230.124 port 46413 Jan 16 19:09:01 host sshd[31451]: input_userauth_request: invalid user admin [preauth] Jan 16 19:09:01 host sshd[31451]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:09:01 host sshd[31451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.65.230.124 Jan 16 19:09:03 host sshd[31451]: Failed password for invalid user admin from 61.65.230.124 port 46413 ssh2 Jan 16 19:09:04 host sshd[31451]: Connection reset by 61.65.230.124 port 46413 [preauth] Jan 16 19:09:54 host sshd[31552]: Invalid user pi from 114.33.167.224 port 37778 Jan 16 19:09:54 host sshd[31552]: input_userauth_request: invalid user pi [preauth] Jan 16 19:09:54 host sshd[31552]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:09:54 host sshd[31552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.167.224 Jan 16 19:09:56 host sshd[31552]: Failed password for invalid user pi from 114.33.167.224 port 37778 ssh2 Jan 16 19:09:57 host sshd[31552]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:09:59 host sshd[31552]: Failed password for invalid user pi from 114.33.167.224 port 37778 ssh2 Jan 16 19:09:59 host sshd[31552]: Connection reset by 114.33.167.224 port 37778 [preauth] Jan 16 19:09:59 host sshd[31552]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.167.224 Jan 16 19:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 19:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=bonifacegroup user-2=wwwevmhonda user-3=wwwletsstalkfood user-4=straightcurve user-5=gifterman user-6=palco123 user-7=phmetals user-8=kottayamcalldriv user-9=wwwnexidigital user-10=mrsclean user-11=remysagr user-12=disposeat user-13=wwwkmaorg user-14=wwwkapin user-15=woodpeck user-16=vfmassets user-17=wwwtestugo user-18=shalinijames user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=wwwrmswll user-23=wwwresourcehunte user-24=keralaholi user-25=ugotscom user-26=wwwkaretakers user-27=cochintaxi user-28=dartsimp user-29=a2zgroup user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 19:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-orSJLTiv4WNqAFbH.~ Jan 16 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-orSJLTiv4WNqAFbH.~' Jan 16 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-orSJLTiv4WNqAFbH.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 19:21:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 19:21:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 19:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 19:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 19:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 19:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 19:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 19:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 19:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 19:23:25 host sshd[1543]: Invalid user fb from 194.110.203.109 port 48378 Jan 16 19:23:25 host sshd[1543]: input_userauth_request: invalid user fb [preauth] Jan 16 19:23:25 host sshd[1543]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:23:25 host sshd[1543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 19:23:27 host sshd[1543]: Failed password for invalid user fb from 194.110.203.109 port 48378 ssh2 Jan 16 19:23:31 host sshd[1543]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:23:32 host sshd[1543]: Failed password for invalid user fb from 194.110.203.109 port 48378 ssh2 Jan 16 19:23:36 host sshd[1543]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:23:38 host sshd[1543]: Failed password for invalid user fb from 194.110.203.109 port 48378 ssh2 Jan 16 19:23:41 host sshd[1543]: Connection closed by 194.110.203.109 port 48378 [preauth] Jan 16 19:23:41 host sshd[1543]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 19:24:27 host sshd[1654]: Connection closed by 167.248.133.62 port 46296 [preauth] Jan 16 19:32:21 host sshd[2954]: Invalid user nginx from 112.144.156.103 port 46155 Jan 16 19:32:21 host sshd[2954]: input_userauth_request: invalid user nginx [preauth] Jan 16 19:32:21 host sshd[2954]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:32:21 host sshd[2954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.144.156.103 Jan 16 19:32:23 host sshd[2954]: Failed password for invalid user nginx from 112.144.156.103 port 46155 ssh2 Jan 16 19:32:24 host sshd[2954]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:32:25 host sshd[2954]: Failed password for invalid user nginx from 112.144.156.103 port 46155 ssh2 Jan 16 19:32:26 host sshd[2954]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:32:28 host sshd[2954]: Failed password for invalid user nginx from 112.144.156.103 port 46155 ssh2 Jan 16 19:32:29 host sshd[2954]: Failed password for invalid user nginx from 112.144.156.103 port 46155 ssh2 Jan 16 19:32:30 host sshd[2954]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:32:32 host sshd[2954]: Failed password for invalid user nginx from 112.144.156.103 port 46155 ssh2 Jan 16 19:46:02 host sshd[5217]: Invalid user john from 195.226.194.242 port 32574 Jan 16 19:46:02 host sshd[5217]: input_userauth_request: invalid user john [preauth] Jan 16 19:46:02 host sshd[5217]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:46:02 host sshd[5217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 16 19:46:04 host sshd[5217]: Failed password for invalid user john from 195.226.194.242 port 32574 ssh2 Jan 16 19:46:04 host sshd[5217]: Received disconnect from 195.226.194.242 port 32574:11: Bye Bye [preauth] Jan 16 19:46:04 host sshd[5217]: Disconnected from 195.226.194.242 port 32574 [preauth] Jan 16 19:52:43 host sshd[6199]: Invalid user super from 220.93.247.56 port 41847 Jan 16 19:52:43 host sshd[6199]: input_userauth_request: invalid user super [preauth] Jan 16 19:52:43 host sshd[6199]: pam_unix(sshd:auth): check pass; user unknown Jan 16 19:52:43 host sshd[6199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.93.247.56 Jan 16 19:52:45 host sshd[6199]: Failed password for invalid user super from 220.93.247.56 port 41847 ssh2 Jan 16 20:02:11 host sshd[7509]: Invalid user admin from 112.185.120.208 port 60716 Jan 16 20:02:11 host sshd[7509]: input_userauth_request: invalid user admin [preauth] Jan 16 20:02:11 host sshd[7509]: pam_unix(sshd:auth): check pass; user unknown Jan 16 20:02:11 host sshd[7509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.185.120.208 Jan 16 20:02:14 host sshd[7509]: Failed password for invalid user admin from 112.185.120.208 port 60716 ssh2 Jan 16 20:02:14 host sshd[7509]: Connection reset by 112.185.120.208 port 60716 [preauth] Jan 16 20:03:01 host sshd[7597]: Connection reset by 211.46.182.203 port 61393 [preauth] Jan 16 20:05:06 host sshd[7890]: Invalid user ubuntu from 125.130.74.221 port 40249 Jan 16 20:05:06 host sshd[7890]: input_userauth_request: invalid user ubuntu [preauth] Jan 16 20:05:06 host sshd[7890]: pam_unix(sshd:auth): check pass; user unknown Jan 16 20:05:06 host sshd[7890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.74.221 Jan 16 20:05:08 host sshd[7890]: Failed password for invalid user ubuntu from 125.130.74.221 port 40249 ssh2 Jan 16 20:05:10 host sshd[7890]: Connection reset by 125.130.74.221 port 40249 [preauth] Jan 16 20:12:35 host sshd[8886]: Invalid user telnet from 118.137.237.36 port 58991 Jan 16 20:12:35 host sshd[8886]: input_userauth_request: invalid user telnet [preauth] Jan 16 20:12:35 host sshd[8886]: pam_unix(sshd:auth): check pass; user unknown Jan 16 20:12:35 host sshd[8886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.137.237.36 Jan 16 20:12:37 host sshd[8886]: Failed password for invalid user telnet from 118.137.237.36 port 58991 ssh2 Jan 16 20:12:37 host sshd[8886]: pam_unix(sshd:auth): check pass; user unknown Jan 16 20:12:39 host sshd[8886]: Failed password for invalid user telnet from 118.137.237.36 port 58991 ssh2 Jan 16 20:16:52 host sshd[9487]: Did not receive identification string from 39.98.229.135 port 56248 Jan 16 20:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=woodpeck user-2=wwwkapin user-3=disposeat user-4=remysagr user-5=wwwkmaorg user-6=pmcresources user-7=shalinijames user-8=wwwtestugo user-9=vfmassets user-10=wwwletsstalkfood user-11=straightcurve user-12=wwwevmhonda user-13=bonifacegroup user-14=mrsclean user-15=wwwnexidigital user-16=phmetals user-17=kottayamcalldriv user-18=palco123 user-19=gifterman user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=ugotscom user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 20:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TFLJFcgmstuq9FaH.~ Jan 16 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TFLJFcgmstuq9FaH.~' Jan 16 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TFLJFcgmstuq9FaH.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 20:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 20:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 20:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 20:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 20:29:13 host sshd[11522]: Connection reset by 68.183.14.38 port 20330 [preauth] Jan 16 20:35:01 host sshd[12266]: Invalid user bigipuser3 from 218.161.51.201 port 60954 Jan 16 20:35:01 host sshd[12266]: input_userauth_request: invalid user bigipuser3 [preauth] Jan 16 20:35:01 host sshd[12266]: pam_unix(sshd:auth): check pass; user unknown Jan 16 20:35:01 host sshd[12266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.161.51.201 Jan 16 20:35:02 host sshd[12264]: Invalid user support from 218.161.51.201 port 60934 Jan 16 20:35:02 host sshd[12264]: input_userauth_request: invalid user support [preauth] Jan 16 20:35:02 host sshd[12264]: pam_unix(sshd:auth): check pass; user unknown Jan 16 20:35:02 host sshd[12264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.161.51.201 Jan 16 20:35:03 host sshd[12266]: Failed password for invalid user bigipuser3 from 218.161.51.201 port 60954 ssh2 Jan 16 20:35:04 host sshd[12266]: pam_unix(sshd:auth): check pass; user unknown Jan 16 20:35:05 host sshd[12264]: Failed password for invalid user support from 218.161.51.201 port 60934 ssh2 Jan 16 20:35:06 host sshd[12266]: Failed password for invalid user bigipuser3 from 218.161.51.201 port 60954 ssh2 Jan 16 20:35:06 host sshd[12318]: Invalid user nathan from 107.189.30.59 port 53016 Jan 16 20:35:06 host sshd[12318]: input_userauth_request: invalid user nathan [preauth] Jan 16 20:35:06 host sshd[12318]: pam_unix(sshd:auth): check pass; user unknown Jan 16 20:35:06 host sshd[12318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 16 20:35:08 host sshd[12264]: Connection reset by 218.161.51.201 port 60934 [preauth] Jan 16 20:35:09 host sshd[12318]: Failed password for invalid user nathan from 107.189.30.59 port 53016 ssh2 Jan 16 20:35:09 host sshd[12318]: Connection closed by 107.189.30.59 port 53016 [preauth] Jan 16 20:43:39 host sshd[13385]: User root from 222.98.96.235 not allowed because not listed in AllowUsers Jan 16 20:43:39 host sshd[13385]: input_userauth_request: invalid user root [preauth] Jan 16 20:43:39 host unix_chkpwd[13390]: password check failed for user (root) Jan 16 20:43:39 host sshd[13385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.98.96.235 user=root Jan 16 20:43:39 host sshd[13385]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 20:43:40 host sshd[13385]: Failed password for invalid user root from 222.98.96.235 port 60089 ssh2 Jan 16 20:43:41 host unix_chkpwd[13393]: password check failed for user (root) Jan 16 20:43:41 host sshd[13385]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 20:43:43 host sshd[13385]: Failed password for invalid user root from 222.98.96.235 port 60089 ssh2 Jan 16 20:43:45 host unix_chkpwd[13396]: password check failed for user (root) Jan 16 20:43:45 host sshd[13385]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 20:43:47 host sshd[13385]: Failed password for invalid user root from 222.98.96.235 port 60089 ssh2 Jan 16 20:43:48 host unix_chkpwd[13400]: password check failed for user (root) Jan 16 20:43:48 host sshd[13385]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 20:43:49 host sshd[13385]: Failed password for invalid user root from 222.98.96.235 port 60089 ssh2 Jan 16 20:43:49 host sshd[13385]: Connection reset by 222.98.96.235 port 60089 [preauth] Jan 16 20:43:49 host sshd[13385]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.98.96.235 user=root Jan 16 20:43:49 host sshd[13385]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 16 20:57:12 host sshd[16358]: User root from 49.213.166.105 not allowed because not listed in AllowUsers Jan 16 20:57:12 host sshd[16358]: input_userauth_request: invalid user root [preauth] Jan 16 20:57:12 host unix_chkpwd[16371]: password check failed for user (root) Jan 16 20:57:12 host sshd[16358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.213.166.105 user=root Jan 16 20:57:12 host sshd[16358]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 20:57:14 host sshd[16358]: Failed password for invalid user root from 49.213.166.105 port 59598 ssh2 Jan 16 20:57:15 host unix_chkpwd[16380]: password check failed for user (root) Jan 16 20:57:15 host sshd[16358]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 20:57:17 host sshd[16358]: Failed password for invalid user root from 49.213.166.105 port 59598 ssh2 Jan 16 20:57:18 host unix_chkpwd[16390]: password check failed for user (root) Jan 16 20:57:18 host sshd[16358]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 20:57:20 host sshd[16358]: Failed password for invalid user root from 49.213.166.105 port 59598 ssh2 Jan 16 20:57:20 host unix_chkpwd[16397]: password check failed for user (root) Jan 16 20:57:20 host sshd[16358]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 20:57:23 host sshd[16358]: Failed password for invalid user root from 49.213.166.105 port 59598 ssh2 Jan 16 20:57:24 host sshd[16358]: Connection reset by 49.213.166.105 port 59598 [preauth] Jan 16 20:57:24 host sshd[16358]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.213.166.105 user=root Jan 16 20:57:24 host sshd[16358]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 16 21:10:02 host sshd[18737]: Invalid user fc from 194.110.203.109 port 42772 Jan 16 21:10:02 host sshd[18737]: input_userauth_request: invalid user fc [preauth] Jan 16 21:10:02 host sshd[18737]: pam_unix(sshd:auth): check pass; user unknown Jan 16 21:10:02 host sshd[18737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 21:10:04 host sshd[18737]: Failed password for invalid user fc from 194.110.203.109 port 42772 ssh2 Jan 16 21:10:07 host sshd[18737]: pam_unix(sshd:auth): check pass; user unknown Jan 16 21:10:09 host sshd[18737]: Failed password for invalid user fc from 194.110.203.109 port 42772 ssh2 Jan 16 21:10:12 host sshd[18737]: pam_unix(sshd:auth): check pass; user unknown Jan 16 21:10:14 host sshd[18737]: Failed password for invalid user fc from 194.110.203.109 port 42772 ssh2 Jan 16 21:10:17 host sshd[18737]: Connection closed by 194.110.203.109 port 42772 [preauth] Jan 16 21:10:17 host sshd[18737]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 21:19:43 host sshd[20377]: User root from 1.2.182.253 not allowed because not listed in AllowUsers Jan 16 21:19:43 host sshd[20377]: input_userauth_request: invalid user root [preauth] Jan 16 21:19:43 host unix_chkpwd[20382]: password check failed for user (root) Jan 16 21:19:43 host sshd[20377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.2.182.253 user=root Jan 16 21:19:43 host sshd[20377]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 21:19:44 host sshd[20377]: Failed password for invalid user root from 1.2.182.253 port 32889 ssh2 Jan 16 21:19:44 host unix_chkpwd[20385]: password check failed for user (root) Jan 16 21:19:44 host sshd[20377]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 21:19:46 host sshd[20377]: Failed password for invalid user root from 1.2.182.253 port 32889 ssh2 Jan 16 21:19:47 host unix_chkpwd[20389]: password check failed for user (root) Jan 16 21:19:47 host sshd[20377]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 21:19:49 host sshd[20377]: Failed password for invalid user root from 1.2.182.253 port 32889 ssh2 Jan 16 21:19:50 host unix_chkpwd[20393]: password check failed for user (root) Jan 16 21:19:50 host sshd[20377]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 21:19:52 host sshd[20377]: Failed password for invalid user root from 1.2.182.253 port 32889 ssh2 Jan 16 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 21:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 21:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=palco123 user-2=gifterman user-3=phmetals user-4=kottayamcalldriv user-5=mrsclean user-6=wwwnexidigital user-7=bonifacegroup user-8=wwwevmhonda user-9=wwwletsstalkfood user-10=straightcurve user-11=vfmassets user-12=shalinijames user-13=wwwtestugo user-14=pmcresources user-15=disposeat user-16=wwwkmaorg user-17=remysagr user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=wwwresourcehunte user-22=keralaholi user-23=wwwrmswll user-24=ugotscom user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 21:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 21:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iWPXxNrR3PeSUoMo.~ Jan 16 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iWPXxNrR3PeSUoMo.~' Jan 16 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iWPXxNrR3PeSUoMo.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 21:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 21:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 21:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 21:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 21:29:58 host sshd[22191]: User root from 116.241.207.248 not allowed because not listed in AllowUsers Jan 16 21:29:58 host sshd[22191]: input_userauth_request: invalid user root [preauth] Jan 16 21:29:58 host unix_chkpwd[22204]: password check failed for user (root) Jan 16 21:29:58 host sshd[22191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.241.207.248 user=root Jan 16 21:29:58 host sshd[22191]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 21:29:59 host sshd[22191]: Failed password for invalid user root from 116.241.207.248 port 57127 ssh2 Jan 16 21:30:00 host unix_chkpwd[22209]: password check failed for user (root) Jan 16 21:30:00 host sshd[22191]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 21:30:03 host sshd[22191]: Failed password for invalid user root from 116.241.207.248 port 57127 ssh2 Jan 16 21:30:03 host unix_chkpwd[22239]: password check failed for user (root) Jan 16 21:30:03 host sshd[22191]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 21:30:05 host sshd[22191]: Failed password for invalid user root from 116.241.207.248 port 57127 ssh2 Jan 16 21:30:06 host unix_chkpwd[22263]: password check failed for user (root) Jan 16 21:30:06 host sshd[22191]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 21:30:08 host sshd[22191]: Failed password for invalid user root from 116.241.207.248 port 57127 ssh2 Jan 16 21:34:10 host sshd[22907]: Invalid user Admin from 1.170.118.167 port 48608 Jan 16 21:34:10 host sshd[22907]: input_userauth_request: invalid user Admin [preauth] Jan 16 21:34:10 host sshd[22907]: pam_unix(sshd:auth): check pass; user unknown Jan 16 21:34:10 host sshd[22907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.170.118.167 Jan 16 21:34:11 host sshd[22907]: Failed password for invalid user Admin from 1.170.118.167 port 48608 ssh2 Jan 16 21:34:12 host sshd[22907]: pam_unix(sshd:auth): check pass; user unknown Jan 16 21:34:14 host sshd[22907]: Failed password for invalid user Admin from 1.170.118.167 port 48608 ssh2 Jan 16 21:34:15 host sshd[22907]: pam_unix(sshd:auth): check pass; user unknown Jan 16 21:34:17 host sshd[22907]: Failed password for invalid user Admin from 1.170.118.167 port 48608 ssh2 Jan 16 21:34:18 host sshd[22907]: pam_unix(sshd:auth): check pass; user unknown Jan 16 21:34:20 host sshd[22907]: Failed password for invalid user Admin from 1.170.118.167 port 48608 ssh2 Jan 16 21:34:21 host sshd[22907]: Failed password for invalid user Admin from 1.170.118.167 port 48608 ssh2 Jan 16 21:35:40 host sshd[23127]: User root from 112.187.236.253 not allowed because not listed in AllowUsers Jan 16 21:35:40 host sshd[23127]: input_userauth_request: invalid user root [preauth] Jan 16 21:35:40 host unix_chkpwd[23132]: password check failed for user (root) Jan 16 21:35:40 host sshd[23127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.187.236.253 user=root Jan 16 21:35:40 host sshd[23127]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 21:35:41 host sshd[23127]: Failed password for invalid user root from 112.187.236.253 port 61895 ssh2 Jan 16 21:35:42 host unix_chkpwd[23136]: password check failed for user (root) Jan 16 21:35:42 host sshd[23127]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 21:35:44 host sshd[23127]: Failed password for invalid user root from 112.187.236.253 port 61895 ssh2 Jan 16 21:35:44 host unix_chkpwd[23140]: password check failed for user (root) Jan 16 21:35:44 host sshd[23127]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 21:35:46 host sshd[23127]: Failed password for invalid user root from 112.187.236.253 port 61895 ssh2 Jan 16 21:35:47 host unix_chkpwd[23146]: password check failed for user (root) Jan 16 21:35:47 host sshd[23127]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 21:35:48 host sshd[23127]: Failed password for invalid user root from 112.187.236.253 port 61895 ssh2 Jan 16 21:35:49 host unix_chkpwd[23155]: password check failed for user (root) Jan 16 21:35:49 host sshd[23127]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 21:35:51 host sshd[23127]: Failed password for invalid user root from 112.187.236.253 port 61895 ssh2 Jan 16 21:35:51 host sshd[23127]: Connection reset by 112.187.236.253 port 61895 [preauth] Jan 16 21:35:51 host sshd[23127]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.187.236.253 user=root Jan 16 21:35:51 host sshd[23127]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 16 21:36:25 host sshd[23255]: Invalid user ubuntu from 220.135.144.200 port 60804 Jan 16 21:36:25 host sshd[23255]: input_userauth_request: invalid user ubuntu [preauth] Jan 16 21:36:25 host sshd[23255]: pam_unix(sshd:auth): check pass; user unknown Jan 16 21:36:25 host sshd[23255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.144.200 Jan 16 21:36:27 host sshd[23255]: Failed password for invalid user ubuntu from 220.135.144.200 port 60804 ssh2 Jan 16 21:36:27 host sshd[23255]: pam_unix(sshd:auth): check pass; user unknown Jan 16 21:36:29 host sshd[23255]: Failed password for invalid user ubuntu from 220.135.144.200 port 60804 ssh2 Jan 16 21:36:30 host sshd[23255]: pam_unix(sshd:auth): check pass; user unknown Jan 16 21:36:32 host sshd[23255]: Failed password for invalid user ubuntu from 220.135.144.200 port 60804 ssh2 Jan 16 21:36:33 host sshd[23255]: Failed password for invalid user ubuntu from 220.135.144.200 port 60804 ssh2 Jan 16 21:36:33 host sshd[23255]: Connection reset by 220.135.144.200 port 60804 [preauth] Jan 16 21:36:33 host sshd[23255]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.144.200 Jan 16 21:42:52 host sshd[24184]: Invalid user super from 121.168.34.211 port 37705 Jan 16 21:42:52 host sshd[24184]: input_userauth_request: invalid user super [preauth] Jan 16 21:42:52 host sshd[24184]: pam_unix(sshd:auth): check pass; user unknown Jan 16 21:42:52 host sshd[24184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.168.34.211 Jan 16 21:42:54 host sshd[24184]: Failed password for invalid user super from 121.168.34.211 port 37705 ssh2 Jan 16 21:42:56 host sshd[24184]: pam_unix(sshd:auth): check pass; user unknown Jan 16 21:42:58 host sshd[24184]: Failed password for invalid user super from 121.168.34.211 port 37705 ssh2 Jan 16 21:42:59 host sshd[24184]: pam_unix(sshd:auth): check pass; user unknown Jan 16 21:43:00 host sshd[24184]: Failed password for invalid user super from 121.168.34.211 port 37705 ssh2 Jan 16 21:58:59 host sshd[26618]: Invalid user role from 205.185.113.129 port 48892 Jan 16 21:58:59 host sshd[26618]: input_userauth_request: invalid user role [preauth] Jan 16 21:58:59 host sshd[26618]: pam_unix(sshd:auth): check pass; user unknown Jan 16 21:58:59 host sshd[26618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 16 21:59:01 host sshd[26618]: Failed password for invalid user role from 205.185.113.129 port 48892 ssh2 Jan 16 21:59:02 host sshd[26618]: Connection closed by 205.185.113.129 port 48892 [preauth] Jan 16 22:01:59 host sshd[27150]: User root from 59.126.160.54 not allowed because not listed in AllowUsers Jan 16 22:01:59 host sshd[27150]: input_userauth_request: invalid user root [preauth] Jan 16 22:01:59 host unix_chkpwd[27153]: password check failed for user (root) Jan 16 22:01:59 host sshd[27150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.160.54 user=root Jan 16 22:01:59 host sshd[27150]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 22:02:02 host sshd[27150]: Failed password for invalid user root from 59.126.160.54 port 59477 ssh2 Jan 16 22:02:02 host unix_chkpwd[27167]: password check failed for user (root) Jan 16 22:02:02 host sshd[27150]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 22:02:05 host sshd[27150]: Failed password for invalid user root from 59.126.160.54 port 59477 ssh2 Jan 16 22:02:05 host unix_chkpwd[27171]: password check failed for user (root) Jan 16 22:02:05 host sshd[27150]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 22:02:07 host sshd[27150]: Failed password for invalid user root from 59.126.160.54 port 59477 ssh2 Jan 16 22:02:08 host sshd[27150]: Connection reset by 59.126.160.54 port 59477 [preauth] Jan 16 22:02:08 host sshd[27150]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.160.54 user=root Jan 16 22:07:29 host sshd[28092]: Invalid user vadmin from 221.164.246.171 port 59553 Jan 16 22:07:29 host sshd[28092]: input_userauth_request: invalid user vadmin [preauth] Jan 16 22:07:29 host sshd[28092]: pam_unix(sshd:auth): check pass; user unknown Jan 16 22:07:29 host sshd[28092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.164.246.171 Jan 16 22:07:32 host sshd[28092]: Failed password for invalid user vadmin from 221.164.246.171 port 59553 ssh2 Jan 16 22:07:33 host sshd[28092]: pam_unix(sshd:auth): check pass; user unknown Jan 16 22:07:35 host sshd[28092]: Failed password for invalid user vadmin from 221.164.246.171 port 59553 ssh2 Jan 16 22:07:36 host sshd[28092]: Failed password for invalid user vadmin from 221.164.246.171 port 59553 ssh2 Jan 16 22:10:31 host sshd[28550]: Invalid user admin from 114.35.46.40 port 49709 Jan 16 22:10:31 host sshd[28550]: input_userauth_request: invalid user admin [preauth] Jan 16 22:10:31 host sshd[28550]: pam_unix(sshd:auth): check pass; user unknown Jan 16 22:10:31 host sshd[28550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.46.40 Jan 16 22:10:33 host sshd[28550]: Failed password for invalid user admin from 114.35.46.40 port 49709 ssh2 Jan 16 22:10:34 host sshd[28550]: Failed password for invalid user admin from 114.35.46.40 port 49709 ssh2 Jan 16 22:10:35 host sshd[28550]: pam_unix(sshd:auth): check pass; user unknown Jan 16 22:10:37 host sshd[28550]: Failed password for invalid user admin from 114.35.46.40 port 49709 ssh2 Jan 16 22:10:38 host sshd[28550]: pam_unix(sshd:auth): check pass; user unknown Jan 16 22:10:40 host sshd[28550]: Failed password for invalid user admin from 114.35.46.40 port 49709 ssh2 Jan 16 22:10:40 host sshd[28550]: pam_unix(sshd:auth): check pass; user unknown Jan 16 22:10:42 host sshd[28550]: Failed password for invalid user admin from 114.35.46.40 port 49709 ssh2 Jan 16 22:17:16 host sshd[29571]: Invalid user user from 195.226.194.242 port 31982 Jan 16 22:17:16 host sshd[29571]: input_userauth_request: invalid user user [preauth] Jan 16 22:17:16 host sshd[29571]: pam_unix(sshd:auth): check pass; user unknown Jan 16 22:17:16 host sshd[29571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 16 22:17:19 host sshd[29571]: Failed password for invalid user user from 195.226.194.242 port 31982 ssh2 Jan 16 22:17:19 host sshd[29571]: Received disconnect from 195.226.194.242 port 31982:11: Bye Bye [preauth] Jan 16 22:17:19 host sshd[29571]: Disconnected from 195.226.194.242 port 31982 [preauth] Jan 16 22:18:33 host sshd[29899]: User root from 121.158.230.180 not allowed because not listed in AllowUsers Jan 16 22:18:33 host sshd[29899]: input_userauth_request: invalid user root [preauth] Jan 16 22:18:33 host unix_chkpwd[29908]: password check failed for user (root) Jan 16 22:18:33 host sshd[29899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.158.230.180 user=root Jan 16 22:18:33 host sshd[29899]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 22:18:36 host sshd[29899]: Failed password for invalid user root from 121.158.230.180 port 63153 ssh2 Jan 16 22:18:37 host unix_chkpwd[29915]: password check failed for user (root) Jan 16 22:18:37 host sshd[29899]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 22:18:38 host sshd[29899]: Failed password for invalid user root from 121.158.230.180 port 63153 ssh2 Jan 16 22:18:39 host unix_chkpwd[29920]: password check failed for user (root) Jan 16 22:18:39 host sshd[29899]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 22:18:41 host sshd[29899]: Failed password for invalid user root from 121.158.230.180 port 63153 ssh2 Jan 16 22:18:42 host unix_chkpwd[29932]: password check failed for user (root) Jan 16 22:18:42 host sshd[29899]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 22:18:44 host sshd[29899]: Failed password for invalid user root from 121.158.230.180 port 63153 ssh2 Jan 16 22:20:23 host sshd[30181]: Invalid user nginx from 97.65.33.11 port 52674 Jan 16 22:20:23 host sshd[30181]: input_userauth_request: invalid user nginx [preauth] Jan 16 22:20:23 host sshd[30181]: pam_unix(sshd:auth): check pass; user unknown Jan 16 22:20:23 host sshd[30181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.65.33.11 Jan 16 22:20:24 host sshd[30181]: Failed password for invalid user nginx from 97.65.33.11 port 52674 ssh2 Jan 16 22:20:27 host sshd[30181]: pam_unix(sshd:auth): check pass; user unknown Jan 16 22:20:29 host sshd[30181]: Failed password for invalid user nginx from 97.65.33.11 port 52674 ssh2 Jan 16 22:20:30 host sshd[30181]: Connection reset by 97.65.33.11 port 52674 [preauth] Jan 16 22:20:30 host sshd[30181]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.65.33.11 Jan 16 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=wwwtestugo user-3=shalinijames user-4=pmcresources user-5=disposeat user-6=wwwkmaorg user-7=remysagr user-8=woodpeck user-9=wwwkapin user-10=gifterman user-11=palco123 user-12=phmetals user-13=kottayamcalldriv user-14=wwwnexidigital user-15=mrsclean user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 22:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XXJbKNY16RmLr9fS.~ Jan 16 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XXJbKNY16RmLr9fS.~' Jan 16 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XXJbKNY16RmLr9fS.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 22:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 22:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 22:22:14 host sshd[30644]: User root from 59.30.158.7 not allowed because not listed in AllowUsers Jan 16 22:22:14 host sshd[30644]: input_userauth_request: invalid user root [preauth] Jan 16 22:22:14 host unix_chkpwd[30648]: password check failed for user (root) Jan 16 22:22:14 host sshd[30644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.30.158.7 user=root Jan 16 22:22:14 host sshd[30644]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 22:22:16 host sshd[30644]: Failed password for invalid user root from 59.30.158.7 port 46098 ssh2 Jan 16 22:22:16 host sshd[30644]: Connection reset by 59.30.158.7 port 46098 [preauth] Jan 16 22:33:06 host sshd[32289]: Invalid user app from 202.163.119.238 port 40317 Jan 16 22:33:06 host sshd[32289]: input_userauth_request: invalid user app [preauth] Jan 16 22:33:06 host sshd[32289]: pam_unix(sshd:auth): check pass; user unknown Jan 16 22:33:06 host sshd[32289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.163.119.238 Jan 16 22:33:07 host sshd[32289]: Failed password for invalid user app from 202.163.119.238 port 40317 ssh2 Jan 16 22:33:08 host sshd[32289]: Received disconnect from 202.163.119.238 port 40317:11: Bye Bye [preauth] Jan 16 22:33:08 host sshd[32289]: Disconnected from 202.163.119.238 port 40317 [preauth] Jan 16 22:38:05 host sshd[669]: Invalid user gpadmin from 202.163.119.238 port 52799 Jan 16 22:38:05 host sshd[669]: input_userauth_request: invalid user gpadmin [preauth] Jan 16 22:38:05 host sshd[669]: pam_unix(sshd:auth): check pass; user unknown Jan 16 22:38:05 host sshd[669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.163.119.238 Jan 16 22:38:07 host sshd[669]: Failed password for invalid user gpadmin from 202.163.119.238 port 52799 ssh2 Jan 16 22:38:07 host sshd[669]: Received disconnect from 202.163.119.238 port 52799:11: Bye Bye [preauth] Jan 16 22:38:07 host sshd[669]: Disconnected from 202.163.119.238 port 52799 [preauth] Jan 16 22:39:23 host sshd[863]: Invalid user wordpress from 202.163.119.238 port 56485 Jan 16 22:39:23 host sshd[863]: input_userauth_request: invalid user wordpress [preauth] Jan 16 22:39:23 host sshd[863]: pam_unix(sshd:auth): check pass; user unknown Jan 16 22:39:23 host sshd[863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.163.119.238 Jan 16 22:39:25 host sshd[863]: Failed password for invalid user wordpress from 202.163.119.238 port 56485 ssh2 Jan 16 22:39:25 host sshd[863]: Received disconnect from 202.163.119.238 port 56485:11: Bye Bye [preauth] Jan 16 22:39:25 host sshd[863]: Disconnected from 202.163.119.238 port 56485 [preauth] Jan 16 22:53:03 host sshd[3102]: User root from 146.190.116.107 not allowed because not listed in AllowUsers Jan 16 22:53:03 host sshd[3102]: input_userauth_request: invalid user root [preauth] Jan 16 22:53:03 host unix_chkpwd[3108]: password check failed for user (root) Jan 16 22:53:03 host sshd[3102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.116.107 user=root Jan 16 22:53:03 host sshd[3102]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 22:53:05 host sshd[3102]: Failed password for invalid user root from 146.190.116.107 port 60984 ssh2 Jan 16 22:53:05 host sshd[3102]: Received disconnect from 146.190.116.107 port 60984:11: Bye Bye [preauth] Jan 16 22:53:05 host sshd[3102]: Disconnected from 146.190.116.107 port 60984 [preauth] Jan 16 22:53:07 host sshd[3111]: User root from 146.190.116.107 not allowed because not listed in AllowUsers Jan 16 22:53:07 host sshd[3111]: input_userauth_request: invalid user root [preauth] Jan 16 22:53:07 host unix_chkpwd[3139]: password check failed for user (root) Jan 16 22:53:07 host sshd[3111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.116.107 user=root Jan 16 22:53:07 host sshd[3111]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 22:53:09 host sshd[3111]: Failed password for invalid user root from 146.190.116.107 port 38544 ssh2 Jan 16 22:53:09 host sshd[3111]: Received disconnect from 146.190.116.107 port 38544:11: Bye Bye [preauth] Jan 16 22:53:09 host sshd[3111]: Disconnected from 146.190.116.107 port 38544 [preauth] Jan 16 22:58:16 host sshd[4199]: Invalid user fd from 194.110.203.109 port 36052 Jan 16 22:58:16 host sshd[4199]: input_userauth_request: invalid user fd [preauth] Jan 16 22:58:16 host sshd[4199]: pam_unix(sshd:auth): check pass; user unknown Jan 16 22:58:16 host sshd[4199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 22:58:18 host sshd[4199]: Failed password for invalid user fd from 194.110.203.109 port 36052 ssh2 Jan 16 22:58:21 host sshd[4199]: pam_unix(sshd:auth): check pass; user unknown Jan 16 22:58:23 host sshd[4199]: Failed password for invalid user fd from 194.110.203.109 port 36052 ssh2 Jan 16 22:58:27 host sshd[4199]: pam_unix(sshd:auth): check pass; user unknown Jan 16 22:58:29 host sshd[4199]: Failed password for invalid user fd from 194.110.203.109 port 36052 ssh2 Jan 16 22:58:32 host sshd[4199]: Connection closed by 194.110.203.109 port 36052 [preauth] Jan 16 22:58:32 host sshd[4199]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 16 23:00:57 host sshd[4587]: Invalid user admin from 180.214.182.147 port 55065 Jan 16 23:00:57 host sshd[4587]: input_userauth_request: invalid user admin [preauth] Jan 16 23:00:57 host sshd[4587]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:00:57 host sshd[4587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.214.182.147 Jan 16 23:00:58 host sshd[4587]: Failed password for invalid user admin from 180.214.182.147 port 55065 ssh2 Jan 16 23:00:59 host sshd[4587]: Failed password for invalid user admin from 180.214.182.147 port 55065 ssh2 Jan 16 23:01:00 host sshd[4587]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:01:02 host sshd[4587]: Failed password for invalid user admin from 180.214.182.147 port 55065 ssh2 Jan 16 23:01:04 host sshd[4587]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:01:06 host sshd[4587]: Failed password for invalid user admin from 180.214.182.147 port 55065 ssh2 Jan 16 23:01:07 host sshd[4587]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:01:10 host sshd[4587]: Failed password for invalid user admin from 180.214.182.147 port 55065 ssh2 Jan 16 23:02:42 host sshd[4919]: User sshd from 194.169.175.102 not allowed because not listed in AllowUsers Jan 16 23:02:42 host sshd[4919]: input_userauth_request: invalid user sshd [preauth] Jan 16 23:02:42 host unix_chkpwd[4922]: password check failed for user (sshd) Jan 16 23:02:42 host sshd[4919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=sshd Jan 16 23:02:42 host sshd[4919]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sshd" Jan 16 23:02:43 host sshd[4919]: Failed password for invalid user sshd from 194.169.175.102 port 62929 ssh2 Jan 16 23:02:43 host sshd[4919]: Received disconnect from 194.169.175.102 port 62929:11: Client disconnecting normally [preauth] Jan 16 23:02:43 host sshd[4919]: Disconnected from 194.169.175.102 port 62929 [preauth] Jan 16 23:04:18 host sshd[5083]: User root from 115.69.119.76 not allowed because not listed in AllowUsers Jan 16 23:04:18 host sshd[5083]: input_userauth_request: invalid user root [preauth] Jan 16 23:04:18 host unix_chkpwd[5087]: password check failed for user (root) Jan 16 23:04:18 host sshd[5083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.69.119.76 user=root Jan 16 23:04:18 host sshd[5083]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:04:19 host sshd[5083]: Failed password for invalid user root from 115.69.119.76 port 40280 ssh2 Jan 16 23:04:20 host unix_chkpwd[5091]: password check failed for user (root) Jan 16 23:04:20 host sshd[5083]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:04:22 host sshd[5083]: Failed password for invalid user root from 115.69.119.76 port 40280 ssh2 Jan 16 23:04:23 host unix_chkpwd[5095]: password check failed for user (root) Jan 16 23:04:23 host sshd[5083]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:04:25 host sshd[5083]: Failed password for invalid user root from 115.69.119.76 port 40280 ssh2 Jan 16 23:04:25 host unix_chkpwd[5097]: password check failed for user (root) Jan 16 23:04:25 host sshd[5083]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:04:26 host sshd[5083]: Failed password for invalid user root from 115.69.119.76 port 40280 ssh2 Jan 16 23:04:27 host unix_chkpwd[5162]: password check failed for user (root) Jan 16 23:04:27 host sshd[5083]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:04:30 host sshd[5083]: Failed password for invalid user root from 115.69.119.76 port 40280 ssh2 Jan 16 23:04:37 host sshd[5263]: Invalid user mcserver from 117.131.215.49 port 52471 Jan 16 23:04:37 host sshd[5263]: input_userauth_request: invalid user mcserver [preauth] Jan 16 23:04:37 host sshd[5263]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:04:37 host sshd[5263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.131.215.49 Jan 16 23:04:39 host sshd[5263]: Failed password for invalid user mcserver from 117.131.215.49 port 52471 ssh2 Jan 16 23:04:39 host sshd[5263]: Received disconnect from 117.131.215.49 port 52471:11: Bye Bye [preauth] Jan 16 23:04:39 host sshd[5263]: Disconnected from 117.131.215.49 port 52471 [preauth] Jan 16 23:04:58 host sshd[5294]: Invalid user maint from 134.209.200.13 port 56152 Jan 16 23:04:58 host sshd[5294]: input_userauth_request: invalid user maint [preauth] Jan 16 23:04:58 host sshd[5294]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:04:58 host sshd[5294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.200.13 Jan 16 23:05:00 host sshd[5294]: Failed password for invalid user maint from 134.209.200.13 port 56152 ssh2 Jan 16 23:05:00 host sshd[5294]: Received disconnect from 134.209.200.13 port 56152:11: Bye Bye [preauth] Jan 16 23:05:00 host sshd[5294]: Disconnected from 134.209.200.13 port 56152 [preauth] Jan 16 23:05:15 host sshd[5342]: User root from 159.89.115.75 not allowed because not listed in AllowUsers Jan 16 23:05:15 host sshd[5342]: input_userauth_request: invalid user root [preauth] Jan 16 23:05:15 host unix_chkpwd[5345]: password check failed for user (root) Jan 16 23:05:15 host sshd[5342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.115.75 user=root Jan 16 23:05:15 host sshd[5342]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:05:17 host sshd[5342]: Failed password for invalid user root from 159.89.115.75 port 51866 ssh2 Jan 16 23:05:18 host sshd[5342]: Received disconnect from 159.89.115.75 port 51866:11: Bye Bye [preauth] Jan 16 23:05:18 host sshd[5342]: Disconnected from 159.89.115.75 port 51866 [preauth] Jan 16 23:08:01 host sshd[5711]: User root from 185.74.4.17 not allowed because not listed in AllowUsers Jan 16 23:08:01 host sshd[5711]: input_userauth_request: invalid user root [preauth] Jan 16 23:08:01 host unix_chkpwd[5722]: password check failed for user (root) Jan 16 23:08:01 host sshd[5711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.17 user=root Jan 16 23:08:01 host sshd[5711]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:08:04 host sshd[5711]: Failed password for invalid user root from 185.74.4.17 port 48477 ssh2 Jan 16 23:08:04 host sshd[5711]: Received disconnect from 185.74.4.17 port 48477:11: Bye Bye [preauth] Jan 16 23:08:04 host sshd[5711]: Disconnected from 185.74.4.17 port 48477 [preauth] Jan 16 23:08:50 host sshd[5811]: Invalid user nginx from 220.125.235.116 port 61136 Jan 16 23:08:50 host sshd[5811]: input_userauth_request: invalid user nginx [preauth] Jan 16 23:08:50 host sshd[5811]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:08:50 host sshd[5811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.125.235.116 Jan 16 23:08:52 host sshd[5811]: Failed password for invalid user nginx from 220.125.235.116 port 61136 ssh2 Jan 16 23:08:53 host sshd[5811]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:08:55 host sshd[5811]: Failed password for invalid user nginx from 220.125.235.116 port 61136 ssh2 Jan 16 23:08:56 host sshd[5811]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:08:58 host sshd[5811]: Failed password for invalid user nginx from 220.125.235.116 port 61136 ssh2 Jan 16 23:08:59 host sshd[5811]: Failed password for invalid user nginx from 220.125.235.116 port 61136 ssh2 Jan 16 23:09:00 host sshd[5811]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:09:02 host sshd[5811]: Failed password for invalid user nginx from 220.125.235.116 port 61136 ssh2 Jan 16 23:09:37 host sshd[6056]: Invalid user developer from 190.99.178.165 port 55096 Jan 16 23:09:37 host sshd[6056]: input_userauth_request: invalid user developer [preauth] Jan 16 23:09:37 host sshd[6056]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:09:37 host sshd[6056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.99.178.165 Jan 16 23:09:39 host sshd[6056]: Failed password for invalid user developer from 190.99.178.165 port 55096 ssh2 Jan 16 23:09:39 host sshd[6056]: Received disconnect from 190.99.178.165 port 55096:11: Bye Bye [preauth] Jan 16 23:09:39 host sshd[6056]: Disconnected from 190.99.178.165 port 55096 [preauth] Jan 16 23:10:53 host sshd[6208]: User root from 134.209.200.13 not allowed because not listed in AllowUsers Jan 16 23:10:53 host sshd[6208]: input_userauth_request: invalid user root [preauth] Jan 16 23:10:53 host unix_chkpwd[6217]: password check failed for user (root) Jan 16 23:10:53 host sshd[6208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.200.13 user=root Jan 16 23:10:53 host sshd[6208]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:10:55 host sshd[6208]: Failed password for invalid user root from 134.209.200.13 port 46382 ssh2 Jan 16 23:10:55 host sshd[6208]: Received disconnect from 134.209.200.13 port 46382:11: Bye Bye [preauth] Jan 16 23:10:55 host sshd[6208]: Disconnected from 134.209.200.13 port 46382 [preauth] Jan 16 23:11:51 host sshd[6355]: User root from 159.89.115.75 not allowed because not listed in AllowUsers Jan 16 23:11:51 host sshd[6355]: input_userauth_request: invalid user root [preauth] Jan 16 23:11:51 host unix_chkpwd[6358]: password check failed for user (root) Jan 16 23:11:51 host sshd[6355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.115.75 user=root Jan 16 23:11:51 host sshd[6355]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:11:53 host sshd[6355]: Failed password for invalid user root from 159.89.115.75 port 52752 ssh2 Jan 16 23:11:53 host sshd[6355]: Received disconnect from 159.89.115.75 port 52752:11: Bye Bye [preauth] Jan 16 23:11:53 host sshd[6355]: Disconnected from 159.89.115.75 port 52752 [preauth] Jan 16 23:11:53 host sshd[6360]: Invalid user jboss from 190.99.178.165 port 60180 Jan 16 23:11:53 host sshd[6360]: input_userauth_request: invalid user jboss [preauth] Jan 16 23:11:53 host sshd[6360]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:11:53 host sshd[6360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.99.178.165 Jan 16 23:11:55 host sshd[6360]: Failed password for invalid user jboss from 190.99.178.165 port 60180 ssh2 Jan 16 23:11:56 host sshd[6360]: Received disconnect from 190.99.178.165 port 60180:11: Bye Bye [preauth] Jan 16 23:11:56 host sshd[6360]: Disconnected from 190.99.178.165 port 60180 [preauth] Jan 16 23:12:11 host sshd[6436]: Invalid user minecraft from 185.74.4.17 port 41232 Jan 16 23:12:11 host sshd[6436]: input_userauth_request: invalid user minecraft [preauth] Jan 16 23:12:11 host sshd[6436]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:12:11 host sshd[6436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.17 Jan 16 23:12:14 host sshd[6436]: Failed password for invalid user minecraft from 185.74.4.17 port 41232 ssh2 Jan 16 23:12:14 host sshd[6436]: Received disconnect from 185.74.4.17 port 41232:11: Bye Bye [preauth] Jan 16 23:12:14 host sshd[6436]: Disconnected from 185.74.4.17 port 41232 [preauth] Jan 16 23:13:16 host sshd[6599]: User root from 190.99.178.165 not allowed because not listed in AllowUsers Jan 16 23:13:16 host sshd[6599]: input_userauth_request: invalid user root [preauth] Jan 16 23:13:16 host unix_chkpwd[6604]: password check failed for user (root) Jan 16 23:13:16 host sshd[6599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.99.178.165 user=root Jan 16 23:13:16 host sshd[6599]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:13:18 host sshd[6599]: Failed password for invalid user root from 190.99.178.165 port 58966 ssh2 Jan 16 23:13:19 host sshd[6599]: Received disconnect from 190.99.178.165 port 58966:11: Bye Bye [preauth] Jan 16 23:13:19 host sshd[6599]: Disconnected from 190.99.178.165 port 58966 [preauth] Jan 16 23:13:31 host sshd[6683]: Did not receive identification string from 206.189.23.129 port 61000 Jan 16 23:15:52 host sshd[7048]: Invalid user terraria from 117.131.215.49 port 35861 Jan 16 23:15:52 host sshd[7048]: input_userauth_request: invalid user terraria [preauth] Jan 16 23:15:52 host sshd[7048]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:15:52 host sshd[7048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.131.215.49 Jan 16 23:15:54 host sshd[7048]: Failed password for invalid user terraria from 117.131.215.49 port 35861 ssh2 Jan 16 23:15:54 host sshd[7048]: Received disconnect from 117.131.215.49 port 35861:11: Bye Bye [preauth] Jan 16 23:15:54 host sshd[7048]: Disconnected from 117.131.215.49 port 35861 [preauth] Jan 16 23:16:29 host sshd[7124]: User root from 117.131.215.49 not allowed because not listed in AllowUsers Jan 16 23:16:29 host sshd[7124]: input_userauth_request: invalid user root [preauth] Jan 16 23:16:29 host unix_chkpwd[7149]: password check failed for user (root) Jan 16 23:16:29 host sshd[7124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.131.215.49 user=root Jan 16 23:16:29 host sshd[7124]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:16:31 host sshd[7124]: Failed password for invalid user root from 117.131.215.49 port 39553 ssh2 Jan 16 23:16:31 host sshd[7124]: Received disconnect from 117.131.215.49 port 39553:11: Bye Bye [preauth] Jan 16 23:16:31 host sshd[7124]: Disconnected from 117.131.215.49 port 39553 [preauth] Jan 16 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 23:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 16 23:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=shalinijames user-3=wwwtestugo user-4=pmcresources user-5=remysagr user-6=disposeat user-7=wwwkmaorg user-8=woodpeck user-9=wwwkapin user-10=palco123 user-11=gifterman user-12=kottayamcalldriv user-13=phmetals user-14=mrsclean user-15=wwwnexidigital user-16=bonifacegroup user-17=wwwevmhonda user-18=wwwletsstalkfood user-19=straightcurve user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 16 23:21:08 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 16 23:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 23:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-udsuIN4wgOvY9tyf.~ Jan 16 23:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-udsuIN4wgOvY9tyf.~' Jan 16 23:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-udsuIN4wgOvY9tyf.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 16 23:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 16 23:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 16 23:21:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 16 23:21:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 16 23:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 16 23:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 16 23:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 16 23:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 16 23:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 16 23:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 16 23:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 16 23:40:21 host sshd[10788]: User root from 223.204.8.94 not allowed because not listed in AllowUsers Jan 16 23:40:21 host sshd[10788]: input_userauth_request: invalid user root [preauth] Jan 16 23:40:21 host unix_chkpwd[10792]: password check failed for user (root) Jan 16 23:40:21 host sshd[10788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.204.8.94 user=root Jan 16 23:40:21 host sshd[10788]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:40:23 host sshd[10788]: Failed password for invalid user root from 223.204.8.94 port 56705 ssh2 Jan 16 23:40:23 host unix_chkpwd[10795]: password check failed for user (root) Jan 16 23:40:23 host sshd[10788]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:40:25 host sshd[10788]: Failed password for invalid user root from 223.204.8.94 port 56705 ssh2 Jan 16 23:40:28 host unix_chkpwd[10800]: password check failed for user (root) Jan 16 23:40:28 host sshd[10788]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:40:30 host sshd[10788]: Failed password for invalid user root from 223.204.8.94 port 56705 ssh2 Jan 16 23:40:30 host unix_chkpwd[10824]: password check failed for user (root) Jan 16 23:40:30 host sshd[10788]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:40:31 host sshd[10788]: Failed password for invalid user root from 223.204.8.94 port 56705 ssh2 Jan 16 23:49:23 host sshd[12039]: Invalid user admin from 195.226.194.242 port 31954 Jan 16 23:49:23 host sshd[12039]: input_userauth_request: invalid user admin [preauth] Jan 16 23:49:23 host sshd[12039]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:49:23 host sshd[12039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 16 23:49:25 host sshd[12046]: Did not receive identification string from 45.119.132.191 port 49122 Jan 16 23:49:25 host sshd[12039]: Failed password for invalid user admin from 195.226.194.242 port 31954 ssh2 Jan 16 23:49:25 host sshd[12039]: Received disconnect from 195.226.194.242 port 31954:11: Bye Bye [preauth] Jan 16 23:49:25 host sshd[12039]: Disconnected from 195.226.194.242 port 31954 [preauth] Jan 16 23:49:25 host sshd[12047]: Invalid user oracle from 45.119.132.191 port 50650 Jan 16 23:49:25 host sshd[12047]: input_userauth_request: invalid user oracle [preauth] Jan 16 23:49:26 host sshd[12047]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:49:26 host sshd[12047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.119.132.191 Jan 16 23:49:28 host sshd[12047]: Failed password for invalid user oracle from 45.119.132.191 port 50650 ssh2 Jan 16 23:49:28 host sshd[12047]: Connection closed by 45.119.132.191 port 50650 [preauth] Jan 16 23:53:41 host sshd[12699]: Invalid user david from 157.245.82.165 port 60984 Jan 16 23:53:41 host sshd[12699]: input_userauth_request: invalid user david [preauth] Jan 16 23:53:41 host sshd[12699]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:53:41 host sshd[12699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.82.165 Jan 16 23:53:43 host sshd[12699]: Failed password for invalid user david from 157.245.82.165 port 60984 ssh2 Jan 16 23:53:43 host sshd[12699]: Received disconnect from 157.245.82.165 port 60984:11: Bye Bye [preauth] Jan 16 23:53:43 host sshd[12699]: Disconnected from 157.245.82.165 port 60984 [preauth] Jan 16 23:54:44 host sshd[12824]: Invalid user airflow from 220.86.68.33 port 55088 Jan 16 23:54:44 host sshd[12824]: input_userauth_request: invalid user airflow [preauth] Jan 16 23:54:44 host sshd[12824]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:54:44 host sshd[12824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.86.68.33 Jan 16 23:54:46 host sshd[12824]: Failed password for invalid user airflow from 220.86.68.33 port 55088 ssh2 Jan 16 23:54:46 host sshd[12824]: Received disconnect from 220.86.68.33 port 55088:11: Bye Bye [preauth] Jan 16 23:54:46 host sshd[12824]: Disconnected from 220.86.68.33 port 55088 [preauth] Jan 16 23:55:18 host sshd[12933]: User root from 181.224.94.54 not allowed because not listed in AllowUsers Jan 16 23:55:18 host sshd[12933]: input_userauth_request: invalid user root [preauth] Jan 16 23:55:18 host unix_chkpwd[12936]: password check failed for user (root) Jan 16 23:55:18 host sshd[12933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.224.94.54 user=root Jan 16 23:55:18 host sshd[12933]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:55:19 host sshd[12933]: Failed password for invalid user root from 181.224.94.54 port 16807 ssh2 Jan 16 23:55:20 host sshd[12933]: Received disconnect from 181.224.94.54 port 16807:11: Bye Bye [preauth] Jan 16 23:55:20 host sshd[12933]: Disconnected from 181.224.94.54 port 16807 [preauth] Jan 16 23:55:33 host sshd[12984]: Invalid user mike from 40.127.156.222 port 10792 Jan 16 23:55:33 host sshd[12984]: input_userauth_request: invalid user mike [preauth] Jan 16 23:55:33 host sshd[12984]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:55:33 host sshd[12984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.127.156.222 Jan 16 23:55:35 host sshd[12984]: Failed password for invalid user mike from 40.127.156.222 port 10792 ssh2 Jan 16 23:55:36 host sshd[12984]: Received disconnect from 40.127.156.222 port 10792:11: Bye Bye [preauth] Jan 16 23:55:36 host sshd[12984]: Disconnected from 40.127.156.222 port 10792 [preauth] Jan 16 23:56:05 host sshd[13143]: Invalid user gns3 from 206.189.130.158 port 49130 Jan 16 23:56:05 host sshd[13143]: input_userauth_request: invalid user gns3 [preauth] Jan 16 23:56:05 host sshd[13143]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:56:05 host sshd[13143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.130.158 Jan 16 23:56:07 host sshd[13143]: Failed password for invalid user gns3 from 206.189.130.158 port 49130 ssh2 Jan 16 23:56:07 host sshd[13143]: Received disconnect from 206.189.130.158 port 49130:11: Bye Bye [preauth] Jan 16 23:56:07 host sshd[13143]: Disconnected from 206.189.130.158 port 49130 [preauth] Jan 16 23:56:44 host sshd[13228]: Invalid user solr from 185.74.5.184 port 38366 Jan 16 23:56:44 host sshd[13228]: input_userauth_request: invalid user solr [preauth] Jan 16 23:56:44 host sshd[13228]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:56:44 host sshd[13228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.5.184 Jan 16 23:56:46 host sshd[13228]: Failed password for invalid user solr from 185.74.5.184 port 38366 ssh2 Jan 16 23:56:47 host sshd[13228]: Received disconnect from 185.74.5.184 port 38366:11: Bye Bye [preauth] Jan 16 23:56:47 host sshd[13228]: Disconnected from 185.74.5.184 port 38366 [preauth] Jan 16 23:57:38 host sshd[13367]: Invalid user sonar from 45.127.88.139 port 50760 Jan 16 23:57:38 host sshd[13367]: input_userauth_request: invalid user sonar [preauth] Jan 16 23:57:38 host sshd[13367]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:57:38 host sshd[13367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.127.88.139 Jan 16 23:57:40 host sshd[13367]: Failed password for invalid user sonar from 45.127.88.139 port 50760 ssh2 Jan 16 23:57:40 host sshd[13367]: Received disconnect from 45.127.88.139 port 50760:11: Bye Bye [preauth] Jan 16 23:57:40 host sshd[13367]: Disconnected from 45.127.88.139 port 50760 [preauth] Jan 16 23:57:57 host sshd[13396]: Invalid user zabbix from 220.86.68.33 port 37738 Jan 16 23:57:57 host sshd[13396]: input_userauth_request: invalid user zabbix [preauth] Jan 16 23:57:57 host sshd[13396]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:57:57 host sshd[13396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.86.68.33 Jan 16 23:58:00 host sshd[13396]: Failed password for invalid user zabbix from 220.86.68.33 port 37738 ssh2 Jan 16 23:58:00 host sshd[13396]: Received disconnect from 220.86.68.33 port 37738:11: Bye Bye [preauth] Jan 16 23:58:00 host sshd[13396]: Disconnected from 220.86.68.33 port 37738 [preauth] Jan 16 23:58:38 host sshd[13485]: Invalid user pos from 35.199.73.100 port 33668 Jan 16 23:58:38 host sshd[13485]: input_userauth_request: invalid user pos [preauth] Jan 16 23:58:38 host sshd[13485]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:58:38 host sshd[13485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.199.73.100 Jan 16 23:58:40 host sshd[13485]: Failed password for invalid user pos from 35.199.73.100 port 33668 ssh2 Jan 16 23:58:40 host sshd[13485]: Received disconnect from 35.199.73.100 port 33668:11: Bye Bye [preauth] Jan 16 23:58:40 host sshd[13485]: Disconnected from 35.199.73.100 port 33668 [preauth] Jan 16 23:58:59 host sshd[13506]: User root from 157.245.82.165 not allowed because not listed in AllowUsers Jan 16 23:58:59 host sshd[13506]: input_userauth_request: invalid user root [preauth] Jan 16 23:58:59 host unix_chkpwd[13509]: password check failed for user (root) Jan 16 23:58:59 host sshd[13506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.82.165 user=root Jan 16 23:58:59 host sshd[13506]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:59:01 host sshd[13506]: Failed password for invalid user root from 157.245.82.165 port 50534 ssh2 Jan 16 23:59:02 host sshd[13506]: Received disconnect from 157.245.82.165 port 50534:11: Bye Bye [preauth] Jan 16 23:59:02 host sshd[13506]: Disconnected from 157.245.82.165 port 50534 [preauth] Jan 16 23:59:05 host sshd[13530]: Invalid user deamon from 154.209.4.95 port 35314 Jan 16 23:59:05 host sshd[13530]: input_userauth_request: invalid user deamon [preauth] Jan 16 23:59:05 host sshd[13530]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:59:05 host sshd[13530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.209.4.95 Jan 16 23:59:08 host sshd[13530]: Failed password for invalid user deamon from 154.209.4.95 port 35314 ssh2 Jan 16 23:59:08 host sshd[13530]: Received disconnect from 154.209.4.95 port 35314:11: Bye Bye [preauth] Jan 16 23:59:08 host sshd[13530]: Disconnected from 154.209.4.95 port 35314 [preauth] Jan 16 23:59:09 host sshd[13567]: Invalid user bitnami from 40.127.156.222 port 10792 Jan 16 23:59:09 host sshd[13567]: input_userauth_request: invalid user bitnami [preauth] Jan 16 23:59:09 host sshd[13567]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:59:09 host sshd[13567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.127.156.222 Jan 16 23:59:11 host sshd[13567]: Failed password for invalid user bitnami from 40.127.156.222 port 10792 ssh2 Jan 16 23:59:11 host sshd[13567]: Received disconnect from 40.127.156.222 port 10792:11: Bye Bye [preauth] Jan 16 23:59:11 host sshd[13567]: Disconnected from 40.127.156.222 port 10792 [preauth] Jan 16 23:59:23 host sshd[13586]: Invalid user deamon from 181.224.94.54 port 40197 Jan 16 23:59:23 host sshd[13586]: input_userauth_request: invalid user deamon [preauth] Jan 16 23:59:23 host sshd[13586]: pam_unix(sshd:auth): check pass; user unknown Jan 16 23:59:23 host sshd[13586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.224.94.54 Jan 16 23:59:25 host sshd[13586]: Failed password for invalid user deamon from 181.224.94.54 port 40197 ssh2 Jan 16 23:59:26 host sshd[13586]: Received disconnect from 181.224.94.54 port 40197:11: Bye Bye [preauth] Jan 16 23:59:26 host sshd[13586]: Disconnected from 181.224.94.54 port 40197 [preauth] Jan 16 23:59:48 host sshd[13667]: User root from 220.86.68.33 not allowed because not listed in AllowUsers Jan 16 23:59:48 host sshd[13667]: input_userauth_request: invalid user root [preauth] Jan 16 23:59:48 host unix_chkpwd[13670]: password check failed for user (root) Jan 16 23:59:48 host sshd[13667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.86.68.33 user=root Jan 16 23:59:48 host sshd[13667]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:59:49 host sshd[13667]: Failed password for invalid user root from 220.86.68.33 port 36126 ssh2 Jan 16 23:59:49 host sshd[13667]: Received disconnect from 220.86.68.33 port 36126:11: Bye Bye [preauth] Jan 16 23:59:49 host sshd[13667]: Disconnected from 220.86.68.33 port 36126 [preauth] Jan 16 23:59:49 host sshd[13672]: User root from 185.74.5.184 not allowed because not listed in AllowUsers Jan 16 23:59:49 host sshd[13672]: input_userauth_request: invalid user root [preauth] Jan 16 23:59:49 host unix_chkpwd[13675]: password check failed for user (root) Jan 16 23:59:49 host sshd[13672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.5.184 user=root Jan 16 23:59:49 host sshd[13672]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 16 23:59:51 host sshd[13672]: Failed password for invalid user root from 185.74.5.184 port 44990 ssh2 Jan 16 23:59:51 host sshd[13672]: Received disconnect from 185.74.5.184 port 44990:11: Bye Bye [preauth] Jan 16 23:59:51 host sshd[13672]: Disconnected from 185.74.5.184 port 44990 [preauth] Jan 17 00:00:09 host sshd[13846]: Invalid user david from 45.127.88.139 port 32938 Jan 17 00:00:09 host sshd[13846]: input_userauth_request: invalid user david [preauth] Jan 17 00:00:09 host sshd[13846]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:00:09 host sshd[13846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.127.88.139 Jan 17 00:00:10 host sshd[13846]: Failed password for invalid user david from 45.127.88.139 port 32938 ssh2 Jan 17 00:00:11 host sshd[13846]: Received disconnect from 45.127.88.139 port 32938:11: Bye Bye [preauth] Jan 17 00:00:11 host sshd[13846]: Disconnected from 45.127.88.139 port 32938 [preauth] Jan 17 00:00:17 host sshd[13853]: Invalid user testing from 40.127.156.222 port 10792 Jan 17 00:00:17 host sshd[13853]: input_userauth_request: invalid user testing [preauth] Jan 17 00:00:17 host sshd[13853]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:00:17 host sshd[13853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.127.156.222 Jan 17 00:00:19 host sshd[13853]: Failed password for invalid user testing from 40.127.156.222 port 10792 ssh2 Jan 17 00:00:19 host sshd[13853]: Received disconnect from 40.127.156.222 port 10792:11: Bye Bye [preauth] Jan 17 00:00:19 host sshd[13853]: Disconnected from 40.127.156.222 port 10792 [preauth] Jan 17 00:00:20 host sshd[13859]: User root from 206.189.130.158 not allowed because not listed in AllowUsers Jan 17 00:00:20 host sshd[13859]: input_userauth_request: invalid user root [preauth] Jan 17 00:00:20 host unix_chkpwd[13861]: password check failed for user (root) Jan 17 00:00:20 host sshd[13859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.130.158 user=root Jan 17 00:00:20 host sshd[13859]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 00:00:21 host sshd[13859]: Failed password for invalid user root from 206.189.130.158 port 33732 ssh2 Jan 17 00:00:21 host sshd[13859]: Received disconnect from 206.189.130.158 port 33732:11: Bye Bye [preauth] Jan 17 00:00:21 host sshd[13859]: Disconnected from 206.189.130.158 port 33732 [preauth] Jan 17 00:00:37 host sshd[13897]: User root from 35.199.73.100 not allowed because not listed in AllowUsers Jan 17 00:00:37 host sshd[13897]: input_userauth_request: invalid user root [preauth] Jan 17 00:00:37 host unix_chkpwd[13902]: password check failed for user (root) Jan 17 00:00:37 host sshd[13897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.199.73.100 user=root Jan 17 00:00:37 host sshd[13897]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 00:00:38 host sshd[13897]: Failed password for invalid user root from 35.199.73.100 port 34772 ssh2 Jan 17 00:00:39 host sshd[13897]: Received disconnect from 35.199.73.100 port 34772:11: Bye Bye [preauth] Jan 17 00:00:39 host sshd[13897]: Disconnected from 35.199.73.100 port 34772 [preauth] Jan 17 00:01:19 host sshd[14049]: User root from 154.209.4.95 not allowed because not listed in AllowUsers Jan 17 00:01:19 host sshd[14049]: input_userauth_request: invalid user root [preauth] Jan 17 00:01:19 host unix_chkpwd[14051]: password check failed for user (root) Jan 17 00:01:19 host sshd[14049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.209.4.95 user=root Jan 17 00:01:19 host sshd[14049]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 00:01:21 host sshd[14049]: Failed password for invalid user root from 154.209.4.95 port 33190 ssh2 Jan 17 00:01:21 host sshd[14049]: Received disconnect from 154.209.4.95 port 33190:11: Bye Bye [preauth] Jan 17 00:01:21 host sshd[14049]: Disconnected from 154.209.4.95 port 33190 [preauth] Jan 17 00:01:22 host sshd[14094]: User root from 45.127.88.139 not allowed because not listed in AllowUsers Jan 17 00:01:22 host sshd[14094]: input_userauth_request: invalid user root [preauth] Jan 17 00:01:22 host unix_chkpwd[14097]: password check failed for user (root) Jan 17 00:01:22 host sshd[14094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.127.88.139 user=root Jan 17 00:01:22 host sshd[14094]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 00:01:23 host sshd[14094]: Failed password for invalid user root from 45.127.88.139 port 54486 ssh2 Jan 17 00:01:23 host sshd[14094]: Received disconnect from 45.127.88.139 port 54486:11: Bye Bye [preauth] Jan 17 00:01:23 host sshd[14094]: Disconnected from 45.127.88.139 port 54486 [preauth] Jan 17 00:01:28 host sshd[14103]: Invalid user samba from 40.127.156.222 port 10792 Jan 17 00:01:28 host sshd[14103]: input_userauth_request: invalid user samba [preauth] Jan 17 00:01:28 host sshd[14103]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:01:28 host sshd[14103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.127.156.222 Jan 17 00:01:30 host sshd[14103]: Failed password for invalid user samba from 40.127.156.222 port 10792 ssh2 Jan 17 00:01:30 host sshd[14158]: Invalid user bitwarden from 206.189.130.158 port 55378 Jan 17 00:01:30 host sshd[14158]: input_userauth_request: invalid user bitwarden [preauth] Jan 17 00:01:30 host sshd[14158]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:01:30 host sshd[14158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.130.158 Jan 17 00:01:30 host sshd[14103]: Received disconnect from 40.127.156.222 port 10792:11: Bye Bye [preauth] Jan 17 00:01:30 host sshd[14103]: Disconnected from 40.127.156.222 port 10792 [preauth] Jan 17 00:01:32 host sshd[14158]: Failed password for invalid user bitwarden from 206.189.130.158 port 55378 ssh2 Jan 17 00:01:32 host sshd[14158]: Received disconnect from 206.189.130.158 port 55378:11: Bye Bye [preauth] Jan 17 00:01:32 host sshd[14158]: Disconnected from 206.189.130.158 port 55378 [preauth] Jan 17 00:01:55 host sshd[14219]: Invalid user gitlab-runner from 125.229.10.158 port 33220 Jan 17 00:01:55 host sshd[14219]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 17 00:01:55 host sshd[14219]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:01:55 host sshd[14219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.10.158 Jan 17 00:01:57 host sshd[14219]: Failed password for invalid user gitlab-runner from 125.229.10.158 port 33220 ssh2 Jan 17 00:01:57 host sshd[14219]: Connection reset by 125.229.10.158 port 33220 [preauth] Jan 17 00:02:05 host sshd[14248]: User mysql from 35.199.73.100 not allowed because not listed in AllowUsers Jan 17 00:02:05 host sshd[14248]: input_userauth_request: invalid user mysql [preauth] Jan 17 00:02:05 host unix_chkpwd[14251]: password check failed for user (mysql) Jan 17 00:02:05 host sshd[14248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.199.73.100 user=mysql Jan 17 00:02:05 host sshd[14248]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 17 00:02:07 host sshd[14248]: Failed password for invalid user mysql from 35.199.73.100 port 33210 ssh2 Jan 17 00:02:07 host sshd[14248]: Received disconnect from 35.199.73.100 port 33210:11: Bye Bye [preauth] Jan 17 00:02:07 host sshd[14248]: Disconnected from 35.199.73.100 port 33210 [preauth] Jan 17 00:02:41 host sshd[14338]: User root from 154.209.4.95 not allowed because not listed in AllowUsers Jan 17 00:02:41 host sshd[14338]: input_userauth_request: invalid user root [preauth] Jan 17 00:02:41 host unix_chkpwd[14341]: password check failed for user (root) Jan 17 00:02:41 host sshd[14338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.209.4.95 user=root Jan 17 00:02:41 host sshd[14338]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 00:02:43 host sshd[14338]: Failed password for invalid user root from 154.209.4.95 port 54866 ssh2 Jan 17 00:02:43 host sshd[14343]: Invalid user system from 40.127.156.222 port 10792 Jan 17 00:02:43 host sshd[14343]: input_userauth_request: invalid user system [preauth] Jan 17 00:02:43 host sshd[14343]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:02:43 host sshd[14343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.127.156.222 Jan 17 00:02:43 host sshd[14338]: Received disconnect from 154.209.4.95 port 54866:11: Bye Bye [preauth] Jan 17 00:02:43 host sshd[14338]: Disconnected from 154.209.4.95 port 54866 [preauth] Jan 17 00:02:45 host sshd[14343]: Failed password for invalid user system from 40.127.156.222 port 10792 ssh2 Jan 17 00:02:45 host sshd[14343]: Received disconnect from 40.127.156.222 port 10792:11: Bye Bye [preauth] Jan 17 00:02:45 host sshd[14343]: Disconnected from 40.127.156.222 port 10792 [preauth] Jan 17 00:18:07 host sshd[17367]: Invalid user user from 121.133.205.146 port 64786 Jan 17 00:18:07 host sshd[17367]: input_userauth_request: invalid user user [preauth] Jan 17 00:18:07 host sshd[17367]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:18:07 host sshd[17367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.133.205.146 Jan 17 00:18:09 host sshd[17367]: Failed password for invalid user user from 121.133.205.146 port 64786 ssh2 Jan 17 00:18:10 host sshd[17367]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:18:12 host sshd[17367]: Failed password for invalid user user from 121.133.205.146 port 64786 ssh2 Jan 17 00:18:14 host sshd[17367]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:18:16 host sshd[17367]: Failed password for invalid user user from 121.133.205.146 port 64786 ssh2 Jan 17 00:18:17 host sshd[17367]: Connection reset by 121.133.205.146 port 64786 [preauth] Jan 17 00:18:17 host sshd[17367]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.133.205.146 Jan 17 00:19:24 host sshd[17500]: Connection reset by 180.50.241.202 port 60203 [preauth] Jan 17 00:20:14 host sshd[17717]: Invalid user ubnt from 195.226.194.242 port 20862 Jan 17 00:20:14 host sshd[17717]: input_userauth_request: invalid user ubnt [preauth] Jan 17 00:20:15 host sshd[17717]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:20:15 host sshd[17717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 17 00:20:16 host sshd[17717]: Failed password for invalid user ubnt from 195.226.194.242 port 20862 ssh2 Jan 17 00:20:17 host sshd[17717]: Received disconnect from 195.226.194.242 port 20862:11: Bye Bye [preauth] Jan 17 00:20:17 host sshd[17717]: Disconnected from 195.226.194.242 port 20862 [preauth] Jan 17 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 00:22:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=wwwrmswll user-10=keralaholi user-11=wwwresourcehunte user-12=disposeat user-13=remysagr user-14=wwwkmaorg user-15=woodpeck user-16=wwwkapin user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=wwwletsstalkfood user-24=straightcurve user-25=kottayamcalldriv user-26=phmetals user-27=gifterman user-28=palco123 user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 00:22:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XJTsbz1hrVdmH4rk.~ Jan 17 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XJTsbz1hrVdmH4rk.~' Jan 17 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-XJTsbz1hrVdmH4rk.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 00:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 00:22:03 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 00:22:03 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 00:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 00:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 00:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 00:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 00:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 00:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 00:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 00:24:23 host sshd[18419]: Invalid user admin from 68.21.145.132 port 51598 Jan 17 00:24:23 host sshd[18419]: input_userauth_request: invalid user admin [preauth] Jan 17 00:24:23 host sshd[18419]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:24:23 host sshd[18419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.21.145.132 Jan 17 00:24:24 host sshd[18419]: Failed password for invalid user admin from 68.21.145.132 port 51598 ssh2 Jan 17 00:24:24 host sshd[18419]: Received disconnect from 68.21.145.132 port 51598:11: Bye Bye [preauth] Jan 17 00:24:24 host sshd[18419]: Disconnected from 68.21.145.132 port 51598 [preauth] Jan 17 00:26:13 host sshd[18884]: Did not receive identification string from 121.4.200.213 port 56546 Jan 17 00:26:14 host sshd[18886]: User mysql from 121.4.200.213 not allowed because not listed in AllowUsers Jan 17 00:26:14 host sshd[18885]: User root from 121.4.200.213 not allowed because not listed in AllowUsers Jan 17 00:26:14 host sshd[18886]: input_userauth_request: invalid user mysql [preauth] Jan 17 00:26:14 host sshd[18885]: input_userauth_request: invalid user root [preauth] Jan 17 00:26:14 host sshd[18887]: User root from 121.4.200.213 not allowed because not listed in AllowUsers Jan 17 00:26:14 host sshd[18887]: input_userauth_request: invalid user root [preauth] Jan 17 00:26:14 host sshd[18888]: Invalid user steam from 121.4.200.213 port 37012 Jan 17 00:26:14 host sshd[18888]: input_userauth_request: invalid user steam [preauth] Jan 17 00:26:14 host sshd[18892]: Invalid user admin from 121.4.200.213 port 37018 Jan 17 00:26:14 host sshd[18891]: Invalid user student from 121.4.200.213 port 37014 Jan 17 00:26:14 host sshd[18890]: User root from 121.4.200.213 not allowed because not listed in AllowUsers Jan 17 00:26:14 host sshd[18893]: User root from 121.4.200.213 not allowed because not listed in AllowUsers Jan 17 00:26:14 host sshd[18891]: input_userauth_request: invalid user student [preauth] Jan 17 00:26:14 host sshd[18890]: input_userauth_request: invalid user root [preauth] Jan 17 00:26:14 host sshd[18893]: input_userauth_request: invalid user root [preauth] Jan 17 00:26:14 host sshd[18892]: input_userauth_request: invalid user admin [preauth] Jan 17 00:26:14 host sshd[18895]: Invalid user admin from 121.4.200.213 port 37002 Jan 17 00:26:14 host sshd[18895]: input_userauth_request: invalid user admin [preauth] Jan 17 00:26:14 host sshd[18901]: Invalid user admin from 121.4.200.213 port 36986 Jan 17 00:26:14 host sshd[18901]: input_userauth_request: invalid user admin [preauth] Jan 17 00:26:14 host sshd[18913]: User root from 121.4.200.213 not allowed because not listed in AllowUsers Jan 17 00:26:14 host sshd[18913]: input_userauth_request: invalid user root [preauth] Jan 17 00:26:15 host unix_chkpwd[18917]: password check failed for user (mysql) Jan 17 00:26:15 host sshd[18886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 user=mysql Jan 17 00:26:15 host sshd[18886]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 17 00:26:15 host unix_chkpwd[18918]: password check failed for user (root) Jan 17 00:26:15 host sshd[18885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 user=root Jan 17 00:26:15 host sshd[18885]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 00:26:15 host sshd[18888]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:26:15 host sshd[18888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 Jan 17 00:26:15 host sshd[18891]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:26:15 host sshd[18891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 Jan 17 00:26:15 host sshd[18892]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:26:15 host sshd[18892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 Jan 17 00:26:15 host unix_chkpwd[18919]: password check failed for user (root) Jan 17 00:26:15 host sshd[18887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 user=root Jan 17 00:26:15 host sshd[18887]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 00:26:15 host sshd[18895]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:26:15 host sshd[18895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 Jan 17 00:26:15 host unix_chkpwd[18921]: password check failed for user (root) Jan 17 00:26:15 host sshd[18890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 user=root Jan 17 00:26:15 host sshd[18890]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 00:26:15 host unix_chkpwd[18920]: password check failed for user (root) Jan 17 00:26:15 host sshd[18893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 user=root Jan 17 00:26:15 host sshd[18893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 00:26:15 host sshd[18898]: User root from 121.4.200.213 not allowed because not listed in AllowUsers Jan 17 00:26:15 host sshd[18898]: input_userauth_request: invalid user root [preauth] Jan 17 00:26:15 host sshd[18901]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:26:15 host sshd[18901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 Jan 17 00:26:15 host sshd[18905]: Invalid user git from 121.4.200.213 port 37008 Jan 17 00:26:15 host sshd[18905]: input_userauth_request: invalid user git [preauth] Jan 17 00:26:15 host unix_chkpwd[18923]: password check failed for user (root) Jan 17 00:26:15 host sshd[18913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 user=root Jan 17 00:26:15 host sshd[18913]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 00:26:15 host unix_chkpwd[18924]: password check failed for user (root) Jan 17 00:26:15 host sshd[18898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 user=root Jan 17 00:26:15 host sshd[18898]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 00:26:15 host sshd[18905]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:26:15 host sshd[18905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 Jan 17 00:26:16 host sshd[18906]: Invalid user user from 121.4.200.213 port 36988 Jan 17 00:26:16 host sshd[18906]: input_userauth_request: invalid user user [preauth] Jan 17 00:26:16 host sshd[18907]: User centos from 121.4.200.213 not allowed because not listed in AllowUsers Jan 17 00:26:16 host sshd[18907]: input_userauth_request: invalid user centos [preauth] Jan 17 00:26:16 host sshd[18906]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:26:16 host sshd[18906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 Jan 17 00:26:16 host unix_chkpwd[18942]: password check failed for user (centos) Jan 17 00:26:16 host sshd[18907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 user=centos Jan 17 00:26:16 host sshd[18886]: Failed password for invalid user mysql from 121.4.200.213 port 37020 ssh2 Jan 17 00:26:16 host sshd[18885]: Failed password for invalid user root from 121.4.200.213 port 36992 ssh2 Jan 17 00:26:17 host sshd[18886]: Connection closed by 121.4.200.213 port 37020 [preauth] Jan 17 00:26:17 host sshd[18885]: Connection closed by 121.4.200.213 port 36992 [preauth] Jan 17 00:26:17 host sshd[18888]: Failed password for invalid user steam from 121.4.200.213 port 37012 ssh2 Jan 17 00:26:17 host sshd[18891]: Failed password for invalid user student from 121.4.200.213 port 37014 ssh2 Jan 17 00:26:17 host sshd[18892]: Failed password for invalid user admin from 121.4.200.213 port 37018 ssh2 Jan 17 00:26:17 host sshd[18887]: Failed password for invalid user root from 121.4.200.213 port 37004 ssh2 Jan 17 00:26:17 host sshd[18895]: Failed password for invalid user admin from 121.4.200.213 port 37002 ssh2 Jan 17 00:26:17 host sshd[18890]: Failed password for invalid user root from 121.4.200.213 port 36996 ssh2 Jan 17 00:26:17 host sshd[18893]: Failed password for invalid user root from 121.4.200.213 port 37010 ssh2 Jan 17 00:26:17 host sshd[18901]: Failed password for invalid user admin from 121.4.200.213 port 36986 ssh2 Jan 17 00:26:17 host sshd[18913]: Failed password for invalid user root from 121.4.200.213 port 36998 ssh2 Jan 17 00:26:17 host sshd[18888]: Connection closed by 121.4.200.213 port 37012 [preauth] Jan 17 00:26:17 host sshd[18891]: Connection closed by 121.4.200.213 port 37014 [preauth] Jan 17 00:26:17 host sshd[18887]: Connection closed by 121.4.200.213 port 37004 [preauth] Jan 17 00:26:17 host sshd[18892]: Connection closed by 121.4.200.213 port 37018 [preauth] Jan 17 00:26:17 host sshd[18895]: Connection closed by 121.4.200.213 port 37002 [preauth] Jan 17 00:26:17 host sshd[18890]: Connection closed by 121.4.200.213 port 36996 [preauth] Jan 17 00:26:17 host sshd[18893]: Connection closed by 121.4.200.213 port 37010 [preauth] Jan 17 00:26:17 host sshd[18901]: Connection closed by 121.4.200.213 port 36986 [preauth] Jan 17 00:26:17 host sshd[18898]: Failed password for invalid user root from 121.4.200.213 port 36990 ssh2 Jan 17 00:26:17 host sshd[18905]: Failed password for invalid user git from 121.4.200.213 port 37008 ssh2 Jan 17 00:26:17 host sshd[18925]: User root from 121.4.200.213 not allowed because not listed in AllowUsers Jan 17 00:26:17 host sshd[18925]: input_userauth_request: invalid user root [preauth] Jan 17 00:26:17 host sshd[18926]: Invalid user esuser from 121.4.200.213 port 37058 Jan 17 00:26:17 host sshd[18926]: input_userauth_request: invalid user esuser [preauth] Jan 17 00:26:17 host sshd[18913]: Connection closed by 121.4.200.213 port 36998 [preauth] Jan 17 00:26:17 host sshd[18898]: Connection closed by 121.4.200.213 port 36990 [preauth] Jan 17 00:26:18 host sshd[18905]: Connection closed by 121.4.200.213 port 37008 [preauth] Jan 17 00:26:18 host unix_chkpwd[18954]: password check failed for user (root) Jan 17 00:26:18 host sshd[18925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 user=root Jan 17 00:26:18 host sshd[18925]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 00:26:18 host sshd[18926]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:26:18 host sshd[18926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 Jan 17 00:26:18 host sshd[18906]: Failed password for invalid user user from 121.4.200.213 port 36988 ssh2 Jan 17 00:26:18 host sshd[18934]: User root from 121.4.200.213 not allowed because not listed in AllowUsers Jan 17 00:26:18 host sshd[18934]: input_userauth_request: invalid user root [preauth] Jan 17 00:26:18 host sshd[18907]: Failed password for invalid user centos from 121.4.200.213 port 36994 ssh2 Jan 17 00:26:18 host sshd[18935]: Invalid user testuser from 121.4.200.213 port 37056 Jan 17 00:26:18 host sshd[18935]: input_userauth_request: invalid user testuser [preauth] Jan 17 00:26:18 host sshd[18944]: User root from 121.4.200.213 not allowed because not listed in AllowUsers Jan 17 00:26:18 host sshd[18944]: input_userauth_request: invalid user root [preauth] Jan 17 00:26:18 host sshd[18945]: Invalid user admin from 121.4.200.213 port 37050 Jan 17 00:26:18 host sshd[18945]: input_userauth_request: invalid user admin [preauth] Jan 17 00:26:18 host sshd[18906]: Connection closed by 121.4.200.213 port 36988 [preauth] Jan 17 00:26:18 host sshd[18948]: User root from 121.4.200.213 not allowed because not listed in AllowUsers Jan 17 00:26:18 host sshd[18948]: input_userauth_request: invalid user root [preauth] Jan 17 00:26:18 host sshd[18907]: Connection closed by 121.4.200.213 port 36994 [preauth] Jan 17 00:26:18 host unix_chkpwd[18962]: password check failed for user (root) Jan 17 00:26:18 host sshd[18934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 user=root Jan 17 00:26:18 host sshd[18934]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 00:26:19 host sshd[18935]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:26:19 host sshd[18935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 Jan 17 00:26:19 host unix_chkpwd[18963]: password check failed for user (root) Jan 17 00:26:19 host sshd[18944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 user=root Jan 17 00:26:19 host sshd[18944]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 00:26:19 host sshd[18945]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:26:19 host sshd[18945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 Jan 17 00:26:19 host unix_chkpwd[18965]: password check failed for user (root) Jan 17 00:26:19 host sshd[18948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.200.213 user=root Jan 17 00:26:19 host sshd[18948]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 00:26:19 host sshd[18925]: Failed password for invalid user root from 121.4.200.213 port 37040 ssh2 Jan 17 00:26:19 host sshd[18926]: Failed password for invalid user esuser from 121.4.200.213 port 37058 ssh2 Jan 17 00:26:19 host sshd[18931]: Invalid user www from 121.4.200.213 port 37022 Jan 17 00:26:19 host sshd[18931]: input_userauth_request: invalid user www [preauth] Jan 17 00:26:19 host sshd[18925]: Connection closed by 121.4.200.213 port 37040 [preauth] Jan 17 00:26:19 host sshd[18926]: Connection closed by 121.4.200.213 port 37058 [preauth] Jan 17 00:26:20 host sshd[18934]: Failed password for invalid user root from 121.4.200.213 port 37038 ssh2 Jan 17 00:26:20 host sshd[18935]: Failed password for invalid user testuser from 121.4.200.213 port 37056 ssh2 Jan 17 00:26:20 host sshd[18944]: Failed password for invalid user root from 121.4.200.213 port 37042 ssh2 Jan 17 00:26:20 host sshd[18945]: Failed password for invalid user admin from 121.4.200.213 port 37050 ssh2 Jan 17 00:26:20 host sshd[18948]: Failed password for invalid user root from 121.4.200.213 port 37028 ssh2 Jan 17 00:27:10 host sshd[19101]: Connection closed by 45.79.181.94 port 42342 [preauth] Jan 17 00:27:12 host sshd[19104]: Connection closed by 45.79.181.94 port 42344 [preauth] Jan 17 00:27:13 host sshd[19109]: Connection closed by 45.79.181.94 port 42354 [preauth] Jan 17 00:28:01 host sshd[19240]: User root from 68.21.145.132 not allowed because not listed in AllowUsers Jan 17 00:28:01 host sshd[19240]: input_userauth_request: invalid user root [preauth] Jan 17 00:28:01 host unix_chkpwd[19243]: password check failed for user (root) Jan 17 00:28:01 host sshd[19240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.21.145.132 user=root Jan 17 00:28:01 host sshd[19240]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 00:28:02 host sshd[19240]: Failed password for invalid user root from 68.21.145.132 port 42528 ssh2 Jan 17 00:28:03 host sshd[19240]: Received disconnect from 68.21.145.132 port 42528:11: Bye Bye [preauth] Jan 17 00:28:03 host sshd[19240]: Disconnected from 68.21.145.132 port 42528 [preauth] Jan 17 00:33:59 host sshd[20269]: Connection reset by 52.124.103.152 port 62397 [preauth] Jan 17 00:37:56 host sshd[20803]: Invalid user user from 122.117.94.46 port 50767 Jan 17 00:37:56 host sshd[20803]: input_userauth_request: invalid user user [preauth] Jan 17 00:37:56 host sshd[20803]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:37:56 host sshd[20803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.94.46 Jan 17 00:37:58 host sshd[20803]: Failed password for invalid user user from 122.117.94.46 port 50767 ssh2 Jan 17 00:37:59 host sshd[20803]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:38:01 host sshd[20803]: Failed password for invalid user user from 122.117.94.46 port 50767 ssh2 Jan 17 00:38:03 host sshd[20803]: Connection reset by 122.117.94.46 port 50767 [preauth] Jan 17 00:38:03 host sshd[20803]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.94.46 Jan 17 00:39:19 host sshd[21098]: Invalid user user from 75.151.249.214 port 63624 Jan 17 00:39:19 host sshd[21098]: input_userauth_request: invalid user user [preauth] Jan 17 00:39:19 host sshd[21098]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:39:19 host sshd[21098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.151.249.214 Jan 17 00:39:21 host sshd[21098]: Failed password for invalid user user from 75.151.249.214 port 63624 ssh2 Jan 17 00:39:28 host sshd[21098]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:39:30 host sshd[21098]: Failed password for invalid user user from 75.151.249.214 port 63624 ssh2 Jan 17 00:39:34 host sshd[21098]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:39:36 host sshd[21098]: Failed password for invalid user user from 75.151.249.214 port 63624 ssh2 Jan 17 00:39:41 host sshd[21098]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:39:43 host sshd[21098]: Failed password for invalid user user from 75.151.249.214 port 63624 ssh2 Jan 17 00:41:55 host sshd[21613]: Invalid user fe from 194.110.203.109 port 43804 Jan 17 00:41:55 host sshd[21613]: input_userauth_request: invalid user fe [preauth] Jan 17 00:41:55 host sshd[21613]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:41:55 host sshd[21613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 00:41:57 host sshd[21613]: Failed password for invalid user fe from 194.110.203.109 port 43804 ssh2 Jan 17 00:42:00 host sshd[21613]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:42:03 host sshd[21613]: Failed password for invalid user fe from 194.110.203.109 port 43804 ssh2 Jan 17 00:42:06 host sshd[21613]: pam_unix(sshd:auth): check pass; user unknown Jan 17 00:42:08 host sshd[21613]: Failed password for invalid user fe from 194.110.203.109 port 43804 ssh2 Jan 17 00:42:11 host sshd[21613]: Connection closed by 194.110.203.109 port 43804 [preauth] Jan 17 00:42:11 host sshd[21613]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 01:17:38 host sshd[26727]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 17 01:17:38 host sshd[26727]: input_userauth_request: invalid user root [preauth] Jan 17 01:17:38 host unix_chkpwd[26730]: password check failed for user (root) Jan 17 01:17:38 host sshd[26727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 17 01:17:38 host sshd[26727]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 01:17:40 host sshd[26727]: Failed password for invalid user root from 195.226.194.242 port 25598 ssh2 Jan 17 01:17:40 host sshd[26727]: Received disconnect from 195.226.194.242 port 25598:11: Bye Bye [preauth] Jan 17 01:17:40 host sshd[26727]: Disconnected from 195.226.194.242 port 25598 [preauth] Jan 17 01:17:55 host sshd[26784]: Did not receive identification string from 106.13.29.110 port 44606 Jan 17 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=a2zgroup user-5=dartsimp user-6=wwwpmcresource user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=ugotscom user-11=travelboniface user-12=woodpeck user-13=wwwkapin user-14=disposeat user-15=remysagr user-16=wwwkmaorg user-17=pmcresources user-18=vfmassets user-19=shalinijames user-20=wwwtestugo user-21=straightcurve user-22=wwwletsstalkfood user-23=bonifacegroup user-24=wwwevmhonda user-25=mrsclean user-26=wwwnexidigital user-27=palco123 user-28=gifterman user-29=kottayamcalldriv user-30=phmetals feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 01:22:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HsjGVEzcEhR9VS16.~ Jan 17 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HsjGVEzcEhR9VS16.~' Jan 17 01:22:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-HsjGVEzcEhR9VS16.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 01:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 01:22:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 01:22:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 01:22:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 01:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 01:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 01:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 01:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 01:22:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:22:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 01:22:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 01:22:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 01:23:10 host sshd[27684]: User root from 59.4.255.220 not allowed because not listed in AllowUsers Jan 17 01:23:10 host sshd[27684]: input_userauth_request: invalid user root [preauth] Jan 17 01:23:10 host unix_chkpwd[27695]: password check failed for user (root) Jan 17 01:23:10 host sshd[27684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.4.255.220 user=root Jan 17 01:23:10 host sshd[27684]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 01:23:13 host sshd[27684]: Failed password for invalid user root from 59.4.255.220 port 46820 ssh2 Jan 17 01:23:14 host unix_chkpwd[27701]: password check failed for user (root) Jan 17 01:23:14 host sshd[27684]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 01:23:16 host sshd[27684]: Failed password for invalid user root from 59.4.255.220 port 46820 ssh2 Jan 17 01:23:16 host unix_chkpwd[27704]: password check failed for user (root) Jan 17 01:23:16 host sshd[27684]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 01:23:18 host sshd[27684]: Failed password for invalid user root from 59.4.255.220 port 46820 ssh2 Jan 17 01:23:19 host unix_chkpwd[27708]: password check failed for user (root) Jan 17 01:23:19 host sshd[27684]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 01:23:21 host sshd[27684]: Failed password for invalid user root from 59.4.255.220 port 46820 ssh2 Jan 17 01:23:25 host sshd[27743]: Invalid user dale from 107.189.30.59 port 39476 Jan 17 01:23:25 host sshd[27743]: input_userauth_request: invalid user dale [preauth] Jan 17 01:23:25 host sshd[27743]: pam_unix(sshd:auth): check pass; user unknown Jan 17 01:23:25 host sshd[27743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 17 01:23:26 host sshd[27743]: Failed password for invalid user dale from 107.189.30.59 port 39476 ssh2 Jan 17 01:23:27 host sshd[27743]: Connection closed by 107.189.30.59 port 39476 [preauth] Jan 17 01:26:48 host sshd[28219]: User root from 162.252.102.236 not allowed because not listed in AllowUsers Jan 17 01:26:48 host sshd[28219]: input_userauth_request: invalid user root [preauth] Jan 17 01:26:48 host unix_chkpwd[28223]: password check failed for user (root) Jan 17 01:26:48 host sshd[28219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.252.102.236 user=root Jan 17 01:26:48 host sshd[28219]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 01:26:50 host sshd[28219]: Failed password for invalid user root from 162.252.102.236 port 37768 ssh2 Jan 17 01:26:51 host sshd[28219]: Connection reset by 162.252.102.236 port 37768 [preauth] Jan 17 01:42:57 host sshd[30314]: Did not receive identification string from 198.23.174.250 port 41614 Jan 17 01:43:06 host sshd[30337]: Invalid user user from 222.118.129.96 port 61392 Jan 17 01:43:06 host sshd[30337]: input_userauth_request: invalid user user [preauth] Jan 17 01:43:06 host sshd[30337]: pam_unix(sshd:auth): check pass; user unknown Jan 17 01:43:06 host sshd[30337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.118.129.96 Jan 17 01:43:08 host sshd[30337]: Failed password for invalid user user from 222.118.129.96 port 61392 ssh2 Jan 17 01:43:08 host sshd[30337]: Connection reset by 222.118.129.96 port 61392 [preauth] Jan 17 01:43:23 host sshd[30358]: User root from 198.23.174.250 not allowed because not listed in AllowUsers Jan 17 01:43:23 host sshd[30358]: input_userauth_request: invalid user root [preauth] Jan 17 01:43:24 host unix_chkpwd[30361]: password check failed for user (root) Jan 17 01:43:24 host sshd[30358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.174.250 user=root Jan 17 01:43:24 host sshd[30358]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 01:43:26 host sshd[30358]: Failed password for invalid user root from 198.23.174.250 port 55522 ssh2 Jan 17 01:43:26 host sshd[30358]: Connection closed by 198.23.174.250 port 55522 [preauth] Jan 17 01:43:58 host sshd[30426]: Invalid user admin from 198.23.174.250 port 33362 Jan 17 01:43:58 host sshd[30426]: input_userauth_request: invalid user admin [preauth] Jan 17 01:43:58 host sshd[30426]: pam_unix(sshd:auth): check pass; user unknown Jan 17 01:43:58 host sshd[30426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.174.250 Jan 17 01:44:00 host sshd[30426]: Failed password for invalid user admin from 198.23.174.250 port 33362 ssh2 Jan 17 01:44:00 host sshd[30426]: Connection closed by 198.23.174.250 port 33362 [preauth] Jan 17 01:44:25 host sshd[30652]: Connection closed by 107.170.240.15 port 41704 [preauth] Jan 17 01:44:43 host sshd[30780]: User root from 113.53.164.236 not allowed because not listed in AllowUsers Jan 17 01:44:43 host sshd[30780]: input_userauth_request: invalid user root [preauth] Jan 17 01:44:43 host unix_chkpwd[30785]: password check failed for user (root) Jan 17 01:44:43 host sshd[30780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.53.164.236 user=root Jan 17 01:44:43 host sshd[30780]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 01:44:45 host sshd[30780]: Failed password for invalid user root from 113.53.164.236 port 34829 ssh2 Jan 17 01:44:47 host unix_chkpwd[30814]: password check failed for user (root) Jan 17 01:44:47 host sshd[30780]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 01:44:48 host sshd[30780]: Failed password for invalid user root from 113.53.164.236 port 34829 ssh2 Jan 17 01:44:50 host sshd[30780]: Connection reset by 113.53.164.236 port 34829 [preauth] Jan 17 01:44:50 host sshd[30780]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.53.164.236 user=root Jan 17 01:50:34 host sshd[31916]: Invalid user Admin from 27.105.71.22 port 35904 Jan 17 01:50:34 host sshd[31916]: input_userauth_request: invalid user Admin [preauth] Jan 17 01:50:34 host sshd[31916]: pam_unix(sshd:auth): check pass; user unknown Jan 17 01:50:34 host sshd[31916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.105.71.22 Jan 17 01:50:37 host sshd[31916]: Failed password for invalid user Admin from 27.105.71.22 port 35904 ssh2 Jan 17 01:50:37 host sshd[31916]: pam_unix(sshd:auth): check pass; user unknown Jan 17 01:50:40 host sshd[31916]: Failed password for invalid user Admin from 27.105.71.22 port 35904 ssh2 Jan 17 01:50:40 host sshd[31916]: pam_unix(sshd:auth): check pass; user unknown Jan 17 01:50:42 host sshd[31916]: Failed password for invalid user Admin from 27.105.71.22 port 35904 ssh2 Jan 17 01:50:42 host sshd[31916]: Connection reset by 27.105.71.22 port 35904 [preauth] Jan 17 01:50:42 host sshd[31916]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.105.71.22 Jan 17 01:55:05 host sshd[32510]: Invalid user geoclue from 205.185.113.129 port 35352 Jan 17 01:55:05 host sshd[32510]: input_userauth_request: invalid user geoclue [preauth] Jan 17 01:55:05 host sshd[32510]: pam_unix(sshd:auth): check pass; user unknown Jan 17 01:55:05 host sshd[32510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 17 01:55:07 host sshd[32510]: Failed password for invalid user geoclue from 205.185.113.129 port 35352 ssh2 Jan 17 01:55:08 host sshd[32510]: Connection closed by 205.185.113.129 port 35352 [preauth] Jan 17 02:00:20 host sshd[1017]: Connection reset by 221.160.138.136 port 62171 [preauth] Jan 17 02:00:27 host sshd[1031]: Invalid user admin from 125.134.147.94 port 60733 Jan 17 02:00:27 host sshd[1031]: input_userauth_request: invalid user admin [preauth] Jan 17 02:00:27 host sshd[1031]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:00:27 host sshd[1031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.134.147.94 Jan 17 02:00:30 host sshd[1031]: Failed password for invalid user admin from 125.134.147.94 port 60733 ssh2 Jan 17 02:00:31 host sshd[1031]: Failed password for invalid user admin from 125.134.147.94 port 60733 ssh2 Jan 17 02:00:32 host sshd[1031]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:00:33 host sshd[1031]: Failed password for invalid user admin from 125.134.147.94 port 60733 ssh2 Jan 17 02:00:33 host sshd[1031]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:00:35 host sshd[1031]: Failed password for invalid user admin from 125.134.147.94 port 60733 ssh2 Jan 17 02:00:36 host sshd[1031]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:00:38 host sshd[1031]: Failed password for invalid user admin from 125.134.147.94 port 60733 ssh2 Jan 17 02:02:38 host sshd[1384]: User root from 178.128.29.118 not allowed because not listed in AllowUsers Jan 17 02:02:38 host sshd[1384]: input_userauth_request: invalid user root [preauth] Jan 17 02:02:38 host unix_chkpwd[1386]: password check failed for user (root) Jan 17 02:02:38 host sshd[1384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.29.118 user=root Jan 17 02:02:38 host sshd[1384]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:02:39 host sshd[1384]: Failed password for invalid user root from 178.128.29.118 port 40518 ssh2 Jan 17 02:02:39 host sshd[1384]: Received disconnect from 178.128.29.118 port 40518:11: Bye Bye [preauth] Jan 17 02:02:39 host sshd[1384]: Disconnected from 178.128.29.118 port 40518 [preauth] Jan 17 02:03:04 host sshd[1439]: User root from 178.154.222.234 not allowed because not listed in AllowUsers Jan 17 02:03:05 host sshd[1439]: input_userauth_request: invalid user root [preauth] Jan 17 02:03:05 host unix_chkpwd[1442]: password check failed for user (root) Jan 17 02:03:05 host sshd[1439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.154.222.234 user=root Jan 17 02:03:05 host sshd[1439]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:03:07 host sshd[1439]: Failed password for invalid user root from 178.154.222.234 port 36612 ssh2 Jan 17 02:03:07 host sshd[1439]: Received disconnect from 178.154.222.234 port 36612:11: Bye Bye [preauth] Jan 17 02:03:07 host sshd[1439]: Disconnected from 178.154.222.234 port 36612 [preauth] Jan 17 02:04:19 host sshd[1585]: Invalid user sammy from 162.240.51.46 port 54418 Jan 17 02:04:19 host sshd[1585]: input_userauth_request: invalid user sammy [preauth] Jan 17 02:04:19 host sshd[1585]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:04:19 host sshd[1585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.240.51.46 Jan 17 02:04:21 host sshd[1585]: Failed password for invalid user sammy from 162.240.51.46 port 54418 ssh2 Jan 17 02:04:21 host sshd[1585]: Received disconnect from 162.240.51.46 port 54418:11: Bye Bye [preauth] Jan 17 02:04:21 host sshd[1585]: Disconnected from 162.240.51.46 port 54418 [preauth] Jan 17 02:04:36 host sshd[1640]: User root from 190.188.217.230 not allowed because not listed in AllowUsers Jan 17 02:04:36 host sshd[1640]: input_userauth_request: invalid user root [preauth] Jan 17 02:04:36 host unix_chkpwd[1644]: password check failed for user (root) Jan 17 02:04:36 host sshd[1640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.188.217.230 user=root Jan 17 02:04:36 host sshd[1640]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:04:38 host sshd[1640]: Failed password for invalid user root from 190.188.217.230 port 54381 ssh2 Jan 17 02:04:39 host sshd[1640]: Received disconnect from 190.188.217.230 port 54381:11: Bye Bye [preauth] Jan 17 02:04:39 host sshd[1640]: Disconnected from 190.188.217.230 port 54381 [preauth] Jan 17 02:04:48 host sshd[1659]: User root from 103.18.74.171 not allowed because not listed in AllowUsers Jan 17 02:04:48 host sshd[1659]: input_userauth_request: invalid user root [preauth] Jan 17 02:04:48 host unix_chkpwd[1662]: password check failed for user (root) Jan 17 02:04:48 host sshd[1659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.18.74.171 user=root Jan 17 02:04:48 host sshd[1659]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:04:50 host sshd[1659]: Failed password for invalid user root from 103.18.74.171 port 47164 ssh2 Jan 17 02:04:50 host sshd[1659]: Received disconnect from 103.18.74.171 port 47164:11: Bye Bye [preauth] Jan 17 02:04:50 host sshd[1659]: Disconnected from 103.18.74.171 port 47164 [preauth] Jan 17 02:04:59 host sshd[1687]: Invalid user guest from 103.147.5.161 port 48740 Jan 17 02:04:59 host sshd[1687]: input_userauth_request: invalid user guest [preauth] Jan 17 02:04:59 host sshd[1687]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:04:59 host sshd[1687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.5.161 Jan 17 02:05:01 host sshd[1687]: Failed password for invalid user guest from 103.147.5.161 port 48740 ssh2 Jan 17 02:05:01 host sshd[1687]: Received disconnect from 103.147.5.161 port 48740:11: Bye Bye [preauth] Jan 17 02:05:01 host sshd[1687]: Disconnected from 103.147.5.161 port 48740 [preauth] Jan 17 02:05:21 host sshd[1892]: User root from 212.60.80.58 not allowed because not listed in AllowUsers Jan 17 02:05:21 host sshd[1892]: input_userauth_request: invalid user root [preauth] Jan 17 02:05:21 host unix_chkpwd[1895]: password check failed for user (root) Jan 17 02:05:21 host sshd[1892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.60.80.58 user=root Jan 17 02:05:21 host sshd[1892]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:05:22 host sshd[1892]: Failed password for invalid user root from 212.60.80.58 port 35741 ssh2 Jan 17 02:05:23 host sshd[1892]: Received disconnect from 212.60.80.58 port 35741:11: Bye Bye [preauth] Jan 17 02:05:23 host sshd[1892]: Disconnected from 212.60.80.58 port 35741 [preauth] Jan 17 02:05:56 host sshd[1991]: Invalid user hotline from 178.128.29.118 port 52268 Jan 17 02:05:56 host sshd[1991]: input_userauth_request: invalid user hotline [preauth] Jan 17 02:05:56 host sshd[1991]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:05:56 host sshd[1991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.29.118 Jan 17 02:05:59 host sshd[1991]: Failed password for invalid user hotline from 178.128.29.118 port 52268 ssh2 Jan 17 02:05:59 host sshd[1991]: Received disconnect from 178.128.29.118 port 52268:11: Bye Bye [preauth] Jan 17 02:05:59 host sshd[1991]: Disconnected from 178.128.29.118 port 52268 [preauth] Jan 17 02:06:05 host sshd[2062]: Invalid user user3 from 178.154.222.234 port 45952 Jan 17 02:06:05 host sshd[2062]: input_userauth_request: invalid user user3 [preauth] Jan 17 02:06:05 host sshd[2062]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:06:05 host sshd[2062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.154.222.234 Jan 17 02:06:08 host sshd[2062]: Failed password for invalid user user3 from 178.154.222.234 port 45952 ssh2 Jan 17 02:06:08 host sshd[2062]: Received disconnect from 178.154.222.234 port 45952:11: Bye Bye [preauth] Jan 17 02:06:08 host sshd[2062]: Disconnected from 178.154.222.234 port 45952 [preauth] Jan 17 02:06:13 host sshd[2074]: Invalid user mapr from 162.240.51.46 port 58062 Jan 17 02:06:13 host sshd[2074]: input_userauth_request: invalid user mapr [preauth] Jan 17 02:06:13 host sshd[2074]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:06:13 host sshd[2074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.240.51.46 Jan 17 02:06:14 host sshd[2074]: Failed password for invalid user mapr from 162.240.51.46 port 58062 ssh2 Jan 17 02:06:15 host sshd[2074]: Received disconnect from 162.240.51.46 port 58062:11: Bye Bye [preauth] Jan 17 02:06:15 host sshd[2074]: Disconnected from 162.240.51.46 port 58062 [preauth] Jan 17 02:06:41 host sshd[2181]: User root from 212.60.80.58 not allowed because not listed in AllowUsers Jan 17 02:06:41 host sshd[2181]: input_userauth_request: invalid user root [preauth] Jan 17 02:06:41 host unix_chkpwd[2184]: password check failed for user (root) Jan 17 02:06:41 host sshd[2181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.60.80.58 user=root Jan 17 02:06:41 host sshd[2181]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:06:43 host sshd[2181]: Failed password for invalid user root from 212.60.80.58 port 47028 ssh2 Jan 17 02:07:11 host sshd[2276]: User root from 103.147.5.161 not allowed because not listed in AllowUsers Jan 17 02:07:11 host sshd[2276]: input_userauth_request: invalid user root [preauth] Jan 17 02:07:11 host unix_chkpwd[2279]: password check failed for user (root) Jan 17 02:07:11 host sshd[2276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.5.161 user=root Jan 17 02:07:11 host sshd[2276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:07:13 host sshd[2287]: User root from 162.240.51.46 not allowed because not listed in AllowUsers Jan 17 02:07:13 host sshd[2287]: input_userauth_request: invalid user root [preauth] Jan 17 02:07:13 host unix_chkpwd[2290]: password check failed for user (root) Jan 17 02:07:13 host sshd[2287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.240.51.46 user=root Jan 17 02:07:13 host sshd[2287]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:07:14 host sshd[2276]: Failed password for invalid user root from 103.147.5.161 port 49060 ssh2 Jan 17 02:07:14 host sshd[2276]: Received disconnect from 103.147.5.161 port 49060:11: Bye Bye [preauth] Jan 17 02:07:14 host sshd[2276]: Disconnected from 103.147.5.161 port 49060 [preauth] Jan 17 02:07:16 host sshd[2287]: Failed password for invalid user root from 162.240.51.46 port 53868 ssh2 Jan 17 02:07:16 host sshd[2287]: Received disconnect from 162.240.51.46 port 53868:11: Bye Bye [preauth] Jan 17 02:07:16 host sshd[2287]: Disconnected from 162.240.51.46 port 53868 [preauth] Jan 17 02:07:56 host sshd[2446]: User root from 190.188.217.230 not allowed because not listed in AllowUsers Jan 17 02:07:56 host sshd[2446]: input_userauth_request: invalid user root [preauth] Jan 17 02:07:56 host unix_chkpwd[2449]: password check failed for user (root) Jan 17 02:07:56 host sshd[2446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.188.217.230 user=root Jan 17 02:07:56 host sshd[2446]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:07:58 host sshd[2446]: Failed password for invalid user root from 190.188.217.230 port 43152 ssh2 Jan 17 02:07:58 host sshd[2457]: User root from 103.18.74.171 not allowed because not listed in AllowUsers Jan 17 02:07:58 host sshd[2457]: input_userauth_request: invalid user root [preauth] Jan 17 02:07:58 host unix_chkpwd[2462]: password check failed for user (root) Jan 17 02:07:58 host sshd[2457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.18.74.171 user=root Jan 17 02:07:58 host sshd[2457]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:07:58 host sshd[2446]: Received disconnect from 190.188.217.230 port 43152:11: Bye Bye [preauth] Jan 17 02:07:58 host sshd[2446]: Disconnected from 190.188.217.230 port 43152 [preauth] Jan 17 02:08:01 host sshd[2457]: Failed password for invalid user root from 103.18.74.171 port 42258 ssh2 Jan 17 02:08:01 host sshd[2457]: Received disconnect from 103.18.74.171 port 42258:11: Bye Bye [preauth] Jan 17 02:08:01 host sshd[2457]: Disconnected from 103.18.74.171 port 42258 [preauth] Jan 17 02:15:55 host sshd[3777]: User root from 211.250.232.17 not allowed because not listed in AllowUsers Jan 17 02:15:55 host sshd[3777]: input_userauth_request: invalid user root [preauth] Jan 17 02:15:55 host unix_chkpwd[3780]: password check failed for user (root) Jan 17 02:15:55 host sshd[3777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.250.232.17 user=root Jan 17 02:15:55 host sshd[3777]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:15:57 host sshd[3777]: Failed password for invalid user root from 211.250.232.17 port 58956 ssh2 Jan 17 02:15:58 host unix_chkpwd[3784]: password check failed for user (root) Jan 17 02:15:58 host sshd[3777]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:16:00 host sshd[3777]: Failed password for invalid user root from 211.250.232.17 port 58956 ssh2 Jan 17 02:16:01 host unix_chkpwd[3792]: password check failed for user (root) Jan 17 02:16:01 host sshd[3777]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:16:03 host sshd[3777]: Failed password for invalid user root from 211.250.232.17 port 58956 ssh2 Jan 17 02:16:04 host unix_chkpwd[3807]: password check failed for user (root) Jan 17 02:16:04 host sshd[3777]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:16:07 host sshd[3777]: Failed password for invalid user root from 211.250.232.17 port 58956 ssh2 Jan 17 02:16:08 host unix_chkpwd[3825]: password check failed for user (root) Jan 17 02:16:08 host sshd[3777]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:16:10 host sshd[3777]: Failed password for invalid user root from 211.250.232.17 port 58956 ssh2 Jan 17 02:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=wwwletsstalkfood user-4=straightcurve user-5=kottayamcalldriv user-6=phmetals user-7=palco123 user-8=gifterman user-9=mrsclean user-10=wwwnexidigital user-11=disposeat user-12=wwwkmaorg user-13=remysagr user-14=wwwkapin user-15=woodpeck user-16=shalinijames user-17=wwwtestugo user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=keralaholi user-24=wwwresourcehunte user-25=wwwrmswll user-26=wwwkaretakers user-27=cochintaxi user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 02:21:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ayTLzH26iP1xd3cU.~ Jan 17 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ayTLzH26iP1xd3cU.~' Jan 17 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ayTLzH26iP1xd3cU.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 02:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 02:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 02:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 02:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 02:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 02:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 02:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:22:53 host sshd[5129]: Invalid user admin from 112.164.67.163 port 61876 Jan 17 02:22:53 host sshd[5129]: input_userauth_request: invalid user admin [preauth] Jan 17 02:22:53 host sshd[5129]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:22:53 host sshd[5129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.164.67.163 Jan 17 02:22:54 host sshd[5129]: Failed password for invalid user admin from 112.164.67.163 port 61876 ssh2 Jan 17 02:22:55 host sshd[5129]: Failed password for invalid user admin from 112.164.67.163 port 61876 ssh2 Jan 17 02:22:56 host sshd[5129]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:22:58 host sshd[5129]: Failed password for invalid user admin from 112.164.67.163 port 61876 ssh2 Jan 17 02:23:00 host sshd[5129]: Connection reset by 112.164.67.163 port 61876 [preauth] Jan 17 02:23:00 host sshd[5129]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.164.67.163 Jan 17 02:25:46 host sshd[5520]: Invalid user peertube from 51.15.105.243 port 41576 Jan 17 02:25:46 host sshd[5520]: input_userauth_request: invalid user peertube [preauth] Jan 17 02:25:46 host sshd[5520]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:25:46 host sshd[5520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.105.243 Jan 17 02:25:48 host sshd[5520]: Failed password for invalid user peertube from 51.15.105.243 port 41576 ssh2 Jan 17 02:25:48 host sshd[5520]: Received disconnect from 51.15.105.243 port 41576:11: Bye Bye [preauth] Jan 17 02:25:48 host sshd[5520]: Disconnected from 51.15.105.243 port 41576 [preauth] Jan 17 02:26:26 host sshd[5696]: Invalid user user2 from 51.178.27.210 port 41882 Jan 17 02:26:26 host sshd[5696]: input_userauth_request: invalid user user2 [preauth] Jan 17 02:26:26 host sshd[5696]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:26:26 host sshd[5696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.27.210 Jan 17 02:26:27 host sshd[5696]: Failed password for invalid user user2 from 51.178.27.210 port 41882 ssh2 Jan 17 02:26:28 host sshd[5696]: Received disconnect from 51.178.27.210 port 41882:11: Bye Bye [preauth] Jan 17 02:26:28 host sshd[5696]: Disconnected from 51.178.27.210 port 41882 [preauth] Jan 17 02:26:45 host sshd[5750]: User root from 195.19.97.157 not allowed because not listed in AllowUsers Jan 17 02:26:45 host sshd[5750]: input_userauth_request: invalid user root [preauth] Jan 17 02:26:45 host unix_chkpwd[5753]: password check failed for user (root) Jan 17 02:26:45 host sshd[5750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.97.157 user=root Jan 17 02:26:45 host sshd[5750]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:26:47 host sshd[5750]: Failed password for invalid user root from 195.19.97.157 port 57608 ssh2 Jan 17 02:26:47 host sshd[5750]: Received disconnect from 195.19.97.157 port 57608:11: Bye Bye [preauth] Jan 17 02:26:47 host sshd[5750]: Disconnected from 195.19.97.157 port 57608 [preauth] Jan 17 02:27:05 host sshd[5794]: Invalid user server from 74.208.247.108 port 37542 Jan 17 02:27:05 host sshd[5794]: input_userauth_request: invalid user server [preauth] Jan 17 02:27:05 host sshd[5794]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:27:05 host sshd[5794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.247.108 Jan 17 02:27:08 host sshd[5794]: Failed password for invalid user server from 74.208.247.108 port 37542 ssh2 Jan 17 02:27:08 host sshd[5794]: Received disconnect from 74.208.247.108 port 37542:11: Bye Bye [preauth] Jan 17 02:27:08 host sshd[5794]: Disconnected from 74.208.247.108 port 37542 [preauth] Jan 17 02:28:34 host sshd[6010]: User tomcat from 43.131.30.155 not allowed because not listed in AllowUsers Jan 17 02:28:34 host sshd[6010]: input_userauth_request: invalid user tomcat [preauth] Jan 17 02:28:34 host unix_chkpwd[6013]: password check failed for user (tomcat) Jan 17 02:28:34 host sshd[6010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.30.155 user=tomcat Jan 17 02:28:34 host sshd[6010]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "tomcat" Jan 17 02:28:36 host sshd[6010]: Failed password for invalid user tomcat from 43.131.30.155 port 46926 ssh2 Jan 17 02:28:36 host sshd[6010]: Received disconnect from 43.131.30.155 port 46926:11: Bye Bye [preauth] Jan 17 02:28:36 host sshd[6010]: Disconnected from 43.131.30.155 port 46926 [preauth] Jan 17 02:29:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 02:29:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:29:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:29:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 02:29:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:29:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:29:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 02:29:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:29:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:29:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 02:29:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:29:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:29:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 02:29:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:29:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:29:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwletsstalkfood user-15=straightcurve user-16=gifterman user-17=palco123 user-18=kottayamcalldriv user-19=phmetals user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=remysagr user-24=wwwkmaorg user-25=wwwkapin user-26=woodpeck user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 02:29:00 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 02:29:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:29:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:29:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Jan 17 02:29:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:29:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:29:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 17 02:29:14 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 17 02:29:14 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 17 02:29:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Jan 17 02:29:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:29:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:29:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Jan 17 02:29:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:29:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:29:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Jan 17 02:29:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:29:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 17 02:29:58 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 17 02:29:58 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 17 02:29:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Jan 17 02:29:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:29:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Jan 17 02:29:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:29:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Jan 17 02:29:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:29:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Jan 17 02:29:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:29:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:29:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Jan 17 02:29:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:30:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Jan 17 02:30:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:30:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:30:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Jan 17 02:30:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:30:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:30:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Jan 17 02:30:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:30:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:30:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Jan 17 02:30:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:30:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:30:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 17 02:30:20 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 17 02:30:20 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 17 02:30:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Jan 17 02:30:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:30:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:30:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 02:30:20 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 02:30:20 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 02:30:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 17 02:30:21 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 17 02:30:21 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 17 02:30:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Jan 17 02:30:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:30:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 17 02:30:44 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 17 02:30:44 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 17 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Jan 17 02:30:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:30:44 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Jan 17 02:30:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:30:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Jan 17 02:30:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:30:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:31:14 host sshd[6907]: Invalid user maximo from 51.15.105.243 port 41676 Jan 17 02:31:14 host sshd[6907]: input_userauth_request: invalid user maximo [preauth] Jan 17 02:31:14 host sshd[6907]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:31:14 host sshd[6907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.105.243 Jan 17 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Jan 17 02:31:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:31:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:31:16 host sshd[6907]: Failed password for invalid user maximo from 51.15.105.243 port 41676 ssh2 Jan 17 02:31:16 host sshd[6907]: Received disconnect from 51.15.105.243 port 41676:11: Bye Bye [preauth] Jan 17 02:31:16 host sshd[6907]: Disconnected from 51.15.105.243 port 41676 [preauth] Jan 17 02:31:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Jan 17 02:31:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:31:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:31:24 host sshd[7167]: User root from 51.178.27.210 not allowed because not listed in AllowUsers Jan 17 02:31:24 host sshd[7167]: input_userauth_request: invalid user root [preauth] Jan 17 02:31:24 host unix_chkpwd[7170]: password check failed for user (root) Jan 17 02:31:24 host sshd[7167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.27.210 user=root Jan 17 02:31:24 host sshd[7167]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:31:26 host sshd[7167]: Failed password for invalid user root from 51.178.27.210 port 40624 ssh2 Jan 17 02:31:26 host sshd[7167]: Received disconnect from 51.178.27.210 port 40624:11: Bye Bye [preauth] Jan 17 02:31:26 host sshd[7167]: Disconnected from 51.178.27.210 port 40624 [preauth] Jan 17 02:31:28 host sshd[7181]: Invalid user asterisk from 46.101.5.100 port 34308 Jan 17 02:31:28 host sshd[7181]: input_userauth_request: invalid user asterisk [preauth] Jan 17 02:31:28 host sshd[7181]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:31:28 host sshd[7181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.5.100 Jan 17 02:31:30 host sshd[7181]: Failed password for invalid user asterisk from 46.101.5.100 port 34308 ssh2 Jan 17 02:31:30 host sshd[7181]: Received disconnect from 46.101.5.100 port 34308:11: Bye Bye [preauth] Jan 17 02:31:30 host sshd[7181]: Disconnected from 46.101.5.100 port 34308 [preauth] Jan 17 02:31:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 17 02:31:32 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 17 02:31:32 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 17 02:31:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Jan 17 02:31:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:31:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Jan 17 02:31:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:31:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:31:34 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Jan 17 02:31:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:31:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:31:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Jan 17 02:31:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:31:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:32:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 17 02:32:01 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 17 02:32:01 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 17 02:32:06 host sshd[7588]: Invalid user asterisk from 195.19.97.157 port 51308 Jan 17 02:32:06 host sshd[7588]: input_userauth_request: invalid user asterisk [preauth] Jan 17 02:32:06 host sshd[7588]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:32:06 host sshd[7588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.97.157 Jan 17 02:32:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Jan 17 02:32:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:32:08 host sshd[7588]: Failed password for invalid user asterisk from 195.19.97.157 port 51308 ssh2 Jan 17 02:32:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:32:08 host sshd[7588]: Received disconnect from 195.19.97.157 port 51308:11: Bye Bye [preauth] Jan 17 02:32:08 host sshd[7588]: Disconnected from 195.19.97.157 port 51308 [preauth] Jan 17 02:32:10 host sshd[7651]: Invalid user ff from 194.110.203.109 port 41190 Jan 17 02:32:10 host sshd[7651]: input_userauth_request: invalid user ff [preauth] Jan 17 02:32:10 host sshd[7651]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:32:10 host sshd[7651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 02:32:12 host sshd[7651]: Failed password for invalid user ff from 194.110.203.109 port 41190 ssh2 Jan 17 02:32:15 host sshd[7651]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:32:16 host sshd[7785]: Invalid user student from 43.131.30.155 port 58812 Jan 17 02:32:16 host sshd[7785]: input_userauth_request: invalid user student [preauth] Jan 17 02:32:16 host sshd[7785]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:32:16 host sshd[7785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.30.155 Jan 17 02:32:17 host sshd[7651]: Failed password for invalid user ff from 194.110.203.109 port 41190 ssh2 Jan 17 02:32:18 host sshd[7785]: Failed password for invalid user student from 43.131.30.155 port 58812 ssh2 Jan 17 02:32:18 host sshd[7785]: Received disconnect from 43.131.30.155 port 58812:11: Bye Bye [preauth] Jan 17 02:32:18 host sshd[7785]: Disconnected from 43.131.30.155 port 58812 [preauth] Jan 17 02:32:20 host sshd[7797]: Invalid user ansible from 51.15.105.243 port 40054 Jan 17 02:32:20 host sshd[7797]: input_userauth_request: invalid user ansible [preauth] Jan 17 02:32:20 host sshd[7797]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:32:20 host sshd[7797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.105.243 Jan 17 02:32:20 host sshd[7651]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:32:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 17 02:32:21 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 17 02:32:21 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 17 02:32:22 host sshd[7797]: Failed password for invalid user ansible from 51.15.105.243 port 40054 ssh2 Jan 17 02:32:22 host sshd[7797]: Received disconnect from 51.15.105.243 port 40054:11: Bye Bye [preauth] Jan 17 02:32:22 host sshd[7797]: Disconnected from 51.15.105.243 port 40054 [preauth] Jan 17 02:32:22 host sshd[7817]: Invalid user kevin from 74.208.247.108 port 51664 Jan 17 02:32:22 host sshd[7817]: input_userauth_request: invalid user kevin [preauth] Jan 17 02:32:22 host sshd[7817]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:32:22 host sshd[7817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.247.108 Jan 17 02:32:22 host sshd[7651]: Failed password for invalid user ff from 194.110.203.109 port 41190 ssh2 Jan 17 02:32:24 host sshd[7817]: Failed password for invalid user kevin from 74.208.247.108 port 51664 ssh2 Jan 17 02:32:24 host sshd[7817]: Received disconnect from 74.208.247.108 port 51664:11: Bye Bye [preauth] Jan 17 02:32:24 host sshd[7817]: Disconnected from 74.208.247.108 port 51664 [preauth] Jan 17 02:32:25 host sshd[7651]: Connection closed by 194.110.203.109 port 41190 [preauth] Jan 17 02:32:25 host sshd[7651]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Jan 17 02:32:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:32:28 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Jan 17 02:32:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:32:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Jan 17 02:32:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:32:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Jan 17 02:32:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:32:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:32:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 17 02:32:33 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 02:32:33 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 02:32:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Jan 17 02:32:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:32:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:32:35 host sshd[8158]: Invalid user server from 46.101.5.100 port 57526 Jan 17 02:32:35 host sshd[8158]: input_userauth_request: invalid user server [preauth] Jan 17 02:32:35 host sshd[8158]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:32:35 host sshd[8158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.5.100 Jan 17 02:32:38 host sshd[8158]: Failed password for invalid user server from 46.101.5.100 port 57526 ssh2 Jan 17 02:32:38 host sshd[8158]: Received disconnect from 46.101.5.100 port 57526:11: Bye Bye [preauth] Jan 17 02:32:38 host sshd[8158]: Disconnected from 46.101.5.100 port 57526 [preauth] Jan 17 02:32:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 17 02:32:51 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 02:32:51 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 02:33:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Jan 17 02:33:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:33:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:33:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 17 02:33:17 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 02:33:17 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 02:33:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Jan 17 02:33:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:33:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Jan 17 02:33:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:33:25 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Jan 17 02:33:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:33:25 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:33:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Jan 17 02:33:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:33:25 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 17 02:33:26 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 17 02:33:26 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 17 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Jan 17 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:33:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Jan 17 02:33:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:33:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:33:27 host sshd[8647]: Invalid user ansible from 74.208.247.108 port 35588 Jan 17 02:33:27 host sshd[8647]: input_userauth_request: invalid user ansible [preauth] Jan 17 02:33:27 host sshd[8647]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:33:27 host sshd[8647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.247.108 Jan 17 02:33:28 host sshd[8647]: Failed password for invalid user ansible from 74.208.247.108 port 35588 ssh2 Jan 17 02:33:28 host sshd[8647]: Received disconnect from 74.208.247.108 port 35588:11: Bye Bye [preauth] Jan 17 02:33:28 host sshd[8647]: Disconnected from 74.208.247.108 port 35588 [preauth] Jan 17 02:33:39 host sshd[8812]: User root from 46.101.5.100 not allowed because not listed in AllowUsers Jan 17 02:33:39 host sshd[8812]: input_userauth_request: invalid user root [preauth] Jan 17 02:33:39 host unix_chkpwd[8815]: password check failed for user (root) Jan 17 02:33:39 host sshd[8812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.5.100 user=root Jan 17 02:33:39 host sshd[8812]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 02:33:40 host sshd[8812]: Failed password for invalid user root from 46.101.5.100 port 52406 ssh2 Jan 17 02:33:41 host sshd[8812]: Received disconnect from 46.101.5.100 port 52406:11: Bye Bye [preauth] Jan 17 02:33:41 host sshd[8812]: Disconnected from 46.101.5.100 port 52406 [preauth] Jan 17 02:33:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 17 02:33:46 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 17 02:33:46 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 17 02:33:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Jan 17 02:33:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:33:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Jan 17 02:33:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:33:47 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:33:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Jan 17 02:33:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:33:47 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Jan 17 02:34:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Jan 17 02:34:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 17 02:34:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 17 02:34:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 17 02:34:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Jan 17 02:34:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Jan 17 02:34:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Jan 17 02:34:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Jan 17 02:34:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwpmcresource WpToolkitNotification send_admin_auto_updates_notification 'available_updates_text=<br/><br/>Updates are available for the following items:<br/><br/>' 'available_updates_list=1. Plugin "Page Builder by SiteOrigin" on (http://ugotechnologies.com/old). Installed version: 2.4.25. Available version: 2.20.4.<br/><br/>' installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 Jan 17 02:34:23 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in Jan 17 02:34:23 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error Jan 17 02:34:23 host sudo: wp-toolkit : (command continued) establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: [error]FailedToExecuteWpCliCommand: chdir /home/woodpeck/public_html/wp: no such file or directory[/error]#012<br/><br/>' --output=json Jan 17 02:34:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Jan 17 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 17 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 17 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 17 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 17 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 17 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 17 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 17 02:34:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 17 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 17 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 17 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 17 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 17 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:34:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 17 02:34:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 02:34:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 02:36:15 host sshd[9917]: Invalid user vadmin from 58.163.150.80 port 40798 Jan 17 02:36:15 host sshd[9917]: input_userauth_request: invalid user vadmin [preauth] Jan 17 02:36:15 host sshd[9917]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:36:15 host sshd[9917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.163.150.80 Jan 17 02:36:17 host sshd[9917]: Failed password for invalid user vadmin from 58.163.150.80 port 40798 ssh2 Jan 17 02:36:17 host sshd[9917]: Connection reset by 58.163.150.80 port 40798 [preauth] Jan 17 02:41:04 host sshd[10676]: Invalid user zyfwp from 114.33.127.74 port 36317 Jan 17 02:41:05 host sshd[10676]: input_userauth_request: invalid user zyfwp [preauth] Jan 17 02:41:05 host sshd[10676]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:41:05 host sshd[10676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.127.74 Jan 17 02:41:07 host sshd[10676]: Failed password for invalid user zyfwp from 114.33.127.74 port 36317 ssh2 Jan 17 02:41:07 host sshd[10676]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:41:09 host sshd[10676]: Failed password for invalid user zyfwp from 114.33.127.74 port 36317 ssh2 Jan 17 02:41:10 host sshd[10676]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:41:13 host sshd[10676]: Failed password for invalid user zyfwp from 114.33.127.74 port 36317 ssh2 Jan 17 02:41:13 host sshd[10676]: Connection closed by 114.33.127.74 port 36317 [preauth] Jan 17 02:41:13 host sshd[10676]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.127.74 Jan 17 02:47:17 host sshd[11561]: Invalid user guest from 104.244.74.6 port 56412 Jan 17 02:47:17 host sshd[11561]: input_userauth_request: invalid user guest [preauth] Jan 17 02:47:17 host sshd[11561]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:47:17 host sshd[11561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 17 02:47:19 host sshd[11561]: Failed password for invalid user guest from 104.244.74.6 port 56412 ssh2 Jan 17 02:47:19 host sshd[11561]: Connection closed by 104.244.74.6 port 56412 [preauth] Jan 17 02:59:02 host sshd[13168]: Invalid user guest from 104.244.74.6 port 49462 Jan 17 02:59:02 host sshd[13168]: input_userauth_request: invalid user guest [preauth] Jan 17 02:59:02 host sshd[13168]: pam_unix(sshd:auth): check pass; user unknown Jan 17 02:59:02 host sshd[13168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 17 02:59:04 host sshd[13168]: Failed password for invalid user guest from 104.244.74.6 port 49462 ssh2 Jan 17 02:59:04 host sshd[13168]: Connection closed by 104.244.74.6 port 49462 [preauth] Jan 17 03:00:30 host sshd[13467]: Connection reset by 198.235.24.156 port 57744 [preauth] Jan 17 03:05:08 host sshd[14075]: Did not receive identification string from 192.241.156.50 port 45168 Jan 17 03:07:02 host sshd[14449]: Invalid user from 64.62.197.165 port 10881 Jan 17 03:07:02 host sshd[14449]: input_userauth_request: invalid user [preauth] Jan 17 03:07:05 host sshd[14449]: Connection closed by 64.62.197.165 port 10881 [preauth] Jan 17 03:14:14 host sshd[15471]: Connection reset by 49.142.36.3 port 59935 [preauth] Jan 17 03:17:00 host sshd[15900]: Invalid user guest from 104.244.74.6 port 53130 Jan 17 03:17:00 host sshd[15900]: input_userauth_request: invalid user guest [preauth] Jan 17 03:17:00 host sshd[15900]: pam_unix(sshd:auth): check pass; user unknown Jan 17 03:17:00 host sshd[15900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 17 03:17:03 host sshd[15900]: Failed password for invalid user guest from 104.244.74.6 port 53130 ssh2 Jan 17 03:17:03 host sshd[15900]: Connection closed by 104.244.74.6 port 53130 [preauth] Jan 17 03:19:47 host sshd[16222]: Invalid user dnsekakf2$$ from 220.133.144.238 port 49797 Jan 17 03:19:47 host sshd[16222]: input_userauth_request: invalid user dnsekakf2$$ [preauth] Jan 17 03:19:47 host sshd[16222]: pam_unix(sshd:auth): check pass; user unknown Jan 17 03:19:47 host sshd[16222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.144.238 Jan 17 03:19:49 host sshd[16222]: Failed password for invalid user dnsekakf2$$ from 220.133.144.238 port 49797 ssh2 Jan 17 03:19:50 host sshd[16222]: Failed password for invalid user dnsekakf2$$ from 220.133.144.238 port 49797 ssh2 Jan 17 03:19:50 host sshd[16222]: Connection closed by 220.133.144.238 port 49797 [preauth] Jan 17 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=wwwrmswll user-9=wwwresourcehunte user-10=keralaholi user-11=ugotscom user-12=disposeat user-13=remysagr user-14=wwwkmaorg user-15=wwwkapin user-16=woodpeck user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=pmcresources user-21=bonifacegroup user-22=wwwevmhonda user-23=straightcurve user-24=wwwletsstalkfood user-25=gifterman user-26=palco123 user-27=phmetals user-28=kottayamcalldriv user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 03:21:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 03:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8xEUIrqrq9YAjvva.~ Jan 17 03:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8xEUIrqrq9YAjvva.~' Jan 17 03:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8xEUIrqrq9YAjvva.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 03:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 03:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 03:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 03:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 03:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 03:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 03:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 03:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 03:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 03:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 03:31:26 host sshd[17995]: User root from 119.207.164.104 not allowed because not listed in AllowUsers Jan 17 03:31:26 host sshd[17995]: input_userauth_request: invalid user root [preauth] Jan 17 03:31:26 host unix_chkpwd[18002]: password check failed for user (root) Jan 17 03:31:26 host sshd[17995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.207.164.104 user=root Jan 17 03:31:26 host sshd[17995]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 03:31:28 host sshd[17995]: Failed password for invalid user root from 119.207.164.104 port 46345 ssh2 Jan 17 03:31:29 host unix_chkpwd[18026]: password check failed for user (root) Jan 17 03:31:29 host sshd[17995]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 03:31:31 host sshd[17995]: Failed password for invalid user root from 119.207.164.104 port 46345 ssh2 Jan 17 03:31:32 host unix_chkpwd[18031]: password check failed for user (root) Jan 17 03:31:32 host sshd[17995]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 03:31:33 host sshd[17995]: Failed password for invalid user root from 119.207.164.104 port 46345 ssh2 Jan 17 03:31:34 host unix_chkpwd[18035]: password check failed for user (root) Jan 17 03:31:34 host sshd[17995]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 03:31:36 host sshd[17995]: Failed password for invalid user root from 119.207.164.104 port 46345 ssh2 Jan 17 03:52:57 host sshd[21015]: Did not receive identification string from 64.227.181.236 port 61000 Jan 17 03:53:43 host sshd[21120]: Invalid user pi from 222.112.66.163 port 60341 Jan 17 03:53:43 host sshd[21120]: input_userauth_request: invalid user pi [preauth] Jan 17 03:53:43 host sshd[21120]: pam_unix(sshd:auth): check pass; user unknown Jan 17 03:53:43 host sshd[21120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.112.66.163 Jan 17 03:53:45 host sshd[21120]: Failed password for invalid user pi from 222.112.66.163 port 60341 ssh2 Jan 17 03:53:46 host sshd[21120]: pam_unix(sshd:auth): check pass; user unknown Jan 17 03:53:48 host sshd[21120]: Failed password for invalid user pi from 222.112.66.163 port 60341 ssh2 Jan 17 03:53:49 host sshd[21120]: pam_unix(sshd:auth): check pass; user unknown Jan 17 03:53:51 host sshd[21120]: Failed password for invalid user pi from 222.112.66.163 port 60341 ssh2 Jan 17 03:58:16 host sshd[21757]: User root from 14.102.50.48 not allowed because not listed in AllowUsers Jan 17 03:58:16 host sshd[21757]: input_userauth_request: invalid user root [preauth] Jan 17 03:58:16 host unix_chkpwd[21766]: password check failed for user (root) Jan 17 03:58:16 host sshd[21757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.102.50.48 user=root Jan 17 03:58:16 host sshd[21757]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 03:58:18 host sshd[21757]: Failed password for invalid user root from 14.102.50.48 port 46383 ssh2 Jan 17 03:58:19 host unix_chkpwd[21771]: password check failed for user (root) Jan 17 03:58:19 host sshd[21757]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 03:58:21 host sshd[21757]: Failed password for invalid user root from 14.102.50.48 port 46383 ssh2 Jan 17 03:58:21 host sshd[21757]: Connection reset by 14.102.50.48 port 46383 [preauth] Jan 17 03:58:21 host sshd[21757]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.102.50.48 user=root Jan 17 04:05:06 host sshd[22626]: Invalid user admin from 179.57.118.220 port 46635 Jan 17 04:05:06 host sshd[22626]: input_userauth_request: invalid user admin [preauth] Jan 17 04:05:06 host sshd[22626]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:05:06 host sshd[22626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.57.118.220 Jan 17 04:05:08 host sshd[22626]: Failed password for invalid user admin from 179.57.118.220 port 46635 ssh2 Jan 17 04:05:09 host sshd[22626]: Failed password for invalid user admin from 179.57.118.220 port 46635 ssh2 Jan 17 04:05:10 host sshd[22626]: Connection reset by 179.57.118.220 port 46635 [preauth] Jan 17 04:20:10 host sshd[24807]: Invalid user ONTUSER from 113.173.122.18 port 33657 Jan 17 04:20:10 host sshd[24807]: input_userauth_request: invalid user ONTUSER [preauth] Jan 17 04:20:10 host sshd[24807]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:20:10 host sshd[24807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.173.122.18 Jan 17 04:20:11 host sshd[24807]: Failed password for invalid user ONTUSER from 113.173.122.18 port 33657 ssh2 Jan 17 04:20:12 host sshd[24807]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:20:14 host sshd[24807]: Failed password for invalid user ONTUSER from 113.173.122.18 port 33657 ssh2 Jan 17 04:20:14 host sshd[24807]: Connection reset by 113.173.122.18 port 33657 [preauth] Jan 17 04:20:14 host sshd[24807]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.173.122.18 Jan 17 04:20:57 host sshd[24910]: User root from 219.84.218.30 not allowed because not listed in AllowUsers Jan 17 04:20:57 host sshd[24910]: input_userauth_request: invalid user root [preauth] Jan 17 04:20:57 host unix_chkpwd[24919]: password check failed for user (root) Jan 17 04:20:57 host sshd[24910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.84.218.30 user=root Jan 17 04:20:57 host sshd[24910]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 04:20:58 host sshd[24910]: Failed password for invalid user root from 219.84.218.30 port 42049 ssh2 Jan 17 04:20:58 host unix_chkpwd[24924]: password check failed for user (root) Jan 17 04:20:58 host sshd[24910]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 04:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 04:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:01 host sshd[24910]: Failed password for invalid user root from 219.84.218.30 port 42049 ssh2 Jan 17 04:21:01 host unix_chkpwd[24985]: password check failed for user (root) Jan 17 04:21:01 host sshd[24910]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=wwwkmaorg user-4=disposeat user-5=remysagr user-6=pmcresources user-7=wwwtestugo user-8=shalinijames user-9=vfmassets user-10=wwwletsstalkfood user-11=straightcurve user-12=wwwevmhonda user-13=bonifacegroup user-14=mrsclean user-15=wwwnexidigital user-16=kottayamcalldriv user-17=phmetals user-18=gifterman user-19=palco123 user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=ugotscom user-27=wwwrmswll user-28=keralaholi user-29=wwwresourcehunte user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 04:21:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Pkr7UeZ4RuQAADiI.~ Jan 17 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Pkr7UeZ4RuQAADiI.~' Jan 17 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Pkr7UeZ4RuQAADiI.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:03 host sshd[24910]: Failed password for invalid user root from 219.84.218.30 port 42049 ssh2 Jan 17 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 04:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 04:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 04:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 04:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:04 host unix_chkpwd[25049]: password check failed for user (root) Jan 17 04:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:04 host sshd[24910]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 04:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 04:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 04:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 04:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 04:21:06 host sshd[24910]: Failed password for invalid user root from 219.84.218.30 port 42049 ssh2 Jan 17 04:21:06 host unix_chkpwd[25084]: password check failed for user (root) Jan 17 04:21:06 host sshd[24910]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 04:21:08 host sshd[24910]: Failed password for invalid user root from 219.84.218.30 port 42049 ssh2 Jan 17 04:23:35 host sshd[25623]: Invalid user fg from 194.110.203.109 port 59076 Jan 17 04:23:35 host sshd[25623]: input_userauth_request: invalid user fg [preauth] Jan 17 04:23:35 host sshd[25623]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:23:35 host sshd[25623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 04:23:37 host sshd[25623]: Failed password for invalid user fg from 194.110.203.109 port 59076 ssh2 Jan 17 04:23:40 host sshd[25623]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:23:42 host sshd[25623]: Failed password for invalid user fg from 194.110.203.109 port 59076 ssh2 Jan 17 04:23:45 host sshd[25623]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:23:47 host sshd[25623]: Failed password for invalid user fg from 194.110.203.109 port 59076 ssh2 Jan 17 04:23:50 host sshd[25623]: Connection closed by 194.110.203.109 port 59076 [preauth] Jan 17 04:23:50 host sshd[25623]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 04:24:11 host sshd[25716]: Invalid user Admin from 80.117.117.187 port 43989 Jan 17 04:24:11 host sshd[25716]: input_userauth_request: invalid user Admin [preauth] Jan 17 04:24:11 host sshd[25716]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:24:11 host sshd[25716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.117.117.187 Jan 17 04:24:13 host sshd[25716]: Failed password for invalid user Admin from 80.117.117.187 port 43989 ssh2 Jan 17 04:24:14 host sshd[25716]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:24:17 host sshd[25716]: Failed password for invalid user Admin from 80.117.117.187 port 43989 ssh2 Jan 17 04:24:18 host sshd[25716]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:24:20 host sshd[25716]: Failed password for invalid user Admin from 80.117.117.187 port 43989 ssh2 Jan 17 04:24:22 host sshd[25716]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:24:24 host sshd[25716]: Failed password for invalid user Admin from 80.117.117.187 port 43989 ssh2 Jan 17 04:24:25 host sshd[25716]: Failed password for invalid user Admin from 80.117.117.187 port 43989 ssh2 Jan 17 04:24:25 host sshd[25716]: Connection reset by 80.117.117.187 port 43989 [preauth] Jan 17 04:24:25 host sshd[25716]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.117.117.187 Jan 17 04:24:25 host sshd[25716]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 17 04:27:52 host sshd[26465]: Invalid user dmdba from 74.128.116.0 port 34706 Jan 17 04:27:52 host sshd[26465]: input_userauth_request: invalid user dmdba [preauth] Jan 17 04:27:52 host sshd[26465]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:27:52 host sshd[26465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.128.116.0 Jan 17 04:27:53 host sshd[26465]: Failed password for invalid user dmdba from 74.128.116.0 port 34706 ssh2 Jan 17 04:27:54 host sshd[26465]: Failed password for invalid user dmdba from 74.128.116.0 port 34706 ssh2 Jan 17 04:27:54 host sshd[26465]: Connection closed by 74.128.116.0 port 34706 [preauth] Jan 17 04:34:07 host sshd[27292]: Invalid user nginx from 106.246.224.154 port 59398 Jan 17 04:34:07 host sshd[27292]: input_userauth_request: invalid user nginx [preauth] Jan 17 04:34:07 host sshd[27292]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:34:07 host sshd[27292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.246.224.154 Jan 17 04:34:07 host sshd[27295]: User root from 192.241.156.50 not allowed because not listed in AllowUsers Jan 17 04:34:07 host sshd[27295]: input_userauth_request: invalid user root [preauth] Jan 17 04:34:07 host unix_chkpwd[27300]: password check failed for user (root) Jan 17 04:34:07 host sshd[27295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.156.50 user=root Jan 17 04:34:07 host sshd[27295]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 04:34:09 host sshd[27292]: Failed password for invalid user nginx from 106.246.224.154 port 59398 ssh2 Jan 17 04:34:09 host sshd[27295]: Failed password for invalid user root from 192.241.156.50 port 60926 ssh2 Jan 17 04:34:09 host sshd[27292]: Received disconnect from 106.246.224.154 port 59398:11: Bye Bye [preauth] Jan 17 04:34:09 host sshd[27292]: Disconnected from 106.246.224.154 port 59398 [preauth] Jan 17 04:34:09 host sshd[27295]: Received disconnect from 192.241.156.50 port 60926:11: Bye Bye [preauth] Jan 17 04:34:09 host sshd[27295]: Disconnected from 192.241.156.50 port 60926 [preauth] Jan 17 04:34:38 host sshd[27370]: Invalid user hikvision from 122.117.97.117 port 33641 Jan 17 04:34:38 host sshd[27370]: input_userauth_request: invalid user hikvision [preauth] Jan 17 04:34:38 host sshd[27370]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:34:38 host sshd[27370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.97.117 Jan 17 04:34:40 host sshd[27370]: Failed password for invalid user hikvision from 122.117.97.117 port 33641 ssh2 Jan 17 04:34:40 host sshd[27370]: Connection reset by 122.117.97.117 port 33641 [preauth] Jan 17 04:34:53 host sshd[27395]: User root from 49.0.129.3 not allowed because not listed in AllowUsers Jan 17 04:34:53 host sshd[27395]: input_userauth_request: invalid user root [preauth] Jan 17 04:34:53 host unix_chkpwd[27398]: password check failed for user (root) Jan 17 04:34:53 host sshd[27395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.0.129.3 user=root Jan 17 04:34:53 host sshd[27395]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 04:34:55 host sshd[27395]: Failed password for invalid user root from 49.0.129.3 port 48636 ssh2 Jan 17 04:34:55 host sshd[27395]: Received disconnect from 49.0.129.3 port 48636:11: Bye Bye [preauth] Jan 17 04:34:55 host sshd[27395]: Disconnected from 49.0.129.3 port 48636 [preauth] Jan 17 04:38:18 host sshd[27904]: User root from 223.197.186.7 not allowed because not listed in AllowUsers Jan 17 04:38:18 host sshd[27904]: input_userauth_request: invalid user root [preauth] Jan 17 04:38:18 host unix_chkpwd[27906]: password check failed for user (root) Jan 17 04:38:18 host sshd[27904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.186.7 user=root Jan 17 04:38:18 host sshd[27904]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 04:38:20 host sshd[27904]: Failed password for invalid user root from 223.197.186.7 port 48948 ssh2 Jan 17 04:38:20 host sshd[27904]: Received disconnect from 223.197.186.7 port 48948:11: Bye Bye [preauth] Jan 17 04:38:20 host sshd[27904]: Disconnected from 223.197.186.7 port 48948 [preauth] Jan 17 04:38:32 host sshd[27948]: Invalid user sysadmin from 175.118.152.100 port 44290 Jan 17 04:38:32 host sshd[27948]: input_userauth_request: invalid user sysadmin [preauth] Jan 17 04:38:32 host sshd[27948]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:38:32 host sshd[27948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.118.152.100 Jan 17 04:38:35 host sshd[27948]: Failed password for invalid user sysadmin from 175.118.152.100 port 44290 ssh2 Jan 17 04:38:35 host sshd[27948]: Received disconnect from 175.118.152.100 port 44290:11: Bye Bye [preauth] Jan 17 04:38:35 host sshd[27948]: Disconnected from 175.118.152.100 port 44290 [preauth] Jan 17 04:39:08 host sshd[28061]: Invalid user jack from 192.241.156.50 port 57926 Jan 17 04:39:08 host sshd[28061]: input_userauth_request: invalid user jack [preauth] Jan 17 04:39:08 host sshd[28061]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:39:08 host sshd[28061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.156.50 Jan 17 04:39:10 host sshd[28061]: Failed password for invalid user jack from 192.241.156.50 port 57926 ssh2 Jan 17 04:39:10 host sshd[28061]: Received disconnect from 192.241.156.50 port 57926:11: Bye Bye [preauth] Jan 17 04:39:10 host sshd[28061]: Disconnected from 192.241.156.50 port 57926 [preauth] Jan 17 04:39:15 host sshd[28100]: Invalid user jack from 187.33.56.200 port 39543 Jan 17 04:39:15 host sshd[28100]: input_userauth_request: invalid user jack [preauth] Jan 17 04:39:15 host sshd[28100]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:39:15 host sshd[28100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.33.56.200 Jan 17 04:39:17 host sshd[28100]: Failed password for invalid user jack from 187.33.56.200 port 39543 ssh2 Jan 17 04:39:17 host sshd[28100]: Received disconnect from 187.33.56.200 port 39543:11: Bye Bye [preauth] Jan 17 04:39:17 host sshd[28100]: Disconnected from 187.33.56.200 port 39543 [preauth] Jan 17 04:40:14 host sshd[28271]: User root from 106.246.224.154 not allowed because not listed in AllowUsers Jan 17 04:40:14 host sshd[28271]: input_userauth_request: invalid user root [preauth] Jan 17 04:40:14 host unix_chkpwd[28279]: password check failed for user (root) Jan 17 04:40:14 host sshd[28271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.246.224.154 user=root Jan 17 04:40:14 host sshd[28271]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 04:40:16 host sshd[28271]: Failed password for invalid user root from 106.246.224.154 port 44700 ssh2 Jan 17 04:40:16 host sshd[28271]: Received disconnect from 106.246.224.154 port 44700:11: Bye Bye [preauth] Jan 17 04:40:16 host sshd[28271]: Disconnected from 106.246.224.154 port 44700 [preauth] Jan 17 04:40:32 host sshd[28379]: Invalid user newuser from 200.187.161.84 port 52764 Jan 17 04:40:32 host sshd[28379]: input_userauth_request: invalid user newuser [preauth] Jan 17 04:40:32 host sshd[28379]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:40:32 host sshd[28379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.187.161.84 Jan 17 04:40:34 host sshd[28379]: Failed password for invalid user newuser from 200.187.161.84 port 52764 ssh2 Jan 17 04:40:35 host sshd[28379]: Received disconnect from 200.187.161.84 port 52764:11: Bye Bye [preauth] Jan 17 04:40:35 host sshd[28379]: Disconnected from 200.187.161.84 port 52764 [preauth] Jan 17 04:40:48 host sshd[28430]: Invalid user halo from 49.0.129.3 port 52402 Jan 17 04:40:48 host sshd[28430]: input_userauth_request: invalid user halo [preauth] Jan 17 04:40:48 host sshd[28430]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:40:48 host sshd[28430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.0.129.3 Jan 17 04:40:51 host sshd[28430]: Failed password for invalid user halo from 49.0.129.3 port 52402 ssh2 Jan 17 04:40:51 host sshd[28430]: Received disconnect from 49.0.129.3 port 52402:11: Bye Bye [preauth] Jan 17 04:40:51 host sshd[28430]: Disconnected from 49.0.129.3 port 52402 [preauth] Jan 17 04:40:54 host sshd[28449]: Invalid user admin from 59.13.161.124 port 63189 Jan 17 04:40:54 host sshd[28449]: input_userauth_request: invalid user admin [preauth] Jan 17 04:40:54 host sshd[28449]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:40:54 host sshd[28449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.13.161.124 Jan 17 04:40:56 host sshd[28449]: Failed password for invalid user admin from 59.13.161.124 port 63189 ssh2 Jan 17 04:40:57 host sshd[28449]: Connection reset by 59.13.161.124 port 63189 [preauth] Jan 17 04:40:59 host sshd[28482]: Invalid user es from 187.33.56.200 port 53751 Jan 17 04:40:59 host sshd[28482]: input_userauth_request: invalid user es [preauth] Jan 17 04:40:59 host sshd[28482]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:40:59 host sshd[28482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.33.56.200 Jan 17 04:41:01 host sshd[28482]: Failed password for invalid user es from 187.33.56.200 port 53751 ssh2 Jan 17 04:41:01 host sshd[28482]: Received disconnect from 187.33.56.200 port 53751:11: Bye Bye [preauth] Jan 17 04:41:01 host sshd[28482]: Disconnected from 187.33.56.200 port 53751 [preauth] Jan 17 04:41:24 host sshd[28539]: User root from 175.118.152.100 not allowed because not listed in AllowUsers Jan 17 04:41:24 host sshd[28539]: input_userauth_request: invalid user root [preauth] Jan 17 04:41:24 host unix_chkpwd[28541]: password check failed for user (root) Jan 17 04:41:24 host sshd[28539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.118.152.100 user=root Jan 17 04:41:24 host sshd[28539]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 04:41:26 host sshd[28539]: Failed password for invalid user root from 175.118.152.100 port 60878 ssh2 Jan 17 04:41:26 host sshd[28539]: Received disconnect from 175.118.152.100 port 60878:11: Bye Bye [preauth] Jan 17 04:41:26 host sshd[28539]: Disconnected from 175.118.152.100 port 60878 [preauth] Jan 17 04:41:43 host sshd[28619]: User root from 223.197.186.7 not allowed because not listed in AllowUsers Jan 17 04:41:43 host sshd[28619]: input_userauth_request: invalid user root [preauth] Jan 17 04:41:43 host unix_chkpwd[28622]: password check failed for user (root) Jan 17 04:41:43 host sshd[28619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.186.7 user=root Jan 17 04:41:43 host sshd[28619]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 04:41:44 host sshd[28619]: Failed password for invalid user root from 223.197.186.7 port 55070 ssh2 Jan 17 04:41:44 host sshd[28619]: Received disconnect from 223.197.186.7 port 55070:11: Bye Bye [preauth] Jan 17 04:41:44 host sshd[28619]: Disconnected from 223.197.186.7 port 55070 [preauth] Jan 17 04:42:18 host sshd[28707]: Invalid user ftpuser from 200.187.161.84 port 53010 Jan 17 04:42:18 host sshd[28707]: input_userauth_request: invalid user ftpuser [preauth] Jan 17 04:42:18 host sshd[28707]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:42:18 host sshd[28707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.187.161.84 Jan 17 04:42:20 host sshd[28707]: Failed password for invalid user ftpuser from 200.187.161.84 port 53010 ssh2 Jan 17 04:42:20 host sshd[28707]: Received disconnect from 200.187.161.84 port 53010:11: Bye Bye [preauth] Jan 17 04:42:20 host sshd[28707]: Disconnected from 200.187.161.84 port 53010 [preauth] Jan 17 04:42:29 host sshd[28733]: Invalid user a from 187.33.56.200 port 39217 Jan 17 04:42:29 host sshd[28733]: input_userauth_request: invalid user a [preauth] Jan 17 04:42:29 host sshd[28733]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:42:29 host sshd[28733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.33.56.200 Jan 17 04:42:31 host sshd[28733]: Failed password for invalid user a from 187.33.56.200 port 39217 ssh2 Jan 17 04:42:31 host sshd[28733]: Received disconnect from 187.33.56.200 port 39217:11: Bye Bye [preauth] Jan 17 04:42:31 host sshd[28733]: Disconnected from 187.33.56.200 port 39217 [preauth] Jan 17 04:43:52 host sshd[29053]: Invalid user jenkins from 200.187.161.84 port 52104 Jan 17 04:43:52 host sshd[29053]: input_userauth_request: invalid user jenkins [preauth] Jan 17 04:43:52 host sshd[29053]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:43:52 host sshd[29053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.187.161.84 Jan 17 04:43:54 host sshd[29053]: Failed password for invalid user jenkins from 200.187.161.84 port 52104 ssh2 Jan 17 04:47:48 host sshd[29534]: Invalid user default from 59.127.77.7 port 35671 Jan 17 04:47:48 host sshd[29534]: input_userauth_request: invalid user default [preauth] Jan 17 04:47:48 host sshd[29534]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:47:48 host sshd[29534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.77.7 Jan 17 04:47:50 host sshd[29534]: Failed password for invalid user default from 59.127.77.7 port 35671 ssh2 Jan 17 04:47:50 host sshd[29534]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:47:52 host sshd[29534]: Failed password for invalid user default from 59.127.77.7 port 35671 ssh2 Jan 17 04:47:53 host sshd[29534]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:47:55 host sshd[29534]: Failed password for invalid user default from 59.127.77.7 port 35671 ssh2 Jan 17 04:47:55 host sshd[29534]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:47:57 host sshd[29534]: Failed password for invalid user default from 59.127.77.7 port 35671 ssh2 Jan 17 04:47:58 host sshd[29534]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:48:00 host sshd[29534]: Failed password for invalid user default from 59.127.77.7 port 35671 ssh2 Jan 17 04:48:00 host sshd[29534]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:48:02 host sshd[29534]: Failed password for invalid user default from 59.127.77.7 port 35671 ssh2 Jan 17 04:48:02 host sshd[29534]: error: maximum authentication attempts exceeded for invalid user default from 59.127.77.7 port 35671 ssh2 [preauth] Jan 17 04:48:02 host sshd[29534]: Disconnecting: Too many authentication failures [preauth] Jan 17 04:48:02 host sshd[29534]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.77.7 Jan 17 04:48:02 host sshd[29534]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 17 04:49:46 host sshd[29877]: Invalid user ubuntu from 101.191.143.212 port 42912 Jan 17 04:49:46 host sshd[29877]: input_userauth_request: invalid user ubuntu [preauth] Jan 17 04:49:46 host sshd[29877]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:49:46 host sshd[29877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.191.143.212 Jan 17 04:49:48 host sshd[29877]: Failed password for invalid user ubuntu from 101.191.143.212 port 42912 ssh2 Jan 17 04:49:49 host sshd[29877]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:49:51 host sshd[29877]: Failed password for invalid user ubuntu from 101.191.143.212 port 42912 ssh2 Jan 17 04:49:54 host sshd[29877]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:49:56 host sshd[29877]: Failed password for invalid user ubuntu from 101.191.143.212 port 42912 ssh2 Jan 17 04:49:57 host sshd[29877]: Failed password for invalid user ubuntu from 101.191.143.212 port 42912 ssh2 Jan 17 04:49:57 host sshd[29877]: pam_unix(sshd:auth): check pass; user unknown Jan 17 04:49:59 host sshd[29877]: Failed password for invalid user ubuntu from 101.191.143.212 port 42912 ssh2 Jan 17 05:02:43 host sshd[31845]: User root from 187.191.60.178 not allowed because not listed in AllowUsers Jan 17 05:02:43 host sshd[31845]: input_userauth_request: invalid user root [preauth] Jan 17 05:02:43 host unix_chkpwd[31852]: password check failed for user (root) Jan 17 05:02:43 host sshd[31845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.191.60.178 user=root Jan 17 05:02:43 host sshd[31845]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 05:02:45 host sshd[31845]: Failed password for invalid user root from 187.191.60.178 port 43791 ssh2 Jan 17 05:02:45 host sshd[31845]: Received disconnect from 187.191.60.178 port 43791:11: Bye Bye [preauth] Jan 17 05:02:45 host sshd[31845]: Disconnected from 187.191.60.178 port 43791 [preauth] Jan 17 05:04:04 host sshd[32166]: Invalid user admin1 from 97.74.94.252 port 45372 Jan 17 05:04:04 host sshd[32166]: input_userauth_request: invalid user admin1 [preauth] Jan 17 05:04:04 host sshd[32166]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:04:04 host sshd[32166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.74.94.252 Jan 17 05:04:06 host sshd[32166]: Failed password for invalid user admin1 from 97.74.94.252 port 45372 ssh2 Jan 17 05:04:06 host sshd[32166]: Received disconnect from 97.74.94.252 port 45372:11: Bye Bye [preauth] Jan 17 05:04:06 host sshd[32166]: Disconnected from 97.74.94.252 port 45372 [preauth] Jan 17 05:04:59 host sshd[32261]: Invalid user manager from 97.74.86.61 port 53666 Jan 17 05:04:59 host sshd[32261]: input_userauth_request: invalid user manager [preauth] Jan 17 05:04:59 host sshd[32261]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:04:59 host sshd[32261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.74.86.61 Jan 17 05:05:00 host sshd[32261]: Failed password for invalid user manager from 97.74.86.61 port 53666 ssh2 Jan 17 05:05:00 host sshd[32261]: Received disconnect from 97.74.86.61 port 53666:11: Bye Bye [preauth] Jan 17 05:05:00 host sshd[32261]: Disconnected from 97.74.86.61 port 53666 [preauth] Jan 17 05:05:32 host sshd[32377]: Invalid user odoo from 126.77.170.137 port 34140 Jan 17 05:05:32 host sshd[32377]: input_userauth_request: invalid user odoo [preauth] Jan 17 05:05:32 host sshd[32377]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:05:32 host sshd[32377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.77.170.137 Jan 17 05:05:34 host sshd[32377]: Failed password for invalid user odoo from 126.77.170.137 port 34140 ssh2 Jan 17 05:05:34 host sshd[32377]: Received disconnect from 126.77.170.137 port 34140:11: Bye Bye [preauth] Jan 17 05:05:34 host sshd[32377]: Disconnected from 126.77.170.137 port 34140 [preauth] Jan 17 05:06:43 host sshd[32522]: Invalid user gpadmin from 97.74.94.252 port 49226 Jan 17 05:06:43 host sshd[32522]: input_userauth_request: invalid user gpadmin [preauth] Jan 17 05:06:43 host sshd[32522]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:06:43 host sshd[32522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.74.94.252 Jan 17 05:06:45 host sshd[32522]: Failed password for invalid user gpadmin from 97.74.94.252 port 49226 ssh2 Jan 17 05:06:45 host sshd[32522]: Received disconnect from 97.74.94.252 port 49226:11: Bye Bye [preauth] Jan 17 05:06:45 host sshd[32522]: Disconnected from 97.74.94.252 port 49226 [preauth] Jan 17 05:08:05 host sshd[32696]: User root from 97.74.94.252 not allowed because not listed in AllowUsers Jan 17 05:08:05 host sshd[32696]: input_userauth_request: invalid user root [preauth] Jan 17 05:08:05 host unix_chkpwd[32699]: password check failed for user (root) Jan 17 05:08:05 host sshd[32696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.74.94.252 user=root Jan 17 05:08:05 host sshd[32696]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 05:08:07 host sshd[32696]: Failed password for invalid user root from 97.74.94.252 port 43966 ssh2 Jan 17 05:08:07 host sshd[32696]: Received disconnect from 97.74.94.252 port 43966:11: Bye Bye [preauth] Jan 17 05:08:07 host sshd[32696]: Disconnected from 97.74.94.252 port 43966 [preauth] Jan 17 05:08:24 host sshd[32757]: Invalid user guest from 13.208.185.44 port 49532 Jan 17 05:08:24 host sshd[32757]: input_userauth_request: invalid user guest [preauth] Jan 17 05:08:24 host sshd[32757]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:08:24 host sshd[32757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.208.185.44 Jan 17 05:08:27 host sshd[32757]: Failed password for invalid user guest from 13.208.185.44 port 49532 ssh2 Jan 17 05:08:27 host sshd[32757]: Received disconnect from 13.208.185.44 port 49532:11: Bye Bye [preauth] Jan 17 05:08:27 host sshd[32757]: Disconnected from 13.208.185.44 port 49532 [preauth] Jan 17 05:08:27 host sshd[32762]: Invalid user user01 from 97.74.86.61 port 58598 Jan 17 05:08:27 host sshd[32762]: input_userauth_request: invalid user user01 [preauth] Jan 17 05:08:27 host sshd[32762]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:08:27 host sshd[32762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.74.86.61 Jan 17 05:08:29 host sshd[32762]: Failed password for invalid user user01 from 97.74.86.61 port 58598 ssh2 Jan 17 05:08:29 host sshd[32762]: Received disconnect from 97.74.86.61 port 58598:11: Bye Bye [preauth] Jan 17 05:08:29 host sshd[32762]: Disconnected from 97.74.86.61 port 58598 [preauth] Jan 17 05:08:59 host sshd[371]: Invalid user usuario from 126.77.170.137 port 49216 Jan 17 05:08:59 host sshd[371]: input_userauth_request: invalid user usuario [preauth] Jan 17 05:08:59 host sshd[371]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:08:59 host sshd[371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.77.170.137 Jan 17 05:09:01 host sshd[371]: Failed password for invalid user usuario from 126.77.170.137 port 49216 ssh2 Jan 17 05:09:01 host sshd[371]: Received disconnect from 126.77.170.137 port 49216:11: Bye Bye [preauth] Jan 17 05:09:01 host sshd[371]: Disconnected from 126.77.170.137 port 49216 [preauth] Jan 17 05:10:00 host sshd[604]: User root from 97.74.86.61 not allowed because not listed in AllowUsers Jan 17 05:10:00 host sshd[604]: input_userauth_request: invalid user root [preauth] Jan 17 05:10:00 host unix_chkpwd[607]: password check failed for user (root) Jan 17 05:10:00 host sshd[604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.74.86.61 user=root Jan 17 05:10:00 host sshd[604]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 05:10:02 host sshd[604]: Failed password for invalid user root from 97.74.86.61 port 53438 ssh2 Jan 17 05:10:02 host sshd[604]: Received disconnect from 97.74.86.61 port 53438:11: Bye Bye [preauth] Jan 17 05:10:02 host sshd[604]: Disconnected from 97.74.86.61 port 53438 [preauth] Jan 17 05:10:24 host sshd[716]: Invalid user ONTUSER from 125.228.30.214 port 35938 Jan 17 05:10:24 host sshd[716]: input_userauth_request: invalid user ONTUSER [preauth] Jan 17 05:10:24 host sshd[716]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:10:24 host sshd[716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.30.214 Jan 17 05:10:27 host sshd[716]: Failed password for invalid user ONTUSER from 125.228.30.214 port 35938 ssh2 Jan 17 05:10:28 host sshd[716]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:10:30 host sshd[716]: Failed password for invalid user ONTUSER from 125.228.30.214 port 35938 ssh2 Jan 17 05:10:30 host sshd[716]: Connection reset by 125.228.30.214 port 35938 [preauth] Jan 17 05:10:30 host sshd[716]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.30.214 Jan 17 05:10:47 host sshd[783]: User root from 187.191.60.178 not allowed because not listed in AllowUsers Jan 17 05:10:47 host sshd[783]: input_userauth_request: invalid user root [preauth] Jan 17 05:10:47 host unix_chkpwd[786]: password check failed for user (root) Jan 17 05:10:47 host sshd[783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.191.60.178 user=root Jan 17 05:10:47 host sshd[783]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 05:10:49 host sshd[783]: Failed password for invalid user root from 187.191.60.178 port 18914 ssh2 Jan 17 05:10:54 host sshd[824]: User root from 126.77.170.137 not allowed because not listed in AllowUsers Jan 17 05:10:54 host sshd[824]: input_userauth_request: invalid user root [preauth] Jan 17 05:10:54 host unix_chkpwd[826]: password check failed for user (root) Jan 17 05:10:54 host sshd[824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.77.170.137 user=root Jan 17 05:10:54 host sshd[824]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 05:10:57 host sshd[824]: Failed password for invalid user root from 126.77.170.137 port 58958 ssh2 Jan 17 05:10:57 host sshd[824]: Received disconnect from 126.77.170.137 port 58958:11: Bye Bye [preauth] Jan 17 05:10:57 host sshd[824]: Disconnected from 126.77.170.137 port 58958 [preauth] Jan 17 05:13:22 host sshd[1166]: Invalid user sysadmin from 13.208.185.44 port 49172 Jan 17 05:13:22 host sshd[1166]: input_userauth_request: invalid user sysadmin [preauth] Jan 17 05:13:22 host sshd[1166]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:13:22 host sshd[1166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.208.185.44 Jan 17 05:13:23 host sshd[1166]: Failed password for invalid user sysadmin from 13.208.185.44 port 49172 ssh2 Jan 17 05:13:24 host sshd[1166]: Received disconnect from 13.208.185.44 port 49172:11: Bye Bye [preauth] Jan 17 05:13:24 host sshd[1166]: Disconnected from 13.208.185.44 port 49172 [preauth] Jan 17 05:16:50 host sshd[1707]: Invalid user user01 from 13.208.185.44 port 49494 Jan 17 05:16:50 host sshd[1707]: input_userauth_request: invalid user user01 [preauth] Jan 17 05:16:50 host sshd[1707]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:16:50 host sshd[1707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.208.185.44 Jan 17 05:16:52 host sshd[1707]: Failed password for invalid user user01 from 13.208.185.44 port 49494 ssh2 Jan 17 05:16:53 host sshd[1707]: Received disconnect from 13.208.185.44 port 49494:11: Bye Bye [preauth] Jan 17 05:16:53 host sshd[1707]: Disconnected from 13.208.185.44 port 49494 [preauth] Jan 17 05:17:40 host sshd[1885]: Did not receive identification string from 154.89.5.218 port 59992 Jan 17 05:17:55 host sshd[1886]: Connection closed by 154.89.5.218 port 60036 [preauth] Jan 17 05:19:47 host sshd[2293]: Invalid user albert from 209.141.56.48 port 46100 Jan 17 05:19:47 host sshd[2293]: input_userauth_request: invalid user albert [preauth] Jan 17 05:19:47 host sshd[2293]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:19:47 host sshd[2293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 17 05:19:49 host sshd[2293]: Failed password for invalid user albert from 209.141.56.48 port 46100 ssh2 Jan 17 05:19:49 host sshd[2293]: Connection closed by 209.141.56.48 port 46100 [preauth] Jan 17 05:20:20 host sshd[2392]: Invalid user albert from 209.141.56.48 port 37604 Jan 17 05:20:20 host sshd[2392]: input_userauth_request: invalid user albert [preauth] Jan 17 05:20:20 host sshd[2392]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:20:20 host sshd[2392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 17 05:20:22 host sshd[2392]: Failed password for invalid user albert from 209.141.56.48 port 37604 ssh2 Jan 17 05:20:22 host sshd[2392]: Connection closed by 209.141.56.48 port 37604 [preauth] Jan 17 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 05:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 05:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 05:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 05:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=palco123 user-4=gifterman user-5=kottayamcalldriv user-6=phmetals user-7=wwwletsstalkfood user-8=straightcurve user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=wwwkapin user-16=woodpeck user-17=disposeat user-18=wwwkmaorg user-19=remysagr user-20=wwwresourcehunte user-21=keralaholi user-22=wwwrmswll user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 05:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 05:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 05:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 05:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Jan 17 05:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Jan 17 05:21:04 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 17 05:21:04 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 17 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Jan 17 05:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Jan 17 05:21:04 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 17 05:21:04 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 17 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Jan 17 05:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 17 05:21:04 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 17 05:21:04 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 17 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 17 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 17 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 17 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 17 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 17 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 05:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 17 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 17 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 17 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Jan 17 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 17 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 17 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session closed for user gifterman Jan 17 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Jan 17 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session closed for user phmetals Jan 17 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 17 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Jan 17 05:21:06 host sudo: pam_unix(sudo:session): session closed for user straightcurve Jan 17 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user pmcresources Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user vfmassets Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user disposeat Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user remysagr Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-1rdjXEbdW2123GzP.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-1rdjXEbdW2123GzP.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user travelboniface Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Jan 17 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Jan 17 05:21:07 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Jan 17 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session closed for user dartsimp Jan 17 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Jan 17 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Jan 17 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 17 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 17 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-ODbtUGmoDikXBpZ3.wp-toolkit-identifier Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 17 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-ODbtUGmoDikXBpZ3.wp-toolkit-identifier Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 17 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZHP02OsIp13SDntl.~ Jan 17 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZHP02OsIp13SDntl.~' Jan 17 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZHP02OsIp13SDntl.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 05:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 05:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 05:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 05:21:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 05:21:44 host sshd[3220]: Connection reset by 222.112.19.89 port 62218 [preauth] Jan 17 05:23:30 host sshd[3471]: Invalid user pi from 151.52.124.160 port 45082 Jan 17 05:23:30 host sshd[3471]: input_userauth_request: invalid user pi [preauth] Jan 17 05:23:30 host sshd[3471]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:23:30 host sshd[3471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.52.124.160 Jan 17 05:23:30 host sshd[3472]: Invalid user pi from 151.52.124.160 port 45084 Jan 17 05:23:30 host sshd[3472]: input_userauth_request: invalid user pi [preauth] Jan 17 05:23:30 host sshd[3472]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:23:30 host sshd[3472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.52.124.160 Jan 17 05:23:33 host sshd[3471]: Failed password for invalid user pi from 151.52.124.160 port 45082 ssh2 Jan 17 05:23:33 host sshd[3471]: Connection closed by 151.52.124.160 port 45082 [preauth] Jan 17 05:23:33 host sshd[3472]: Failed password for invalid user pi from 151.52.124.160 port 45084 ssh2 Jan 17 05:23:33 host sshd[3472]: Connection closed by 151.52.124.160 port 45084 [preauth] Jan 17 05:25:19 host sshd[3875]: User root from 121.155.171.79 not allowed because not listed in AllowUsers Jan 17 05:25:19 host sshd[3875]: input_userauth_request: invalid user root [preauth] Jan 17 05:25:19 host unix_chkpwd[3890]: password check failed for user (root) Jan 17 05:25:19 host sshd[3875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.155.171.79 user=root Jan 17 05:25:19 host sshd[3875]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 05:25:21 host sshd[3875]: Failed password for invalid user root from 121.155.171.79 port 42592 ssh2 Jan 17 05:25:22 host sshd[3875]: Connection reset by 121.155.171.79 port 42592 [preauth] Jan 17 05:32:21 host sshd[4966]: Connection reset by 125.228.34.140 port 45650 [preauth] Jan 17 05:33:09 host sshd[5073]: User root from 209.141.55.27 not allowed because not listed in AllowUsers Jan 17 05:33:09 host sshd[5073]: input_userauth_request: invalid user root [preauth] Jan 17 05:33:09 host unix_chkpwd[5076]: password check failed for user (root) Jan 17 05:33:09 host sshd[5073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 user=root Jan 17 05:33:09 host sshd[5073]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 05:33:11 host sshd[5073]: Failed password for invalid user root from 209.141.55.27 port 51998 ssh2 Jan 17 05:33:11 host sshd[5073]: Received disconnect from 209.141.55.27 port 51998:11: Normal Shutdown, Thank you for playing [preauth] Jan 17 05:33:11 host sshd[5073]: Disconnected from 209.141.55.27 port 51998 [preauth] Jan 17 05:39:50 host sshd[6209]: Invalid user default from 116.15.64.17 port 61034 Jan 17 05:39:50 host sshd[6209]: input_userauth_request: invalid user default [preauth] Jan 17 05:39:50 host sshd[6209]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:39:50 host sshd[6209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.15.64.17 Jan 17 05:39:52 host sshd[6209]: Failed password for invalid user default from 116.15.64.17 port 61034 ssh2 Jan 17 05:39:52 host sshd[6209]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:39:54 host sshd[6209]: Failed password for invalid user default from 116.15.64.17 port 61034 ssh2 Jan 17 05:46:00 host sshd[7181]: Invalid user albert from 209.141.56.48 port 36770 Jan 17 05:46:00 host sshd[7181]: input_userauth_request: invalid user albert [preauth] Jan 17 05:46:00 host sshd[7181]: pam_unix(sshd:auth): check pass; user unknown Jan 17 05:46:00 host sshd[7181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 17 05:46:03 host sshd[7181]: Failed password for invalid user albert from 209.141.56.48 port 36770 ssh2 Jan 17 05:46:03 host sshd[7181]: Connection closed by 209.141.56.48 port 36770 [preauth] Jan 17 06:04:20 host sshd[9731]: User root from 220.84.192.131 not allowed because not listed in AllowUsers Jan 17 06:04:20 host sshd[9731]: input_userauth_request: invalid user root [preauth] Jan 17 06:04:20 host unix_chkpwd[9740]: password check failed for user (root) Jan 17 06:04:20 host sshd[9731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.84.192.131 user=root Jan 17 06:04:20 host sshd[9731]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:04:22 host sshd[9731]: Failed password for invalid user root from 220.84.192.131 port 61890 ssh2 Jan 17 06:04:23 host unix_chkpwd[9743]: password check failed for user (root) Jan 17 06:04:23 host sshd[9731]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:04:24 host sshd[9731]: Failed password for invalid user root from 220.84.192.131 port 61890 ssh2 Jan 17 06:04:25 host unix_chkpwd[9746]: password check failed for user (root) Jan 17 06:04:25 host sshd[9731]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:04:26 host sshd[9731]: Failed password for invalid user root from 220.84.192.131 port 61890 ssh2 Jan 17 06:04:27 host unix_chkpwd[9756]: password check failed for user (root) Jan 17 06:04:27 host sshd[9731]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:04:30 host sshd[9731]: Failed password for invalid user root from 220.84.192.131 port 61890 ssh2 Jan 17 06:04:30 host unix_chkpwd[9802]: password check failed for user (root) Jan 17 06:04:30 host sshd[9731]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:04:32 host sshd[9731]: Failed password for invalid user root from 220.84.192.131 port 61890 ssh2 Jan 17 06:12:02 host sshd[11118]: User root from 217.96.146.145 not allowed because not listed in AllowUsers Jan 17 06:12:02 host sshd[11118]: input_userauth_request: invalid user root [preauth] Jan 17 06:12:02 host unix_chkpwd[11123]: password check failed for user (root) Jan 17 06:12:02 host sshd[11118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.96.146.145 user=root Jan 17 06:12:02 host sshd[11118]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:12:04 host sshd[11118]: Failed password for invalid user root from 217.96.146.145 port 42235 ssh2 Jan 17 06:12:05 host unix_chkpwd[11128]: password check failed for user (root) Jan 17 06:12:05 host sshd[11118]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:12:07 host sshd[11118]: Failed password for invalid user root from 217.96.146.145 port 42235 ssh2 Jan 17 06:12:07 host unix_chkpwd[11132]: password check failed for user (root) Jan 17 06:12:07 host sshd[11118]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:12:10 host sshd[11118]: Failed password for invalid user root from 217.96.146.145 port 42235 ssh2 Jan 17 06:12:10 host unix_chkpwd[11136]: password check failed for user (root) Jan 17 06:12:10 host sshd[11118]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:12:12 host sshd[11118]: Failed password for invalid user root from 217.96.146.145 port 42235 ssh2 Jan 17 06:15:45 host sshd[11692]: Invalid user fh from 194.110.203.109 port 54470 Jan 17 06:15:45 host sshd[11692]: input_userauth_request: invalid user fh [preauth] Jan 17 06:15:45 host sshd[11692]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:15:45 host sshd[11692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 06:15:46 host sshd[11692]: Failed password for invalid user fh from 194.110.203.109 port 54470 ssh2 Jan 17 06:15:49 host sshd[11692]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:15:51 host sshd[11692]: Failed password for invalid user fh from 194.110.203.109 port 54470 ssh2 Jan 17 06:15:54 host sshd[11692]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:15:56 host sshd[11692]: Failed password for invalid user fh from 194.110.203.109 port 54470 ssh2 Jan 17 06:15:59 host sshd[11692]: Connection closed by 194.110.203.109 port 54470 [preauth] Jan 17 06:15:59 host sshd[11692]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 06:20:20 host sshd[12538]: Invalid user manuel from 107.189.30.59 port 54168 Jan 17 06:20:20 host sshd[12538]: input_userauth_request: invalid user manuel [preauth] Jan 17 06:20:20 host sshd[12538]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:20:20 host sshd[12538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 17 06:20:23 host sshd[12538]: Failed password for invalid user manuel from 107.189.30.59 port 54168 ssh2 Jan 17 06:20:23 host sshd[12538]: Connection closed by 107.189.30.59 port 54168 [preauth] Jan 17 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 06:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 06:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 06:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 06:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 06:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwresourcehunte user-5=keralaholi user-6=wwwrmswll user-7=wwwkaretakers user-8=cochintaxi user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwletsstalkfood user-15=straightcurve user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=remysagr user-24=wwwkmaorg user-25=wwwkapin user-26=woodpeck user-27=shalinijames user-28=wwwtestugo user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 06:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 06:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 06:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-FZx450qD7t5Y05qY.~ Jan 17 06:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-FZx450qD7t5Y05qY.~' Jan 17 06:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-FZx450qD7t5Y05qY.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 06:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 06:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 06:21:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 06:21:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 06:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 06:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 06:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 06:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 06:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 06:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:21:56 host sshd[13091]: Connection closed by 45.79.172.21 port 36130 [preauth] Jan 17 06:21:59 host sshd[13098]: Connection closed by 45.79.172.21 port 11012 [preauth] Jan 17 06:22:01 host sshd[13103]: Connection closed by 45.79.172.21 port 11020 [preauth] Jan 17 06:38:22 host sshd[15858]: Invalid user admin from 222.230.21.66 port 41973 Jan 17 06:38:22 host sshd[15858]: input_userauth_request: invalid user admin [preauth] Jan 17 06:38:22 host sshd[15858]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:38:22 host sshd[15858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.230.21.66 Jan 17 06:38:24 host sshd[15858]: Failed password for invalid user admin from 222.230.21.66 port 41973 ssh2 Jan 17 06:38:25 host sshd[15858]: Failed password for invalid user admin from 222.230.21.66 port 41973 ssh2 Jan 17 06:38:26 host sshd[15858]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:38:28 host sshd[15858]: Failed password for invalid user admin from 222.230.21.66 port 41973 ssh2 Jan 17 06:38:28 host sshd[15858]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:38:30 host sshd[15858]: Failed password for invalid user admin from 222.230.21.66 port 41973 ssh2 Jan 17 06:38:30 host sshd[15858]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:38:32 host sshd[15858]: Failed password for invalid user admin from 222.230.21.66 port 41973 ssh2 Jan 17 06:38:33 host sshd[15924]: Invalid user mike from 210.16.201.188 port 59472 Jan 17 06:38:33 host sshd[15924]: input_userauth_request: invalid user mike [preauth] Jan 17 06:38:33 host sshd[15924]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:38:33 host sshd[15924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.16.201.188 Jan 17 06:38:36 host sshd[15924]: Failed password for invalid user mike from 210.16.201.188 port 59472 ssh2 Jan 17 06:38:36 host sshd[15924]: Received disconnect from 210.16.201.188 port 59472:11: Bye Bye [preauth] Jan 17 06:38:36 host sshd[15924]: Disconnected from 210.16.201.188 port 59472 [preauth] Jan 17 06:43:47 host sshd[16708]: Invalid user user from 162.194.48.181 port 55918 Jan 17 06:43:47 host sshd[16708]: input_userauth_request: invalid user user [preauth] Jan 17 06:43:47 host sshd[16708]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:43:47 host sshd[16708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.194.48.181 Jan 17 06:43:49 host sshd[16708]: Failed password for invalid user user from 162.194.48.181 port 55918 ssh2 Jan 17 06:43:52 host sshd[16708]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:43:54 host sshd[16708]: Failed password for invalid user user from 162.194.48.181 port 55918 ssh2 Jan 17 06:43:55 host sshd[16708]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:43:57 host sshd[16708]: Failed password for invalid user user from 162.194.48.181 port 55918 ssh2 Jan 17 06:43:58 host sshd[16708]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:43:59 host sshd[16708]: Failed password for invalid user user from 162.194.48.181 port 55918 ssh2 Jan 17 06:44:00 host sshd[16708]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:44:02 host sshd[16708]: Failed password for invalid user user from 162.194.48.181 port 55918 ssh2 Jan 17 06:44:11 host sshd[16839]: User root from 210.16.201.188 not allowed because not listed in AllowUsers Jan 17 06:44:11 host sshd[16839]: input_userauth_request: invalid user root [preauth] Jan 17 06:44:11 host unix_chkpwd[16843]: password check failed for user (root) Jan 17 06:44:11 host sshd[16839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.16.201.188 user=root Jan 17 06:44:11 host sshd[16839]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:44:13 host sshd[16839]: Failed password for invalid user root from 210.16.201.188 port 56250 ssh2 Jan 17 06:44:13 host sshd[16839]: Received disconnect from 210.16.201.188 port 56250:11: Bye Bye [preauth] Jan 17 06:44:13 host sshd[16839]: Disconnected from 210.16.201.188 port 56250 [preauth] Jan 17 06:48:09 host sshd[17545]: Invalid user steam from 220.134.113.234 port 47480 Jan 17 06:48:09 host sshd[17545]: input_userauth_request: invalid user steam [preauth] Jan 17 06:48:09 host sshd[17545]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:48:09 host sshd[17545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.113.234 Jan 17 06:48:11 host sshd[17545]: Failed password for invalid user steam from 220.134.113.234 port 47480 ssh2 Jan 17 06:48:11 host sshd[17545]: Connection reset by 220.134.113.234 port 47480 [preauth] Jan 17 06:50:40 host sshd[17929]: User root from 157.245.53.239 not allowed because not listed in AllowUsers Jan 17 06:50:40 host sshd[17929]: input_userauth_request: invalid user root [preauth] Jan 17 06:50:40 host unix_chkpwd[17932]: password check failed for user (root) Jan 17 06:50:40 host sshd[17929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.53.239 user=root Jan 17 06:50:40 host sshd[17929]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:50:42 host sshd[17929]: Failed password for invalid user root from 157.245.53.239 port 47406 ssh2 Jan 17 06:50:42 host sshd[17929]: Received disconnect from 157.245.53.239 port 47406:11: Bye Bye [preauth] Jan 17 06:50:42 host sshd[17929]: Disconnected from 157.245.53.239 port 47406 [preauth] Jan 17 06:51:09 host sshd[17984]: Invalid user panda from 37.193.112.180 port 39674 Jan 17 06:51:09 host sshd[17984]: input_userauth_request: invalid user panda [preauth] Jan 17 06:51:09 host sshd[17984]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:51:09 host sshd[17984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.193.112.180 Jan 17 06:51:11 host sshd[17984]: Failed password for invalid user panda from 37.193.112.180 port 39674 ssh2 Jan 17 06:51:11 host sshd[17984]: Received disconnect from 37.193.112.180 port 39674:11: Bye Bye [preauth] Jan 17 06:51:11 host sshd[17984]: Disconnected from 37.193.112.180 port 39674 [preauth] Jan 17 06:51:39 host sshd[18058]: Invalid user zookeeper from 34.23.17.138 port 1111 Jan 17 06:51:39 host sshd[18058]: input_userauth_request: invalid user zookeeper [preauth] Jan 17 06:51:39 host sshd[18058]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:51:39 host sshd[18058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.23.17.138 Jan 17 06:51:40 host sshd[18058]: Failed password for invalid user zookeeper from 34.23.17.138 port 1111 ssh2 Jan 17 06:51:41 host sshd[18058]: Received disconnect from 34.23.17.138 port 1111:11: Bye Bye [preauth] Jan 17 06:51:41 host sshd[18058]: Disconnected from 34.23.17.138 port 1111 [preauth] Jan 17 06:51:59 host sshd[18185]: Invalid user ts2 from 5.255.106.239 port 21974 Jan 17 06:51:59 host sshd[18185]: input_userauth_request: invalid user ts2 [preauth] Jan 17 06:51:59 host sshd[18185]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:51:59 host sshd[18185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.255.106.239 Jan 17 06:52:01 host sshd[18185]: Failed password for invalid user ts2 from 5.255.106.239 port 21974 ssh2 Jan 17 06:52:01 host sshd[18185]: Received disconnect from 5.255.106.239 port 21974:11: Bye Bye [preauth] Jan 17 06:52:01 host sshd[18185]: Disconnected from 5.255.106.239 port 21974 [preauth] Jan 17 06:52:40 host sshd[18285]: User root from 113.125.41.74 not allowed because not listed in AllowUsers Jan 17 06:52:40 host sshd[18285]: input_userauth_request: invalid user root [preauth] Jan 17 06:52:40 host unix_chkpwd[18293]: password check failed for user (root) Jan 17 06:52:40 host sshd[18285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.125.41.74 user=root Jan 17 06:52:40 host sshd[18285]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:52:41 host sshd[18285]: Failed password for invalid user root from 113.125.41.74 port 33978 ssh2 Jan 17 06:52:42 host unix_chkpwd[18297]: password check failed for user (root) Jan 17 06:52:42 host sshd[18285]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:52:45 host sshd[18285]: Failed password for invalid user root from 113.125.41.74 port 33978 ssh2 Jan 17 06:52:45 host unix_chkpwd[18302]: password check failed for user (root) Jan 17 06:52:45 host sshd[18285]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:52:47 host sshd[18285]: Failed password for invalid user root from 113.125.41.74 port 33978 ssh2 Jan 17 06:52:47 host unix_chkpwd[18308]: password check failed for user (root) Jan 17 06:52:47 host sshd[18285]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:52:49 host sshd[18285]: Failed password for invalid user root from 113.125.41.74 port 33978 ssh2 Jan 17 06:52:49 host unix_chkpwd[18312]: password check failed for user (root) Jan 17 06:52:49 host sshd[18285]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:52:52 host sshd[18285]: Failed password for invalid user root from 113.125.41.74 port 33978 ssh2 Jan 17 06:53:02 host sshd[18361]: User root from 186.67.248.8 not allowed because not listed in AllowUsers Jan 17 06:53:02 host sshd[18361]: input_userauth_request: invalid user root [preauth] Jan 17 06:53:02 host unix_chkpwd[18375]: password check failed for user (root) Jan 17 06:53:02 host sshd[18361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.8 user=root Jan 17 06:53:02 host sshd[18361]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:53:03 host sshd[18361]: Failed password for invalid user root from 186.67.248.8 port 50134 ssh2 Jan 17 06:53:04 host sshd[18361]: Received disconnect from 186.67.248.8 port 50134:11: Bye Bye [preauth] Jan 17 06:53:04 host sshd[18361]: Disconnected from 186.67.248.8 port 50134 [preauth] Jan 17 06:53:25 host sshd[18413]: Invalid user db2inst1 from 43.156.241.142 port 55258 Jan 17 06:53:25 host sshd[18413]: input_userauth_request: invalid user db2inst1 [preauth] Jan 17 06:53:25 host sshd[18413]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:53:25 host sshd[18413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.241.142 Jan 17 06:53:27 host sshd[18413]: Failed password for invalid user db2inst1 from 43.156.241.142 port 55258 ssh2 Jan 17 06:53:27 host sshd[18413]: Received disconnect from 43.156.241.142 port 55258:11: Bye Bye [preauth] Jan 17 06:53:27 host sshd[18413]: Disconnected from 43.156.241.142 port 55258 [preauth] Jan 17 06:54:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 06:54:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:54:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:54:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 06:54:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:54:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:54:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 06:54:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:54:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:54:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 06:54:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:54:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:54:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 06:54:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:54:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:54:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 06:54:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:54:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:54:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 06:54:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 06:54:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 06:54:32 host sshd[18668]: Invalid user oracle from 182.71.142.252 port 37438 Jan 17 06:54:32 host sshd[18668]: input_userauth_request: invalid user oracle [preauth] Jan 17 06:54:32 host sshd[18668]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:54:32 host sshd[18668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.71.142.252 Jan 17 06:54:33 host sshd[18668]: Failed password for invalid user oracle from 182.71.142.252 port 37438 ssh2 Jan 17 06:54:33 host sshd[18668]: Received disconnect from 182.71.142.252 port 37438:11: Bye Bye [preauth] Jan 17 06:54:33 host sshd[18668]: Disconnected from 182.71.142.252 port 37438 [preauth] Jan 17 06:55:07 host sshd[18744]: Invalid user mike from 64.225.70.42 port 34782 Jan 17 06:55:07 host sshd[18744]: input_userauth_request: invalid user mike [preauth] Jan 17 06:55:07 host sshd[18744]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:55:07 host sshd[18744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.70.42 Jan 17 06:55:09 host sshd[18744]: Failed password for invalid user mike from 64.225.70.42 port 34782 ssh2 Jan 17 06:55:09 host sshd[18744]: Received disconnect from 64.225.70.42 port 34782:11: Bye Bye [preauth] Jan 17 06:55:09 host sshd[18744]: Disconnected from 64.225.70.42 port 34782 [preauth] Jan 17 06:55:30 host sshd[18805]: Invalid user zookeeper from 43.159.49.49 port 37394 Jan 17 06:55:30 host sshd[18805]: input_userauth_request: invalid user zookeeper [preauth] Jan 17 06:55:30 host sshd[18805]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:55:30 host sshd[18805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.49.49 Jan 17 06:55:32 host sshd[18805]: Failed password for invalid user zookeeper from 43.159.49.49 port 37394 ssh2 Jan 17 06:55:32 host sshd[18805]: Received disconnect from 43.159.49.49 port 37394:11: Bye Bye [preauth] Jan 17 06:55:32 host sshd[18805]: Disconnected from 43.159.49.49 port 37394 [preauth] Jan 17 06:55:44 host sshd[18820]: User root from 186.145.254.158 not allowed because not listed in AllowUsers Jan 17 06:55:44 host sshd[18820]: input_userauth_request: invalid user root [preauth] Jan 17 06:55:44 host unix_chkpwd[18824]: password check failed for user (root) Jan 17 06:55:44 host sshd[18820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.145.254.158 user=root Jan 17 06:55:44 host sshd[18820]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:55:45 host sshd[18820]: Failed password for invalid user root from 186.145.254.158 port 40125 ssh2 Jan 17 06:55:45 host sshd[18820]: Received disconnect from 186.145.254.158 port 40125:11: Bye Bye [preauth] Jan 17 06:55:45 host sshd[18820]: Disconnected from 186.145.254.158 port 40125 [preauth] Jan 17 06:56:50 host sshd[18947]: User root from 34.23.17.138 not allowed because not listed in AllowUsers Jan 17 06:56:50 host sshd[18947]: input_userauth_request: invalid user root [preauth] Jan 17 06:56:50 host unix_chkpwd[18950]: password check failed for user (root) Jan 17 06:56:50 host sshd[18947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.23.17.138 user=root Jan 17 06:56:50 host sshd[18947]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:56:51 host sshd[18947]: Failed password for invalid user root from 34.23.17.138 port 1112 ssh2 Jan 17 06:56:51 host sshd[18947]: Received disconnect from 34.23.17.138 port 1112:11: Bye Bye [preauth] Jan 17 06:56:51 host sshd[18947]: Disconnected from 34.23.17.138 port 1112 [preauth] Jan 17 06:56:56 host sshd[19005]: Invalid user postgres from 5.255.106.239 port 58768 Jan 17 06:56:56 host sshd[19005]: input_userauth_request: invalid user postgres [preauth] Jan 17 06:56:56 host sshd[19005]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:56:56 host sshd[19005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.255.106.239 Jan 17 06:56:58 host sshd[19005]: Failed password for invalid user postgres from 5.255.106.239 port 58768 ssh2 Jan 17 06:56:58 host sshd[19005]: Received disconnect from 5.255.106.239 port 58768:11: Bye Bye [preauth] Jan 17 06:56:58 host sshd[19005]: Disconnected from 5.255.106.239 port 58768 [preauth] Jan 17 06:57:07 host sshd[19111]: User root from 43.156.241.142 not allowed because not listed in AllowUsers Jan 17 06:57:07 host sshd[19111]: input_userauth_request: invalid user root [preauth] Jan 17 06:57:07 host unix_chkpwd[19113]: password check failed for user (root) Jan 17 06:57:07 host sshd[19111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.241.142 user=root Jan 17 06:57:07 host sshd[19111]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:57:09 host sshd[19111]: Failed password for invalid user root from 43.156.241.142 port 41832 ssh2 Jan 17 06:57:09 host sshd[19111]: Received disconnect from 43.156.241.142 port 41832:11: Bye Bye [preauth] Jan 17 06:57:09 host sshd[19111]: Disconnected from 43.156.241.142 port 41832 [preauth] Jan 17 06:57:19 host sshd[19158]: User root from 37.193.112.180 not allowed because not listed in AllowUsers Jan 17 06:57:19 host sshd[19158]: input_userauth_request: invalid user root [preauth] Jan 17 06:57:20 host unix_chkpwd[19161]: password check failed for user (root) Jan 17 06:57:20 host sshd[19158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.193.112.180 user=root Jan 17 06:57:20 host sshd[19158]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:57:22 host sshd[19158]: Failed password for invalid user root from 37.193.112.180 port 41392 ssh2 Jan 17 06:57:22 host sshd[19158]: Received disconnect from 37.193.112.180 port 41392:11: Bye Bye [preauth] Jan 17 06:57:22 host sshd[19158]: Disconnected from 37.193.112.180 port 41392 [preauth] Jan 17 06:57:55 host sshd[19258]: Invalid user zookeeper from 64.225.70.42 port 38454 Jan 17 06:57:55 host sshd[19258]: input_userauth_request: invalid user zookeeper [preauth] Jan 17 06:57:55 host sshd[19258]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:57:55 host sshd[19258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.70.42 Jan 17 06:57:57 host sshd[19258]: Failed password for invalid user zookeeper from 64.225.70.42 port 38454 ssh2 Jan 17 06:57:57 host sshd[19258]: Received disconnect from 64.225.70.42 port 38454:11: Bye Bye [preauth] Jan 17 06:57:57 host sshd[19258]: Disconnected from 64.225.70.42 port 38454 [preauth] Jan 17 06:58:06 host sshd[19295]: Invalid user es from 157.245.53.239 port 43966 Jan 17 06:58:06 host sshd[19295]: input_userauth_request: invalid user es [preauth] Jan 17 06:58:06 host sshd[19295]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:58:06 host sshd[19295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.53.239 Jan 17 06:58:07 host sshd[19297]: Invalid user dev from 5.255.106.239 port 20592 Jan 17 06:58:07 host sshd[19297]: input_userauth_request: invalid user dev [preauth] Jan 17 06:58:07 host sshd[19297]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:58:07 host sshd[19297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.255.106.239 Jan 17 06:58:08 host sshd[19295]: Failed password for invalid user es from 157.245.53.239 port 43966 ssh2 Jan 17 06:58:08 host sshd[19295]: Received disconnect from 157.245.53.239 port 43966:11: Bye Bye [preauth] Jan 17 06:58:08 host sshd[19295]: Disconnected from 157.245.53.239 port 43966 [preauth] Jan 17 06:58:09 host sshd[19297]: Failed password for invalid user dev from 5.255.106.239 port 20592 ssh2 Jan 17 06:58:16 host sshd[19378]: User root from 43.159.49.49 not allowed because not listed in AllowUsers Jan 17 06:58:16 host sshd[19378]: input_userauth_request: invalid user root [preauth] Jan 17 06:58:16 host unix_chkpwd[19381]: password check failed for user (root) Jan 17 06:58:16 host sshd[19378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.49.49 user=root Jan 17 06:58:16 host sshd[19378]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:58:18 host sshd[19378]: Failed password for invalid user root from 43.159.49.49 port 43590 ssh2 Jan 17 06:58:18 host sshd[19378]: Received disconnect from 43.159.49.49 port 43590:11: Bye Bye [preauth] Jan 17 06:58:18 host sshd[19378]: Disconnected from 43.159.49.49 port 43590 [preauth] Jan 17 06:58:20 host sshd[19391]: Invalid user admin1 from 182.71.142.252 port 56704 Jan 17 06:58:20 host sshd[19391]: input_userauth_request: invalid user admin1 [preauth] Jan 17 06:58:20 host sshd[19391]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:58:20 host sshd[19391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.71.142.252 Jan 17 06:58:22 host sshd[19393]: User root from 186.145.254.158 not allowed because not listed in AllowUsers Jan 17 06:58:22 host sshd[19393]: input_userauth_request: invalid user root [preauth] Jan 17 06:58:22 host unix_chkpwd[19398]: password check failed for user (root) Jan 17 06:58:22 host sshd[19393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.145.254.158 user=root Jan 17 06:58:22 host sshd[19393]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:58:22 host sshd[19391]: Failed password for invalid user admin1 from 182.71.142.252 port 56704 ssh2 Jan 17 06:58:22 host sshd[19391]: Received disconnect from 182.71.142.252 port 56704:11: Bye Bye [preauth] Jan 17 06:58:22 host sshd[19391]: Disconnected from 182.71.142.252 port 56704 [preauth] Jan 17 06:58:24 host sshd[19393]: Failed password for invalid user root from 186.145.254.158 port 43064 ssh2 Jan 17 06:59:03 host sshd[19562]: User root from 64.225.70.42 not allowed because not listed in AllowUsers Jan 17 06:59:03 host sshd[19562]: input_userauth_request: invalid user root [preauth] Jan 17 06:59:03 host unix_chkpwd[19567]: password check failed for user (root) Jan 17 06:59:03 host sshd[19562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.70.42 user=root Jan 17 06:59:03 host sshd[19562]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 06:59:05 host sshd[19562]: Failed password for invalid user root from 64.225.70.42 port 37982 ssh2 Jan 17 06:59:06 host sshd[19562]: Received disconnect from 64.225.70.42 port 37982:11: Bye Bye [preauth] Jan 17 06:59:06 host sshd[19562]: Disconnected from 64.225.70.42 port 37982 [preauth] Jan 17 06:59:44 host sshd[19686]: Invalid user sales1 from 182.71.142.252 port 39855 Jan 17 06:59:44 host sshd[19686]: input_userauth_request: invalid user sales1 [preauth] Jan 17 06:59:44 host sshd[19686]: pam_unix(sshd:auth): check pass; user unknown Jan 17 06:59:44 host sshd[19686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.71.142.252 Jan 17 06:59:46 host sshd[19686]: Failed password for invalid user sales1 from 182.71.142.252 port 39855 ssh2 Jan 17 06:59:46 host sshd[19686]: Received disconnect from 182.71.142.252 port 39855:11: Bye Bye [preauth] Jan 17 06:59:46 host sshd[19686]: Disconnected from 182.71.142.252 port 39855 [preauth] Jan 17 07:04:57 host sshd[20658]: Invalid user super from 80.15.59.182 port 51949 Jan 17 07:04:57 host sshd[20658]: input_userauth_request: invalid user super [preauth] Jan 17 07:04:57 host sshd[20658]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:04:57 host sshd[20658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.15.59.182 Jan 17 07:04:59 host sshd[20658]: Failed password for invalid user super from 80.15.59.182 port 51949 ssh2 Jan 17 07:04:59 host sshd[20658]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:05:02 host sshd[20658]: Failed password for invalid user super from 80.15.59.182 port 51949 ssh2 Jan 17 07:05:02 host sshd[20658]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:05:04 host sshd[20658]: Failed password for invalid user super from 80.15.59.182 port 51949 ssh2 Jan 17 07:05:05 host sshd[20658]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:05:07 host sshd[20658]: Failed password for invalid user super from 80.15.59.182 port 51949 ssh2 Jan 17 07:05:07 host sshd[20658]: Failed password for invalid user super from 80.15.59.182 port 51949 ssh2 Jan 17 07:05:07 host sshd[20658]: Connection closed by 80.15.59.182 port 51949 [preauth] Jan 17 07:05:07 host sshd[20658]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.15.59.182 Jan 17 07:05:07 host sshd[20658]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 17 07:05:12 host sshd[20735]: Invalid user zookeeper from 186.67.248.8 port 59132 Jan 17 07:05:12 host sshd[20735]: input_userauth_request: invalid user zookeeper [preauth] Jan 17 07:05:12 host sshd[20735]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:05:12 host sshd[20735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.8 Jan 17 07:05:15 host sshd[20735]: Failed password for invalid user zookeeper from 186.67.248.8 port 59132 ssh2 Jan 17 07:05:15 host sshd[20735]: Received disconnect from 186.67.248.8 port 59132:11: Bye Bye [preauth] Jan 17 07:05:15 host sshd[20735]: Disconnected from 186.67.248.8 port 59132 [preauth] Jan 17 07:18:00 host sshd[22937]: Connection reset by 220.132.179.205 port 37307 [preauth] Jan 17 07:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 07:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 07:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 07:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 07:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 07:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 07:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 07:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 07:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 07:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 07:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 07:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 07:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 07:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=wwwrmswll user-3=wwwresourcehunte user-4=keralaholi user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=cochintaxi user-11=wwwkaretakers user-12=mrsclean user-13=wwwnexidigital user-14=phmetals user-15=kottayamcalldriv user-16=gifterman user-17=palco123 user-18=straightcurve user-19=wwwletsstalkfood user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=wwwtestugo user-24=shalinijames user-25=vfmassets user-26=wwwkapin user-27=woodpeck user-28=disposeat user-29=wwwkmaorg user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 07:21:08 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 07:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 07:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MwvvGLhzyEnSV8L7.~ Jan 17 07:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MwvvGLhzyEnSV8L7.~' Jan 17 07:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MwvvGLhzyEnSV8L7.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 07:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 07:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 07:21:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 07:21:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 07:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 07:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 07:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 07:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 07:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 07:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 07:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 07:32:30 host sshd[25458]: Invalid user admin from 175.214.46.72 port 40940 Jan 17 07:32:30 host sshd[25458]: input_userauth_request: invalid user admin [preauth] Jan 17 07:32:30 host sshd[25458]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:32:30 host sshd[25458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.214.46.72 Jan 17 07:32:32 host sshd[25458]: Failed password for invalid user admin from 175.214.46.72 port 40940 ssh2 Jan 17 07:32:35 host sshd[25458]: Failed password for invalid user admin from 175.214.46.72 port 40940 ssh2 Jan 17 07:32:37 host sshd[25458]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:32:39 host sshd[25458]: Failed password for invalid user admin from 175.214.46.72 port 40940 ssh2 Jan 17 07:32:43 host sshd[25458]: Connection reset by 175.214.46.72 port 40940 [preauth] Jan 17 07:32:43 host sshd[25458]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.214.46.72 Jan 17 07:32:44 host sshd[25499]: Invalid user user3 from 201.149.20.162 port 27622 Jan 17 07:32:44 host sshd[25499]: input_userauth_request: invalid user user3 [preauth] Jan 17 07:32:44 host sshd[25499]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:32:44 host sshd[25499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.20.162 Jan 17 07:32:46 host sshd[25499]: Failed password for invalid user user3 from 201.149.20.162 port 27622 ssh2 Jan 17 07:32:46 host sshd[25499]: Received disconnect from 201.149.20.162 port 27622:11: Bye Bye [preauth] Jan 17 07:32:46 host sshd[25499]: Disconnected from 201.149.20.162 port 27622 [preauth] Jan 17 07:32:47 host sshd[25504]: Invalid user terraria from 27.254.163.228 port 46474 Jan 17 07:32:47 host sshd[25504]: input_userauth_request: invalid user terraria [preauth] Jan 17 07:32:47 host sshd[25504]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:32:47 host sshd[25504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.163.228 Jan 17 07:32:49 host sshd[25504]: Failed password for invalid user terraria from 27.254.163.228 port 46474 ssh2 Jan 17 07:32:49 host sshd[25504]: Received disconnect from 27.254.163.228 port 46474:11: Bye Bye [preauth] Jan 17 07:32:49 host sshd[25504]: Disconnected from 27.254.163.228 port 46474 [preauth] Jan 17 07:33:33 host sshd[25597]: Invalid user minecraft from 138.91.110.181 port 50428 Jan 17 07:33:33 host sshd[25597]: input_userauth_request: invalid user minecraft [preauth] Jan 17 07:33:33 host sshd[25597]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:33:33 host sshd[25597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.91.110.181 Jan 17 07:33:34 host sshd[25597]: Failed password for invalid user minecraft from 138.91.110.181 port 50428 ssh2 Jan 17 07:33:35 host sshd[25597]: Received disconnect from 138.91.110.181 port 50428:11: Bye Bye [preauth] Jan 17 07:33:35 host sshd[25597]: Disconnected from 138.91.110.181 port 50428 [preauth] Jan 17 07:36:51 host sshd[26109]: Invalid user user3 from 27.254.163.228 port 38826 Jan 17 07:36:51 host sshd[26109]: input_userauth_request: invalid user user3 [preauth] Jan 17 07:36:51 host sshd[26109]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:36:51 host sshd[26109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.163.228 Jan 17 07:36:53 host sshd[26109]: Failed password for invalid user user3 from 27.254.163.228 port 38826 ssh2 Jan 17 07:36:53 host sshd[26109]: Received disconnect from 27.254.163.228 port 38826:11: Bye Bye [preauth] Jan 17 07:36:53 host sshd[26109]: Disconnected from 27.254.163.228 port 38826 [preauth] Jan 17 07:36:54 host sshd[26115]: Invalid user kafka from 138.91.110.181 port 42856 Jan 17 07:36:54 host sshd[26115]: input_userauth_request: invalid user kafka [preauth] Jan 17 07:36:54 host sshd[26115]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:36:54 host sshd[26115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.91.110.181 Jan 17 07:36:57 host sshd[26115]: Failed password for invalid user kafka from 138.91.110.181 port 42856 ssh2 Jan 17 07:36:57 host sshd[26115]: Received disconnect from 138.91.110.181 port 42856:11: Bye Bye [preauth] Jan 17 07:36:57 host sshd[26115]: Disconnected from 138.91.110.181 port 42856 [preauth] Jan 17 07:38:01 host sshd[26247]: User root from 138.91.110.181 not allowed because not listed in AllowUsers Jan 17 07:38:01 host sshd[26247]: input_userauth_request: invalid user root [preauth] Jan 17 07:38:01 host unix_chkpwd[26260]: password check failed for user (root) Jan 17 07:38:01 host sshd[26247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.91.110.181 user=root Jan 17 07:38:01 host sshd[26247]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 07:38:03 host sshd[26247]: Failed password for invalid user root from 138.91.110.181 port 40978 ssh2 Jan 17 07:38:03 host sshd[26247]: Received disconnect from 138.91.110.181 port 40978:11: Bye Bye [preauth] Jan 17 07:38:04 host sshd[26247]: Disconnected from 138.91.110.181 port 40978 [preauth] Jan 17 07:38:06 host sshd[26296]: Invalid user ts2 from 27.254.163.228 port 35684 Jan 17 07:38:06 host sshd[26296]: input_userauth_request: invalid user ts2 [preauth] Jan 17 07:38:06 host sshd[26296]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:38:06 host sshd[26296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.163.228 Jan 17 07:38:08 host sshd[26296]: Failed password for invalid user ts2 from 27.254.163.228 port 35684 ssh2 Jan 17 07:38:08 host sshd[26296]: Received disconnect from 27.254.163.228 port 35684:11: Bye Bye [preauth] Jan 17 07:38:08 host sshd[26296]: Disconnected from 27.254.163.228 port 35684 [preauth] Jan 17 07:38:42 host sshd[26392]: User root from 104.128.88.83 not allowed because not listed in AllowUsers Jan 17 07:38:42 host sshd[26392]: input_userauth_request: invalid user root [preauth] Jan 17 07:38:42 host unix_chkpwd[26395]: password check failed for user (root) Jan 17 07:38:42 host sshd[26392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.128.88.83 user=root Jan 17 07:38:42 host sshd[26392]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 07:38:45 host sshd[26392]: Failed password for invalid user root from 104.128.88.83 port 50256 ssh2 Jan 17 07:38:45 host sshd[26392]: Received disconnect from 104.128.88.83 port 50256:11: Bye Bye [preauth] Jan 17 07:38:45 host sshd[26392]: Disconnected from 104.128.88.83 port 50256 [preauth] Jan 17 07:39:51 host sshd[26663]: User root from 201.149.20.162 not allowed because not listed in AllowUsers Jan 17 07:39:51 host sshd[26663]: input_userauth_request: invalid user root [preauth] Jan 17 07:39:51 host unix_chkpwd[26666]: password check failed for user (root) Jan 17 07:39:51 host sshd[26663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.20.162 user=root Jan 17 07:39:51 host sshd[26663]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 07:39:53 host sshd[26663]: Failed password for invalid user root from 201.149.20.162 port 14228 ssh2 Jan 17 07:39:53 host sshd[26663]: Received disconnect from 201.149.20.162 port 14228:11: Bye Bye [preauth] Jan 17 07:39:53 host sshd[26663]: Disconnected from 201.149.20.162 port 14228 [preauth] Jan 17 07:45:22 host sshd[27496]: User root from 104.128.88.83 not allowed because not listed in AllowUsers Jan 17 07:45:22 host sshd[27496]: input_userauth_request: invalid user root [preauth] Jan 17 07:45:22 host unix_chkpwd[27501]: password check failed for user (root) Jan 17 07:45:22 host sshd[27496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.128.88.83 user=root Jan 17 07:45:22 host sshd[27496]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 07:45:24 host sshd[27496]: Failed password for invalid user root from 104.128.88.83 port 50460 ssh2 Jan 17 07:45:24 host sshd[27496]: Received disconnect from 104.128.88.83 port 50460:11: Bye Bye [preauth] Jan 17 07:45:24 host sshd[27496]: Disconnected from 104.128.88.83 port 50460 [preauth] Jan 17 07:50:05 host sshd[28332]: Did not receive identification string from 167.235.77.67 port 51210 Jan 17 07:50:06 host sshd[28335]: Invalid user user from 167.235.77.67 port 51300 Jan 17 07:50:06 host sshd[28336]: Invalid user admin from 167.235.77.67 port 51236 Jan 17 07:50:06 host sshd[28343]: Invalid user admin from 167.235.77.67 port 51250 Jan 17 07:50:06 host sshd[28337]: User root from 167.235.77.67 not allowed because not listed in AllowUsers Jan 17 07:50:06 host sshd[28338]: Invalid user test from 167.235.77.67 port 51320 Jan 17 07:50:06 host sshd[28339]: Invalid user student from 167.235.77.67 port 51342 Jan 17 07:50:06 host sshd[28337]: input_userauth_request: invalid user root [preauth] Jan 17 07:50:06 host sshd[28343]: input_userauth_request: invalid user admin [preauth] Jan 17 07:50:06 host sshd[28338]: input_userauth_request: invalid user test [preauth] Jan 17 07:50:06 host sshd[28335]: input_userauth_request: invalid user user [preauth] Jan 17 07:50:06 host sshd[28340]: User root from 167.235.77.67 not allowed because not listed in AllowUsers Jan 17 07:50:06 host sshd[28340]: input_userauth_request: invalid user root [preauth] Jan 17 07:50:06 host sshd[28339]: input_userauth_request: invalid user student [preauth] Jan 17 07:50:06 host sshd[28336]: input_userauth_request: invalid user admin [preauth] Jan 17 07:50:06 host sshd[28333]: User centos from 167.235.77.67 not allowed because not listed in AllowUsers Jan 17 07:50:06 host sshd[28333]: input_userauth_request: invalid user centos [preauth] Jan 17 07:50:06 host sshd[28334]: Invalid user postgres from 167.235.77.67 port 51234 Jan 17 07:50:06 host sshd[28334]: input_userauth_request: invalid user postgres [preauth] Jan 17 07:50:06 host sshd[28342]: Invalid user hadoop from 167.235.77.67 port 51326 Jan 17 07:50:06 host sshd[28342]: input_userauth_request: invalid user hadoop [preauth] Jan 17 07:50:06 host sshd[28345]: Invalid user testuser from 167.235.77.67 port 51376 Jan 17 07:50:06 host sshd[28345]: input_userauth_request: invalid user testuser [preauth] Jan 17 07:50:06 host sshd[28353]: Invalid user hadoop from 167.235.77.67 port 51306 Jan 17 07:50:06 host sshd[28353]: input_userauth_request: invalid user hadoop [preauth] Jan 17 07:50:06 host sshd[28346]: Invalid user test from 167.235.77.67 port 51388 Jan 17 07:50:06 host sshd[28346]: input_userauth_request: invalid user test [preauth] Jan 17 07:50:06 host sshd[28348]: Invalid user halo from 167.235.77.67 port 51496 Jan 17 07:50:06 host sshd[28348]: input_userauth_request: invalid user halo [preauth] Jan 17 07:50:06 host sshd[28341]: Invalid user devops from 167.235.77.67 port 51272 Jan 17 07:50:06 host sshd[28349]: User root from 167.235.77.67 not allowed because not listed in AllowUsers Jan 17 07:50:06 host sshd[28341]: input_userauth_request: invalid user devops [preauth] Jan 17 07:50:06 host sshd[28349]: input_userauth_request: invalid user root [preauth] Jan 17 07:50:06 host sshd[28344]: Invalid user admin from 167.235.77.67 port 51312 Jan 17 07:50:06 host sshd[28344]: input_userauth_request: invalid user admin [preauth] Jan 17 07:50:06 host sshd[28350]: Invalid user oracle from 167.235.77.67 port 51510 Jan 17 07:50:06 host sshd[28350]: input_userauth_request: invalid user oracle [preauth] Jan 17 07:50:07 host sshd[28352]: User root from 167.235.77.67 not allowed because not listed in AllowUsers Jan 17 07:50:07 host sshd[28352]: input_userauth_request: invalid user root [preauth] Jan 17 07:50:07 host sshd[28355]: User root from 167.235.77.67 not allowed because not listed in AllowUsers Jan 17 07:50:07 host sshd[28355]: input_userauth_request: invalid user root [preauth] Jan 17 07:50:07 host sshd[28356]: Invalid user student from 167.235.77.67 port 51482 Jan 17 07:50:07 host sshd[28356]: input_userauth_request: invalid user student [preauth] Jan 17 07:50:07 host sshd[28338]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host sshd[28334]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host sshd[28339]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host sshd[28343]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host sshd[28342]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host sshd[28351]: User root from 167.235.77.67 not allowed because not listed in AllowUsers Jan 17 07:50:07 host sshd[28351]: input_userauth_request: invalid user root [preauth] Jan 17 07:50:07 host sshd[28354]: Invalid user esuser from 167.235.77.67 port 51542 Jan 17 07:50:07 host sshd[28354]: input_userauth_request: invalid user esuser [preauth] Jan 17 07:50:07 host sshd[28346]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28336]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host sshd[28336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host sshd[28345]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host sshd[28366]: Invalid user es from 167.235.77.67 port 51468 Jan 17 07:50:07 host sshd[28366]: input_userauth_request: invalid user es [preauth] Jan 17 07:50:07 host sshd[28367]: Invalid user postgres from 167.235.77.67 port 51494 Jan 17 07:50:07 host sshd[28367]: input_userauth_request: invalid user postgres [preauth] Jan 17 07:50:07 host sshd[28335]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host sshd[28341]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host unix_chkpwd[28385]: password check failed for user (root) Jan 17 07:50:07 host unix_chkpwd[28386]: password check failed for user (centos) Jan 17 07:50:07 host sshd[28337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 user=root Jan 17 07:50:07 host sshd[28337]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 07:50:07 host sshd[28348]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host sshd[28333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 user=centos Jan 17 07:50:07 host sshd[28353]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host unix_chkpwd[28384]: password check failed for user (root) Jan 17 07:50:07 host sshd[28340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 user=root Jan 17 07:50:07 host sshd[28340]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 07:50:07 host sshd[28350]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host sshd[28344]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host unix_chkpwd[28387]: password check failed for user (root) Jan 17 07:50:07 host sshd[28349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 user=root Jan 17 07:50:07 host sshd[28349]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 07:50:07 host sshd[28356]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host sshd[28354]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host unix_chkpwd[28388]: password check failed for user (root) Jan 17 07:50:07 host sshd[28352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 user=root Jan 17 07:50:07 host sshd[28352]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 07:50:07 host unix_chkpwd[28389]: password check failed for user (root) Jan 17 07:50:07 host sshd[28355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 user=root Jan 17 07:50:07 host sshd[28355]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 07:50:07 host sshd[28366]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host sshd[28367]: pam_unix(sshd:auth): check pass; user unknown Jan 17 07:50:07 host sshd[28367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 Jan 17 07:50:07 host unix_chkpwd[28390]: password check failed for user (root) Jan 17 07:50:07 host sshd[28351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.235.77.67 user=root Jan 17 07:50:07 host sshd[28351]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 07:50:09 host sshd[28338]: Failed password for invalid user test from 167.235.77.67 port 51320 ssh2 Jan 17 07:50:09 host sshd[28334]: Failed password for invalid user postgres from 167.235.77.67 port 51234 ssh2 Jan 17 07:50:09 host sshd[28343]: Failed password for invalid user admin from 167.235.77.67 port 51250 ssh2 Jan 17 07:50:09 host sshd[28339]: Failed password for invalid user student from 167.235.77.67 port 51342 ssh2 Jan 17 07:50:09 host sshd[28342]: Failed password for invalid user hadoop from 167.235.77.67 port 51326 ssh2 Jan 17 07:50:09 host sshd[28336]: Failed password for invalid user admin from 167.235.77.67 port 51236 ssh2 Jan 17 07:50:09 host sshd[28346]: Failed password for invalid user test from 167.235.77.67 port 51388 ssh2 Jan 17 07:50:09 host sshd[28345]: Failed password for invalid user testuser from 167.235.77.67 port 51376 ssh2 Jan 17 07:50:09 host sshd[28335]: Failed password for invalid user user from 167.235.77.67 port 51300 ssh2 Jan 17 07:50:09 host sshd[28341]: Failed password for invalid user devops from 167.235.77.67 port 51272 ssh2 Jan 17 07:50:09 host sshd[28337]: Failed password for invalid user root from 167.235.77.67 port 51350 ssh2 Jan 17 07:50:09 host sshd[28333]: Failed password for invalid user centos from 167.235.77.67 port 51224 ssh2 Jan 17 07:50:09 host sshd[28353]: Failed password for invalid user hadoop from 167.235.77.67 port 51306 ssh2 Jan 17 07:50:09 host sshd[28348]: Failed password for invalid user halo from 167.235.77.67 port 51496 ssh2 Jan 17 07:50:09 host sshd[28340]: Failed password for invalid user root from 167.235.77.67 port 51266 ssh2 Jan 17 07:50:09 host sshd[28350]: Failed password for invalid user oracle from 167.235.77.67 port 51510 ssh2 Jan 17 07:50:09 host sshd[28344]: Failed password for invalid user admin from 167.235.77.67 port 51312 ssh2 Jan 17 07:50:09 host sshd[28349]: Failed password for invalid user root from 167.235.77.67 port 51512 ssh2 Jan 17 07:50:09 host sshd[28334]: Connection closed by 167.235.77.67 port 51234 [preauth] Jan 17 07:50:09 host sshd[28335]: Connection closed by 167.235.77.67 port 51300 [preauth] Jan 17 07:50:09 host sshd[28336]: Connection closed by 167.235.77.67 port 51236 [preauth] Jan 17 07:50:09 host sshd[28338]: Connection closed by 167.235.77.67 port 51320 [preauth] Jan 17 07:50:09 host sshd[28348]: Connection closed by 167.235.77.67 port 51496 [preauth] Jan 17 07:50:09 host sshd[28337]: Connection closed by 167.235.77.67 port 51350 [preauth] Jan 17 07:50:09 host sshd[28339]: Connection closed by 167.235.77.67 port 51342 [preauth] Jan 17 07:50:09 host sshd[28340]: Connection closed by 167.235.77.67 port 51266 [preauth] Jan 17 07:50:09 host sshd[28350]: Connection closed by 167.235.77.67 port 51510 [preauth] Jan 17 07:50:09 host sshd[28343]: Connection closed by 167.235.77.67 port 51250 [preauth] Jan 17 07:50:09 host sshd[28341]: Connection closed by 167.235.77.67 port 51272 [preauth] Jan 17 07:50:09 host sshd[28342]: Connection closed by 167.235.77.67 port 51326 [preauth] Jan 17 07:50:09 host sshd[28344]: Connection closed by 167.235.77.67 port 51312 [preauth] Jan 17 07:50:09 host sshd[28345]: Connection closed by 167.235.77.67 port 51376 [preauth] Jan 17 07:50:09 host sshd[28349]: Connection closed by 167.235.77.67 port 51512 [preauth] Jan 17 07:50:09 host sshd[28353]: Connection closed by 167.235.77.67 port 51306 [preauth] Jan 17 07:50:09 host sshd[28346]: Connection closed by 167.235.77.67 port 51388 [preauth] Jan 17 07:50:09 host sshd[28333]: Connection closed by 167.235.77.67 port 51224 [preauth] Jan 17 07:50:09 host sshd[28356]: Failed password for invalid user student from 167.235.77.67 port 51482 ssh2 Jan 17 07:50:09 host sshd[28354]: Failed password for invalid user esuser from 167.235.77.67 port 51542 ssh2 Jan 17 07:50:09 host sshd[28352]: Failed password for invalid user root from 167.235.77.67 port 51574 ssh2 Jan 17 07:50:09 host sshd[28355]: Failed password for invalid user root from 167.235.77.67 port 51534 ssh2 Jan 17 07:50:09 host sshd[28366]: Failed password for invalid user es from 167.235.77.67 port 51468 ssh2 Jan 17 07:50:09 host sshd[28367]: Failed password for invalid user postgres from 167.235.77.67 port 51494 ssh2 Jan 17 07:50:09 host sshd[28351]: Failed password for invalid user root from 167.235.77.67 port 51524 ssh2 Jan 17 07:50:09 host sshd[28356]: Connection closed by 167.235.77.67 port 51482 [preauth] Jan 17 07:50:09 host sshd[28352]: Connection closed by 167.235.77.67 port 51574 [preauth] Jan 17 07:50:09 host sshd[28354]: Connection closed by 167.235.77.67 port 51542 [preauth] Jan 17 07:50:09 host sshd[28355]: Connection closed by 167.235.77.67 port 51534 [preauth] Jan 17 07:50:09 host sshd[28351]: Connection closed by 167.235.77.67 port 51524 [preauth] Jan 17 07:50:09 host sshd[28366]: Connection closed by 167.235.77.67 port 51468 [preauth] Jan 17 07:50:09 host sshd[28367]: Connection closed by 167.235.77.67 port 51494 [preauth] Jan 17 08:01:16 host sshd[29910]: Invalid user bigipuser3 from 107.204.9.145 port 38429 Jan 17 08:01:16 host sshd[29910]: input_userauth_request: invalid user bigipuser3 [preauth] Jan 17 08:01:16 host sshd[29910]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:01:16 host sshd[29910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.204.9.145 Jan 17 08:01:18 host sshd[29910]: Failed password for invalid user bigipuser3 from 107.204.9.145 port 38429 ssh2 Jan 17 08:01:19 host sshd[29910]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:01:21 host sshd[29910]: Failed password for invalid user bigipuser3 from 107.204.9.145 port 38429 ssh2 Jan 17 08:01:22 host sshd[29910]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:01:23 host sshd[29910]: Failed password for invalid user bigipuser3 from 107.204.9.145 port 38429 ssh2 Jan 17 08:01:24 host sshd[29910]: Failed password for invalid user bigipuser3 from 107.204.9.145 port 38429 ssh2 Jan 17 08:01:24 host sshd[29910]: Connection closed by 107.204.9.145 port 38429 [preauth] Jan 17 08:01:24 host sshd[29910]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.204.9.145 Jan 17 08:02:30 host sshd[30127]: Invalid user fi from 194.110.203.109 port 54172 Jan 17 08:02:30 host sshd[30127]: input_userauth_request: invalid user fi [preauth] Jan 17 08:02:30 host sshd[30127]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:02:30 host sshd[30127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 08:02:32 host sshd[30127]: Failed password for invalid user fi from 194.110.203.109 port 54172 ssh2 Jan 17 08:02:35 host sshd[30127]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:02:37 host sshd[30127]: Failed password for invalid user fi from 194.110.203.109 port 54172 ssh2 Jan 17 08:02:40 host sshd[30127]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:02:42 host sshd[30127]: Failed password for invalid user fi from 194.110.203.109 port 54172 ssh2 Jan 17 08:02:45 host sshd[30127]: Connection closed by 194.110.203.109 port 54172 [preauth] Jan 17 08:02:45 host sshd[30127]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 08:06:26 host sshd[30698]: User root from 167.99.84.28 not allowed because not listed in AllowUsers Jan 17 08:06:26 host sshd[30698]: input_userauth_request: invalid user root [preauth] Jan 17 08:06:26 host unix_chkpwd[30707]: password check failed for user (root) Jan 17 08:06:26 host sshd[30698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.84.28 user=root Jan 17 08:06:26 host sshd[30698]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:06:28 host sshd[30698]: Failed password for invalid user root from 167.99.84.28 port 36564 ssh2 Jan 17 08:06:28 host sshd[30698]: Received disconnect from 167.99.84.28 port 36564:11: Bye Bye [preauth] Jan 17 08:06:28 host sshd[30698]: Disconnected from 167.99.84.28 port 36564 [preauth] Jan 17 08:07:39 host sshd[30851]: Invalid user devops from 135.125.234.221 port 42258 Jan 17 08:07:39 host sshd[30851]: input_userauth_request: invalid user devops [preauth] Jan 17 08:07:39 host sshd[30851]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:07:39 host sshd[30851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.125.234.221 Jan 17 08:07:42 host sshd[30851]: Failed password for invalid user devops from 135.125.234.221 port 42258 ssh2 Jan 17 08:07:42 host sshd[30851]: Received disconnect from 135.125.234.221 port 42258:11: Bye Bye [preauth] Jan 17 08:07:42 host sshd[30851]: Disconnected from 135.125.234.221 port 42258 [preauth] Jan 17 08:11:45 host sshd[31500]: User root from 198.199.86.89 not allowed because not listed in AllowUsers Jan 17 08:11:45 host sshd[31500]: input_userauth_request: invalid user root [preauth] Jan 17 08:11:45 host unix_chkpwd[31503]: password check failed for user (root) Jan 17 08:11:45 host sshd[31500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.86.89 user=root Jan 17 08:11:45 host sshd[31500]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:11:47 host sshd[31500]: Failed password for invalid user root from 198.199.86.89 port 39838 ssh2 Jan 17 08:11:47 host sshd[31500]: Received disconnect from 198.199.86.89 port 39838:11: Bye Bye [preauth] Jan 17 08:11:47 host sshd[31500]: Disconnected from 198.199.86.89 port 39838 [preauth] Jan 17 08:12:02 host sshd[31522]: Invalid user installer from 167.99.84.28 port 53514 Jan 17 08:12:02 host sshd[31522]: input_userauth_request: invalid user installer [preauth] Jan 17 08:12:02 host sshd[31522]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:12:02 host sshd[31522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.84.28 Jan 17 08:12:04 host sshd[31522]: Failed password for invalid user installer from 167.99.84.28 port 53514 ssh2 Jan 17 08:12:04 host sshd[31522]: Received disconnect from 167.99.84.28 port 53514:11: Bye Bye [preauth] Jan 17 08:12:04 host sshd[31522]: Disconnected from 167.99.84.28 port 53514 [preauth] Jan 17 08:12:12 host sshd[31574]: Invalid user manager from 86.105.27.140 port 34310 Jan 17 08:12:12 host sshd[31574]: input_userauth_request: invalid user manager [preauth] Jan 17 08:12:12 host sshd[31574]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:12:12 host sshd[31574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.105.27.140 Jan 17 08:12:14 host sshd[31574]: Failed password for invalid user manager from 86.105.27.140 port 34310 ssh2 Jan 17 08:12:14 host sshd[31574]: Received disconnect from 86.105.27.140 port 34310:11: Bye Bye [preauth] Jan 17 08:12:14 host sshd[31574]: Disconnected from 86.105.27.140 port 34310 [preauth] Jan 17 08:12:57 host sshd[31643]: User root from 198.199.86.89 not allowed because not listed in AllowUsers Jan 17 08:12:57 host sshd[31643]: input_userauth_request: invalid user root [preauth] Jan 17 08:12:57 host unix_chkpwd[31646]: password check failed for user (root) Jan 17 08:12:57 host sshd[31643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.86.89 user=root Jan 17 08:12:57 host sshd[31643]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:12:59 host sshd[31643]: Failed password for invalid user root from 198.199.86.89 port 49940 ssh2 Jan 17 08:12:59 host sshd[31643]: Received disconnect from 198.199.86.89 port 49940:11: Bye Bye [preauth] Jan 17 08:12:59 host sshd[31643]: Disconnected from 198.199.86.89 port 49940 [preauth] Jan 17 08:13:05 host sshd[31702]: Invalid user media from 135.125.234.221 port 41872 Jan 17 08:13:05 host sshd[31702]: input_userauth_request: invalid user media [preauth] Jan 17 08:13:05 host sshd[31702]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:13:05 host sshd[31702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.125.234.221 Jan 17 08:13:07 host sshd[31702]: Failed password for invalid user media from 135.125.234.221 port 41872 ssh2 Jan 17 08:13:07 host sshd[31702]: Received disconnect from 135.125.234.221 port 41872:11: Bye Bye [preauth] Jan 17 08:13:07 host sshd[31702]: Disconnected from 135.125.234.221 port 41872 [preauth] Jan 17 08:13:23 host sshd[31733]: Invalid user oracle from 86.142.215.150 port 33519 Jan 17 08:13:23 host sshd[31733]: input_userauth_request: invalid user oracle [preauth] Jan 17 08:13:23 host sshd[31733]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:13:23 host sshd[31733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.142.215.150 Jan 17 08:13:24 host sshd[31733]: Failed password for invalid user oracle from 86.142.215.150 port 33519 ssh2 Jan 17 08:13:25 host sshd[31733]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:13:27 host sshd[31733]: Failed password for invalid user oracle from 86.142.215.150 port 33519 ssh2 Jan 17 08:13:27 host sshd[31733]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:13:29 host sshd[31733]: Failed password for invalid user oracle from 86.142.215.150 port 33519 ssh2 Jan 17 08:13:30 host sshd[31733]: Failed password for invalid user oracle from 86.142.215.150 port 33519 ssh2 Jan 17 08:13:31 host sshd[31733]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:13:33 host sshd[31733]: Failed password for invalid user oracle from 86.142.215.150 port 33519 ssh2 Jan 17 08:13:33 host sshd[31733]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:13:36 host sshd[31733]: Failed password for invalid user oracle from 86.142.215.150 port 33519 ssh2 Jan 17 08:13:36 host sshd[31733]: error: maximum authentication attempts exceeded for invalid user oracle from 86.142.215.150 port 33519 ssh2 [preauth] Jan 17 08:13:36 host sshd[31733]: Disconnecting: Too many authentication failures [preauth] Jan 17 08:13:36 host sshd[31733]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.142.215.150 Jan 17 08:13:36 host sshd[31733]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 17 08:13:42 host sshd[31810]: Invalid user media from 86.105.27.140 port 42188 Jan 17 08:13:42 host sshd[31810]: input_userauth_request: invalid user media [preauth] Jan 17 08:13:42 host sshd[31810]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:13:42 host sshd[31810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.105.27.140 Jan 17 08:13:44 host sshd[31810]: Failed password for invalid user media from 86.105.27.140 port 42188 ssh2 Jan 17 08:13:44 host sshd[31810]: Received disconnect from 86.105.27.140 port 42188:11: Bye Bye [preauth] Jan 17 08:13:44 host sshd[31810]: Disconnected from 86.105.27.140 port 42188 [preauth] Jan 17 08:14:21 host sshd[31929]: Invalid user hadoop from 135.125.234.221 port 40716 Jan 17 08:14:21 host sshd[31929]: input_userauth_request: invalid user hadoop [preauth] Jan 17 08:14:21 host sshd[31929]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:14:21 host sshd[31929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.125.234.221 Jan 17 08:14:23 host sshd[31929]: Failed password for invalid user hadoop from 135.125.234.221 port 40716 ssh2 Jan 17 08:14:23 host sshd[31929]: Received disconnect from 135.125.234.221 port 40716:11: Bye Bye [preauth] Jan 17 08:14:23 host sshd[31929]: Disconnected from 135.125.234.221 port 40716 [preauth] Jan 17 08:14:52 host sshd[32047]: Invalid user abc from 86.105.27.140 port 51004 Jan 17 08:14:52 host sshd[32047]: input_userauth_request: invalid user abc [preauth] Jan 17 08:14:52 host sshd[32047]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:14:52 host sshd[32047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.105.27.140 Jan 17 08:14:54 host sshd[32047]: Failed password for invalid user abc from 86.105.27.140 port 51004 ssh2 Jan 17 08:14:54 host sshd[32047]: Received disconnect from 86.105.27.140 port 51004:11: Bye Bye [preauth] Jan 17 08:14:54 host sshd[32047]: Disconnected from 86.105.27.140 port 51004 [preauth] Jan 17 08:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 08:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 08:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 08:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 08:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 08:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 08:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 08:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 08:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 08:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 08:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 08:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 08:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 08:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=bonifacegroup user-4=wwwevmhonda user-5=mrsclean user-6=wwwnexidigital user-7=palco123 user-8=gifterman user-9=kottayamcalldriv user-10=phmetals user-11=wwwkapin user-12=woodpeck user-13=disposeat user-14=wwwkmaorg user-15=remysagr user-16=pmcresources user-17=vfmassets user-18=shalinijames user-19=wwwtestugo user-20=wwwpmcresource user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=ugotscom user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 08:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 08:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 08:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ail8c8QyESUq7UmB.~ Jan 17 08:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ail8c8QyESUq7UmB.~' Jan 17 08:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ail8c8QyESUq7UmB.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 08:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 08:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 08:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 08:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 08:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 08:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 08:22:17 host sshd[1085]: Invalid user dnsekakf2$$ from 42.200.237.165 port 50978 Jan 17 08:22:17 host sshd[1085]: input_userauth_request: invalid user dnsekakf2$$ [preauth] Jan 17 08:22:17 host sshd[1085]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:22:17 host sshd[1085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.237.165 Jan 17 08:22:19 host sshd[1085]: Failed password for invalid user dnsekakf2$$ from 42.200.237.165 port 50978 ssh2 Jan 17 08:22:20 host sshd[1085]: Failed password for invalid user dnsekakf2$$ from 42.200.237.165 port 50978 ssh2 Jan 17 08:22:20 host sshd[1085]: Connection closed by 42.200.237.165 port 50978 [preauth] Jan 17 08:34:22 host sshd[2838]: User root from 122.116.44.235 not allowed because not listed in AllowUsers Jan 17 08:34:22 host sshd[2838]: input_userauth_request: invalid user root [preauth] Jan 17 08:34:22 host unix_chkpwd[2842]: password check failed for user (root) Jan 17 08:34:22 host sshd[2838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.44.235 user=root Jan 17 08:34:22 host sshd[2838]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:34:24 host sshd[2838]: Failed password for invalid user root from 122.116.44.235 port 36069 ssh2 Jan 17 08:34:24 host sshd[2838]: Connection reset by 122.116.44.235 port 36069 [preauth] Jan 17 08:42:15 host sshd[4054]: Did not receive identification string from 206.189.23.129 port 61000 Jan 17 08:50:53 host sshd[5232]: User root from 167.172.150.24 not allowed because not listed in AllowUsers Jan 17 08:50:53 host sshd[5232]: input_userauth_request: invalid user root [preauth] Jan 17 08:50:53 host unix_chkpwd[5236]: password check failed for user (root) Jan 17 08:50:53 host sshd[5232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.150.24 user=root Jan 17 08:50:53 host sshd[5232]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:50:55 host sshd[5232]: Failed password for invalid user root from 167.172.150.24 port 52058 ssh2 Jan 17 08:50:55 host sshd[5232]: Received disconnect from 167.172.150.24 port 52058:11: Bye Bye [preauth] Jan 17 08:50:55 host sshd[5232]: Disconnected from 167.172.150.24 port 52058 [preauth] Jan 17 08:51:04 host sshd[5259]: User root from 181.114.109.54 not allowed because not listed in AllowUsers Jan 17 08:51:04 host sshd[5259]: input_userauth_request: invalid user root [preauth] Jan 17 08:51:04 host unix_chkpwd[5263]: password check failed for user (root) Jan 17 08:51:04 host sshd[5259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.114.109.54 user=root Jan 17 08:51:04 host sshd[5259]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:51:06 host sshd[5259]: Failed password for invalid user root from 181.114.109.54 port 50598 ssh2 Jan 17 08:51:06 host sshd[5259]: Received disconnect from 181.114.109.54 port 50598:11: Bye Bye [preauth] Jan 17 08:51:06 host sshd[5259]: Disconnected from 181.114.109.54 port 50598 [preauth] Jan 17 08:51:59 host sshd[5360]: User root from 190.60.110.240 not allowed because not listed in AllowUsers Jan 17 08:51:59 host sshd[5360]: input_userauth_request: invalid user root [preauth] Jan 17 08:51:59 host unix_chkpwd[5364]: password check failed for user (root) Jan 17 08:51:59 host sshd[5360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.60.110.240 user=root Jan 17 08:51:59 host sshd[5360]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:52:01 host sshd[5360]: Failed password for invalid user root from 190.60.110.240 port 65078 ssh2 Jan 17 08:52:01 host sshd[5360]: Received disconnect from 190.60.110.240 port 65078:11: Bye Bye [preauth] Jan 17 08:52:01 host sshd[5360]: Disconnected from 190.60.110.240 port 65078 [preauth] Jan 17 08:52:10 host sshd[5388]: Invalid user asterisk from 104.248.159.207 port 15032 Jan 17 08:52:10 host sshd[5388]: input_userauth_request: invalid user asterisk [preauth] Jan 17 08:52:10 host sshd[5388]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:52:10 host sshd[5388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.159.207 Jan 17 08:52:12 host sshd[5391]: User mysql from 178.46.163.191 not allowed because not listed in AllowUsers Jan 17 08:52:12 host sshd[5391]: input_userauth_request: invalid user mysql [preauth] Jan 17 08:52:12 host unix_chkpwd[5396]: password check failed for user (mysql) Jan 17 08:52:12 host sshd[5391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.46.163.191 user=mysql Jan 17 08:52:12 host sshd[5391]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 17 08:52:12 host sshd[5388]: Failed password for invalid user asterisk from 104.248.159.207 port 15032 ssh2 Jan 17 08:52:12 host sshd[5388]: Received disconnect from 104.248.159.207 port 15032:11: Bye Bye [preauth] Jan 17 08:52:12 host sshd[5388]: Disconnected from 104.248.159.207 port 15032 [preauth] Jan 17 08:52:14 host sshd[5391]: Failed password for invalid user mysql from 178.46.163.191 port 53284 ssh2 Jan 17 08:52:14 host sshd[5391]: Received disconnect from 178.46.163.191 port 53284:11: Bye Bye [preauth] Jan 17 08:52:14 host sshd[5391]: Disconnected from 178.46.163.191 port 53284 [preauth] Jan 17 08:52:39 host sshd[5456]: User root from 200.70.56.202 not allowed because not listed in AllowUsers Jan 17 08:52:39 host sshd[5456]: input_userauth_request: invalid user root [preauth] Jan 17 08:52:39 host unix_chkpwd[5461]: password check failed for user (root) Jan 17 08:52:39 host sshd[5456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.202 user=root Jan 17 08:52:39 host sshd[5456]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:52:42 host sshd[5456]: Failed password for invalid user root from 200.70.56.202 port 38076 ssh2 Jan 17 08:52:42 host sshd[5456]: Received disconnect from 200.70.56.202 port 38076:11: Bye Bye [preauth] Jan 17 08:52:42 host sshd[5456]: Disconnected from 200.70.56.202 port 38076 [preauth] Jan 17 08:53:22 host sshd[5632]: Invalid user amir from 186.248.219.34 port 42088 Jan 17 08:53:22 host sshd[5632]: input_userauth_request: invalid user amir [preauth] Jan 17 08:53:22 host sshd[5632]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:53:22 host sshd[5632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.248.219.34 Jan 17 08:53:24 host sshd[5632]: Failed password for invalid user amir from 186.248.219.34 port 42088 ssh2 Jan 17 08:53:25 host sshd[5632]: Received disconnect from 186.248.219.34 port 42088:11: Bye Bye [preauth] Jan 17 08:53:25 host sshd[5632]: Disconnected from 186.248.219.34 port 42088 [preauth] Jan 17 08:53:46 host sshd[5701]: Invalid user nagios from 41.82.208.182 port 13613 Jan 17 08:53:46 host sshd[5701]: input_userauth_request: invalid user nagios [preauth] Jan 17 08:53:46 host sshd[5701]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:53:46 host sshd[5701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.82.208.182 Jan 17 08:53:48 host sshd[5701]: Failed password for invalid user nagios from 41.82.208.182 port 13613 ssh2 Jan 17 08:53:48 host sshd[5701]: Received disconnect from 41.82.208.182 port 13613:11: Bye Bye [preauth] Jan 17 08:53:48 host sshd[5701]: Disconnected from 41.82.208.182 port 13613 [preauth] Jan 17 08:54:34 host sshd[5831]: Invalid user hotline from 103.84.236.242 port 51372 Jan 17 08:54:34 host sshd[5831]: input_userauth_request: invalid user hotline [preauth] Jan 17 08:54:34 host sshd[5831]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:54:34 host sshd[5831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.236.242 Jan 17 08:54:36 host sshd[5831]: Failed password for invalid user hotline from 103.84.236.242 port 51372 ssh2 Jan 17 08:54:36 host sshd[5831]: Received disconnect from 103.84.236.242 port 51372:11: Bye Bye [preauth] Jan 17 08:54:36 host sshd[5831]: Disconnected from 103.84.236.242 port 51372 [preauth] Jan 17 08:54:38 host sshd[5841]: User root from 162.243.237.90 not allowed because not listed in AllowUsers Jan 17 08:54:38 host sshd[5841]: input_userauth_request: invalid user root [preauth] Jan 17 08:54:38 host unix_chkpwd[5845]: password check failed for user (root) Jan 17 08:54:38 host sshd[5841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.237.90 user=root Jan 17 08:54:38 host sshd[5841]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:54:40 host sshd[5841]: Failed password for invalid user root from 162.243.237.90 port 44204 ssh2 Jan 17 08:54:40 host sshd[5841]: Received disconnect from 162.243.237.90 port 44204:11: Bye Bye [preauth] Jan 17 08:54:40 host sshd[5841]: Disconnected from 162.243.237.90 port 44204 [preauth] Jan 17 08:54:45 host sshd[5856]: User root from 99.130.111.161 not allowed because not listed in AllowUsers Jan 17 08:54:45 host sshd[5856]: input_userauth_request: invalid user root [preauth] Jan 17 08:54:45 host unix_chkpwd[5864]: password check failed for user (root) Jan 17 08:54:45 host sshd[5856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.130.111.161 user=root Jan 17 08:54:45 host sshd[5856]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:54:47 host sshd[5856]: Failed password for invalid user root from 99.130.111.161 port 56694 ssh2 Jan 17 08:54:47 host sshd[5856]: Received disconnect from 99.130.111.161 port 56694:11: Bye Bye [preauth] Jan 17 08:54:47 host sshd[5856]: Disconnected from 99.130.111.161 port 56694 [preauth] Jan 17 08:54:52 host sshd[5880]: User root from 162.55.126.28 not allowed because not listed in AllowUsers Jan 17 08:54:52 host sshd[5880]: input_userauth_request: invalid user root [preauth] Jan 17 08:54:52 host unix_chkpwd[5888]: password check failed for user (root) Jan 17 08:54:52 host sshd[5880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.55.126.28 user=root Jan 17 08:54:52 host sshd[5880]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:54:54 host sshd[5880]: Failed password for invalid user root from 162.55.126.28 port 47748 ssh2 Jan 17 08:54:54 host sshd[5880]: Received disconnect from 162.55.126.28 port 47748:11: Bye Bye [preauth] Jan 17 08:54:54 host sshd[5880]: Disconnected from 162.55.126.28 port 47748 [preauth] Jan 17 08:55:10 host sshd[5942]: User root from 185.205.12.132 not allowed because not listed in AllowUsers Jan 17 08:55:10 host sshd[5942]: input_userauth_request: invalid user root [preauth] Jan 17 08:55:10 host unix_chkpwd[5946]: password check failed for user (root) Jan 17 08:55:10 host sshd[5942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.205.12.132 user=root Jan 17 08:55:10 host sshd[5942]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:55:13 host sshd[5942]: Failed password for invalid user root from 185.205.12.132 port 37520 ssh2 Jan 17 08:55:13 host sshd[5942]: Received disconnect from 185.205.12.132 port 37520:11: Bye Bye [preauth] Jan 17 08:55:13 host sshd[5942]: Disconnected from 185.205.12.132 port 37520 [preauth] Jan 17 08:56:05 host sshd[6096]: User root from 58.186.85.94 not allowed because not listed in AllowUsers Jan 17 08:56:05 host sshd[6096]: input_userauth_request: invalid user root [preauth] Jan 17 08:56:05 host unix_chkpwd[6098]: password check failed for user (root) Jan 17 08:56:05 host sshd[6096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.186.85.94 user=root Jan 17 08:56:05 host sshd[6096]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:56:07 host sshd[6096]: Failed password for invalid user root from 58.186.85.94 port 42464 ssh2 Jan 17 08:56:07 host sshd[6096]: Received disconnect from 58.186.85.94 port 42464:11: Bye Bye [preauth] Jan 17 08:56:07 host sshd[6096]: Disconnected from 58.186.85.94 port 42464 [preauth] Jan 17 08:56:23 host sshd[6127]: User root from 167.71.233.59 not allowed because not listed in AllowUsers Jan 17 08:56:23 host sshd[6127]: input_userauth_request: invalid user root [preauth] Jan 17 08:56:23 host unix_chkpwd[6129]: password check failed for user (root) Jan 17 08:56:23 host sshd[6127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.233.59 user=root Jan 17 08:56:23 host sshd[6127]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:56:26 host sshd[6127]: Failed password for invalid user root from 167.71.233.59 port 45860 ssh2 Jan 17 08:56:26 host sshd[6127]: Received disconnect from 167.71.233.59 port 45860:11: Bye Bye [preauth] Jan 17 08:56:26 host sshd[6127]: Disconnected from 167.71.233.59 port 45860 [preauth] Jan 17 08:56:28 host sshd[6145]: User root from 204.48.27.25 not allowed because not listed in AllowUsers Jan 17 08:56:28 host sshd[6145]: input_userauth_request: invalid user root [preauth] Jan 17 08:56:28 host unix_chkpwd[6149]: password check failed for user (root) Jan 17 08:56:28 host sshd[6145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.27.25 user=root Jan 17 08:56:28 host sshd[6145]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:56:31 host sshd[6145]: Failed password for invalid user root from 204.48.27.25 port 35892 ssh2 Jan 17 08:56:31 host sshd[6145]: Received disconnect from 204.48.27.25 port 35892:11: Bye Bye [preauth] Jan 17 08:56:31 host sshd[6145]: Disconnected from 204.48.27.25 port 35892 [preauth] Jan 17 08:57:01 host sshd[6229]: User root from 92.255.195.59 not allowed because not listed in AllowUsers Jan 17 08:57:01 host sshd[6229]: input_userauth_request: invalid user root [preauth] Jan 17 08:57:01 host unix_chkpwd[6236]: password check failed for user (root) Jan 17 08:57:01 host sshd[6229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.195.59 user=root Jan 17 08:57:01 host sshd[6229]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:57:03 host sshd[6229]: Failed password for invalid user root from 92.255.195.59 port 54674 ssh2 Jan 17 08:57:03 host sshd[6229]: Received disconnect from 92.255.195.59 port 54674:11: Bye Bye [preauth] Jan 17 08:57:03 host sshd[6229]: Disconnected from 92.255.195.59 port 54674 [preauth] Jan 17 08:57:16 host sshd[6269]: Invalid user halo from 181.114.109.54 port 52944 Jan 17 08:57:16 host sshd[6269]: input_userauth_request: invalid user halo [preauth] Jan 17 08:57:16 host sshd[6269]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:57:16 host sshd[6269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.114.109.54 Jan 17 08:57:18 host sshd[6269]: Failed password for invalid user halo from 181.114.109.54 port 52944 ssh2 Jan 17 08:57:18 host sshd[6269]: Received disconnect from 181.114.109.54 port 52944:11: Bye Bye [preauth] Jan 17 08:57:18 host sshd[6269]: Disconnected from 181.114.109.54 port 52944 [preauth] Jan 17 08:57:34 host sshd[6349]: User root from 167.172.150.24 not allowed because not listed in AllowUsers Jan 17 08:57:34 host sshd[6349]: input_userauth_request: invalid user root [preauth] Jan 17 08:57:34 host unix_chkpwd[6352]: password check failed for user (root) Jan 17 08:57:34 host sshd[6349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.150.24 user=root Jan 17 08:57:34 host sshd[6349]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:57:36 host sshd[6349]: Failed password for invalid user root from 167.172.150.24 port 34716 ssh2 Jan 17 08:57:36 host sshd[6349]: Received disconnect from 167.172.150.24 port 34716:11: Bye Bye [preauth] Jan 17 08:57:36 host sshd[6349]: Disconnected from 167.172.150.24 port 34716 [preauth] Jan 17 08:57:38 host sshd[6361]: Invalid user amir from 162.243.237.90 port 35611 Jan 17 08:57:38 host sshd[6361]: input_userauth_request: invalid user amir [preauth] Jan 17 08:57:38 host sshd[6361]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:57:38 host sshd[6361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.237.90 Jan 17 08:57:40 host sshd[6390]: User root from 99.130.111.161 not allowed because not listed in AllowUsers Jan 17 08:57:40 host sshd[6390]: input_userauth_request: invalid user root [preauth] Jan 17 08:57:40 host unix_chkpwd[6393]: password check failed for user (root) Jan 17 08:57:40 host sshd[6390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=99.130.111.161 user=root Jan 17 08:57:40 host sshd[6390]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:57:40 host sshd[6361]: Failed password for invalid user amir from 162.243.237.90 port 35611 ssh2 Jan 17 08:57:40 host sshd[6361]: Received disconnect from 162.243.237.90 port 35611:11: Bye Bye [preauth] Jan 17 08:57:40 host sshd[6361]: Disconnected from 162.243.237.90 port 35611 [preauth] Jan 17 08:57:42 host sshd[6390]: Failed password for invalid user root from 99.130.111.161 port 38682 ssh2 Jan 17 08:57:42 host sshd[6390]: Received disconnect from 99.130.111.161 port 38682:11: Bye Bye [preauth] Jan 17 08:57:42 host sshd[6390]: Disconnected from 99.130.111.161 port 38682 [preauth] Jan 17 08:57:50 host sshd[6463]: Invalid user sam from 204.48.27.25 port 36020 Jan 17 08:57:50 host sshd[6463]: input_userauth_request: invalid user sam [preauth] Jan 17 08:57:50 host sshd[6463]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:57:50 host sshd[6463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.27.25 Jan 17 08:57:52 host sshd[6470]: Invalid user mc from 41.82.208.182 port 54200 Jan 17 08:57:52 host sshd[6470]: input_userauth_request: invalid user mc [preauth] Jan 17 08:57:52 host sshd[6470]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:57:52 host sshd[6470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.82.208.182 Jan 17 08:57:52 host sshd[6463]: Failed password for invalid user sam from 204.48.27.25 port 36020 ssh2 Jan 17 08:57:53 host sshd[6463]: Received disconnect from 204.48.27.25 port 36020:11: Bye Bye [preauth] Jan 17 08:57:53 host sshd[6463]: Disconnected from 204.48.27.25 port 36020 [preauth] Jan 17 08:57:54 host sshd[6470]: Failed password for invalid user mc from 41.82.208.182 port 54200 ssh2 Jan 17 08:57:54 host sshd[6470]: Received disconnect from 41.82.208.182 port 54200:11: Bye Bye [preauth] Jan 17 08:57:54 host sshd[6470]: Disconnected from 41.82.208.182 port 54200 [preauth] Jan 17 08:57:59 host sshd[6513]: Invalid user nagios from 162.55.126.28 port 57078 Jan 17 08:57:59 host sshd[6513]: input_userauth_request: invalid user nagios [preauth] Jan 17 08:57:59 host sshd[6513]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:57:59 host sshd[6513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.55.126.28 Jan 17 08:58:01 host sshd[6516]: Invalid user abc from 185.205.12.132 port 56636 Jan 17 08:58:01 host sshd[6516]: input_userauth_request: invalid user abc [preauth] Jan 17 08:58:01 host sshd[6516]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:58:01 host sshd[6516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.205.12.132 Jan 17 08:58:01 host sshd[6513]: Failed password for invalid user nagios from 162.55.126.28 port 57078 ssh2 Jan 17 08:58:01 host sshd[6513]: Received disconnect from 162.55.126.28 port 57078:11: Bye Bye [preauth] Jan 17 08:58:01 host sshd[6513]: Disconnected from 162.55.126.28 port 57078 [preauth] Jan 17 08:58:02 host sshd[6520]: Invalid user packer from 186.248.219.34 port 41170 Jan 17 08:58:02 host sshd[6520]: input_userauth_request: invalid user packer [preauth] Jan 17 08:58:02 host sshd[6520]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:58:02 host sshd[6520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.248.219.34 Jan 17 08:58:03 host sshd[6516]: Failed password for invalid user abc from 185.205.12.132 port 56636 ssh2 Jan 17 08:58:04 host sshd[6516]: Received disconnect from 185.205.12.132 port 56636:11: Bye Bye [preauth] Jan 17 08:58:04 host sshd[6516]: Disconnected from 185.205.12.132 port 56636 [preauth] Jan 17 08:58:05 host sshd[6520]: Failed password for invalid user packer from 186.248.219.34 port 41170 ssh2 Jan 17 08:58:05 host sshd[6520]: Received disconnect from 186.248.219.34 port 41170:11: Bye Bye [preauth] Jan 17 08:58:05 host sshd[6520]: Disconnected from 186.248.219.34 port 41170 [preauth] Jan 17 08:58:11 host sshd[6676]: Invalid user ali from 104.248.159.207 port 12634 Jan 17 08:58:11 host sshd[6676]: input_userauth_request: invalid user ali [preauth] Jan 17 08:58:11 host sshd[6676]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:58:11 host sshd[6676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.159.207 Jan 17 08:58:13 host sshd[6676]: Failed password for invalid user ali from 104.248.159.207 port 12634 ssh2 Jan 17 08:58:13 host sshd[6676]: Received disconnect from 104.248.159.207 port 12634:11: Bye Bye [preauth] Jan 17 08:58:13 host sshd[6676]: Disconnected from 104.248.159.207 port 12634 [preauth] Jan 17 08:58:19 host sshd[6719]: Invalid user elemental from 103.84.236.242 port 35362 Jan 17 08:58:19 host sshd[6719]: input_userauth_request: invalid user elemental [preauth] Jan 17 08:58:19 host sshd[6719]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:58:19 host sshd[6719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.236.242 Jan 17 08:58:22 host sshd[6719]: Failed password for invalid user elemental from 103.84.236.242 port 35362 ssh2 Jan 17 08:58:22 host sshd[6719]: Received disconnect from 103.84.236.242 port 35362:11: Bye Bye [preauth] Jan 17 08:58:22 host sshd[6719]: Disconnected from 103.84.236.242 port 35362 [preauth] Jan 17 08:58:33 host sshd[6768]: Invalid user minikube from 178.46.163.191 port 38388 Jan 17 08:58:33 host sshd[6768]: input_userauth_request: invalid user minikube [preauth] Jan 17 08:58:33 host sshd[6768]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:58:33 host sshd[6768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.46.163.191 Jan 17 08:58:35 host sshd[6768]: Failed password for invalid user minikube from 178.46.163.191 port 38388 ssh2 Jan 17 08:58:35 host sshd[6768]: Received disconnect from 178.46.163.191 port 38388:11: Bye Bye [preauth] Jan 17 08:58:35 host sshd[6768]: Disconnected from 178.46.163.191 port 38388 [preauth] Jan 17 08:58:36 host sshd[6776]: Invalid user amir from 190.60.110.240 port 19611 Jan 17 08:58:36 host sshd[6776]: input_userauth_request: invalid user amir [preauth] Jan 17 08:58:36 host sshd[6776]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:58:36 host sshd[6776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.60.110.240 Jan 17 08:58:37 host sshd[6779]: Invalid user elemental from 200.70.56.202 port 39008 Jan 17 08:58:37 host sshd[6779]: input_userauth_request: invalid user elemental [preauth] Jan 17 08:58:37 host sshd[6779]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:58:37 host sshd[6779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.202 Jan 17 08:58:38 host sshd[6776]: Failed password for invalid user amir from 190.60.110.240 port 19611 ssh2 Jan 17 08:58:39 host sshd[6776]: Received disconnect from 190.60.110.240 port 19611:11: Bye Bye [preauth] Jan 17 08:58:39 host sshd[6776]: Disconnected from 190.60.110.240 port 19611 [preauth] Jan 17 08:58:39 host sshd[6779]: Failed password for invalid user elemental from 200.70.56.202 port 39008 ssh2 Jan 17 08:58:40 host sshd[6779]: Received disconnect from 200.70.56.202 port 39008:11: Bye Bye [preauth] Jan 17 08:58:40 host sshd[6779]: Disconnected from 200.70.56.202 port 39008 [preauth] Jan 17 08:58:48 host sshd[6892]: User root from 92.255.195.59 not allowed because not listed in AllowUsers Jan 17 08:58:48 host sshd[6892]: input_userauth_request: invalid user root [preauth] Jan 17 08:58:48 host unix_chkpwd[6896]: password check failed for user (root) Jan 17 08:58:48 host sshd[6892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.195.59 user=root Jan 17 08:58:48 host sshd[6892]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:58:50 host sshd[6892]: Failed password for invalid user root from 92.255.195.59 port 60394 ssh2 Jan 17 08:58:50 host sshd[6892]: Received disconnect from 92.255.195.59 port 60394:11: Bye Bye [preauth] Jan 17 08:58:50 host sshd[6892]: Disconnected from 92.255.195.59 port 60394 [preauth] Jan 17 08:59:09 host sshd[6969]: Invalid user zabbix from 58.186.85.94 port 48206 Jan 17 08:59:09 host sshd[6969]: input_userauth_request: invalid user zabbix [preauth] Jan 17 08:59:09 host sshd[6969]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:59:09 host sshd[6969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.186.85.94 Jan 17 08:59:11 host sshd[6969]: Failed password for invalid user zabbix from 58.186.85.94 port 48206 ssh2 Jan 17 08:59:11 host sshd[6969]: Received disconnect from 58.186.85.94 port 48206:11: Bye Bye [preauth] Jan 17 08:59:11 host sshd[6969]: Disconnected from 58.186.85.94 port 48206 [preauth] Jan 17 08:59:12 host sshd[6977]: User root from 41.82.208.182 not allowed because not listed in AllowUsers Jan 17 08:59:12 host sshd[6977]: input_userauth_request: invalid user root [preauth] Jan 17 08:59:12 host unix_chkpwd[6986]: password check failed for user (root) Jan 17 08:59:12 host sshd[6977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.82.208.182 user=root Jan 17 08:59:12 host sshd[6977]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:59:14 host sshd[6977]: Failed password for invalid user root from 41.82.208.182 port 52397 ssh2 Jan 17 08:59:14 host sshd[6977]: Received disconnect from 41.82.208.182 port 52397:11: Bye Bye [preauth] Jan 17 08:59:14 host sshd[6977]: Disconnected from 41.82.208.182 port 52397 [preauth] Jan 17 08:59:21 host sshd[7058]: User root from 186.248.219.34 not allowed because not listed in AllowUsers Jan 17 08:59:21 host sshd[7058]: input_userauth_request: invalid user root [preauth] Jan 17 08:59:21 host unix_chkpwd[7061]: password check failed for user (root) Jan 17 08:59:21 host sshd[7058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.248.219.34 user=root Jan 17 08:59:21 host sshd[7058]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:59:23 host sshd[7058]: Failed password for invalid user root from 186.248.219.34 port 42438 ssh2 Jan 17 08:59:43 host sshd[7150]: Invalid user grid from 104.248.159.207 port 39524 Jan 17 08:59:43 host sshd[7150]: input_userauth_request: invalid user grid [preauth] Jan 17 08:59:43 host sshd[7150]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:59:43 host sshd[7150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.159.207 Jan 17 08:59:46 host sshd[7150]: Failed password for invalid user grid from 104.248.159.207 port 39524 ssh2 Jan 17 08:59:46 host sshd[7150]: Received disconnect from 104.248.159.207 port 39524:11: Bye Bye [preauth] Jan 17 08:59:46 host sshd[7150]: Disconnected from 104.248.159.207 port 39524 [preauth] Jan 17 08:59:46 host sshd[7156]: User root from 167.71.233.59 not allowed because not listed in AllowUsers Jan 17 08:59:46 host sshd[7156]: input_userauth_request: invalid user root [preauth] Jan 17 08:59:46 host unix_chkpwd[7158]: password check failed for user (root) Jan 17 08:59:46 host sshd[7156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.233.59 user=root Jan 17 08:59:46 host sshd[7156]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 08:59:48 host sshd[7156]: Failed password for invalid user root from 167.71.233.59 port 52842 ssh2 Jan 17 08:59:57 host sshd[7235]: Invalid user asterisk from 103.84.236.242 port 34168 Jan 17 08:59:57 host sshd[7235]: input_userauth_request: invalid user asterisk [preauth] Jan 17 08:59:57 host sshd[7235]: pam_unix(sshd:auth): check pass; user unknown Jan 17 08:59:57 host sshd[7235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.236.242 Jan 17 08:59:58 host sshd[7235]: Failed password for invalid user asterisk from 103.84.236.242 port 34168 ssh2 Jan 17 08:59:58 host sshd[7235]: Received disconnect from 103.84.236.242 port 34168:11: Bye Bye [preauth] Jan 17 08:59:58 host sshd[7235]: Disconnected from 103.84.236.242 port 34168 [preauth] Jan 17 09:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 09:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 09:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 09:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=wwwtestugo user-3=shalinijames user-4=pmcresources user-5=disposeat user-6=wwwkmaorg user-7=remysagr user-8=wwwkapin user-9=woodpeck user-10=gifterman user-11=palco123 user-12=kottayamcalldriv user-13=phmetals user-14=mrsclean user-15=wwwnexidigital user-16=bonifacegroup user-17=wwwevmhonda user-18=wwwletsstalkfood user-19=straightcurve user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 09:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-se53eXUJhaV3y0Y3.~ Jan 17 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-se53eXUJhaV3y0Y3.~' Jan 17 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-se53eXUJhaV3y0Y3.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 09:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 09:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 09:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 09:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 09:31:29 host sshd[13023]: User root from 196.179.231.103 not allowed because not listed in AllowUsers Jan 17 09:31:29 host sshd[13023]: input_userauth_request: invalid user root [preauth] Jan 17 09:31:29 host unix_chkpwd[13032]: password check failed for user (root) Jan 17 09:31:29 host sshd[13023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.231.103 user=root Jan 17 09:31:29 host sshd[13023]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 09:31:31 host sshd[13023]: Failed password for invalid user root from 196.179.231.103 port 47698 ssh2 Jan 17 09:31:31 host sshd[13023]: Received disconnect from 196.179.231.103 port 47698:11: Bye Bye [preauth] Jan 17 09:31:31 host sshd[13023]: Disconnected from 196.179.231.103 port 47698 [preauth] Jan 17 09:32:57 host sshd[13215]: User root from 182.253.115.155 not allowed because not listed in AllowUsers Jan 17 09:32:57 host sshd[13215]: input_userauth_request: invalid user root [preauth] Jan 17 09:32:57 host unix_chkpwd[13217]: password check failed for user (root) Jan 17 09:32:57 host sshd[13215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.115.155 user=root Jan 17 09:32:57 host sshd[13215]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 09:32:59 host sshd[13215]: Failed password for invalid user root from 182.253.115.155 port 45280 ssh2 Jan 17 09:32:59 host sshd[13215]: Received disconnect from 182.253.115.155 port 45280:11: Bye Bye [preauth] Jan 17 09:32:59 host sshd[13215]: Disconnected from 182.253.115.155 port 45280 [preauth] Jan 17 09:34:02 host sshd[13373]: Invalid user apache from 167.172.246.83 port 49348 Jan 17 09:34:02 host sshd[13373]: input_userauth_request: invalid user apache [preauth] Jan 17 09:34:02 host sshd[13373]: pam_unix(sshd:auth): check pass; user unknown Jan 17 09:34:02 host sshd[13373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.246.83 Jan 17 09:34:04 host sshd[13373]: Failed password for invalid user apache from 167.172.246.83 port 49348 ssh2 Jan 17 09:34:04 host sshd[13373]: Received disconnect from 167.172.246.83 port 49348:11: Bye Bye [preauth] Jan 17 09:34:04 host sshd[13373]: Disconnected from 167.172.246.83 port 49348 [preauth] Jan 17 09:34:11 host sshd[13400]: Invalid user miner from 13.87.204.143 port 59646 Jan 17 09:34:11 host sshd[13400]: input_userauth_request: invalid user miner [preauth] Jan 17 09:34:11 host sshd[13400]: pam_unix(sshd:auth): check pass; user unknown Jan 17 09:34:11 host sshd[13400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.87.204.143 Jan 17 09:34:13 host sshd[13400]: Failed password for invalid user miner from 13.87.204.143 port 59646 ssh2 Jan 17 09:34:13 host sshd[13400]: Received disconnect from 13.87.204.143 port 59646:11: Bye Bye [preauth] Jan 17 09:34:13 host sshd[13400]: Disconnected from 13.87.204.143 port 59646 [preauth] Jan 17 09:35:25 host sshd[13703]: User root from 93.115.53.27 not allowed because not listed in AllowUsers Jan 17 09:35:25 host sshd[13703]: input_userauth_request: invalid user root [preauth] Jan 17 09:35:25 host unix_chkpwd[13708]: password check failed for user (root) Jan 17 09:35:25 host sshd[13703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.115.53.27 user=root Jan 17 09:35:25 host sshd[13703]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 09:35:27 host sshd[13703]: Failed password for invalid user root from 93.115.53.27 port 55306 ssh2 Jan 17 09:35:27 host sshd[13703]: Received disconnect from 93.115.53.27 port 55306:11: Bye Bye [preauth] Jan 17 09:35:27 host sshd[13703]: Disconnected from 93.115.53.27 port 55306 [preauth] Jan 17 09:35:36 host sshd[13749]: User root from 165.154.243.252 not allowed because not listed in AllowUsers Jan 17 09:35:36 host sshd[13749]: input_userauth_request: invalid user root [preauth] Jan 17 09:35:36 host unix_chkpwd[13753]: password check failed for user (root) Jan 17 09:35:36 host sshd[13749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.243.252 user=root Jan 17 09:35:36 host sshd[13749]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 09:35:38 host sshd[13749]: Failed password for invalid user root from 165.154.243.252 port 26686 ssh2 Jan 17 09:35:38 host sshd[13749]: Received disconnect from 165.154.243.252 port 26686:11: Bye Bye [preauth] Jan 17 09:35:38 host sshd[13749]: Disconnected from 165.154.243.252 port 26686 [preauth] Jan 17 09:36:40 host sshd[13875]: User root from 196.179.231.103 not allowed because not listed in AllowUsers Jan 17 09:36:40 host sshd[13875]: input_userauth_request: invalid user root [preauth] Jan 17 09:36:40 host unix_chkpwd[13878]: password check failed for user (root) Jan 17 09:36:40 host sshd[13875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.231.103 user=root Jan 17 09:36:40 host sshd[13875]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 09:36:42 host sshd[13875]: Failed password for invalid user root from 196.179.231.103 port 45730 ssh2 Jan 17 09:36:42 host sshd[13875]: Received disconnect from 196.179.231.103 port 45730:11: Bye Bye [preauth] Jan 17 09:36:42 host sshd[13875]: Disconnected from 196.179.231.103 port 45730 [preauth] Jan 17 09:37:34 host sshd[14016]: User root from 13.87.204.143 not allowed because not listed in AllowUsers Jan 17 09:37:34 host sshd[14016]: input_userauth_request: invalid user root [preauth] Jan 17 09:37:34 host unix_chkpwd[14019]: password check failed for user (root) Jan 17 09:37:34 host sshd[14016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.87.204.143 user=root Jan 17 09:37:34 host sshd[14016]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 09:37:37 host sshd[14016]: Failed password for invalid user root from 13.87.204.143 port 33422 ssh2 Jan 17 09:37:37 host sshd[14016]: Received disconnect from 13.87.204.143 port 33422:11: Bye Bye [preauth] Jan 17 09:37:37 host sshd[14016]: Disconnected from 13.87.204.143 port 33422 [preauth] Jan 17 09:37:38 host sshd[14023]: User root from 167.172.246.83 not allowed because not listed in AllowUsers Jan 17 09:37:38 host sshd[14023]: input_userauth_request: invalid user root [preauth] Jan 17 09:37:38 host unix_chkpwd[14029]: password check failed for user (root) Jan 17 09:37:38 host sshd[14023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.246.83 user=root Jan 17 09:37:38 host sshd[14023]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 09:37:39 host sshd[14052]: Invalid user rancher from 182.253.115.155 port 57964 Jan 17 09:37:39 host sshd[14052]: input_userauth_request: invalid user rancher [preauth] Jan 17 09:37:39 host sshd[14052]: pam_unix(sshd:auth): check pass; user unknown Jan 17 09:37:39 host sshd[14052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.115.155 Jan 17 09:37:40 host sshd[14023]: Failed password for invalid user root from 167.172.246.83 port 59014 ssh2 Jan 17 09:37:40 host sshd[14023]: Received disconnect from 167.172.246.83 port 59014:11: Bye Bye [preauth] Jan 17 09:37:40 host sshd[14023]: Disconnected from 167.172.246.83 port 59014 [preauth] Jan 17 09:37:41 host sshd[14072]: User root from 58.82.155.197 not allowed because not listed in AllowUsers Jan 17 09:37:41 host sshd[14072]: input_userauth_request: invalid user root [preauth] Jan 17 09:37:41 host unix_chkpwd[14084]: password check failed for user (root) Jan 17 09:37:41 host sshd[14072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.82.155.197 user=root Jan 17 09:37:41 host sshd[14072]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 09:37:41 host sshd[14052]: Failed password for invalid user rancher from 182.253.115.155 port 57964 ssh2 Jan 17 09:37:41 host sshd[14052]: Received disconnect from 182.253.115.155 port 57964:11: Bye Bye [preauth] Jan 17 09:37:41 host sshd[14052]: Disconnected from 182.253.115.155 port 57964 [preauth] Jan 17 09:37:43 host sshd[14072]: Failed password for invalid user root from 58.82.155.197 port 59082 ssh2 Jan 17 09:37:43 host sshd[14072]: Received disconnect from 58.82.155.197 port 59082:11: Bye Bye [preauth] Jan 17 09:37:43 host sshd[14072]: Disconnected from 58.82.155.197 port 59082 [preauth] Jan 17 09:37:49 host sshd[14156]: User root from 165.154.243.252 not allowed because not listed in AllowUsers Jan 17 09:37:49 host sshd[14156]: input_userauth_request: invalid user root [preauth] Jan 17 09:37:49 host unix_chkpwd[14165]: password check failed for user (root) Jan 17 09:37:49 host sshd[14156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.243.252 user=root Jan 17 09:37:49 host sshd[14156]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 09:37:51 host sshd[14156]: Failed password for invalid user root from 165.154.243.252 port 55966 ssh2 Jan 17 09:37:51 host sshd[14156]: Received disconnect from 165.154.243.252 port 55966:11: Bye Bye [preauth] Jan 17 09:37:51 host sshd[14156]: Disconnected from 165.154.243.252 port 55966 [preauth] Jan 17 09:37:59 host sshd[14207]: User root from 93.115.53.27 not allowed because not listed in AllowUsers Jan 17 09:37:59 host sshd[14207]: input_userauth_request: invalid user root [preauth] Jan 17 09:37:59 host unix_chkpwd[14212]: password check failed for user (root) Jan 17 09:37:59 host sshd[14207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.115.53.27 user=root Jan 17 09:37:59 host sshd[14207]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 09:38:01 host sshd[14207]: Failed password for invalid user root from 93.115.53.27 port 52474 ssh2 Jan 17 09:38:01 host sshd[14207]: Received disconnect from 93.115.53.27 port 52474:11: Bye Bye [preauth] Jan 17 09:38:01 host sshd[14207]: Disconnected from 93.115.53.27 port 52474 [preauth] Jan 17 09:39:09 host sshd[14389]: Invalid user redis from 68.183.132.72 port 38124 Jan 17 09:39:09 host sshd[14389]: input_userauth_request: invalid user redis [preauth] Jan 17 09:39:09 host sshd[14389]: pam_unix(sshd:auth): check pass; user unknown Jan 17 09:39:09 host sshd[14389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.132.72 Jan 17 09:39:11 host sshd[14389]: Failed password for invalid user redis from 68.183.132.72 port 38124 ssh2 Jan 17 09:39:11 host sshd[14389]: Received disconnect from 68.183.132.72 port 38124:11: Bye Bye [preauth] Jan 17 09:39:11 host sshd[14389]: Disconnected from 68.183.132.72 port 38124 [preauth] Jan 17 09:39:41 host sshd[14480]: User root from 58.82.155.197 not allowed because not listed in AllowUsers Jan 17 09:39:41 host sshd[14480]: input_userauth_request: invalid user root [preauth] Jan 17 09:39:41 host unix_chkpwd[14484]: password check failed for user (root) Jan 17 09:39:41 host sshd[14480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.82.155.197 user=root Jan 17 09:39:41 host sshd[14480]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 09:39:43 host sshd[14480]: Failed password for invalid user root from 58.82.155.197 port 34010 ssh2 Jan 17 09:39:43 host sshd[14480]: Received disconnect from 58.82.155.197 port 34010:11: Bye Bye [preauth] Jan 17 09:39:43 host sshd[14480]: Disconnected from 58.82.155.197 port 34010 [preauth] Jan 17 09:45:42 host sshd[15540]: Invalid user gitlab-runner from 125.228.30.74 port 48200 Jan 17 09:45:42 host sshd[15540]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 17 09:45:42 host sshd[15540]: pam_unix(sshd:auth): check pass; user unknown Jan 17 09:45:42 host sshd[15540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.30.74 Jan 17 09:45:44 host sshd[15540]: Failed password for invalid user gitlab-runner from 125.228.30.74 port 48200 ssh2 Jan 17 09:45:45 host sshd[15540]: pam_unix(sshd:auth): check pass; user unknown Jan 17 09:45:47 host sshd[15540]: Failed password for invalid user gitlab-runner from 125.228.30.74 port 48200 ssh2 Jan 17 09:45:48 host sshd[15540]: pam_unix(sshd:auth): check pass; user unknown Jan 17 09:45:49 host sshd[15540]: Failed password for invalid user gitlab-runner from 125.228.30.74 port 48200 ssh2 Jan 17 09:45:50 host sshd[15540]: Failed password for invalid user gitlab-runner from 125.228.30.74 port 48200 ssh2 Jan 17 09:45:50 host sshd[15540]: Connection closed by 125.228.30.74 port 48200 [preauth] Jan 17 09:45:50 host sshd[15540]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.30.74 Jan 17 09:48:01 host sshd[15830]: Invalid user bitnami from 68.183.132.72 port 49596 Jan 17 09:48:01 host sshd[15830]: input_userauth_request: invalid user bitnami [preauth] Jan 17 09:48:01 host sshd[15830]: pam_unix(sshd:auth): check pass; user unknown Jan 17 09:48:01 host sshd[15830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.132.72 Jan 17 09:48:02 host sshd[15830]: Failed password for invalid user bitnami from 68.183.132.72 port 49596 ssh2 Jan 17 09:48:03 host sshd[15830]: Received disconnect from 68.183.132.72 port 49596:11: Bye Bye [preauth] Jan 17 09:48:03 host sshd[15830]: Disconnected from 68.183.132.72 port 49596 [preauth] Jan 17 09:49:23 host sshd[15996]: Invalid user fj from 194.110.203.109 port 41128 Jan 17 09:49:23 host sshd[15996]: input_userauth_request: invalid user fj [preauth] Jan 17 09:49:23 host sshd[15996]: pam_unix(sshd:auth): check pass; user unknown Jan 17 09:49:23 host sshd[15996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 09:49:25 host sshd[15996]: Failed password for invalid user fj from 194.110.203.109 port 41128 ssh2 Jan 17 09:49:29 host sshd[15996]: pam_unix(sshd:auth): check pass; user unknown Jan 17 09:49:30 host sshd[15996]: Failed password for invalid user fj from 194.110.203.109 port 41128 ssh2 Jan 17 09:49:34 host sshd[15996]: pam_unix(sshd:auth): check pass; user unknown Jan 17 09:49:35 host sshd[15996]: Failed password for invalid user fj from 194.110.203.109 port 41128 ssh2 Jan 17 09:49:38 host sshd[15996]: Connection closed by 194.110.203.109 port 41128 [preauth] Jan 17 09:49:38 host sshd[15996]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 09:53:30 host sshd[16666]: Invalid user admin from 68.183.132.72 port 50940 Jan 17 09:53:30 host sshd[16666]: input_userauth_request: invalid user admin [preauth] Jan 17 09:53:30 host sshd[16666]: pam_unix(sshd:auth): check pass; user unknown Jan 17 09:53:30 host sshd[16666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.132.72 Jan 17 09:53:32 host sshd[16666]: Failed password for invalid user admin from 68.183.132.72 port 50940 ssh2 Jan 17 09:53:32 host sshd[16666]: Received disconnect from 68.183.132.72 port 50940:11: Bye Bye [preauth] Jan 17 09:53:32 host sshd[16666]: Disconnected from 68.183.132.72 port 50940 [preauth] Jan 17 09:54:40 host sshd[16810]: Invalid user Admin from 36.228.90.92 port 51325 Jan 17 09:54:40 host sshd[16810]: input_userauth_request: invalid user Admin [preauth] Jan 17 09:54:40 host sshd[16810]: pam_unix(sshd:auth): check pass; user unknown Jan 17 09:54:40 host sshd[16810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.228.90.92 Jan 17 09:54:42 host sshd[16810]: Failed password for invalid user Admin from 36.228.90.92 port 51325 ssh2 Jan 17 09:54:43 host sshd[16810]: pam_unix(sshd:auth): check pass; user unknown Jan 17 09:54:45 host sshd[16810]: Failed password for invalid user Admin from 36.228.90.92 port 51325 ssh2 Jan 17 09:54:45 host sshd[16810]: pam_unix(sshd:auth): check pass; user unknown Jan 17 09:54:48 host sshd[16810]: Failed password for invalid user Admin from 36.228.90.92 port 51325 ssh2 Jan 17 09:54:50 host sshd[16810]: pam_unix(sshd:auth): check pass; user unknown Jan 17 09:54:52 host sshd[16810]: Failed password for invalid user Admin from 36.228.90.92 port 51325 ssh2 Jan 17 09:54:53 host sshd[16810]: Failed password for invalid user Admin from 36.228.90.92 port 51325 ssh2 Jan 17 09:54:54 host sshd[16810]: pam_unix(sshd:auth): check pass; user unknown Jan 17 09:54:56 host sshd[16810]: Failed password for invalid user Admin from 36.228.90.92 port 51325 ssh2 Jan 17 09:54:56 host sshd[16810]: error: maximum authentication attempts exceeded for invalid user Admin from 36.228.90.92 port 51325 ssh2 [preauth] Jan 17 09:54:56 host sshd[16810]: Disconnecting: Too many authentication failures [preauth] Jan 17 09:54:56 host sshd[16810]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.228.90.92 Jan 17 09:54:56 host sshd[16810]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 17 10:02:23 host sshd[18131]: User root from 34.93.223.12 not allowed because not listed in AllowUsers Jan 17 10:02:23 host sshd[18131]: input_userauth_request: invalid user root [preauth] Jan 17 10:02:23 host unix_chkpwd[18133]: password check failed for user (root) Jan 17 10:02:23 host sshd[18131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.93.223.12 user=root Jan 17 10:02:23 host sshd[18131]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 10:02:25 host sshd[18131]: Failed password for invalid user root from 34.93.223.12 port 48410 ssh2 Jan 17 10:02:25 host sshd[18131]: Received disconnect from 34.93.223.12 port 48410:11: Bye Bye [preauth] Jan 17 10:02:25 host sshd[18131]: Disconnected from 34.93.223.12 port 48410 [preauth] Jan 17 10:03:47 host sshd[18292]: Invalid user hb from 188.166.52.232 port 42942 Jan 17 10:03:47 host sshd[18292]: input_userauth_request: invalid user hb [preauth] Jan 17 10:03:47 host sshd[18292]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:03:47 host sshd[18292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.52.232 Jan 17 10:03:49 host sshd[18292]: Failed password for invalid user hb from 188.166.52.232 port 42942 ssh2 Jan 17 10:03:49 host sshd[18292]: Received disconnect from 188.166.52.232 port 42942:11: Bye Bye [preauth] Jan 17 10:03:49 host sshd[18292]: Disconnected from 188.166.52.232 port 42942 [preauth] Jan 17 10:06:00 host sshd[18651]: Invalid user zyfwp from 73.58.47.72 port 45198 Jan 17 10:06:00 host sshd[18651]: input_userauth_request: invalid user zyfwp [preauth] Jan 17 10:06:00 host sshd[18651]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:06:00 host sshd[18651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.58.47.72 Jan 17 10:06:02 host sshd[18651]: Failed password for invalid user zyfwp from 73.58.47.72 port 45198 ssh2 Jan 17 10:06:02 host sshd[18651]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:06:05 host sshd[18651]: Failed password for invalid user zyfwp from 73.58.47.72 port 45198 ssh2 Jan 17 10:06:06 host sshd[18651]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:06:07 host sshd[18651]: Failed password for invalid user zyfwp from 73.58.47.72 port 45198 ssh2 Jan 17 10:06:08 host sshd[18651]: Connection closed by 73.58.47.72 port 45198 [preauth] Jan 17 10:06:08 host sshd[18651]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.58.47.72 Jan 17 10:06:12 host sshd[18777]: Invalid user trojanuser from 79.59.251.230 port 37522 Jan 17 10:06:12 host sshd[18777]: input_userauth_request: invalid user trojanuser [preauth] Jan 17 10:06:12 host sshd[18777]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:06:12 host sshd[18777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.59.251.230 Jan 17 10:06:14 host sshd[18777]: Failed password for invalid user trojanuser from 79.59.251.230 port 37522 ssh2 Jan 17 10:06:14 host sshd[18777]: Received disconnect from 79.59.251.230 port 37522:11: Bye Bye [preauth] Jan 17 10:06:14 host sshd[18777]: Disconnected from 79.59.251.230 port 37522 [preauth] Jan 17 10:07:12 host sshd[18888]: User root from 188.166.52.232 not allowed because not listed in AllowUsers Jan 17 10:07:12 host sshd[18888]: input_userauth_request: invalid user root [preauth] Jan 17 10:07:12 host unix_chkpwd[18894]: password check failed for user (root) Jan 17 10:07:12 host sshd[18888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.52.232 user=root Jan 17 10:07:12 host sshd[18888]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 10:07:14 host sshd[18888]: Failed password for invalid user root from 188.166.52.232 port 44372 ssh2 Jan 17 10:07:14 host sshd[18888]: Received disconnect from 188.166.52.232 port 44372:11: Bye Bye [preauth] Jan 17 10:07:14 host sshd[18888]: Disconnected from 188.166.52.232 port 44372 [preauth] Jan 17 10:08:32 host sshd[19151]: Invalid user wordpress from 34.93.223.12 port 59220 Jan 17 10:08:32 host sshd[19151]: input_userauth_request: invalid user wordpress [preauth] Jan 17 10:08:32 host sshd[19151]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:08:32 host sshd[19151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.93.223.12 Jan 17 10:08:34 host sshd[19151]: Failed password for invalid user wordpress from 34.93.223.12 port 59220 ssh2 Jan 17 10:08:34 host sshd[19151]: Received disconnect from 34.93.223.12 port 59220:11: Bye Bye [preauth] Jan 17 10:08:34 host sshd[19151]: Disconnected from 34.93.223.12 port 59220 [preauth] Jan 17 10:09:08 host sshd[19317]: Invalid user user2 from 79.59.251.230 port 43182 Jan 17 10:09:08 host sshd[19317]: input_userauth_request: invalid user user2 [preauth] Jan 17 10:09:08 host sshd[19317]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:09:08 host sshd[19317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.59.251.230 Jan 17 10:09:10 host sshd[19317]: Failed password for invalid user user2 from 79.59.251.230 port 43182 ssh2 Jan 17 10:09:11 host sshd[19317]: Received disconnect from 79.59.251.230 port 43182:11: Bye Bye [preauth] Jan 17 10:09:11 host sshd[19317]: Disconnected from 79.59.251.230 port 43182 [preauth] Jan 17 10:10:16 host sshd[19481]: Invalid user plex from 79.59.251.230 port 37554 Jan 17 10:10:16 host sshd[19481]: input_userauth_request: invalid user plex [preauth] Jan 17 10:10:16 host sshd[19481]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:10:16 host sshd[19481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.59.251.230 Jan 17 10:10:19 host sshd[19481]: Failed password for invalid user plex from 79.59.251.230 port 37554 ssh2 Jan 17 10:10:19 host sshd[19481]: Received disconnect from 79.59.251.230 port 37554:11: Bye Bye [preauth] Jan 17 10:10:19 host sshd[19481]: Disconnected from 79.59.251.230 port 37554 [preauth] Jan 17 10:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 10:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 10:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 10:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=wwwresourcehunte user-4=keralaholi user-5=wwwrmswll user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=straightcurve user-13=wwwletsstalkfood user-14=wwwevmhonda user-15=bonifacegroup user-16=mrsclean user-17=wwwnexidigital user-18=phmetals user-19=kottayamcalldriv user-20=palco123 user-21=gifterman user-22=woodpeck user-23=wwwkapin user-24=disposeat user-25=remysagr user-26=wwwkmaorg user-27=pmcresources user-28=shalinijames user-29=wwwtestugo user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 10:21:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 10:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-qJiw4XsTURgymrTi.~ Jan 17 10:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-qJiw4XsTURgymrTi.~' Jan 17 10:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-qJiw4XsTURgymrTi.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 10:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 10:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 10:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 10:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 10:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 10:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 10:23:58 host sshd[22069]: User sshd from 194.169.175.102 not allowed because not listed in AllowUsers Jan 17 10:23:58 host sshd[22069]: input_userauth_request: invalid user sshd [preauth] Jan 17 10:23:58 host unix_chkpwd[22072]: password check failed for user (sshd) Jan 17 10:23:58 host sshd[22069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=sshd Jan 17 10:23:58 host sshd[22069]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sshd" Jan 17 10:24:00 host sshd[22069]: Failed password for invalid user sshd from 194.169.175.102 port 65271 ssh2 Jan 17 10:24:01 host sshd[22069]: Received disconnect from 194.169.175.102 port 65271:11: Client disconnecting normally [preauth] Jan 17 10:24:01 host sshd[22069]: Disconnected from 194.169.175.102 port 65271 [preauth] Jan 17 10:33:40 host sshd[23600]: Invalid user default from 125.228.30.214 port 45818 Jan 17 10:33:40 host sshd[23600]: input_userauth_request: invalid user default [preauth] Jan 17 10:33:40 host sshd[23600]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:33:40 host sshd[23600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.30.214 Jan 17 10:33:42 host sshd[23600]: Failed password for invalid user default from 125.228.30.214 port 45818 ssh2 Jan 17 10:33:43 host sshd[23600]: Connection reset by 125.228.30.214 port 45818 [preauth] Jan 17 10:37:20 host sshd[24075]: Invalid user vpn from 123.31.20.81 port 56420 Jan 17 10:37:20 host sshd[24075]: input_userauth_request: invalid user vpn [preauth] Jan 17 10:37:20 host sshd[24075]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:37:20 host sshd[24075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.20.81 Jan 17 10:37:22 host sshd[24075]: Failed password for invalid user vpn from 123.31.20.81 port 56420 ssh2 Jan 17 10:37:22 host sshd[24075]: Received disconnect from 123.31.20.81 port 56420:11: Bye Bye [preauth] Jan 17 10:37:22 host sshd[24075]: Disconnected from 123.31.20.81 port 56420 [preauth] Jan 17 10:39:59 host sshd[24524]: Invalid user vpn from 197.153.57.103 port 50038 Jan 17 10:39:59 host sshd[24524]: input_userauth_request: invalid user vpn [preauth] Jan 17 10:39:59 host sshd[24524]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:39:59 host sshd[24524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.153.57.103 Jan 17 10:40:01 host sshd[24524]: Failed password for invalid user vpn from 197.153.57.103 port 50038 ssh2 Jan 17 10:40:01 host sshd[24524]: Received disconnect from 197.153.57.103 port 50038:11: Bye Bye [preauth] Jan 17 10:40:01 host sshd[24524]: Disconnected from 197.153.57.103 port 50038 [preauth] Jan 17 10:41:31 host sshd[24738]: Invalid user db2inst1 from 197.153.57.103 port 36245 Jan 17 10:41:31 host sshd[24738]: input_userauth_request: invalid user db2inst1 [preauth] Jan 17 10:41:32 host sshd[24738]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:41:32 host sshd[24738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.153.57.103 Jan 17 10:41:34 host sshd[24738]: Failed password for invalid user db2inst1 from 197.153.57.103 port 36245 ssh2 Jan 17 10:41:34 host sshd[24738]: Received disconnect from 197.153.57.103 port 36245:11: Bye Bye [preauth] Jan 17 10:41:34 host sshd[24738]: Disconnected from 197.153.57.103 port 36245 [preauth] Jan 17 10:42:08 host sshd[24788]: Invalid user mapr from 123.31.20.81 port 44972 Jan 17 10:42:08 host sshd[24788]: input_userauth_request: invalid user mapr [preauth] Jan 17 10:42:08 host sshd[24788]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:42:08 host sshd[24788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.20.81 Jan 17 10:42:10 host sshd[24788]: Failed password for invalid user mapr from 123.31.20.81 port 44972 ssh2 Jan 17 10:42:10 host sshd[24788]: Received disconnect from 123.31.20.81 port 44972:11: Bye Bye [preauth] Jan 17 10:42:10 host sshd[24788]: Disconnected from 123.31.20.81 port 44972 [preauth] Jan 17 10:42:44 host sshd[24853]: Invalid user dockeradmin from 197.153.57.103 port 49875 Jan 17 10:42:44 host sshd[24853]: input_userauth_request: invalid user dockeradmin [preauth] Jan 17 10:42:44 host sshd[24853]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:42:44 host sshd[24853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.153.57.103 Jan 17 10:42:46 host sshd[24853]: Failed password for invalid user dockeradmin from 197.153.57.103 port 49875 ssh2 Jan 17 10:43:34 host sshd[24985]: User root from 123.31.20.81 not allowed because not listed in AllowUsers Jan 17 10:43:34 host sshd[24985]: input_userauth_request: invalid user root [preauth] Jan 17 10:43:34 host unix_chkpwd[24994]: password check failed for user (root) Jan 17 10:43:34 host sshd[24985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.20.81 user=root Jan 17 10:43:34 host sshd[24985]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 10:43:36 host sshd[24985]: Failed password for invalid user root from 123.31.20.81 port 40124 ssh2 Jan 17 10:43:36 host sshd[24985]: Received disconnect from 123.31.20.81 port 40124:11: Bye Bye [preauth] Jan 17 10:43:36 host sshd[24985]: Disconnected from 123.31.20.81 port 40124 [preauth] Jan 17 10:47:47 host sshd[25780]: User root from 18.183.240.136 not allowed because not listed in AllowUsers Jan 17 10:47:47 host sshd[25780]: input_userauth_request: invalid user root [preauth] Jan 17 10:47:47 host unix_chkpwd[25811]: password check failed for user (root) Jan 17 10:47:47 host sshd[25780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.183.240.136 user=root Jan 17 10:47:47 host sshd[25780]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 10:47:49 host sshd[25780]: Failed password for invalid user root from 18.183.240.136 port 50072 ssh2 Jan 17 10:47:49 host sshd[25780]: Received disconnect from 18.183.240.136 port 50072:11: Bye Bye [preauth] Jan 17 10:47:49 host sshd[25780]: Disconnected from 18.183.240.136 port 50072 [preauth] Jan 17 10:58:40 host sshd[27666]: Invalid user ubnt from 121.176.85.158 port 4069 Jan 17 10:58:40 host sshd[27666]: input_userauth_request: invalid user ubnt [preauth] Jan 17 10:58:40 host sshd[27666]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:58:40 host sshd[27666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.176.85.158 Jan 17 10:58:42 host sshd[27666]: Failed password for invalid user ubnt from 121.176.85.158 port 4069 ssh2 Jan 17 10:58:43 host sshd[27666]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:58:45 host sshd[27666]: Failed password for invalid user ubnt from 121.176.85.158 port 4069 ssh2 Jan 17 10:58:46 host sshd[27666]: Failed password for invalid user ubnt from 121.176.85.158 port 4069 ssh2 Jan 17 10:58:46 host sshd[27666]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:58:49 host sshd[27666]: Failed password for invalid user ubnt from 121.176.85.158 port 4069 ssh2 Jan 17 10:58:49 host sshd[27666]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:58:51 host sshd[27666]: Failed password for invalid user ubnt from 121.176.85.158 port 4069 ssh2 Jan 17 10:58:52 host sshd[27666]: pam_unix(sshd:auth): check pass; user unknown Jan 17 10:58:54 host sshd[27666]: Failed password for invalid user ubnt from 121.176.85.158 port 4069 ssh2 Jan 17 10:58:54 host sshd[27666]: error: maximum authentication attempts exceeded for invalid user ubnt from 121.176.85.158 port 4069 ssh2 [preauth] Jan 17 10:58:54 host sshd[27666]: Disconnecting: Too many authentication failures [preauth] Jan 17 10:58:54 host sshd[27666]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.176.85.158 Jan 17 10:58:54 host sshd[27666]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 17 10:59:07 host sshd[27718]: Connection closed by 18.183.240.136 port 41988 [preauth] Jan 17 11:02:42 host sshd[28294]: Connection closed by 18.183.240.136 port 38192 [preauth] Jan 17 11:06:58 host sshd[28974]: Connection closed by 18.183.240.136 port 35240 [preauth] Jan 17 11:11:09 host sshd[29683]: Connection closed by 18.183.240.136 port 52916 [preauth] Jan 17 11:14:42 host sshd[30258]: Connection closed by 18.183.240.136 port 48404 [preauth] Jan 17 11:16:25 host sshd[30594]: User root from 61.73.109.78 not allowed because not listed in AllowUsers Jan 17 11:16:25 host sshd[30594]: input_userauth_request: invalid user root [preauth] Jan 17 11:16:25 host unix_chkpwd[30601]: password check failed for user (root) Jan 17 11:16:25 host sshd[30594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.73.109.78 user=root Jan 17 11:16:25 host sshd[30594]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 11:16:27 host sshd[30594]: Failed password for invalid user root from 61.73.109.78 port 62703 ssh2 Jan 17 11:16:28 host sshd[30594]: Connection reset by 61.73.109.78 port 62703 [preauth] Jan 17 11:17:24 host sshd[30753]: Connection reset by 125.229.91.139 port 35763 [preauth] Jan 17 11:18:26 host sshd[30919]: Connection closed by 18.183.240.136 port 39364 [preauth] Jan 17 11:19:40 host sshd[31127]: Invalid user rodney from 107.189.30.59 port 40628 Jan 17 11:19:40 host sshd[31127]: input_userauth_request: invalid user rodney [preauth] Jan 17 11:19:40 host sshd[31127]: pam_unix(sshd:auth): check pass; user unknown Jan 17 11:19:40 host sshd[31127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 17 11:19:43 host sshd[31127]: Failed password for invalid user rodney from 107.189.30.59 port 40628 ssh2 Jan 17 11:19:44 host sshd[31127]: Connection closed by 107.189.30.59 port 40628 [preauth] Jan 17 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 11:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 11:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=shalinijames user-2=wwwtestugo user-3=vfmassets user-4=pmcresources user-5=remysagr user-6=disposeat user-7=wwwkmaorg user-8=woodpeck user-9=wwwkapin user-10=kottayamcalldriv user-11=phmetals user-12=palco123 user-13=gifterman user-14=wwwnexidigital user-15=mrsclean user-16=wwwevmhonda user-17=bonifacegroup user-18=wwwletsstalkfood user-19=straightcurve user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=ugotscom user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 11:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 11:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 11:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-W6NPfn5Q5hWyiq8I.~ Jan 17 11:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-W6NPfn5Q5hWyiq8I.~' Jan 17 11:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-W6NPfn5Q5hWyiq8I.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 11:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 11:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 11:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 11:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 11:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 11:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 11:21:58 host sshd[31698]: Connection closed by 18.183.240.136 port 55062 [preauth] Jan 17 11:23:17 host sshd[31852]: User root from 175.203.66.34 not allowed because not listed in AllowUsers Jan 17 11:23:17 host sshd[31852]: input_userauth_request: invalid user root [preauth] Jan 17 11:23:17 host unix_chkpwd[31856]: password check failed for user (root) Jan 17 11:23:17 host sshd[31852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.203.66.34 user=root Jan 17 11:23:17 host sshd[31852]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 11:23:18 host sshd[31852]: Failed password for invalid user root from 175.203.66.34 port 36582 ssh2 Jan 17 11:23:19 host unix_chkpwd[31861]: password check failed for user (root) Jan 17 11:23:19 host sshd[31852]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 11:23:21 host sshd[31852]: Failed password for invalid user root from 175.203.66.34 port 36582 ssh2 Jan 17 11:23:22 host sshd[31852]: Connection reset by 175.203.66.34 port 36582 [preauth] Jan 17 11:23:22 host sshd[31852]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.203.66.34 user=root Jan 17 11:23:58 host sshd[31930]: Invalid user zyfwp from 49.213.228.22 port 37176 Jan 17 11:23:58 host sshd[31930]: input_userauth_request: invalid user zyfwp [preauth] Jan 17 11:23:58 host sshd[31930]: pam_unix(sshd:auth): check pass; user unknown Jan 17 11:23:58 host sshd[31930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.213.228.22 Jan 17 11:24:00 host sshd[31930]: Failed password for invalid user zyfwp from 49.213.228.22 port 37176 ssh2 Jan 17 11:24:00 host sshd[31930]: Connection reset by 49.213.228.22 port 37176 [preauth] Jan 17 11:25:40 host sshd[32183]: Invalid user default from 180.189.105.83 port 42642 Jan 17 11:25:40 host sshd[32183]: input_userauth_request: invalid user default [preauth] Jan 17 11:25:40 host sshd[32183]: pam_unix(sshd:auth): check pass; user unknown Jan 17 11:25:40 host sshd[32183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.189.105.83 Jan 17 11:25:42 host sshd[32183]: Failed password for invalid user default from 180.189.105.83 port 42642 ssh2 Jan 17 11:25:42 host sshd[32183]: pam_unix(sshd:auth): check pass; user unknown Jan 17 11:25:44 host sshd[32183]: Failed password for invalid user default from 180.189.105.83 port 42642 ssh2 Jan 17 11:25:44 host sshd[32183]: pam_unix(sshd:auth): check pass; user unknown Jan 17 11:25:47 host sshd[32183]: Failed password for invalid user default from 180.189.105.83 port 42642 ssh2 Jan 17 11:25:47 host sshd[32183]: pam_unix(sshd:auth): check pass; user unknown Jan 17 11:25:49 host sshd[32183]: Failed password for invalid user default from 180.189.105.83 port 42642 ssh2 Jan 17 11:25:50 host sshd[32183]: pam_unix(sshd:auth): check pass; user unknown Jan 17 11:25:52 host sshd[32183]: Failed password for invalid user default from 180.189.105.83 port 42642 ssh2 Jan 17 11:25:52 host sshd[32183]: pam_unix(sshd:auth): check pass; user unknown Jan 17 11:25:55 host sshd[32183]: Failed password for invalid user default from 180.189.105.83 port 42642 ssh2 Jan 17 11:25:55 host sshd[32183]: error: maximum authentication attempts exceeded for invalid user default from 180.189.105.83 port 42642 ssh2 [preauth] Jan 17 11:25:55 host sshd[32183]: Disconnecting: Too many authentication failures [preauth] Jan 17 11:25:55 host sshd[32183]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.189.105.83 Jan 17 11:25:55 host sshd[32183]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 17 11:26:23 host sshd[32267]: Connection closed by 18.183.240.136 port 60844 [preauth] Jan 17 11:29:36 host sshd[304]: User root from 18.183.240.136 not allowed because not listed in AllowUsers Jan 17 11:29:36 host sshd[304]: input_userauth_request: invalid user root [preauth] Jan 17 11:29:36 host unix_chkpwd[311]: password check failed for user (root) Jan 17 11:29:36 host sshd[304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.183.240.136 user=root Jan 17 11:29:36 host sshd[304]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 11:29:38 host sshd[304]: Failed password for invalid user root from 18.183.240.136 port 39072 ssh2 Jan 17 11:39:49 host sshd[2102]: Invalid user fk from 194.110.203.109 port 36228 Jan 17 11:39:49 host sshd[2102]: input_userauth_request: invalid user fk [preauth] Jan 17 11:39:49 host sshd[2102]: pam_unix(sshd:auth): check pass; user unknown Jan 17 11:39:49 host sshd[2102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 11:39:51 host sshd[2102]: Failed password for invalid user fk from 194.110.203.109 port 36228 ssh2 Jan 17 11:39:54 host sshd[2102]: pam_unix(sshd:auth): check pass; user unknown Jan 17 11:39:56 host sshd[2102]: Failed password for invalid user fk from 194.110.203.109 port 36228 ssh2 Jan 17 11:39:59 host sshd[2102]: pam_unix(sshd:auth): check pass; user unknown Jan 17 11:40:02 host sshd[2102]: Failed password for invalid user fk from 194.110.203.109 port 36228 ssh2 Jan 17 11:40:05 host sshd[2102]: Connection closed by 194.110.203.109 port 36228 [preauth] Jan 17 11:40:05 host sshd[2102]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 11:42:49 host sshd[2555]: User root from 222.117.36.204 not allowed because not listed in AllowUsers Jan 17 11:42:49 host sshd[2555]: input_userauth_request: invalid user root [preauth] Jan 17 11:42:49 host unix_chkpwd[2563]: password check failed for user (root) Jan 17 11:42:49 host sshd[2555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.117.36.204 user=root Jan 17 11:42:49 host sshd[2555]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 11:42:50 host sshd[2555]: Failed password for invalid user root from 222.117.36.204 port 51852 ssh2 Jan 17 11:42:52 host unix_chkpwd[2571]: password check failed for user (root) Jan 17 11:42:52 host sshd[2555]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 11:42:54 host sshd[2555]: Failed password for invalid user root from 222.117.36.204 port 51852 ssh2 Jan 17 11:42:55 host unix_chkpwd[2578]: password check failed for user (root) Jan 17 11:42:55 host sshd[2555]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 11:42:57 host sshd[2555]: Failed password for invalid user root from 222.117.36.204 port 51852 ssh2 Jan 17 12:08:22 host sshd[6560]: Invalid user hikvision from 125.228.150.187 port 52826 Jan 17 12:08:22 host sshd[6560]: input_userauth_request: invalid user hikvision [preauth] Jan 17 12:08:22 host sshd[6560]: pam_unix(sshd:auth): check pass; user unknown Jan 17 12:08:22 host sshd[6560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.150.187 Jan 17 12:08:24 host sshd[6560]: Failed password for invalid user hikvision from 125.228.150.187 port 52826 ssh2 Jan 17 12:08:25 host sshd[6560]: pam_unix(sshd:auth): check pass; user unknown Jan 17 12:08:27 host sshd[6560]: Failed password for invalid user hikvision from 125.228.150.187 port 52826 ssh2 Jan 17 12:08:28 host sshd[6560]: Failed password for invalid user hikvision from 125.228.150.187 port 52826 ssh2 Jan 17 12:08:28 host sshd[6560]: Connection reset by 125.228.150.187 port 52826 [preauth] Jan 17 12:08:28 host sshd[6560]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.150.187 Jan 17 12:17:23 host sshd[8771]: User root from 119.196.161.183 not allowed because not listed in AllowUsers Jan 17 12:17:23 host sshd[8771]: input_userauth_request: invalid user root [preauth] Jan 17 12:17:23 host unix_chkpwd[8779]: password check failed for user (root) Jan 17 12:17:23 host sshd[8771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.196.161.183 user=root Jan 17 12:17:23 host sshd[8771]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 12:17:26 host sshd[8771]: Failed password for invalid user root from 119.196.161.183 port 60657 ssh2 Jan 17 12:17:27 host sshd[8771]: Connection reset by 119.196.161.183 port 60657 [preauth] Jan 17 12:18:25 host sshd[8986]: Connection closed by 172.104.11.4 port 48496 [preauth] Jan 17 12:18:26 host sshd[8989]: Connection closed by 172.104.11.4 port 48502 [preauth] Jan 17 12:18:28 host sshd[8992]: Connection closed by 172.104.11.4 port 48508 [preauth] Jan 17 12:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 12:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 12:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 12:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=wwwevmhonda user-4=bonifacegroup user-5=wwwnexidigital user-6=mrsclean user-7=kottayamcalldriv user-8=phmetals user-9=gifterman user-10=palco123 user-11=woodpeck user-12=wwwkapin user-13=wwwkmaorg user-14=disposeat user-15=remysagr user-16=pmcresources user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=wwwrmswll user-23=wwwresourcehunte user-24=keralaholi user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 12:21:07 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 12:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 12:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vu1uEcM2v6jQcFYK.~ Jan 17 12:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vu1uEcM2v6jQcFYK.~' Jan 17 12:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vu1uEcM2v6jQcFYK.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 12:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 12:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 12:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 12:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 12:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 12:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 12:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 12:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 12:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 12:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 12:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 12:35:01 host sshd[11606]: Invalid user admin from 1.219.220.158 port 47994 Jan 17 12:35:01 host sshd[11606]: input_userauth_request: invalid user admin [preauth] Jan 17 12:35:01 host sshd[11606]: pam_unix(sshd:auth): check pass; user unknown Jan 17 12:35:01 host sshd[11606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.219.220.158 Jan 17 12:35:03 host sshd[11606]: Failed password for invalid user admin from 1.219.220.158 port 47994 ssh2 Jan 17 12:35:04 host sshd[11606]: Failed password for invalid user admin from 1.219.220.158 port 47994 ssh2 Jan 17 12:35:05 host sshd[11606]: pam_unix(sshd:auth): check pass; user unknown Jan 17 12:35:06 host sshd[11606]: Failed password for invalid user admin from 1.219.220.158 port 47994 ssh2 Jan 17 12:35:07 host sshd[11606]: pam_unix(sshd:auth): check pass; user unknown Jan 17 12:35:09 host sshd[11606]: Failed password for invalid user admin from 1.219.220.158 port 47994 ssh2 Jan 17 12:35:09 host sshd[11606]: Connection reset by 1.219.220.158 port 47994 [preauth] Jan 17 12:35:09 host sshd[11606]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.219.220.158 Jan 17 12:38:04 host sshd[12163]: User root from 122.117.118.183 not allowed because not listed in AllowUsers Jan 17 12:38:04 host sshd[12163]: input_userauth_request: invalid user root [preauth] Jan 17 12:38:04 host unix_chkpwd[12166]: password check failed for user (root) Jan 17 12:38:04 host sshd[12163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.118.183 user=root Jan 17 12:38:04 host sshd[12163]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 12:38:06 host sshd[12163]: Failed password for invalid user root from 122.117.118.183 port 49015 ssh2 Jan 17 12:38:07 host unix_chkpwd[12171]: password check failed for user (root) Jan 17 12:38:07 host sshd[12163]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 12:38:09 host sshd[12163]: Failed password for invalid user root from 122.117.118.183 port 49015 ssh2 Jan 17 12:38:10 host unix_chkpwd[12174]: password check failed for user (root) Jan 17 12:38:10 host sshd[12163]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 12:38:12 host sshd[12163]: Failed password for invalid user root from 122.117.118.183 port 49015 ssh2 Jan 17 12:38:13 host unix_chkpwd[12178]: password check failed for user (root) Jan 17 12:38:13 host sshd[12163]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 12:38:14 host sshd[12163]: Failed password for invalid user root from 122.117.118.183 port 49015 ssh2 Jan 17 12:38:15 host sshd[12163]: Connection reset by 122.117.118.183 port 49015 [preauth] Jan 17 12:38:15 host sshd[12163]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.118.183 user=root Jan 17 12:38:15 host sshd[12163]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 17 12:45:22 host sshd[13687]: Invalid user telnet from 210.223.20.229 port 38702 Jan 17 12:45:22 host sshd[13687]: input_userauth_request: invalid user telnet [preauth] Jan 17 12:45:22 host sshd[13687]: pam_unix(sshd:auth): check pass; user unknown Jan 17 12:45:22 host sshd[13687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.223.20.229 Jan 17 12:45:24 host sshd[13687]: Failed password for invalid user telnet from 210.223.20.229 port 38702 ssh2 Jan 17 12:45:25 host sshd[13687]: Connection reset by 210.223.20.229 port 38702 [preauth] Jan 17 12:52:35 host sshd[15575]: Invalid user usr from 220.132.60.127 port 40753 Jan 17 12:52:35 host sshd[15575]: input_userauth_request: invalid user usr [preauth] Jan 17 12:52:35 host sshd[15575]: pam_unix(sshd:auth): check pass; user unknown Jan 17 12:52:35 host sshd[15575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.60.127 Jan 17 12:52:37 host sshd[15575]: Failed password for invalid user usr from 220.132.60.127 port 40753 ssh2 Jan 17 12:52:37 host sshd[15575]: Connection reset by 220.132.60.127 port 40753 [preauth] Jan 17 13:04:43 host sshd[19152]: User root from 118.46.245.47 not allowed because not listed in AllowUsers Jan 17 13:04:43 host sshd[19152]: input_userauth_request: invalid user root [preauth] Jan 17 13:04:44 host unix_chkpwd[19167]: password check failed for user (root) Jan 17 13:04:44 host sshd[19152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.46.245.47 user=root Jan 17 13:04:44 host sshd[19152]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 13:04:45 host sshd[19152]: Failed password for invalid user root from 118.46.245.47 port 63091 ssh2 Jan 17 13:04:45 host sshd[19152]: Connection reset by 118.46.245.47 port 63091 [preauth] Jan 17 13:09:08 host sshd[19880]: Invalid user default from 42.191.77.59 port 51042 Jan 17 13:09:08 host sshd[19880]: input_userauth_request: invalid user default [preauth] Jan 17 13:09:08 host sshd[19880]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:09:08 host sshd[19880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.191.77.59 Jan 17 13:09:10 host sshd[19880]: Failed password for invalid user default from 42.191.77.59 port 51042 ssh2 Jan 17 13:09:10 host sshd[19880]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:09:12 host sshd[19880]: Failed password for invalid user default from 42.191.77.59 port 51042 ssh2 Jan 17 13:09:12 host sshd[19880]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:09:14 host sshd[19880]: Failed password for invalid user default from 42.191.77.59 port 51042 ssh2 Jan 17 13:09:15 host sshd[19880]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:09:17 host sshd[19880]: Failed password for invalid user default from 42.191.77.59 port 51042 ssh2 Jan 17 13:09:17 host sshd[19880]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:09:19 host sshd[19880]: Failed password for invalid user default from 42.191.77.59 port 51042 ssh2 Jan 17 13:09:19 host sshd[19880]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:09:22 host sshd[19880]: Failed password for invalid user default from 42.191.77.59 port 51042 ssh2 Jan 17 13:09:22 host sshd[19880]: error: maximum authentication attempts exceeded for invalid user default from 42.191.77.59 port 51042 ssh2 [preauth] Jan 17 13:09:22 host sshd[19880]: Disconnecting: Too many authentication failures [preauth] Jan 17 13:09:22 host sshd[19880]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.191.77.59 Jan 17 13:09:22 host sshd[19880]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 17 13:09:55 host sshd[19997]: Invalid user ubnt from 112.173.206.245 port 48215 Jan 17 13:09:55 host sshd[19997]: input_userauth_request: invalid user ubnt [preauth] Jan 17 13:09:55 host sshd[19997]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:09:55 host sshd[19997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.173.206.245 Jan 17 13:09:57 host sshd[19997]: Failed password for invalid user ubnt from 112.173.206.245 port 48215 ssh2 Jan 17 13:12:21 host sshd[20371]: Invalid user usr from 122.117.72.216 port 42708 Jan 17 13:12:21 host sshd[20371]: input_userauth_request: invalid user usr [preauth] Jan 17 13:12:21 host sshd[20371]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:12:21 host sshd[20371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.72.216 Jan 17 13:12:23 host sshd[20371]: Failed password for invalid user usr from 122.117.72.216 port 42708 ssh2 Jan 17 13:12:23 host sshd[20371]: Connection reset by 122.117.72.216 port 42708 [preauth] Jan 17 13:16:56 host sshd[20893]: Invalid user super from 121.153.245.38 port 49384 Jan 17 13:16:56 host sshd[20893]: input_userauth_request: invalid user super [preauth] Jan 17 13:16:56 host sshd[20893]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:16:56 host sshd[20893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.153.245.38 Jan 17 13:16:58 host sshd[20893]: Failed password for invalid user super from 121.153.245.38 port 49384 ssh2 Jan 17 13:16:59 host sshd[20893]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:17:01 host sshd[20893]: Failed password for invalid user super from 121.153.245.38 port 49384 ssh2 Jan 17 13:17:04 host sshd[20893]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:17:06 host sshd[20893]: Failed password for invalid user super from 121.153.245.38 port 49384 ssh2 Jan 17 13:17:06 host sshd[20893]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:17:08 host sshd[20893]: Failed password for invalid user super from 121.153.245.38 port 49384 ssh2 Jan 17 13:17:09 host sshd[20893]: Connection reset by 121.153.245.38 port 49384 [preauth] Jan 17 13:17:09 host sshd[20893]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.153.245.38 Jan 17 13:17:09 host sshd[20893]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 17 13:18:31 host sshd[21209]: User root from 220.134.174.154 not allowed because not listed in AllowUsers Jan 17 13:18:31 host sshd[21209]: input_userauth_request: invalid user root [preauth] Jan 17 13:18:31 host unix_chkpwd[21213]: password check failed for user (root) Jan 17 13:18:31 host sshd[21209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.174.154 user=root Jan 17 13:18:31 host sshd[21209]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 13:18:33 host sshd[21209]: Failed password for invalid user root from 220.134.174.154 port 44264 ssh2 Jan 17 13:18:34 host unix_chkpwd[21217]: password check failed for user (root) Jan 17 13:18:34 host sshd[21209]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 13:18:36 host sshd[21209]: Failed password for invalid user root from 220.134.174.154 port 44264 ssh2 Jan 17 13:18:37 host unix_chkpwd[21227]: password check failed for user (root) Jan 17 13:18:37 host sshd[21209]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 13:18:39 host sshd[21209]: Failed password for invalid user root from 220.134.174.154 port 44264 ssh2 Jan 17 13:18:40 host unix_chkpwd[21230]: password check failed for user (root) Jan 17 13:18:40 host sshd[21209]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 13:18:43 host sshd[21209]: Failed password for invalid user root from 220.134.174.154 port 44264 ssh2 Jan 17 13:20:49 host sshd[21533]: Invalid user pi from 46.205.211.100 port 13332 Jan 17 13:20:49 host sshd[21533]: input_userauth_request: invalid user pi [preauth] Jan 17 13:20:49 host sshd[21532]: Invalid user pi from 46.205.211.100 port 9238 Jan 17 13:20:49 host sshd[21532]: input_userauth_request: invalid user pi [preauth] Jan 17 13:20:49 host sshd[21533]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:20:49 host sshd[21533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.205.211.100 Jan 17 13:20:49 host sshd[21532]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:20:49 host sshd[21532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.205.211.100 Jan 17 13:20:51 host sshd[21533]: Failed password for invalid user pi from 46.205.211.100 port 13332 ssh2 Jan 17 13:20:51 host sshd[21532]: Failed password for invalid user pi from 46.205.211.100 port 9238 ssh2 Jan 17 13:20:51 host sshd[21533]: Connection closed by 46.205.211.100 port 13332 [preauth] Jan 17 13:20:51 host sshd[21532]: Connection closed by 46.205.211.100 port 9238 [preauth] Jan 17 13:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 13:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 13:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 13:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkmaorg user-2=disposeat user-3=remysagr user-4=wwwkapin user-5=woodpeck user-6=vfmassets user-7=wwwtestugo user-8=shalinijames user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=gifterman user-15=palco123 user-16=kottayamcalldriv user-17=phmetals user-18=mrsclean user-19=wwwnexidigital user-20=cochintaxi user-21=wwwkaretakers user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwrmswll user-28=keralaholi user-29=wwwresourcehunte user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 13:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 13:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 13:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZjHyYbQKf0kzhLkQ.~ Jan 17 13:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZjHyYbQKf0kzhLkQ.~' Jan 17 13:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZjHyYbQKf0kzhLkQ.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 13:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 13:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 13:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 13:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 13:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 13:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 13:27:21 host sshd[22734]: Invalid user Admin from 118.173.203.29 port 33382 Jan 17 13:27:21 host sshd[22734]: input_userauth_request: invalid user Admin [preauth] Jan 17 13:27:21 host sshd[22734]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:27:21 host sshd[22734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.173.203.29 Jan 17 13:27:23 host sshd[22734]: Failed password for invalid user Admin from 118.173.203.29 port 33382 ssh2 Jan 17 13:27:24 host sshd[22734]: Connection reset by 118.173.203.29 port 33382 [preauth] Jan 17 13:30:10 host sshd[23184]: Invalid user fl from 194.110.203.109 port 33088 Jan 17 13:30:10 host sshd[23184]: input_userauth_request: invalid user fl [preauth] Jan 17 13:30:10 host sshd[23184]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:30:10 host sshd[23184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 13:30:12 host sshd[23184]: Failed password for invalid user fl from 194.110.203.109 port 33088 ssh2 Jan 17 13:30:15 host sshd[23184]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:30:17 host sshd[23184]: Failed password for invalid user fl from 194.110.203.109 port 33088 ssh2 Jan 17 13:30:20 host sshd[23184]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:30:22 host sshd[23184]: Failed password for invalid user fl from 194.110.203.109 port 33088 ssh2 Jan 17 13:30:25 host sshd[23184]: Connection closed by 194.110.203.109 port 33088 [preauth] Jan 17 13:30:25 host sshd[23184]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 13:30:25 host sshd[23221]: Did not receive identification string from 64.227.181.236 port 61000 Jan 17 13:49:36 host sshd[26073]: Invalid user ec2-user from 218.156.128.226 port 34736 Jan 17 13:49:36 host sshd[26073]: input_userauth_request: invalid user ec2-user [preauth] Jan 17 13:49:36 host sshd[26073]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:49:36 host sshd[26073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.156.128.226 Jan 17 13:49:39 host sshd[26073]: Failed password for invalid user ec2-user from 218.156.128.226 port 34736 ssh2 Jan 17 13:49:39 host sshd[26073]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:49:41 host sshd[26073]: Failed password for invalid user ec2-user from 218.156.128.226 port 34736 ssh2 Jan 17 13:49:42 host sshd[26073]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:49:44 host sshd[26073]: Failed password for invalid user ec2-user from 218.156.128.226 port 34736 ssh2 Jan 17 13:49:44 host sshd[26073]: Failed password for invalid user ec2-user from 218.156.128.226 port 34736 ssh2 Jan 17 13:49:45 host sshd[26073]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:49:47 host sshd[26073]: Failed password for invalid user ec2-user from 218.156.128.226 port 34736 ssh2 Jan 17 13:49:47 host sshd[26073]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:49:49 host sshd[26073]: Failed password for invalid user ec2-user from 218.156.128.226 port 34736 ssh2 Jan 17 13:49:49 host sshd[26073]: error: maximum authentication attempts exceeded for invalid user ec2-user from 218.156.128.226 port 34736 ssh2 [preauth] Jan 17 13:49:49 host sshd[26073]: Disconnecting: Too many authentication failures [preauth] Jan 17 13:49:49 host sshd[26073]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.156.128.226 Jan 17 13:49:49 host sshd[26073]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 17 13:53:29 host sshd[26660]: Invalid user admin from 210.206.3.119 port 60153 Jan 17 13:53:29 host sshd[26660]: input_userauth_request: invalid user admin [preauth] Jan 17 13:53:29 host sshd[26660]: pam_unix(sshd:auth): check pass; user unknown Jan 17 13:53:29 host sshd[26660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.206.3.119 Jan 17 13:53:31 host sshd[26660]: Failed password for invalid user admin from 210.206.3.119 port 60153 ssh2 Jan 17 13:53:32 host sshd[26660]: Connection reset by 210.206.3.119 port 60153 [preauth] Jan 17 14:00:52 host sshd[27628]: Did not receive identification string from 82.157.194.152 port 56270 Jan 17 14:03:32 host sshd[27973]: User root from 146.190.227.169 not allowed because not listed in AllowUsers Jan 17 14:03:32 host sshd[27973]: input_userauth_request: invalid user root [preauth] Jan 17 14:03:32 host unix_chkpwd[27976]: password check failed for user (root) Jan 17 14:03:32 host sshd[27973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.227.169 user=root Jan 17 14:03:32 host sshd[27973]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 14:03:34 host sshd[27973]: Failed password for invalid user root from 146.190.227.169 port 41826 ssh2 Jan 17 14:03:35 host sshd[27973]: Received disconnect from 146.190.227.169 port 41826:11: Bye Bye [preauth] Jan 17 14:03:35 host sshd[27973]: Disconnected from 146.190.227.169 port 41826 [preauth] Jan 17 14:07:07 host sshd[28498]: Invalid user slave from 129.205.208.20 port 61003 Jan 17 14:07:07 host sshd[28498]: input_userauth_request: invalid user slave [preauth] Jan 17 14:07:07 host sshd[28498]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:07:07 host sshd[28498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.205.208.20 Jan 17 14:07:09 host sshd[28498]: Failed password for invalid user slave from 129.205.208.20 port 61003 ssh2 Jan 17 14:07:09 host sshd[28498]: Received disconnect from 129.205.208.20 port 61003:11: Bye Bye [preauth] Jan 17 14:07:09 host sshd[28498]: Disconnected from 129.205.208.20 port 61003 [preauth] Jan 17 14:07:24 host sshd[28532]: Invalid user admin from 122.117.92.132 port 35298 Jan 17 14:07:24 host sshd[28532]: input_userauth_request: invalid user admin [preauth] Jan 17 14:07:24 host sshd[28532]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:07:24 host sshd[28532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.92.132 Jan 17 14:07:26 host sshd[28532]: Failed password for invalid user admin from 122.117.92.132 port 35298 ssh2 Jan 17 14:07:28 host sshd[28532]: Failed password for invalid user admin from 122.117.92.132 port 35298 ssh2 Jan 17 14:07:28 host sshd[28532]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:07:31 host sshd[28532]: Failed password for invalid user admin from 122.117.92.132 port 35298 ssh2 Jan 17 14:07:32 host sshd[28532]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:07:34 host sshd[28532]: Failed password for invalid user admin from 122.117.92.132 port 35298 ssh2 Jan 17 14:07:34 host sshd[28567]: Invalid user terraria from 164.90.191.216 port 42078 Jan 17 14:07:34 host sshd[28567]: input_userauth_request: invalid user terraria [preauth] Jan 17 14:07:34 host sshd[28567]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:07:34 host sshd[28567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.191.216 Jan 17 14:07:34 host sshd[28532]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:07:36 host sshd[28567]: Failed password for invalid user terraria from 164.90.191.216 port 42078 ssh2 Jan 17 14:07:36 host sshd[28567]: Received disconnect from 164.90.191.216 port 42078:11: Bye Bye [preauth] Jan 17 14:07:36 host sshd[28567]: Disconnected from 164.90.191.216 port 42078 [preauth] Jan 17 14:07:36 host sshd[28532]: Failed password for invalid user admin from 122.117.92.132 port 35298 ssh2 Jan 17 14:07:37 host sshd[28532]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:07:39 host sshd[28532]: Failed password for invalid user admin from 122.117.92.132 port 35298 ssh2 Jan 17 14:07:39 host sshd[28532]: error: maximum authentication attempts exceeded for invalid user admin from 122.117.92.132 port 35298 ssh2 [preauth] Jan 17 14:07:39 host sshd[28532]: Disconnecting: Too many authentication failures [preauth] Jan 17 14:07:39 host sshd[28532]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.92.132 Jan 17 14:07:39 host sshd[28532]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 17 14:08:08 host sshd[28655]: Connection closed by 60.217.75.70 port 54710 [preauth] Jan 17 14:09:10 host sshd[28788]: User root from 146.190.227.169 not allowed because not listed in AllowUsers Jan 17 14:09:10 host sshd[28788]: input_userauth_request: invalid user root [preauth] Jan 17 14:09:10 host unix_chkpwd[28791]: password check failed for user (root) Jan 17 14:09:10 host sshd[28788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.227.169 user=root Jan 17 14:09:10 host sshd[28788]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 14:09:12 host sshd[28788]: Failed password for invalid user root from 146.190.227.169 port 42536 ssh2 Jan 17 14:09:13 host sshd[28788]: Received disconnect from 146.190.227.169 port 42536:11: Bye Bye [preauth] Jan 17 14:09:13 host sshd[28788]: Disconnected from 146.190.227.169 port 42536 [preauth] Jan 17 14:09:44 host sshd[28883]: Invalid user devops from 164.90.191.216 port 47554 Jan 17 14:09:44 host sshd[28883]: input_userauth_request: invalid user devops [preauth] Jan 17 14:09:44 host sshd[28883]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:09:44 host sshd[28883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.191.216 Jan 17 14:09:47 host sshd[28883]: Failed password for invalid user devops from 164.90.191.216 port 47554 ssh2 Jan 17 14:09:47 host sshd[28883]: Received disconnect from 164.90.191.216 port 47554:11: Bye Bye [preauth] Jan 17 14:09:47 host sshd[28883]: Disconnected from 164.90.191.216 port 47554 [preauth] Jan 17 14:10:52 host sshd[29130]: User root from 164.90.191.216 not allowed because not listed in AllowUsers Jan 17 14:10:52 host sshd[29130]: input_userauth_request: invalid user root [preauth] Jan 17 14:10:52 host unix_chkpwd[29133]: password check failed for user (root) Jan 17 14:10:52 host sshd[29130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.191.216 user=root Jan 17 14:10:52 host sshd[29130]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 14:10:54 host sshd[29130]: Failed password for invalid user root from 164.90.191.216 port 46008 ssh2 Jan 17 14:11:09 host sshd[29193]: Connection reset by 114.32.62.25 port 50550 [preauth] Jan 17 14:12:08 host sshd[29302]: Did not receive identification string from 20.163.208.188 port 39998 Jan 17 14:12:11 host sshd[29315]: Invalid user user from 20.163.208.188 port 40050 Jan 17 14:12:11 host sshd[29315]: input_userauth_request: invalid user user [preauth] Jan 17 14:12:11 host sshd[29309]: Invalid user admin from 20.163.208.188 port 40080 Jan 17 14:12:11 host sshd[29310]: Invalid user admin from 20.163.208.188 port 40064 Jan 17 14:12:11 host sshd[29310]: input_userauth_request: invalid user admin [preauth] Jan 17 14:12:11 host sshd[29309]: input_userauth_request: invalid user admin [preauth] Jan 17 14:12:11 host sshd[29312]: Invalid user es from 20.163.208.188 port 40046 Jan 17 14:12:11 host sshd[29313]: Invalid user test from 20.163.208.188 port 40090 Jan 17 14:12:11 host sshd[29312]: input_userauth_request: invalid user es [preauth] Jan 17 14:12:11 host sshd[29313]: input_userauth_request: invalid user test [preauth] Jan 17 14:12:11 host sshd[29316]: Invalid user oracle from 20.163.208.188 port 40130 Jan 17 14:12:11 host sshd[29316]: input_userauth_request: invalid user oracle [preauth] Jan 17 14:12:11 host sshd[29317]: Invalid user halo from 20.163.208.188 port 40026 Jan 17 14:12:11 host sshd[29317]: input_userauth_request: invalid user halo [preauth] Jan 17 14:12:11 host sshd[29308]: Invalid user testuser from 20.163.208.188 port 40034 Jan 17 14:12:11 host sshd[29308]: input_userauth_request: invalid user testuser [preauth] Jan 17 14:12:11 host sshd[29311]: Invalid user es from 20.163.208.188 port 40118 Jan 17 14:12:11 host sshd[29311]: input_userauth_request: invalid user es [preauth] Jan 17 14:12:11 host sshd[29307]: Invalid user esuser from 20.163.208.188 port 40016 Jan 17 14:12:11 host sshd[29307]: input_userauth_request: invalid user esuser [preauth] Jan 17 14:12:11 host sshd[29306]: Invalid user student from 20.163.208.188 port 40014 Jan 17 14:12:11 host sshd[29306]: input_userauth_request: invalid user student [preauth] Jan 17 14:12:12 host sshd[29314]: Invalid user steam from 20.163.208.188 port 40074 Jan 17 14:12:12 host sshd[29314]: input_userauth_request: invalid user steam [preauth] Jan 17 14:12:12 host sshd[29337]: Invalid user guest from 20.163.208.188 port 40182 Jan 17 14:12:12 host sshd[29337]: input_userauth_request: invalid user guest [preauth] Jan 17 14:12:12 host sshd[29332]: Invalid user oracle from 20.163.208.188 port 40236 Jan 17 14:12:12 host sshd[29333]: Invalid user testuser from 20.163.208.188 port 40220 Jan 17 14:12:12 host sshd[29332]: input_userauth_request: invalid user oracle [preauth] Jan 17 14:12:12 host sshd[29333]: input_userauth_request: invalid user testuser [preauth] Jan 17 14:12:12 host sshd[29315]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29331]: Invalid user test from 20.163.208.188 port 40168 Jan 17 14:12:12 host sshd[29331]: input_userauth_request: invalid user test [preauth] Jan 17 14:12:12 host sshd[29339]: Invalid user admin from 20.163.208.188 port 40262 Jan 17 14:12:12 host sshd[29339]: input_userauth_request: invalid user admin [preauth] Jan 17 14:12:12 host sshd[29330]: Invalid user oracle from 20.163.208.188 port 40138 Jan 17 14:12:12 host sshd[29330]: input_userauth_request: invalid user oracle [preauth] Jan 17 14:12:12 host sshd[29336]: Invalid user user from 20.163.208.188 port 40190 Jan 17 14:12:12 host sshd[29335]: User root from 20.163.208.188 not allowed because not listed in AllowUsers Jan 17 14:12:12 host sshd[29344]: Invalid user testuser from 20.163.208.188 port 40362 Jan 17 14:12:12 host sshd[29336]: input_userauth_request: invalid user user [preauth] Jan 17 14:12:12 host sshd[29344]: input_userauth_request: invalid user testuser [preauth] Jan 17 14:12:12 host sshd[29335]: input_userauth_request: invalid user root [preauth] Jan 17 14:12:12 host sshd[29334]: Invalid user oracle from 20.163.208.188 port 40142 Jan 17 14:12:12 host sshd[29334]: input_userauth_request: invalid user oracle [preauth] Jan 17 14:12:12 host sshd[29309]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29310]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29345]: Invalid user admin from 20.163.208.188 port 40288 Jan 17 14:12:12 host sshd[29313]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29345]: input_userauth_request: invalid user admin [preauth] Jan 17 14:12:12 host sshd[29312]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29316]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29346]: Invalid user ansible from 20.163.208.188 port 40314 Jan 17 14:12:12 host sshd[29346]: input_userauth_request: invalid user ansible [preauth] Jan 17 14:12:12 host sshd[29317]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29340]: Invalid user postgres from 20.163.208.188 port 40208 Jan 17 14:12:12 host sshd[29340]: input_userauth_request: invalid user postgres [preauth] Jan 17 14:12:12 host sshd[29308]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29314]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29338]: User root from 20.163.208.188 not allowed because not listed in AllowUsers Jan 17 14:12:12 host sshd[29338]: input_userauth_request: invalid user root [preauth] Jan 17 14:12:12 host sshd[29337]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29333]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29332]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29311]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29307]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29306]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29339]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29331]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29336]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29330]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29345]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29305]: Invalid user ansadmin from 20.163.208.188 port 40002 Jan 17 14:12:12 host sshd[29305]: input_userauth_request: invalid user ansadmin [preauth] Jan 17 14:12:12 host sshd[29334]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host sshd[29344]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:12 host sshd[29344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:12 host unix_chkpwd[29369]: password check failed for user (root) Jan 17 14:12:12 host sshd[29335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 user=root Jan 17 14:12:12 host sshd[29335]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 14:12:13 host sshd[29346]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:13 host sshd[29346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:13 host sshd[29340]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:13 host sshd[29340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:13 host sshd[29350]: Invalid user ansible from 20.163.208.188 port 40364 Jan 17 14:12:13 host sshd[29350]: input_userauth_request: invalid user ansible [preauth] Jan 17 14:12:13 host sshd[29315]: Failed password for invalid user user from 20.163.208.188 port 40050 ssh2 Jan 17 14:12:13 host sshd[29341]: User root from 20.163.208.188 not allowed because not listed in AllowUsers Jan 17 14:12:13 host sshd[29341]: input_userauth_request: invalid user root [preauth] Jan 17 14:12:13 host unix_chkpwd[29377]: password check failed for user (root) Jan 17 14:12:13 host sshd[29338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 user=root Jan 17 14:12:13 host sshd[29338]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 14:12:13 host sshd[29309]: Failed password for invalid user admin from 20.163.208.188 port 40080 ssh2 Jan 17 14:12:13 host sshd[29310]: Failed password for invalid user admin from 20.163.208.188 port 40064 ssh2 Jan 17 14:12:13 host sshd[29316]: Failed password for invalid user oracle from 20.163.208.188 port 40130 ssh2 Jan 17 14:12:13 host sshd[29313]: Failed password for invalid user test from 20.163.208.188 port 40090 ssh2 Jan 17 14:12:13 host sshd[29312]: Failed password for invalid user es from 20.163.208.188 port 40046 ssh2 Jan 17 14:12:13 host sshd[29305]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:13 host sshd[29305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.163.208.188 Jan 17 14:12:13 host sshd[29317]: Failed password for invalid user halo from 20.163.208.188 port 40026 ssh2 Jan 17 14:12:14 host sshd[29308]: Failed password for invalid user testuser from 20.163.208.188 port 40034 ssh2 Jan 17 14:12:14 host sshd[29314]: Failed password for invalid user steam from 20.163.208.188 port 40074 ssh2 Jan 17 14:12:14 host sshd[29337]: Failed password for invalid user guest from 20.163.208.188 port 40182 ssh2 Jan 17 14:12:14 host sshd[29333]: Failed password for invalid user testuser from 20.163.208.188 port 40220 ssh2 Jan 17 14:12:14 host sshd[29332]: Failed password for invalid user oracle from 20.163.208.188 port 40236 ssh2 Jan 17 14:12:14 host sshd[29307]: Failed password for invalid user esuser from 20.163.208.188 port 40016 ssh2 Jan 17 14:12:14 host sshd[29311]: Failed password for invalid user es from 20.163.208.188 port 40118 ssh2 Jan 17 14:12:14 host sshd[29306]: Failed password for invalid user student from 20.163.208.188 port 40014 ssh2 Jan 17 14:12:14 host sshd[29339]: Failed password for invalid user admin from 20.163.208.188 port 40262 ssh2 Jan 17 14:12:14 host sshd[29331]: Failed password for invalid user test from 20.163.208.188 port 40168 ssh2 Jan 17 14:12:14 host sshd[29336]: Failed password for invalid user user from 20.163.208.188 port 40190 ssh2 Jan 17 14:12:14 host sshd[29330]: Failed password for invalid user oracle from 20.163.208.188 port 40138 ssh2 Jan 17 14:12:14 host sshd[29345]: Failed password for invalid user admin from 20.163.208.188 port 40288 ssh2 Jan 17 14:12:14 host sshd[29334]: Failed password for invalid user oracle from 20.163.208.188 port 40142 ssh2 Jan 17 14:12:14 host sshd[29344]: Failed password for invalid user testuser from 20.163.208.188 port 40362 ssh2 Jan 17 14:12:14 host sshd[29335]: Failed password for invalid user root from 20.163.208.188 port 40156 ssh2 Jan 17 14:12:14 host sshd[29346]: Failed password for invalid user ansible from 20.163.208.188 port 40314 ssh2 Jan 17 14:12:14 host sshd[29340]: Failed password for invalid user postgres from 20.163.208.188 port 40208 ssh2 Jan 17 14:12:14 host sshd[29338]: Failed password for invalid user root from 20.163.208.188 port 40226 ssh2 Jan 17 14:12:15 host sshd[29305]: Failed password for invalid user ansadmin from 20.163.208.188 port 40002 ssh2 Jan 17 14:12:58 host sshd[29475]: Invalid user admin from 114.33.94.206 port 50635 Jan 17 14:12:58 host sshd[29475]: input_userauth_request: invalid user admin [preauth] Jan 17 14:12:58 host sshd[29475]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:12:58 host sshd[29475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.94.206 Jan 17 14:13:01 host sshd[29475]: Failed password for invalid user admin from 114.33.94.206 port 50635 ssh2 Jan 17 14:13:01 host sshd[29475]: Failed password for invalid user admin from 114.33.94.206 port 50635 ssh2 Jan 17 14:13:02 host sshd[29475]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:13:04 host sshd[29475]: Failed password for invalid user admin from 114.33.94.206 port 50635 ssh2 Jan 17 14:13:05 host sshd[29475]: Connection reset by 114.33.94.206 port 50635 [preauth] Jan 17 14:13:05 host sshd[29475]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.94.206 Jan 17 14:13:43 host sshd[29577]: Invalid user albert from 129.205.208.20 port 38989 Jan 17 14:13:43 host sshd[29577]: input_userauth_request: invalid user albert [preauth] Jan 17 14:13:43 host sshd[29577]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:13:43 host sshd[29577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.205.208.20 Jan 17 14:13:44 host sshd[29577]: Failed password for invalid user albert from 129.205.208.20 port 38989 ssh2 Jan 17 14:13:44 host sshd[29577]: Received disconnect from 129.205.208.20 port 38989:11: Bye Bye [preauth] Jan 17 14:13:44 host sshd[29577]: Disconnected from 129.205.208.20 port 38989 [preauth] Jan 17 14:15:07 host sshd[29754]: Invalid user training from 129.205.208.20 port 49718 Jan 17 14:15:07 host sshd[29754]: input_userauth_request: invalid user training [preauth] Jan 17 14:15:07 host sshd[29754]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:15:07 host sshd[29754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.205.208.20 Jan 17 14:15:10 host sshd[29754]: Failed password for invalid user training from 129.205.208.20 port 49718 ssh2 Jan 17 14:20:25 host sshd[30474]: Connection reset by 114.33.162.97 port 47858 [preauth] Jan 17 14:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 14:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=straightcurve user-4=wwwletsstalkfood user-5=phmetals user-6=kottayamcalldriv user-7=gifterman user-8=palco123 user-9=mrsclean user-10=wwwnexidigital user-11=disposeat user-12=remysagr user-13=wwwkmaorg user-14=wwwkapin user-15=woodpeck user-16=wwwtestugo user-17=shalinijames user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=wwwrmswll user-24=keralaholi user-25=wwwresourcehunte user-26=cochintaxi user-27=wwwkaretakers user-28=dartsimp user-29=a2zgroup user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 14:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 14:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 14:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7V5TKPkc96ZGM28A.~ Jan 17 14:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7V5TKPkc96ZGM28A.~' Jan 17 14:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7V5TKPkc96ZGM28A.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 14:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 14:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 14:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 14:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 14:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 14:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 14:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 14:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 14:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 14:32:18 host sshd[32448]: Invalid user maximo from 103.253.147.160 port 44518 Jan 17 14:32:18 host sshd[32448]: input_userauth_request: invalid user maximo [preauth] Jan 17 14:32:18 host sshd[32448]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:32:18 host sshd[32448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.253.147.160 Jan 17 14:32:20 host sshd[32448]: Failed password for invalid user maximo from 103.253.147.160 port 44518 ssh2 Jan 17 14:32:20 host sshd[32448]: Received disconnect from 103.253.147.160 port 44518:11: Bye Bye [preauth] Jan 17 14:32:20 host sshd[32448]: Disconnected from 103.253.147.160 port 44518 [preauth] Jan 17 14:32:22 host sshd[32453]: User root from 123.0.236.125 not allowed because not listed in AllowUsers Jan 17 14:32:22 host sshd[32453]: input_userauth_request: invalid user root [preauth] Jan 17 14:32:22 host unix_chkpwd[32456]: password check failed for user (root) Jan 17 14:32:22 host sshd[32453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.0.236.125 user=root Jan 17 14:32:22 host sshd[32453]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 14:32:25 host sshd[32453]: Failed password for invalid user root from 123.0.236.125 port 54588 ssh2 Jan 17 14:32:25 host sshd[32458]: User root from 138.68.239.113 not allowed because not listed in AllowUsers Jan 17 14:32:25 host sshd[32458]: input_userauth_request: invalid user root [preauth] Jan 17 14:32:25 host unix_chkpwd[32463]: password check failed for user (root) Jan 17 14:32:25 host sshd[32458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.239.113 user=root Jan 17 14:32:25 host sshd[32458]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 14:32:26 host unix_chkpwd[32465]: password check failed for user (root) Jan 17 14:32:26 host sshd[32453]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 14:32:26 host sshd[32458]: Failed password for invalid user root from 138.68.239.113 port 48758 ssh2 Jan 17 14:32:26 host sshd[32458]: Received disconnect from 138.68.239.113 port 48758:11: Bye Bye [preauth] Jan 17 14:32:26 host sshd[32458]: Disconnected from 138.68.239.113 port 48758 [preauth] Jan 17 14:32:28 host sshd[32453]: Failed password for invalid user root from 123.0.236.125 port 54588 ssh2 Jan 17 14:32:28 host unix_chkpwd[32472]: password check failed for user (root) Jan 17 14:32:28 host sshd[32453]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 14:32:30 host sshd[32453]: Failed password for invalid user root from 123.0.236.125 port 54588 ssh2 Jan 17 14:32:32 host unix_chkpwd[32498]: password check failed for user (root) Jan 17 14:32:32 host sshd[32453]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 14:32:34 host sshd[32453]: Failed password for invalid user root from 123.0.236.125 port 54588 ssh2 Jan 17 14:32:35 host unix_chkpwd[32522]: password check failed for user (root) Jan 17 14:32:35 host sshd[32453]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 14:32:37 host sshd[32453]: Failed password for invalid user root from 123.0.236.125 port 54588 ssh2 Jan 17 14:34:19 host sshd[32698]: Invalid user hotline from 20.40.81.0 port 41244 Jan 17 14:34:19 host sshd[32698]: input_userauth_request: invalid user hotline [preauth] Jan 17 14:34:19 host sshd[32698]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:34:19 host sshd[32698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.40.81.0 Jan 17 14:34:21 host sshd[32698]: Failed password for invalid user hotline from 20.40.81.0 port 41244 ssh2 Jan 17 14:34:21 host sshd[32698]: Received disconnect from 20.40.81.0 port 41244:11: Bye Bye [preauth] Jan 17 14:34:21 host sshd[32698]: Disconnected from 20.40.81.0 port 41244 [preauth] Jan 17 14:36:35 host sshd[708]: Invalid user test2 from 67.205.187.133 port 34350 Jan 17 14:36:35 host sshd[708]: input_userauth_request: invalid user test2 [preauth] Jan 17 14:36:35 host sshd[708]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:36:35 host sshd[708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.187.133 Jan 17 14:36:37 host sshd[708]: Failed password for invalid user test2 from 67.205.187.133 port 34350 ssh2 Jan 17 14:36:38 host sshd[708]: Received disconnect from 67.205.187.133 port 34350:11: Bye Bye [preauth] Jan 17 14:36:38 host sshd[708]: Disconnected from 67.205.187.133 port 34350 [preauth] Jan 17 14:37:43 host sshd[874]: User root from 138.68.239.113 not allowed because not listed in AllowUsers Jan 17 14:37:43 host sshd[874]: input_userauth_request: invalid user root [preauth] Jan 17 14:37:43 host unix_chkpwd[878]: password check failed for user (root) Jan 17 14:37:43 host sshd[874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.239.113 user=root Jan 17 14:37:43 host sshd[874]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 14:37:45 host sshd[874]: Failed password for invalid user root from 138.68.239.113 port 46780 ssh2 Jan 17 14:37:55 host sshd[930]: User root from 103.253.147.160 not allowed because not listed in AllowUsers Jan 17 14:37:55 host sshd[930]: input_userauth_request: invalid user root [preauth] Jan 17 14:37:55 host unix_chkpwd[932]: password check failed for user (root) Jan 17 14:37:55 host sshd[930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.253.147.160 user=root Jan 17 14:37:55 host sshd[930]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 14:37:57 host sshd[930]: Failed password for invalid user root from 103.253.147.160 port 43806 ssh2 Jan 17 14:37:57 host sshd[930]: Received disconnect from 103.253.147.160 port 43806:11: Bye Bye [preauth] Jan 17 14:37:57 host sshd[930]: Disconnected from 103.253.147.160 port 43806 [preauth] Jan 17 14:38:08 host sshd[994]: User root from 67.205.187.133 not allowed because not listed in AllowUsers Jan 17 14:38:08 host sshd[994]: input_userauth_request: invalid user root [preauth] Jan 17 14:38:08 host unix_chkpwd[999]: password check failed for user (root) Jan 17 14:38:08 host sshd[994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.187.133 user=root Jan 17 14:38:08 host sshd[994]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 14:38:09 host sshd[994]: Failed password for invalid user root from 67.205.187.133 port 35606 ssh2 Jan 17 14:38:10 host sshd[994]: Received disconnect from 67.205.187.133 port 35606:11: Bye Bye [preauth] Jan 17 14:38:10 host sshd[994]: Disconnected from 67.205.187.133 port 35606 [preauth] Jan 17 14:38:28 host sshd[1070]: Invalid user redis from 20.40.81.0 port 59440 Jan 17 14:38:28 host sshd[1070]: input_userauth_request: invalid user redis [preauth] Jan 17 14:38:28 host sshd[1070]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:38:28 host sshd[1070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.40.81.0 Jan 17 14:38:30 host sshd[1070]: Failed password for invalid user redis from 20.40.81.0 port 59440 ssh2 Jan 17 14:38:30 host sshd[1070]: Received disconnect from 20.40.81.0 port 59440:11: Bye Bye [preauth] Jan 17 14:38:30 host sshd[1070]: Disconnected from 20.40.81.0 port 59440 [preauth] Jan 17 14:38:51 host sshd[1135]: User root from 85.237.57.44 not allowed because not listed in AllowUsers Jan 17 14:38:51 host sshd[1135]: input_userauth_request: invalid user root [preauth] Jan 17 14:38:51 host unix_chkpwd[1146]: password check failed for user (root) Jan 17 14:38:51 host sshd[1135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.237.57.44 user=root Jan 17 14:38:51 host sshd[1135]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 14:38:52 host sshd[1135]: Failed password for invalid user root from 85.237.57.44 port 54460 ssh2 Jan 17 14:38:53 host sshd[1135]: Received disconnect from 85.237.57.44 port 54460:11: Bye Bye [preauth] Jan 17 14:38:53 host sshd[1135]: Disconnected from 85.237.57.44 port 54460 [preauth] Jan 17 14:39:52 host sshd[1333]: Invalid user bet from 20.40.81.0 port 39166 Jan 17 14:39:52 host sshd[1333]: input_userauth_request: invalid user bet [preauth] Jan 17 14:39:52 host sshd[1333]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:39:52 host sshd[1333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.40.81.0 Jan 17 14:39:54 host sshd[1333]: Failed password for invalid user bet from 20.40.81.0 port 39166 ssh2 Jan 17 14:39:54 host sshd[1333]: Received disconnect from 20.40.81.0 port 39166:11: Bye Bye [preauth] Jan 17 14:39:54 host sshd[1333]: Disconnected from 20.40.81.0 port 39166 [preauth] Jan 17 14:42:07 host sshd[1833]: Invalid user auditor from 205.185.113.129 port 51196 Jan 17 14:42:07 host sshd[1833]: input_userauth_request: invalid user auditor [preauth] Jan 17 14:42:07 host sshd[1833]: pam_unix(sshd:auth): check pass; user unknown Jan 17 14:42:07 host sshd[1833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 17 14:42:09 host sshd[1833]: Failed password for invalid user auditor from 205.185.113.129 port 51196 ssh2 Jan 17 14:42:10 host sshd[1833]: Connection closed by 205.185.113.129 port 51196 [preauth] Jan 17 14:42:47 host sshd[1932]: Connection closed by 85.237.57.44 port 60436 [preauth] Jan 17 14:48:50 host sshd[2814]: Connection closed by 85.237.57.44 port 42746 [preauth] Jan 17 14:54:56 host sshd[3821]: Connection closed by 85.237.57.44 port 33324 [preauth] Jan 17 15:01:38 host sshd[4935]: Received disconnect from 85.237.57.44 port 57176:11: Bye Bye [preauth] Jan 17 15:01:38 host sshd[4935]: Disconnected from 85.237.57.44 port 57176 [preauth] Jan 17 15:04:06 host sshd[5455]: Invalid user docker from 85.237.57.44 port 55360 Jan 17 15:04:06 host sshd[5455]: input_userauth_request: invalid user docker [preauth] Jan 17 15:04:06 host sshd[5455]: pam_unix(sshd:auth): check pass; user unknown Jan 17 15:04:06 host sshd[5455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.237.57.44 Jan 17 15:04:08 host sshd[5455]: Failed password for invalid user docker from 85.237.57.44 port 55360 ssh2 Jan 17 15:04:08 host sshd[5455]: Received disconnect from 85.237.57.44 port 55360:11: Bye Bye [preauth] Jan 17 15:04:08 host sshd[5455]: Disconnected from 85.237.57.44 port 55360 [preauth] Jan 17 15:14:42 host sshd[7003]: Invalid user fm from 194.110.203.109 port 36538 Jan 17 15:14:42 host sshd[7003]: input_userauth_request: invalid user fm [preauth] Jan 17 15:14:42 host sshd[7003]: pam_unix(sshd:auth): check pass; user unknown Jan 17 15:14:42 host sshd[7003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 15:14:45 host sshd[7003]: Failed password for invalid user fm from 194.110.203.109 port 36538 ssh2 Jan 17 15:14:48 host sshd[7003]: pam_unix(sshd:auth): check pass; user unknown Jan 17 15:14:50 host sshd[7003]: Failed password for invalid user fm from 194.110.203.109 port 36538 ssh2 Jan 17 15:14:53 host sshd[7003]: pam_unix(sshd:auth): check pass; user unknown Jan 17 15:14:55 host sshd[7003]: Failed password for invalid user fm from 194.110.203.109 port 36538 ssh2 Jan 17 15:14:59 host sshd[7003]: Connection closed by 194.110.203.109 port 36538 [preauth] Jan 17 15:14:59 host sshd[7003]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 15:19:25 host sshd[7515]: Invalid user vadmin from 114.33.83.127 port 54058 Jan 17 15:19:25 host sshd[7515]: input_userauth_request: invalid user vadmin [preauth] Jan 17 15:19:25 host sshd[7515]: pam_unix(sshd:auth): check pass; user unknown Jan 17 15:19:25 host sshd[7515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.83.127 Jan 17 15:19:28 host sshd[7515]: Failed password for invalid user vadmin from 114.33.83.127 port 54058 ssh2 Jan 17 15:19:28 host sshd[7515]: Connection reset by 114.33.83.127 port 54058 [preauth] Jan 17 15:20:41 host sshd[7796]: Invalid user pi from 220.132.183.154 port 47276 Jan 17 15:20:41 host sshd[7796]: input_userauth_request: invalid user pi [preauth] Jan 17 15:20:41 host sshd[7796]: pam_unix(sshd:auth): check pass; user unknown Jan 17 15:20:41 host sshd[7796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.183.154 Jan 17 15:20:43 host sshd[7796]: Failed password for invalid user pi from 220.132.183.154 port 47276 ssh2 Jan 17 15:20:44 host sshd[7796]: pam_unix(sshd:auth): check pass; user unknown Jan 17 15:20:45 host sshd[7796]: Failed password for invalid user pi from 220.132.183.154 port 47276 ssh2 Jan 17 15:20:46 host sshd[7796]: pam_unix(sshd:auth): check pass; user unknown Jan 17 15:20:48 host sshd[7796]: Failed password for invalid user pi from 220.132.183.154 port 47276 ssh2 Jan 17 15:20:49 host sshd[7796]: pam_unix(sshd:auth): check pass; user unknown Jan 17 15:20:51 host sshd[7796]: Failed password for invalid user pi from 220.132.183.154 port 47276 ssh2 Jan 17 15:20:52 host sshd[7796]: pam_unix(sshd:auth): check pass; user unknown Jan 17 15:20:54 host sshd[7796]: Failed password for invalid user pi from 220.132.183.154 port 47276 ssh2 Jan 17 15:20:55 host sshd[7796]: pam_unix(sshd:auth): check pass; user unknown Jan 17 15:20:58 host sshd[7796]: Failed password for invalid user pi from 220.132.183.154 port 47276 ssh2 Jan 17 15:20:58 host sshd[7796]: error: maximum authentication attempts exceeded for invalid user pi from 220.132.183.154 port 47276 ssh2 [preauth] Jan 17 15:20:58 host sshd[7796]: Disconnecting: Too many authentication failures [preauth] Jan 17 15:20:58 host sshd[7796]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.183.154 Jan 17 15:20:58 host sshd[7796]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 17 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 15:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=wwwevmhonda user-4=bonifacegroup user-5=wwwnexidigital user-6=mrsclean user-7=phmetals user-8=kottayamcalldriv user-9=gifterman user-10=palco123 user-11=wwwkapin user-12=woodpeck user-13=remysagr user-14=disposeat user-15=wwwkmaorg user-16=pmcresources user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=wwwrmswll user-23=keralaholi user-24=wwwresourcehunte user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 15:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 15:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 15:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TBdEAEErpUziEQND.~ Jan 17 15:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TBdEAEErpUziEQND.~' Jan 17 15:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-TBdEAEErpUziEQND.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 15:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 15:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 15:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 15:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 15:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 15:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 15:25:56 host sshd[8733]: Invalid user ali from 203.151.81.77 port 44786 Jan 17 15:25:56 host sshd[8733]: input_userauth_request: invalid user ali [preauth] Jan 17 15:25:56 host sshd[8733]: pam_unix(sshd:auth): check pass; user unknown Jan 17 15:25:56 host sshd[8733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.151.81.77 Jan 17 15:25:59 host sshd[8733]: Failed password for invalid user ali from 203.151.81.77 port 44786 ssh2 Jan 17 15:25:59 host sshd[8733]: Received disconnect from 203.151.81.77 port 44786:11: Bye Bye [preauth] Jan 17 15:25:59 host sshd[8733]: Disconnected from 203.151.81.77 port 44786 [preauth] Jan 17 15:34:57 host sshd[9828]: Invalid user abc from 203.151.81.77 port 41704 Jan 17 15:34:57 host sshd[9828]: input_userauth_request: invalid user abc [preauth] Jan 17 15:34:57 host sshd[9828]: pam_unix(sshd:auth): check pass; user unknown Jan 17 15:34:57 host sshd[9828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.151.81.77 Jan 17 15:34:59 host sshd[9828]: Failed password for invalid user abc from 203.151.81.77 port 41704 ssh2 Jan 17 15:35:00 host sshd[9828]: Received disconnect from 203.151.81.77 port 41704:11: Bye Bye [preauth] Jan 17 15:35:00 host sshd[9828]: Disconnected from 203.151.81.77 port 41704 [preauth] Jan 17 15:36:42 host sshd[10149]: User root from 203.151.81.77 not allowed because not listed in AllowUsers Jan 17 15:36:42 host sshd[10149]: input_userauth_request: invalid user root [preauth] Jan 17 15:36:42 host unix_chkpwd[10151]: password check failed for user (root) Jan 17 15:36:42 host sshd[10149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.151.81.77 user=root Jan 17 15:36:42 host sshd[10149]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 15:36:44 host sshd[10149]: Failed password for invalid user root from 203.151.81.77 port 55430 ssh2 Jan 17 15:36:44 host sshd[10149]: Received disconnect from 203.151.81.77 port 55430:11: Bye Bye [preauth] Jan 17 15:36:44 host sshd[10149]: Disconnected from 203.151.81.77 port 55430 [preauth] Jan 17 15:44:06 host sshd[11133]: Invalid user pi from 211.105.29.162 port 56951 Jan 17 15:44:06 host sshd[11133]: input_userauth_request: invalid user pi [preauth] Jan 17 15:44:06 host sshd[11133]: pam_unix(sshd:auth): check pass; user unknown Jan 17 15:44:06 host sshd[11133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.105.29.162 Jan 17 15:44:08 host sshd[11133]: Failed password for invalid user pi from 211.105.29.162 port 56951 ssh2 Jan 17 15:44:09 host sshd[11133]: Connection reset by 211.105.29.162 port 56951 [preauth] Jan 17 15:47:42 host sshd[11681]: User ftp from 220.89.4.100 not allowed because not listed in AllowUsers Jan 17 15:47:42 host sshd[11681]: input_userauth_request: invalid user ftp [preauth] Jan 17 15:47:42 host unix_chkpwd[11692]: password check failed for user (ftp) Jan 17 15:47:42 host sshd[11681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.89.4.100 user=ftp Jan 17 15:47:42 host sshd[11681]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 17 15:47:44 host sshd[11681]: Failed password for invalid user ftp from 220.89.4.100 port 54226 ssh2 Jan 17 15:47:44 host unix_chkpwd[11697]: password check failed for user (ftp) Jan 17 15:47:44 host sshd[11681]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 17 15:47:46 host sshd[11681]: Failed password for invalid user ftp from 220.89.4.100 port 54226 ssh2 Jan 17 15:47:46 host unix_chkpwd[11708]: password check failed for user (ftp) Jan 17 15:47:46 host sshd[11681]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 17 15:47:48 host sshd[11681]: Failed password for invalid user ftp from 220.89.4.100 port 54226 ssh2 Jan 17 15:47:48 host sshd[11681]: Connection reset by 220.89.4.100 port 54226 [preauth] Jan 17 15:47:48 host sshd[11681]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.89.4.100 user=ftp Jan 17 15:54:04 host sshd[12577]: Invalid user admin from 71.150.143.34 port 51358 Jan 17 15:54:04 host sshd[12577]: input_userauth_request: invalid user admin [preauth] Jan 17 15:54:04 host sshd[12577]: pam_unix(sshd:auth): check pass; user unknown Jan 17 15:54:04 host sshd[12577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.150.143.34 Jan 17 15:54:06 host sshd[12577]: Failed password for invalid user admin from 71.150.143.34 port 51358 ssh2 Jan 17 15:54:06 host sshd[12577]: Failed password for invalid user admin from 71.150.143.34 port 51358 ssh2 Jan 17 15:54:07 host sshd[12577]: Connection reset by 71.150.143.34 port 51358 [preauth] Jan 17 16:08:12 host sshd[14548]: Invalid user user from 114.34.67.128 port 50540 Jan 17 16:08:12 host sshd[14548]: input_userauth_request: invalid user user [preauth] Jan 17 16:08:12 host sshd[14548]: pam_unix(sshd:auth): check pass; user unknown Jan 17 16:08:12 host sshd[14548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.67.128 Jan 17 16:08:13 host sshd[14548]: Failed password for invalid user user from 114.34.67.128 port 50540 ssh2 Jan 17 16:08:15 host sshd[14548]: pam_unix(sshd:auth): check pass; user unknown Jan 17 16:08:17 host sshd[14548]: Failed password for invalid user user from 114.34.67.128 port 50540 ssh2 Jan 17 16:08:17 host sshd[14548]: pam_unix(sshd:auth): check pass; user unknown Jan 17 16:08:20 host sshd[14548]: Failed password for invalid user user from 114.34.67.128 port 50540 ssh2 Jan 17 16:08:20 host sshd[14548]: pam_unix(sshd:auth): check pass; user unknown Jan 17 16:08:22 host sshd[14548]: Failed password for invalid user user from 114.34.67.128 port 50540 ssh2 Jan 17 16:08:23 host sshd[14548]: pam_unix(sshd:auth): check pass; user unknown Jan 17 16:08:25 host sshd[14548]: Failed password for invalid user user from 114.34.67.128 port 50540 ssh2 Jan 17 16:08:25 host sshd[14548]: Connection reset by 114.34.67.128 port 50540 [preauth] Jan 17 16:08:25 host sshd[14548]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.67.128 Jan 17 16:08:25 host sshd[14548]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 17 16:14:58 host sshd[15488]: Invalid user from 64.62.197.164 port 18465 Jan 17 16:14:58 host sshd[15488]: input_userauth_request: invalid user [preauth] Jan 17 16:15:02 host sshd[15488]: Connection closed by 64.62.197.164 port 18465 [preauth] Jan 17 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 16:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 16:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=wwwkaretakers user-5=cochintaxi user-6=ugotscom user-7=keralaholi user-8=wwwresourcehunte user-9=wwwrmswll user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=shalinijames user-14=wwwtestugo user-15=vfmassets user-16=wwwkapin user-17=woodpeck user-18=disposeat user-19=remysagr user-20=wwwkmaorg user-21=mrsclean user-22=wwwnexidigital user-23=kottayamcalldriv user-24=phmetals user-25=palco123 user-26=gifterman user-27=straightcurve user-28=wwwletsstalkfood user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 16:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 16:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 16:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-kBQwAC2R4dGoHQtD.~ Jan 17 16:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-kBQwAC2R4dGoHQtD.~' Jan 17 16:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-kBQwAC2R4dGoHQtD.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 16:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 16:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 16:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 16:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 16:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 16:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 16:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 16:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 16:22:44 host sshd[16910]: Invalid user admin from 211.224.185.55 port 63623 Jan 17 16:22:44 host sshd[16910]: input_userauth_request: invalid user admin [preauth] Jan 17 16:22:44 host sshd[16910]: pam_unix(sshd:auth): check pass; user unknown Jan 17 16:22:44 host sshd[16910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.224.185.55 Jan 17 16:22:46 host sshd[16910]: Failed password for invalid user admin from 211.224.185.55 port 63623 ssh2 Jan 17 16:22:47 host sshd[16910]: Connection reset by 211.224.185.55 port 63623 [preauth] Jan 17 16:26:41 host sshd[17355]: Invalid user curtis from 107.189.30.59 port 55320 Jan 17 16:26:41 host sshd[17355]: input_userauth_request: invalid user curtis [preauth] Jan 17 16:26:41 host sshd[17355]: pam_unix(sshd:auth): check pass; user unknown Jan 17 16:26:41 host sshd[17355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 17 16:26:43 host sshd[17355]: Failed password for invalid user curtis from 107.189.30.59 port 55320 ssh2 Jan 17 16:26:43 host sshd[17355]: Connection closed by 107.189.30.59 port 55320 [preauth] Jan 17 16:38:41 host sshd[18873]: Connection reset by 119.196.240.38 port 63359 [preauth] Jan 17 16:44:30 host sshd[19636]: Did not receive identification string from 89.248.163.210 port 46758 Jan 17 16:45:39 host sshd[19766]: Invalid user admin from 59.126.116.8 port 58384 Jan 17 16:45:39 host sshd[19766]: input_userauth_request: invalid user admin [preauth] Jan 17 16:45:39 host sshd[19766]: pam_unix(sshd:auth): check pass; user unknown Jan 17 16:45:39 host sshd[19766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.116.8 Jan 17 16:45:40 host sshd[19766]: Failed password for invalid user admin from 59.126.116.8 port 58384 ssh2 Jan 17 16:45:41 host sshd[19766]: Failed password for invalid user admin from 59.126.116.8 port 58384 ssh2 Jan 17 16:45:43 host sshd[19766]: pam_unix(sshd:auth): check pass; user unknown Jan 17 16:45:46 host sshd[19766]: Failed password for invalid user admin from 59.126.116.8 port 58384 ssh2 Jan 17 16:45:46 host sshd[19766]: pam_unix(sshd:auth): check pass; user unknown Jan 17 16:45:48 host sshd[19766]: Failed password for invalid user admin from 59.126.116.8 port 58384 ssh2 Jan 17 16:48:46 host sshd[20255]: User root from 2.216.243.211 not allowed because not listed in AllowUsers Jan 17 16:48:46 host sshd[20255]: input_userauth_request: invalid user root [preauth] Jan 17 16:48:46 host unix_chkpwd[20258]: password check failed for user (root) Jan 17 16:48:46 host sshd[20255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.216.243.211 user=root Jan 17 16:48:46 host sshd[20255]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 16:48:48 host sshd[20255]: Failed password for invalid user root from 2.216.243.211 port 52628 ssh2 Jan 17 16:48:49 host unix_chkpwd[20264]: password check failed for user (root) Jan 17 16:48:49 host sshd[20255]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 16:48:52 host sshd[20255]: Failed password for invalid user root from 2.216.243.211 port 52628 ssh2 Jan 17 16:48:52 host unix_chkpwd[20267]: password check failed for user (root) Jan 17 16:48:52 host sshd[20255]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 16:48:54 host sshd[20255]: Failed password for invalid user root from 2.216.243.211 port 52628 ssh2 Jan 17 16:48:54 host sshd[20255]: Connection reset by 2.216.243.211 port 52628 [preauth] Jan 17 16:48:54 host sshd[20255]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.216.243.211 user=root Jan 17 16:50:28 host sshd[20472]: Invalid user admin from 59.126.39.217 port 36167 Jan 17 16:50:28 host sshd[20472]: input_userauth_request: invalid user admin [preauth] Jan 17 16:50:28 host sshd[20472]: pam_unix(sshd:auth): check pass; user unknown Jan 17 16:50:28 host sshd[20472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.39.217 Jan 17 16:50:31 host sshd[20472]: Failed password for invalid user admin from 59.126.39.217 port 36167 ssh2 Jan 17 16:50:31 host sshd[20472]: Connection reset by 59.126.39.217 port 36167 [preauth] Jan 17 16:53:04 host sshd[20856]: User root from 125.228.149.62 not allowed because not listed in AllowUsers Jan 17 16:53:04 host sshd[20856]: input_userauth_request: invalid user root [preauth] Jan 17 16:53:04 host unix_chkpwd[20860]: password check failed for user (root) Jan 17 16:53:04 host sshd[20856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.149.62 user=root Jan 17 16:53:04 host sshd[20856]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 16:53:06 host sshd[20856]: Failed password for invalid user root from 125.228.149.62 port 38262 ssh2 Jan 17 16:53:06 host sshd[20856]: Connection reset by 125.228.149.62 port 38262 [preauth] Jan 17 16:58:10 host sshd[21493]: Invalid user fn from 194.110.203.109 port 50878 Jan 17 16:58:10 host sshd[21493]: input_userauth_request: invalid user fn [preauth] Jan 17 16:58:10 host sshd[21493]: pam_unix(sshd:auth): check pass; user unknown Jan 17 16:58:10 host sshd[21493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 16:58:12 host sshd[21493]: Failed password for invalid user fn from 194.110.203.109 port 50878 ssh2 Jan 17 16:58:15 host sshd[21493]: pam_unix(sshd:auth): check pass; user unknown Jan 17 16:58:17 host sshd[21493]: Failed password for invalid user fn from 194.110.203.109 port 50878 ssh2 Jan 17 16:58:20 host sshd[21493]: pam_unix(sshd:auth): check pass; user unknown Jan 17 16:58:22 host sshd[21493]: Failed password for invalid user fn from 194.110.203.109 port 50878 ssh2 Jan 17 16:58:25 host sshd[21493]: Connection closed by 194.110.203.109 port 50878 [preauth] Jan 17 16:58:25 host sshd[21493]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 17:07:31 host sshd[22848]: Invalid user nginx from 103.58.93.234 port 36695 Jan 17 17:07:31 host sshd[22848]: input_userauth_request: invalid user nginx [preauth] Jan 17 17:07:31 host sshd[22848]: pam_unix(sshd:auth): check pass; user unknown Jan 17 17:07:31 host sshd[22848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.58.93.234 Jan 17 17:07:33 host sshd[22848]: Failed password for invalid user nginx from 103.58.93.234 port 36695 ssh2 Jan 17 17:07:35 host sshd[22848]: Connection reset by 103.58.93.234 port 36695 [preauth] Jan 17 17:15:24 host sshd[23866]: Invalid user installer from 157.230.232.227 port 53780 Jan 17 17:15:24 host sshd[23866]: input_userauth_request: invalid user installer [preauth] Jan 17 17:15:24 host sshd[23866]: pam_unix(sshd:auth): check pass; user unknown Jan 17 17:15:24 host sshd[23866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.232.227 Jan 17 17:15:27 host sshd[23866]: Failed password for invalid user installer from 157.230.232.227 port 53780 ssh2 Jan 17 17:15:27 host sshd[23866]: Received disconnect from 157.230.232.227 port 53780:11: Bye Bye [preauth] Jan 17 17:15:27 host sshd[23866]: Disconnected from 157.230.232.227 port 53780 [preauth] Jan 17 17:16:14 host sshd[23962]: Invalid user peertube from 130.162.165.255 port 58734 Jan 17 17:16:14 host sshd[23962]: input_userauth_request: invalid user peertube [preauth] Jan 17 17:16:14 host sshd[23962]: pam_unix(sshd:auth): check pass; user unknown Jan 17 17:16:14 host sshd[23962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.165.255 Jan 17 17:16:15 host sshd[23962]: Failed password for invalid user peertube from 130.162.165.255 port 58734 ssh2 Jan 17 17:16:15 host sshd[23962]: Received disconnect from 130.162.165.255 port 58734:11: Bye Bye [preauth] Jan 17 17:16:15 host sshd[23962]: Disconnected from 130.162.165.255 port 58734 [preauth] Jan 17 17:17:31 host sshd[24272]: User root from 27.112.78.12 not allowed because not listed in AllowUsers Jan 17 17:17:31 host sshd[24272]: input_userauth_request: invalid user root [preauth] Jan 17 17:17:31 host unix_chkpwd[24275]: password check failed for user (root) Jan 17 17:17:31 host sshd[24272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.112.78.12 user=root Jan 17 17:17:31 host sshd[24272]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 17:17:33 host sshd[24272]: Failed password for invalid user root from 27.112.78.12 port 46404 ssh2 Jan 17 17:17:33 host sshd[24272]: Received disconnect from 27.112.78.12 port 46404:11: Bye Bye [preauth] Jan 17 17:17:33 host sshd[24272]: Disconnected from 27.112.78.12 port 46404 [preauth] Jan 17 17:19:21 host sshd[24482]: Invalid user administrator from 43.153.106.58 port 53552 Jan 17 17:19:21 host sshd[24482]: input_userauth_request: invalid user administrator [preauth] Jan 17 17:19:21 host sshd[24482]: pam_unix(sshd:auth): check pass; user unknown Jan 17 17:19:21 host sshd[24482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.106.58 Jan 17 17:19:23 host sshd[24482]: Failed password for invalid user administrator from 43.153.106.58 port 53552 ssh2 Jan 17 17:19:23 host sshd[24482]: Received disconnect from 43.153.106.58 port 53552:11: Bye Bye [preauth] Jan 17 17:19:23 host sshd[24482]: Disconnected from 43.153.106.58 port 53552 [preauth] Jan 17 17:20:23 host sshd[24639]: User root from 134.122.56.34 not allowed because not listed in AllowUsers Jan 17 17:20:23 host sshd[24639]: input_userauth_request: invalid user root [preauth] Jan 17 17:20:24 host unix_chkpwd[24642]: password check failed for user (root) Jan 17 17:20:24 host sshd[24639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.56.34 user=root Jan 17 17:20:24 host sshd[24639]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 17:20:25 host sshd[24639]: Failed password for invalid user root from 134.122.56.34 port 48232 ssh2 Jan 17 17:20:26 host sshd[24639]: Received disconnect from 134.122.56.34 port 48232:11: Bye Bye [preauth] Jan 17 17:20:26 host sshd[24639]: Disconnected from 134.122.56.34 port 48232 [preauth] Jan 17 17:20:47 host sshd[24699]: Connection reset by 220.132.32.134 port 58074 [preauth] Jan 17 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwresourcehunte user-5=keralaholi user-6=wwwrmswll user-7=wwwkaretakers user-8=cochintaxi user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwletsstalkfood user-15=straightcurve user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=remysagr user-24=wwwkmaorg user-25=woodpeck user-26=wwwkapin user-27=shalinijames user-28=wwwtestugo user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 17:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-lgjIgPIIe4Z7PMrK.~ Jan 17 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-lgjIgPIIe4Z7PMrK.~' Jan 17 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-lgjIgPIIe4Z7PMrK.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 17:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 17:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 17:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 17:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 17:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 17:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 17:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 17:21:21 host sshd[24982]: Invalid user esuser from 130.162.165.255 port 58984 Jan 17 17:21:21 host sshd[24982]: input_userauth_request: invalid user esuser [preauth] Jan 17 17:21:21 host sshd[24982]: pam_unix(sshd:auth): check pass; user unknown Jan 17 17:21:21 host sshd[24982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.165.255 Jan 17 17:21:23 host sshd[24982]: Failed password for invalid user esuser from 130.162.165.255 port 58984 ssh2 Jan 17 17:21:24 host sshd[24982]: Received disconnect from 130.162.165.255 port 58984:11: Bye Bye [preauth] Jan 17 17:21:24 host sshd[24982]: Disconnected from 130.162.165.255 port 58984 [preauth] Jan 17 17:22:21 host sshd[25214]: Invalid user max from 27.112.78.12 port 39748 Jan 17 17:22:21 host sshd[25214]: input_userauth_request: invalid user max [preauth] Jan 17 17:22:21 host sshd[25214]: pam_unix(sshd:auth): check pass; user unknown Jan 17 17:22:21 host sshd[25214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.112.78.12 Jan 17 17:22:22 host sshd[25214]: Failed password for invalid user max from 27.112.78.12 port 39748 ssh2 Jan 17 17:22:23 host sshd[25214]: Received disconnect from 27.112.78.12 port 39748:11: Bye Bye [preauth] Jan 17 17:22:23 host sshd[25214]: Disconnected from 27.112.78.12 port 39748 [preauth] Jan 17 17:22:39 host sshd[25294]: Invalid user installer from 134.122.56.34 port 48370 Jan 17 17:22:39 host sshd[25294]: input_userauth_request: invalid user installer [preauth] Jan 17 17:22:39 host sshd[25294]: pam_unix(sshd:auth): check pass; user unknown Jan 17 17:22:39 host sshd[25294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.56.34 Jan 17 17:22:41 host sshd[25294]: Failed password for invalid user installer from 134.122.56.34 port 48370 ssh2 Jan 17 17:22:42 host sshd[25294]: Received disconnect from 134.122.56.34 port 48370:11: Bye Bye [preauth] Jan 17 17:22:42 host sshd[25294]: Disconnected from 134.122.56.34 port 48370 [preauth] Jan 17 17:23:39 host sshd[25437]: User root from 130.162.165.255 not allowed because not listed in AllowUsers Jan 17 17:23:39 host sshd[25437]: input_userauth_request: invalid user root [preauth] Jan 17 17:23:39 host unix_chkpwd[25440]: password check failed for user (root) Jan 17 17:23:39 host sshd[25437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.165.255 user=root Jan 17 17:23:39 host sshd[25437]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 17:23:41 host sshd[25437]: Failed password for invalid user root from 130.162.165.255 port 59094 ssh2 Jan 17 17:24:30 host sshd[25556]: User root from 157.230.232.227 not allowed because not listed in AllowUsers Jan 17 17:24:30 host sshd[25556]: input_userauth_request: invalid user root [preauth] Jan 17 17:24:30 host unix_chkpwd[25559]: password check failed for user (root) Jan 17 17:24:30 host sshd[25556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.232.227 user=root Jan 17 17:24:30 host sshd[25556]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 17:24:32 host sshd[25556]: Failed password for invalid user root from 157.230.232.227 port 55054 ssh2 Jan 17 17:24:32 host sshd[25556]: Received disconnect from 157.230.232.227 port 55054:11: Bye Bye [preauth] Jan 17 17:24:32 host sshd[25556]: Disconnected from 157.230.232.227 port 55054 [preauth] Jan 17 17:27:58 host sshd[25960]: Invalid user pi from 1.34.127.198 port 37120 Jan 17 17:27:58 host sshd[25960]: input_userauth_request: invalid user pi [preauth] Jan 17 17:27:58 host sshd[25960]: pam_unix(sshd:auth): check pass; user unknown Jan 17 17:27:58 host sshd[25960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.127.198 Jan 17 17:28:00 host sshd[25960]: Failed password for invalid user pi from 1.34.127.198 port 37120 ssh2 Jan 17 17:28:00 host sshd[25960]: pam_unix(sshd:auth): check pass; user unknown Jan 17 17:28:02 host sshd[25960]: Failed password for invalid user pi from 1.34.127.198 port 37120 ssh2 Jan 17 17:28:02 host sshd[25960]: pam_unix(sshd:auth): check pass; user unknown Jan 17 17:28:05 host sshd[25960]: Failed password for invalid user pi from 1.34.127.198 port 37120 ssh2 Jan 17 17:28:05 host sshd[25960]: Connection reset by 1.34.127.198 port 37120 [preauth] Jan 17 17:28:05 host sshd[25960]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.127.198 Jan 17 17:29:03 host sshd[26167]: Invalid user user01 from 43.153.106.58 port 56108 Jan 17 17:29:03 host sshd[26167]: input_userauth_request: invalid user user01 [preauth] Jan 17 17:29:03 host sshd[26167]: pam_unix(sshd:auth): check pass; user unknown Jan 17 17:29:03 host sshd[26167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.106.58 Jan 17 17:29:05 host sshd[26167]: Failed password for invalid user user01 from 43.153.106.58 port 56108 ssh2 Jan 17 17:29:05 host sshd[26167]: Received disconnect from 43.153.106.58 port 56108:11: Bye Bye [preauth] Jan 17 17:29:05 host sshd[26167]: Disconnected from 43.153.106.58 port 56108 [preauth] Jan 17 17:32:28 host sshd[26576]: Invalid user kali from 43.153.106.58 port 52036 Jan 17 17:32:28 host sshd[26576]: input_userauth_request: invalid user kali [preauth] Jan 17 17:32:28 host sshd[26576]: pam_unix(sshd:auth): check pass; user unknown Jan 17 17:32:28 host sshd[26576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.106.58 Jan 17 17:32:30 host sshd[26576]: Failed password for invalid user kali from 43.153.106.58 port 52036 ssh2 Jan 17 17:32:30 host sshd[26576]: Received disconnect from 43.153.106.58 port 52036:11: Bye Bye [preauth] Jan 17 17:32:30 host sshd[26576]: Disconnected from 43.153.106.58 port 52036 [preauth] Jan 17 17:36:05 host sshd[27239]: Invalid user user from 1.34.183.18 port 47107 Jan 17 17:36:05 host sshd[27239]: input_userauth_request: invalid user user [preauth] Jan 17 17:36:05 host sshd[27239]: pam_unix(sshd:auth): check pass; user unknown Jan 17 17:36:05 host sshd[27239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.183.18 Jan 17 17:36:07 host sshd[27239]: Failed password for invalid user user from 1.34.183.18 port 47107 ssh2 Jan 17 17:36:07 host sshd[27239]: Connection reset by 1.34.183.18 port 47107 [preauth] Jan 17 17:37:00 host sshd[27342]: Did not receive identification string from 92.255.85.115 port 15625 Jan 17 17:50:38 host sshd[29629]: User root from 211.219.59.7 not allowed because not listed in AllowUsers Jan 17 17:50:38 host sshd[29629]: input_userauth_request: invalid user root [preauth] Jan 17 17:50:38 host unix_chkpwd[29639]: password check failed for user (root) Jan 17 17:50:38 host sshd[29629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.219.59.7 user=root Jan 17 17:50:38 host sshd[29629]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 17:50:39 host sshd[29629]: Failed password for invalid user root from 211.219.59.7 port 63421 ssh2 Jan 17 17:50:40 host unix_chkpwd[29642]: password check failed for user (root) Jan 17 17:50:40 host sshd[29629]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 17:50:42 host sshd[29629]: Failed password for invalid user root from 211.219.59.7 port 63421 ssh2 Jan 17 17:50:42 host unix_chkpwd[29653]: password check failed for user (root) Jan 17 17:50:42 host sshd[29629]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 17:50:44 host sshd[29629]: Failed password for invalid user root from 211.219.59.7 port 63421 ssh2 Jan 17 17:50:44 host unix_chkpwd[29656]: password check failed for user (root) Jan 17 17:50:44 host sshd[29629]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 17:50:46 host sshd[29629]: Failed password for invalid user root from 211.219.59.7 port 63421 ssh2 Jan 17 17:50:46 host unix_chkpwd[29683]: password check failed for user (root) Jan 17 17:50:46 host sshd[29629]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 17:50:48 host sshd[29629]: Failed password for invalid user root from 211.219.59.7 port 63421 ssh2 Jan 17 17:52:26 host sshd[29920]: Invalid user usr from 87.80.150.130 port 36765 Jan 17 17:52:26 host sshd[29920]: input_userauth_request: invalid user usr [preauth] Jan 17 17:52:26 host sshd[29920]: pam_unix(sshd:auth): check pass; user unknown Jan 17 17:52:26 host sshd[29920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.80.150.130 Jan 17 17:52:28 host sshd[29920]: Failed password for invalid user usr from 87.80.150.130 port 36765 ssh2 Jan 17 17:52:29 host sshd[29920]: pam_unix(sshd:auth): check pass; user unknown Jan 17 17:52:31 host sshd[29920]: Failed password for invalid user usr from 87.80.150.130 port 36765 ssh2 Jan 17 17:52:32 host sshd[29920]: pam_unix(sshd:auth): check pass; user unknown Jan 17 17:52:33 host sshd[29920]: Failed password for invalid user usr from 87.80.150.130 port 36765 ssh2 Jan 17 17:52:41 host sshd[29920]: pam_unix(sshd:auth): check pass; user unknown Jan 17 17:52:44 host sshd[29920]: Failed password for invalid user usr from 87.80.150.130 port 36765 ssh2 Jan 17 17:52:44 host sshd[29920]: Connection reset by 87.80.150.130 port 36765 [preauth] Jan 17 17:52:44 host sshd[29920]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.80.150.130 Jan 17 17:52:44 host sshd[29920]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 17 17:56:35 host sshd[30588]: User root from 210.61.131.216 not allowed because not listed in AllowUsers Jan 17 17:56:35 host sshd[30588]: input_userauth_request: invalid user root [preauth] Jan 17 17:56:35 host unix_chkpwd[30591]: password check failed for user (root) Jan 17 17:56:35 host sshd[30588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.61.131.216 user=root Jan 17 17:56:35 host sshd[30588]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 17:56:36 host sshd[30588]: Failed password for invalid user root from 210.61.131.216 port 34079 ssh2 Jan 17 17:56:37 host unix_chkpwd[30599]: password check failed for user (root) Jan 17 17:56:37 host sshd[30588]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 17:56:39 host sshd[30588]: Failed password for invalid user root from 210.61.131.216 port 34079 ssh2 Jan 17 17:56:39 host unix_chkpwd[30602]: password check failed for user (root) Jan 17 17:56:39 host sshd[30588]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 17:56:40 host sshd[30588]: Failed password for invalid user root from 210.61.131.216 port 34079 ssh2 Jan 17 17:56:41 host sshd[30588]: Connection reset by 210.61.131.216 port 34079 [preauth] Jan 17 17:56:41 host sshd[30588]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.61.131.216 user=root Jan 17 18:01:02 host sshd[31217]: User root from 121.178.83.200 not allowed because not listed in AllowUsers Jan 17 18:01:02 host sshd[31217]: input_userauth_request: invalid user root [preauth] Jan 17 18:01:03 host unix_chkpwd[31246]: password check failed for user (root) Jan 17 18:01:03 host sshd[31217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.178.83.200 user=root Jan 17 18:01:03 host sshd[31217]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 18:01:05 host sshd[31217]: Failed password for invalid user root from 121.178.83.200 port 62913 ssh2 Jan 17 18:01:05 host unix_chkpwd[31249]: password check failed for user (root) Jan 17 18:01:05 host sshd[31217]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 18:01:07 host sshd[31251]: Invalid user admin from 92.255.85.115 port 53626 Jan 17 18:01:07 host sshd[31251]: input_userauth_request: invalid user admin [preauth] Jan 17 18:01:07 host sshd[31251]: pam_unix(sshd:auth): check pass; user unknown Jan 17 18:01:07 host sshd[31251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 17 18:01:08 host sshd[31217]: Failed password for invalid user root from 121.178.83.200 port 62913 ssh2 Jan 17 18:01:08 host unix_chkpwd[31255]: password check failed for user (root) Jan 17 18:01:08 host sshd[31217]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 18:01:09 host sshd[31251]: Failed password for invalid user admin from 92.255.85.115 port 53626 ssh2 Jan 17 18:01:09 host sshd[31251]: Connection reset by 92.255.85.115 port 53626 [preauth] Jan 17 18:01:09 host sshd[31217]: Failed password for invalid user root from 121.178.83.200 port 62913 ssh2 Jan 17 18:01:10 host sshd[31217]: Connection reset by 121.178.83.200 port 62913 [preauth] Jan 17 18:01:10 host sshd[31217]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.178.83.200 user=root Jan 17 18:04:56 host sshd[31684]: Invalid user admin from 182.155.177.142 port 41535 Jan 17 18:04:56 host sshd[31684]: input_userauth_request: invalid user admin [preauth] Jan 17 18:04:56 host sshd[31684]: pam_unix(sshd:auth): check pass; user unknown Jan 17 18:04:56 host sshd[31684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.155.177.142 Jan 17 18:04:58 host sshd[31684]: Failed password for invalid user admin from 182.155.177.142 port 41535 ssh2 Jan 17 18:05:00 host sshd[31684]: Failed password for invalid user admin from 182.155.177.142 port 41535 ssh2 Jan 17 18:05:00 host sshd[31684]: Connection reset by 182.155.177.142 port 41535 [preauth] Jan 17 18:07:52 host sshd[32154]: Invalid user support from 92.255.85.115 port 58721 Jan 17 18:07:52 host sshd[32154]: input_userauth_request: invalid user support [preauth] Jan 17 18:07:52 host sshd[32154]: pam_unix(sshd:auth): check pass; user unknown Jan 17 18:07:52 host sshd[32154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 17 18:07:55 host sshd[32154]: Failed password for invalid user support from 92.255.85.115 port 58721 ssh2 Jan 17 18:07:55 host sshd[32154]: Connection reset by 92.255.85.115 port 58721 [preauth] Jan 17 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 18:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 18:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=wwwkmaorg user-4=disposeat user-5=remysagr user-6=pmcresources user-7=vfmassets user-8=shalinijames user-9=wwwtestugo user-10=wwwletsstalkfood user-11=straightcurve user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwnexidigital user-15=mrsclean user-16=palco123 user-17=gifterman user-18=kottayamcalldriv user-19=phmetals user-20=wwwkaretakers user-21=cochintaxi user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 18:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 18:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 18:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mrarrDyV7saGw9Mt.~ Jan 17 18:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mrarrDyV7saGw9Mt.~' Jan 17 18:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mrarrDyV7saGw9Mt.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 18:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 18:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 18:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 18:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 18:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 18:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 18:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 18:23:04 host sshd[2069]: Connection closed by 45.79.181.223 port 11848 [preauth] Jan 17 18:23:06 host sshd[2074]: Connection closed by 45.79.181.223 port 11850 [preauth] Jan 17 18:23:09 host sshd[2078]: Connection closed by 45.79.181.223 port 10034 [preauth] Jan 17 18:25:08 host sshd[2318]: Did not receive identification string from 206.189.23.129 port 61000 Jan 17 18:41:35 host sshd[4630]: Invalid user fo from 194.110.203.109 port 59704 Jan 17 18:41:35 host sshd[4630]: input_userauth_request: invalid user fo [preauth] Jan 17 18:41:35 host sshd[4630]: pam_unix(sshd:auth): check pass; user unknown Jan 17 18:41:35 host sshd[4630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 18:41:37 host sshd[4630]: Failed password for invalid user fo from 194.110.203.109 port 59704 ssh2 Jan 17 18:41:40 host sshd[4630]: pam_unix(sshd:auth): check pass; user unknown Jan 17 18:41:42 host sshd[4630]: Failed password for invalid user fo from 194.110.203.109 port 59704 ssh2 Jan 17 18:41:45 host sshd[4630]: pam_unix(sshd:auth): check pass; user unknown Jan 17 18:41:47 host sshd[4630]: Failed password for invalid user fo from 194.110.203.109 port 59704 ssh2 Jan 17 18:41:50 host sshd[4630]: Connection closed by 194.110.203.109 port 59704 [preauth] Jan 17 18:41:50 host sshd[4630]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 18:50:07 host sshd[5735]: User root from 108.80.30.229 not allowed because not listed in AllowUsers Jan 17 18:50:07 host sshd[5735]: input_userauth_request: invalid user root [preauth] Jan 17 18:50:07 host unix_chkpwd[5739]: password check failed for user (root) Jan 17 18:50:07 host sshd[5735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.80.30.229 user=root Jan 17 18:50:07 host sshd[5735]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 18:50:10 host sshd[5735]: Failed password for invalid user root from 108.80.30.229 port 43233 ssh2 Jan 17 18:50:10 host sshd[5735]: Connection reset by 108.80.30.229 port 43233 [preauth] Jan 17 18:55:31 host sshd[6445]: User root from 61.89.135.4 not allowed because not listed in AllowUsers Jan 17 18:55:31 host sshd[6445]: input_userauth_request: invalid user root [preauth] Jan 17 18:55:31 host unix_chkpwd[6447]: password check failed for user (root) Jan 17 18:55:31 host sshd[6445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.89.135.4 user=root Jan 17 18:55:31 host sshd[6445]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 18:55:34 host sshd[6445]: Failed password for invalid user root from 61.89.135.4 port 60244 ssh2 Jan 17 18:55:34 host sshd[6445]: Connection reset by 61.89.135.4 port 60244 [preauth] Jan 17 19:00:24 host sshd[7078]: Invalid user bcim from 205.185.113.129 port 37656 Jan 17 19:00:24 host sshd[7078]: input_userauth_request: invalid user bcim [preauth] Jan 17 19:00:24 host sshd[7078]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:00:24 host sshd[7078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 17 19:00:27 host sshd[7078]: Failed password for invalid user bcim from 205.185.113.129 port 37656 ssh2 Jan 17 19:00:28 host sshd[7078]: Connection closed by 205.185.113.129 port 37656 [preauth] Jan 17 19:00:54 host sshd[7256]: Invalid user oracle from 125.228.34.110 port 47790 Jan 17 19:00:54 host sshd[7256]: input_userauth_request: invalid user oracle [preauth] Jan 17 19:00:54 host sshd[7256]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:00:54 host sshd[7256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.34.110 Jan 17 19:00:56 host sshd[7256]: Failed password for invalid user oracle from 125.228.34.110 port 47790 ssh2 Jan 17 19:00:57 host sshd[7256]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:00:59 host sshd[7256]: Failed password for invalid user oracle from 125.228.34.110 port 47790 ssh2 Jan 17 19:01:00 host sshd[7256]: Connection reset by 125.228.34.110 port 47790 [preauth] Jan 17 19:01:00 host sshd[7256]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.34.110 Jan 17 19:03:55 host sshd[7604]: User root from 146.190.127.28 not allowed because not listed in AllowUsers Jan 17 19:03:55 host sshd[7604]: input_userauth_request: invalid user root [preauth] Jan 17 19:03:55 host unix_chkpwd[7607]: password check failed for user (root) Jan 17 19:03:55 host sshd[7604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.127.28 user=root Jan 17 19:03:55 host sshd[7604]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 19:03:57 host sshd[7604]: Failed password for invalid user root from 146.190.127.28 port 51830 ssh2 Jan 17 19:03:57 host sshd[7604]: Received disconnect from 146.190.127.28 port 51830:11: Bye Bye [preauth] Jan 17 19:03:57 host sshd[7604]: Disconnected from 146.190.127.28 port 51830 [preauth] Jan 17 19:06:47 host sshd[8033]: Invalid user training from 181.114.116.98 port 33724 Jan 17 19:06:47 host sshd[8033]: input_userauth_request: invalid user training [preauth] Jan 17 19:06:47 host sshd[8033]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:06:47 host sshd[8033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.114.116.98 Jan 17 19:06:49 host sshd[8033]: Failed password for invalid user training from 181.114.116.98 port 33724 ssh2 Jan 17 19:06:49 host sshd[8033]: Received disconnect from 181.114.116.98 port 33724:11: Bye Bye [preauth] Jan 17 19:06:49 host sshd[8033]: Disconnected from 181.114.116.98 port 33724 [preauth] Jan 17 19:07:13 host sshd[8079]: Invalid user demo from 104.236.182.223 port 36670 Jan 17 19:07:13 host sshd[8079]: input_userauth_request: invalid user demo [preauth] Jan 17 19:07:13 host sshd[8079]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:07:13 host sshd[8079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.182.223 Jan 17 19:07:15 host sshd[8079]: Failed password for invalid user demo from 104.236.182.223 port 36670 ssh2 Jan 17 19:07:15 host sshd[8079]: Received disconnect from 104.236.182.223 port 36670:11: Bye Bye [preauth] Jan 17 19:07:15 host sshd[8079]: Disconnected from 104.236.182.223 port 36670 [preauth] Jan 17 19:07:39 host sshd[8127]: Invalid user admin1 from 182.70.115.11 port 52176 Jan 17 19:07:39 host sshd[8127]: input_userauth_request: invalid user admin1 [preauth] Jan 17 19:07:39 host sshd[8127]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:07:39 host sshd[8127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.70.115.11 Jan 17 19:07:41 host sshd[8127]: Failed password for invalid user admin1 from 182.70.115.11 port 52176 ssh2 Jan 17 19:07:41 host sshd[8127]: Received disconnect from 182.70.115.11 port 52176:11: Bye Bye [preauth] Jan 17 19:07:41 host sshd[8127]: Disconnected from 182.70.115.11 port 52176 [preauth] Jan 17 19:09:34 host sshd[8366]: Invalid user admin123 from 146.190.127.28 port 57140 Jan 17 19:09:34 host sshd[8366]: input_userauth_request: invalid user admin123 [preauth] Jan 17 19:09:34 host sshd[8366]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:09:34 host sshd[8366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.127.28 Jan 17 19:09:36 host sshd[8366]: Failed password for invalid user admin123 from 146.190.127.28 port 57140 ssh2 Jan 17 19:09:36 host sshd[8366]: Received disconnect from 146.190.127.28 port 57140:11: Bye Bye [preauth] Jan 17 19:09:36 host sshd[8366]: Disconnected from 146.190.127.28 port 57140 [preauth] Jan 17 19:09:50 host sshd[8412]: Invalid user halo from 190.129.122.3 port 1212 Jan 17 19:09:50 host sshd[8412]: input_userauth_request: invalid user halo [preauth] Jan 17 19:09:50 host sshd[8412]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:09:50 host sshd[8412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.129.122.3 Jan 17 19:09:52 host sshd[8412]: Failed password for invalid user halo from 190.129.122.3 port 1212 ssh2 Jan 17 19:09:52 host sshd[8412]: Received disconnect from 190.129.122.3 port 1212:11: Bye Bye [preauth] Jan 17 19:09:52 host sshd[8412]: Disconnected from 190.129.122.3 port 1212 [preauth] Jan 17 19:10:29 host sshd[8491]: Invalid user panda from 104.236.182.223 port 49428 Jan 17 19:10:29 host sshd[8491]: input_userauth_request: invalid user panda [preauth] Jan 17 19:10:29 host sshd[8491]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:10:29 host sshd[8491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.182.223 Jan 17 19:10:30 host sshd[8523]: Invalid user oscar from 211.245.31.15 port 50606 Jan 17 19:10:30 host sshd[8523]: input_userauth_request: invalid user oscar [preauth] Jan 17 19:10:30 host sshd[8523]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:10:30 host sshd[8523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.245.31.15 Jan 17 19:10:31 host sshd[8491]: Failed password for invalid user panda from 104.236.182.223 port 49428 ssh2 Jan 17 19:10:32 host sshd[8491]: Received disconnect from 104.236.182.223 port 49428:11: Bye Bye [preauth] Jan 17 19:10:32 host sshd[8491]: Disconnected from 104.236.182.223 port 49428 [preauth] Jan 17 19:10:33 host sshd[8523]: Failed password for invalid user oscar from 211.245.31.15 port 50606 ssh2 Jan 17 19:10:33 host sshd[8523]: Received disconnect from 211.245.31.15 port 50606:11: Bye Bye [preauth] Jan 17 19:10:33 host sshd[8523]: Disconnected from 211.245.31.15 port 50606 [preauth] Jan 17 19:11:07 host sshd[8679]: User root from 181.114.116.98 not allowed because not listed in AllowUsers Jan 17 19:11:07 host sshd[8679]: input_userauth_request: invalid user root [preauth] Jan 17 19:11:07 host unix_chkpwd[8683]: password check failed for user (root) Jan 17 19:11:07 host sshd[8679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.114.116.98 user=root Jan 17 19:11:07 host sshd[8679]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 19:11:10 host sshd[8679]: Failed password for invalid user root from 181.114.116.98 port 48270 ssh2 Jan 17 19:11:10 host sshd[8679]: Received disconnect from 181.114.116.98 port 48270:11: Bye Bye [preauth] Jan 17 19:11:10 host sshd[8679]: Disconnected from 181.114.116.98 port 48270 [preauth] Jan 17 19:11:46 host sshd[8800]: Invalid user osboxes from 104.236.182.223 port 48412 Jan 17 19:11:46 host sshd[8800]: input_userauth_request: invalid user osboxes [preauth] Jan 17 19:11:46 host sshd[8800]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:11:46 host sshd[8800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.182.223 Jan 17 19:11:48 host sshd[8800]: Failed password for invalid user osboxes from 104.236.182.223 port 48412 ssh2 Jan 17 19:11:49 host sshd[8800]: Received disconnect from 104.236.182.223 port 48412:11: Bye Bye [preauth] Jan 17 19:11:49 host sshd[8800]: Disconnected from 104.236.182.223 port 48412 [preauth] Jan 17 19:12:23 host sshd[8906]: Invalid user admin from 182.70.115.11 port 42762 Jan 17 19:12:23 host sshd[8906]: input_userauth_request: invalid user admin [preauth] Jan 17 19:12:23 host sshd[8906]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:12:23 host sshd[8906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.70.115.11 Jan 17 19:12:25 host sshd[8906]: Failed password for invalid user admin from 182.70.115.11 port 42762 ssh2 Jan 17 19:12:25 host sshd[8906]: Received disconnect from 182.70.115.11 port 42762:11: Bye Bye [preauth] Jan 17 19:12:25 host sshd[8906]: Disconnected from 182.70.115.11 port 42762 [preauth] Jan 17 19:12:43 host sshd[8946]: User root from 190.129.122.3 not allowed because not listed in AllowUsers Jan 17 19:12:43 host sshd[8946]: input_userauth_request: invalid user root [preauth] Jan 17 19:12:43 host unix_chkpwd[8951]: password check failed for user (root) Jan 17 19:12:43 host sshd[8946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.129.122.3 user=root Jan 17 19:12:43 host sshd[8946]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 19:12:45 host sshd[8946]: Failed password for invalid user root from 190.129.122.3 port 1208 ssh2 Jan 17 19:12:45 host sshd[8946]: Received disconnect from 190.129.122.3 port 1208:11: Bye Bye [preauth] Jan 17 19:12:45 host sshd[8946]: Disconnected from 190.129.122.3 port 1208 [preauth] Jan 17 19:13:53 host sshd[9110]: Invalid user foundry from 182.70.115.11 port 38978 Jan 17 19:13:53 host sshd[9110]: input_userauth_request: invalid user foundry [preauth] Jan 17 19:13:53 host sshd[9110]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:13:53 host sshd[9110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.70.115.11 Jan 17 19:13:55 host sshd[9110]: Failed password for invalid user foundry from 182.70.115.11 port 38978 ssh2 Jan 17 19:15:33 host sshd[9329]: User root from 211.245.31.15 not allowed because not listed in AllowUsers Jan 17 19:15:33 host sshd[9329]: input_userauth_request: invalid user root [preauth] Jan 17 19:15:33 host unix_chkpwd[9334]: password check failed for user (root) Jan 17 19:15:33 host sshd[9329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.245.31.15 user=root Jan 17 19:15:33 host sshd[9329]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 19:15:36 host sshd[9329]: Failed password for invalid user root from 211.245.31.15 port 39610 ssh2 Jan 17 19:15:36 host sshd[9329]: Received disconnect from 211.245.31.15 port 39610:11: Bye Bye [preauth] Jan 17 19:15:36 host sshd[9329]: Disconnected from 211.245.31.15 port 39610 [preauth] Jan 17 19:20:32 host sshd[9976]: User root from 72.190.53.59 not allowed because not listed in AllowUsers Jan 17 19:20:32 host sshd[9976]: input_userauth_request: invalid user root [preauth] Jan 17 19:20:32 host unix_chkpwd[9980]: password check failed for user (root) Jan 17 19:20:32 host sshd[9976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.190.53.59 user=root Jan 17 19:20:32 host sshd[9976]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 19:20:34 host sshd[9976]: Failed password for invalid user root from 72.190.53.59 port 41384 ssh2 Jan 17 19:20:35 host unix_chkpwd[9983]: password check failed for user (root) Jan 17 19:20:35 host sshd[9976]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 19:20:36 host sshd[9976]: Failed password for invalid user root from 72.190.53.59 port 41384 ssh2 Jan 17 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=gifterman user-4=palco123 user-5=phmetals user-6=kottayamcalldriv user-7=straightcurve user-8=wwwletsstalkfood user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=wwwkapin user-16=woodpeck user-17=remysagr user-18=disposeat user-19=wwwkmaorg user-20=wwwrmswll user-21=wwwresourcehunte user-22=keralaholi user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 19:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Lng6hUVkmfqHFhfw.~ Jan 17 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Lng6hUVkmfqHFhfw.~' Jan 17 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Lng6hUVkmfqHFhfw.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 19:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 19:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 19:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 19:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 19:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 19:49:30 host sshd[14576]: Did not receive identification string from 120.48.120.83 port 43362 Jan 17 19:49:38 host sshd[14579]: Invalid user ubuntu from 120.48.120.83 port 46908 Jan 17 19:49:38 host sshd[14579]: input_userauth_request: invalid user ubuntu [preauth] Jan 17 19:49:39 host sshd[14588]: Invalid user postgres from 120.48.120.83 port 46978 Jan 17 19:49:39 host sshd[14588]: input_userauth_request: invalid user postgres [preauth] Jan 17 19:49:39 host sshd[14593]: Invalid user zjw from 120.48.120.83 port 46922 Jan 17 19:49:39 host sshd[14593]: input_userauth_request: invalid user zjw [preauth] Jan 17 19:49:39 host sshd[14579]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:49:39 host sshd[14579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 17 19:49:40 host sshd[14604]: Invalid user user from 120.48.120.83 port 46902 Jan 17 19:49:40 host sshd[14604]: input_userauth_request: invalid user user [preauth] Jan 17 19:49:40 host sshd[14597]: Invalid user ubuntu from 120.48.120.83 port 46962 Jan 17 19:49:40 host sshd[14597]: input_userauth_request: invalid user ubuntu [preauth] Jan 17 19:49:40 host sshd[14604]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:49:40 host sshd[14604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.48.120.83 Jan 17 19:49:41 host sshd[14579]: Failed password for invalid user ubuntu from 120.48.120.83 port 46908 ssh2 Jan 17 19:49:43 host sshd[14604]: Failed password for invalid user user from 120.48.120.83 port 46902 ssh2 Jan 17 19:54:59 host sshd[15368]: Invalid user admin from 125.228.183.150 port 37518 Jan 17 19:54:59 host sshd[15368]: input_userauth_request: invalid user admin [preauth] Jan 17 19:54:59 host sshd[15368]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:54:59 host sshd[15368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.183.150 Jan 17 19:55:01 host sshd[15368]: Failed password for invalid user admin from 125.228.183.150 port 37518 ssh2 Jan 17 19:55:03 host sshd[15368]: Connection reset by 125.228.183.150 port 37518 [preauth] Jan 17 19:55:11 host sshd[15407]: Invalid user ts3 from 159.89.40.119 port 60152 Jan 17 19:55:11 host sshd[15407]: input_userauth_request: invalid user ts3 [preauth] Jan 17 19:55:11 host sshd[15407]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:55:11 host sshd[15407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.40.119 Jan 17 19:55:13 host sshd[15407]: Failed password for invalid user ts3 from 159.89.40.119 port 60152 ssh2 Jan 17 19:55:13 host sshd[15407]: Received disconnect from 159.89.40.119 port 60152:11: Bye Bye [preauth] Jan 17 19:55:13 host sshd[15407]: Disconnected from 159.89.40.119 port 60152 [preauth] Jan 17 19:55:20 host sshd[15419]: User root from 157.245.148.189 not allowed because not listed in AllowUsers Jan 17 19:55:20 host sshd[15419]: input_userauth_request: invalid user root [preauth] Jan 17 19:55:20 host unix_chkpwd[15421]: password check failed for user (root) Jan 17 19:55:20 host sshd[15419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.148.189 user=root Jan 17 19:55:20 host sshd[15419]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 19:55:22 host sshd[15419]: Failed password for invalid user root from 157.245.148.189 port 45668 ssh2 Jan 17 19:55:22 host sshd[15419]: Received disconnect from 157.245.148.189 port 45668:11: Bye Bye [preauth] Jan 17 19:55:22 host sshd[15419]: Disconnected from 157.245.148.189 port 45668 [preauth] Jan 17 19:55:37 host sshd[15462]: User centos from 43.153.12.71 not allowed because not listed in AllowUsers Jan 17 19:55:37 host sshd[15462]: input_userauth_request: invalid user centos [preauth] Jan 17 19:55:37 host unix_chkpwd[15465]: password check failed for user (centos) Jan 17 19:55:37 host sshd[15462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.12.71 user=centos Jan 17 19:55:39 host sshd[15462]: Failed password for invalid user centos from 43.153.12.71 port 56742 ssh2 Jan 17 19:55:39 host sshd[15462]: Received disconnect from 43.153.12.71 port 56742:11: Bye Bye [preauth] Jan 17 19:55:39 host sshd[15462]: Disconnected from 43.153.12.71 port 56742 [preauth] Jan 17 19:57:11 host sshd[15696]: Connection reset by 221.165.87.21 port 52707 [preauth] Jan 17 19:57:15 host sshd[15707]: Invalid user local from 209.97.183.120 port 58532 Jan 17 19:57:15 host sshd[15707]: input_userauth_request: invalid user local [preauth] Jan 17 19:57:15 host sshd[15707]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:57:15 host sshd[15707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.183.120 Jan 17 19:57:17 host sshd[15707]: Failed password for invalid user local from 209.97.183.120 port 58532 ssh2 Jan 17 19:57:17 host sshd[15707]: Received disconnect from 209.97.183.120 port 58532:11: Bye Bye [preauth] Jan 17 19:57:17 host sshd[15707]: Disconnected from 209.97.183.120 port 58532 [preauth] Jan 17 19:58:46 host sshd[15975]: Invalid user oscar from 79.59.125.253 port 44620 Jan 17 19:58:46 host sshd[15975]: input_userauth_request: invalid user oscar [preauth] Jan 17 19:58:46 host sshd[15975]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:58:46 host sshd[15975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.59.125.253 Jan 17 19:58:48 host sshd[15975]: Failed password for invalid user oscar from 79.59.125.253 port 44620 ssh2 Jan 17 19:58:48 host sshd[15975]: Received disconnect from 79.59.125.253 port 44620:11: Bye Bye [preauth] Jan 17 19:58:48 host sshd[15975]: Disconnected from 79.59.125.253 port 44620 [preauth] Jan 17 19:59:29 host sshd[16078]: Invalid user max from 101.36.108.106 port 10340 Jan 17 19:59:29 host sshd[16078]: input_userauth_request: invalid user max [preauth] Jan 17 19:59:29 host sshd[16078]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:59:29 host sshd[16078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.108.106 Jan 17 19:59:32 host sshd[16078]: Failed password for invalid user max from 101.36.108.106 port 10340 ssh2 Jan 17 19:59:32 host sshd[16078]: Received disconnect from 101.36.108.106 port 10340:11: Bye Bye [preauth] Jan 17 19:59:32 host sshd[16078]: Disconnected from 101.36.108.106 port 10340 [preauth] Jan 17 19:59:38 host sshd[16089]: Invalid user node from 82.196.113.78 port 8257 Jan 17 19:59:38 host sshd[16089]: input_userauth_request: invalid user node [preauth] Jan 17 19:59:38 host sshd[16089]: pam_unix(sshd:auth): check pass; user unknown Jan 17 19:59:38 host sshd[16089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.113.78 Jan 17 19:59:40 host sshd[16089]: Failed password for invalid user node from 82.196.113.78 port 8257 ssh2 Jan 17 19:59:40 host sshd[16089]: Received disconnect from 82.196.113.78 port 8257:11: Bye Bye [preauth] Jan 17 19:59:40 host sshd[16089]: Disconnected from 82.196.113.78 port 8257 [preauth] Jan 17 20:00:04 host sshd[16155]: User root from 89.109.32.143 not allowed because not listed in AllowUsers Jan 17 20:00:04 host sshd[16155]: input_userauth_request: invalid user root [preauth] Jan 17 20:00:05 host unix_chkpwd[16162]: password check failed for user (root) Jan 17 20:00:05 host sshd[16155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.109.32.143 user=root Jan 17 20:00:05 host sshd[16155]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:00:05 host sshd[16158]: Invalid user max from 178.91.57.74 port 48784 Jan 17 20:00:05 host sshd[16158]: input_userauth_request: invalid user max [preauth] Jan 17 20:00:05 host sshd[16158]: pam_unix(sshd:auth): check pass; user unknown Jan 17 20:00:05 host sshd[16158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.91.57.74 Jan 17 20:00:07 host sshd[16155]: Failed password for invalid user root from 89.109.32.143 port 35992 ssh2 Jan 17 20:00:07 host unix_chkpwd[16166]: password check failed for user (root) Jan 17 20:00:07 host sshd[16155]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:00:07 host sshd[16158]: Failed password for invalid user max from 178.91.57.74 port 48784 ssh2 Jan 17 20:00:08 host sshd[16158]: Received disconnect from 178.91.57.74 port 48784:11: Bye Bye [preauth] Jan 17 20:00:08 host sshd[16158]: Disconnected from 178.91.57.74 port 48784 [preauth] Jan 17 20:00:09 host sshd[16155]: Failed password for invalid user root from 89.109.32.143 port 35992 ssh2 Jan 17 20:00:09 host unix_chkpwd[16169]: password check failed for user (root) Jan 17 20:00:09 host sshd[16155]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:00:11 host sshd[16155]: Failed password for invalid user root from 89.109.32.143 port 35992 ssh2 Jan 17 20:00:11 host unix_chkpwd[16173]: password check failed for user (root) Jan 17 20:00:11 host sshd[16155]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:00:13 host sshd[16155]: Failed password for invalid user root from 89.109.32.143 port 35992 ssh2 Jan 17 20:00:14 host unix_chkpwd[16177]: password check failed for user (root) Jan 17 20:00:14 host sshd[16155]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:00:16 host sshd[16155]: Failed password for invalid user root from 89.109.32.143 port 35992 ssh2 Jan 17 20:00:16 host unix_chkpwd[16187]: password check failed for user (root) Jan 17 20:00:16 host sshd[16155]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:00:18 host sshd[16155]: Failed password for invalid user root from 89.109.32.143 port 35992 ssh2 Jan 17 20:00:18 host sshd[16155]: error: maximum authentication attempts exceeded for invalid user root from 89.109.32.143 port 35992 ssh2 [preauth] Jan 17 20:00:18 host sshd[16155]: Disconnecting: Too many authentication failures [preauth] Jan 17 20:00:18 host sshd[16155]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.109.32.143 user=root Jan 17 20:00:18 host sshd[16155]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 17 20:01:03 host sshd[16343]: Invalid user debian from 159.89.40.119 port 58760 Jan 17 20:01:03 host sshd[16343]: input_userauth_request: invalid user debian [preauth] Jan 17 20:01:03 host sshd[16343]: pam_unix(sshd:auth): check pass; user unknown Jan 17 20:01:03 host sshd[16343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.40.119 Jan 17 20:01:05 host sshd[16343]: Failed password for invalid user debian from 159.89.40.119 port 58760 ssh2 Jan 17 20:01:05 host sshd[16343]: Received disconnect from 159.89.40.119 port 58760:11: Bye Bye [preauth] Jan 17 20:01:05 host sshd[16343]: Disconnected from 159.89.40.119 port 58760 [preauth] Jan 17 20:01:18 host sshd[16370]: User root from 209.97.183.120 not allowed because not listed in AllowUsers Jan 17 20:01:18 host sshd[16370]: input_userauth_request: invalid user root [preauth] Jan 17 20:01:18 host unix_chkpwd[16373]: password check failed for user (root) Jan 17 20:01:18 host sshd[16370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.183.120 user=root Jan 17 20:01:18 host sshd[16370]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:01:21 host sshd[16370]: Failed password for invalid user root from 209.97.183.120 port 51234 ssh2 Jan 17 20:01:21 host sshd[16370]: Received disconnect from 209.97.183.120 port 51234:11: Bye Bye [preauth] Jan 17 20:01:21 host sshd[16370]: Disconnected from 209.97.183.120 port 51234 [preauth] Jan 17 20:01:43 host sshd[16468]: Invalid user deployer from 82.196.113.78 port 63208 Jan 17 20:01:43 host sshd[16468]: input_userauth_request: invalid user deployer [preauth] Jan 17 20:01:43 host sshd[16468]: pam_unix(sshd:auth): check pass; user unknown Jan 17 20:01:43 host sshd[16468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.113.78 Jan 17 20:01:46 host sshd[16468]: Failed password for invalid user deployer from 82.196.113.78 port 63208 ssh2 Jan 17 20:01:46 host sshd[16468]: Received disconnect from 82.196.113.78 port 63208:11: Bye Bye [preauth] Jan 17 20:01:46 host sshd[16468]: Disconnected from 82.196.113.78 port 63208 [preauth] Jan 17 20:01:48 host sshd[16482]: Invalid user esuser from 157.245.148.189 port 35186 Jan 17 20:01:48 host sshd[16482]: input_userauth_request: invalid user esuser [preauth] Jan 17 20:01:48 host sshd[16482]: pam_unix(sshd:auth): check pass; user unknown Jan 17 20:01:48 host sshd[16482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.148.189 Jan 17 20:01:50 host sshd[16482]: Failed password for invalid user esuser from 157.245.148.189 port 35186 ssh2 Jan 17 20:01:50 host sshd[16482]: Received disconnect from 157.245.148.189 port 35186:11: Bye Bye [preauth] Jan 17 20:01:50 host sshd[16482]: Disconnected from 157.245.148.189 port 35186 [preauth] Jan 17 20:02:06 host sshd[16559]: User root from 79.59.125.253 not allowed because not listed in AllowUsers Jan 17 20:02:06 host sshd[16559]: input_userauth_request: invalid user root [preauth] Jan 17 20:02:06 host unix_chkpwd[16563]: password check failed for user (root) Jan 17 20:02:06 host sshd[16559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.59.125.253 user=root Jan 17 20:02:06 host sshd[16559]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:02:09 host sshd[16559]: Failed password for invalid user root from 79.59.125.253 port 53028 ssh2 Jan 17 20:02:09 host sshd[16559]: Received disconnect from 79.59.125.253 port 53028:11: Bye Bye [preauth] Jan 17 20:02:09 host sshd[16559]: Disconnected from 79.59.125.253 port 53028 [preauth] Jan 17 20:02:10 host sshd[16571]: Invalid user deployer from 159.89.40.119 port 53498 Jan 17 20:02:10 host sshd[16571]: input_userauth_request: invalid user deployer [preauth] Jan 17 20:02:10 host sshd[16571]: pam_unix(sshd:auth): check pass; user unknown Jan 17 20:02:10 host sshd[16571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.40.119 Jan 17 20:02:12 host sshd[16571]: Failed password for invalid user deployer from 159.89.40.119 port 53498 ssh2 Jan 17 20:02:35 host sshd[16697]: Invalid user nextcloud from 178.91.57.74 port 46046 Jan 17 20:02:35 host sshd[16697]: input_userauth_request: invalid user nextcloud [preauth] Jan 17 20:02:35 host sshd[16697]: pam_unix(sshd:auth): check pass; user unknown Jan 17 20:02:35 host sshd[16697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.91.57.74 Jan 17 20:02:36 host sshd[16697]: Failed password for invalid user nextcloud from 178.91.57.74 port 46046 ssh2 Jan 17 20:02:37 host sshd[16697]: Received disconnect from 178.91.57.74 port 46046:11: Bye Bye [preauth] Jan 17 20:02:37 host sshd[16697]: Disconnected from 178.91.57.74 port 46046 [preauth] Jan 17 20:02:51 host sshd[16661]: Connection closed by 101.36.108.106 port 41288 [preauth] Jan 17 20:03:07 host sshd[16772]: User root from 82.196.113.78 not allowed because not listed in AllowUsers Jan 17 20:03:07 host sshd[16772]: input_userauth_request: invalid user root [preauth] Jan 17 20:03:07 host unix_chkpwd[16776]: password check failed for user (root) Jan 17 20:03:08 host sshd[16772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.113.78 user=root Jan 17 20:03:08 host sshd[16772]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:03:10 host sshd[16772]: Failed password for invalid user root from 82.196.113.78 port 65286 ssh2 Jan 17 20:03:10 host sshd[16772]: Received disconnect from 82.196.113.78 port 65286:11: Bye Bye [preauth] Jan 17 20:03:10 host sshd[16772]: Disconnected from 82.196.113.78 port 65286 [preauth] Jan 17 20:03:55 host sshd[17007]: Invalid user admin123 from 43.153.12.71 port 51996 Jan 17 20:03:55 host sshd[17007]: input_userauth_request: invalid user admin123 [preauth] Jan 17 20:03:55 host sshd[17007]: pam_unix(sshd:auth): check pass; user unknown Jan 17 20:03:55 host sshd[17007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.12.71 Jan 17 20:03:55 host sshd[17009]: Invalid user hb from 178.91.57.74 port 40080 Jan 17 20:03:55 host sshd[17009]: input_userauth_request: invalid user hb [preauth] Jan 17 20:03:55 host sshd[17009]: pam_unix(sshd:auth): check pass; user unknown Jan 17 20:03:55 host sshd[17009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.91.57.74 Jan 17 20:03:57 host sshd[17007]: Failed password for invalid user admin123 from 43.153.12.71 port 51996 ssh2 Jan 17 20:03:57 host sshd[17007]: Received disconnect from 43.153.12.71 port 51996:11: Bye Bye [preauth] Jan 17 20:03:57 host sshd[17007]: Disconnected from 43.153.12.71 port 51996 [preauth] Jan 17 20:03:57 host sshd[17009]: Failed password for invalid user hb from 178.91.57.74 port 40080 ssh2 Jan 17 20:04:57 host sshd[17211]: User root from 101.36.108.106 not allowed because not listed in AllowUsers Jan 17 20:04:57 host sshd[17211]: input_userauth_request: invalid user root [preauth] Jan 17 20:04:57 host unix_chkpwd[17215]: password check failed for user (root) Jan 17 20:04:57 host sshd[17211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.108.106 user=root Jan 17 20:04:57 host sshd[17211]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:04:59 host sshd[17211]: Failed password for invalid user root from 101.36.108.106 port 13484 ssh2 Jan 17 20:04:59 host sshd[17211]: Received disconnect from 101.36.108.106 port 13484:11: Bye Bye [preauth] Jan 17 20:04:59 host sshd[17211]: Disconnected from 101.36.108.106 port 13484 [preauth] Jan 17 20:09:10 host sshd[18023]: Invalid user zyfwp from 49.164.92.247 port 47515 Jan 17 20:09:10 host sshd[18023]: input_userauth_request: invalid user zyfwp [preauth] Jan 17 20:09:10 host sshd[18023]: pam_unix(sshd:auth): check pass; user unknown Jan 17 20:09:10 host sshd[18023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.164.92.247 Jan 17 20:09:12 host sshd[18023]: Failed password for invalid user zyfwp from 49.164.92.247 port 47515 ssh2 Jan 17 20:09:13 host sshd[18023]: pam_unix(sshd:auth): check pass; user unknown Jan 17 20:09:15 host sshd[18023]: Failed password for invalid user zyfwp from 49.164.92.247 port 47515 ssh2 Jan 17 20:09:15 host sshd[18023]: pam_unix(sshd:auth): check pass; user unknown Jan 17 20:09:16 host sshd[18023]: Failed password for invalid user zyfwp from 49.164.92.247 port 47515 ssh2 Jan 17 20:09:17 host sshd[18023]: Connection closed by 49.164.92.247 port 47515 [preauth] Jan 17 20:09:17 host sshd[18023]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.164.92.247 Jan 17 20:10:03 host sshd[18121]: User root from 220.135.222.190 not allowed because not listed in AllowUsers Jan 17 20:10:03 host sshd[18121]: input_userauth_request: invalid user root [preauth] Jan 17 20:10:03 host unix_chkpwd[18149]: password check failed for user (root) Jan 17 20:10:03 host sshd[18121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.222.190 user=root Jan 17 20:10:03 host sshd[18121]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:10:04 host sshd[18121]: Failed password for invalid user root from 220.135.222.190 port 54112 ssh2 Jan 17 20:10:05 host unix_chkpwd[18156]: password check failed for user (root) Jan 17 20:10:05 host sshd[18121]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:10:07 host sshd[18121]: Failed password for invalid user root from 220.135.222.190 port 54112 ssh2 Jan 17 20:10:08 host unix_chkpwd[18161]: password check failed for user (root) Jan 17 20:10:08 host sshd[18121]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:10:10 host sshd[18121]: Failed password for invalid user root from 220.135.222.190 port 54112 ssh2 Jan 17 20:10:11 host sshd[18121]: Connection reset by 220.135.222.190 port 54112 [preauth] Jan 17 20:10:11 host sshd[18121]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.222.190 user=root Jan 17 20:18:27 host sshd[19372]: Invalid user admin from 220.133.53.249 port 42205 Jan 17 20:18:27 host sshd[19372]: input_userauth_request: invalid user admin [preauth] Jan 17 20:18:27 host sshd[19372]: pam_unix(sshd:auth): check pass; user unknown Jan 17 20:18:27 host sshd[19372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.53.249 Jan 17 20:18:30 host sshd[19372]: Failed password for invalid user admin from 220.133.53.249 port 42205 ssh2 Jan 17 20:18:30 host sshd[19372]: Connection reset by 220.133.53.249 port 42205 [preauth] Jan 17 20:20:46 host sshd[19773]: User root from 49.213.216.230 not allowed because not listed in AllowUsers Jan 17 20:20:46 host sshd[19773]: input_userauth_request: invalid user root [preauth] Jan 17 20:20:46 host unix_chkpwd[19776]: password check failed for user (root) Jan 17 20:20:46 host sshd[19773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.213.216.230 user=root Jan 17 20:20:46 host sshd[19773]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:20:47 host sshd[19773]: Failed password for invalid user root from 49.213.216.230 port 57989 ssh2 Jan 17 20:20:48 host unix_chkpwd[19786]: password check failed for user (root) Jan 17 20:20:48 host sshd[19773]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:20:50 host sshd[19773]: Failed password for invalid user root from 49.213.216.230 port 57989 ssh2 Jan 17 20:20:51 host unix_chkpwd[19789]: password check failed for user (root) Jan 17 20:20:51 host sshd[19773]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:20:53 host sshd[19773]: Failed password for invalid user root from 49.213.216.230 port 57989 ssh2 Jan 17 20:20:54 host unix_chkpwd[19797]: password check failed for user (root) Jan 17 20:20:54 host sshd[19773]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:20:56 host sshd[19773]: Failed password for invalid user root from 49.213.216.230 port 57989 ssh2 Jan 17 20:20:56 host unix_chkpwd[19800]: password check failed for user (root) Jan 17 20:20:56 host sshd[19773]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 20:20:58 host sshd[19773]: Failed password for invalid user root from 49.213.216.230 port 57989 ssh2 Jan 17 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=wwwtestugo user-3=shalinijames user-4=pmcresources user-5=disposeat user-6=remysagr user-7=wwwkmaorg user-8=wwwkapin user-9=woodpeck user-10=gifterman user-11=palco123 user-12=phmetals user-13=kottayamcalldriv user-14=mrsclean user-15=wwwnexidigital user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=wwwrmswll user-27=keralaholi user-28=wwwresourcehunte user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 20:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fpSle9JaLlwhSF0y.~ Jan 17 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fpSle9JaLlwhSF0y.~' Jan 17 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fpSle9JaLlwhSF0y.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 20:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 20:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 20:25:06 host sshd[20674]: Invalid user fp from 194.110.203.109 port 36174 Jan 17 20:25:06 host sshd[20674]: input_userauth_request: invalid user fp [preauth] Jan 17 20:25:06 host sshd[20674]: pam_unix(sshd:auth): check pass; user unknown Jan 17 20:25:06 host sshd[20674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 20:25:08 host sshd[20674]: Failed password for invalid user fp from 194.110.203.109 port 36174 ssh2 Jan 17 20:25:11 host sshd[20674]: pam_unix(sshd:auth): check pass; user unknown Jan 17 20:25:13 host sshd[20674]: Failed password for invalid user fp from 194.110.203.109 port 36174 ssh2 Jan 17 20:25:17 host sshd[20674]: pam_unix(sshd:auth): check pass; user unknown Jan 17 20:25:18 host sshd[20674]: Failed password for invalid user fp from 194.110.203.109 port 36174 ssh2 Jan 17 20:25:22 host sshd[20674]: Connection closed by 194.110.203.109 port 36174 [preauth] Jan 17 20:25:22 host sshd[20674]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 20:34:27 host sshd[22670]: Invalid user odroid from 195.226.194.142 port 41410 Jan 17 20:34:27 host sshd[22670]: input_userauth_request: invalid user odroid [preauth] Jan 17 20:34:28 host sshd[22670]: pam_unix(sshd:auth): check pass; user unknown Jan 17 20:34:28 host sshd[22670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 17 20:34:30 host sshd[22670]: Failed password for invalid user odroid from 195.226.194.142 port 41410 ssh2 Jan 17 20:34:30 host sshd[22670]: Received disconnect from 195.226.194.142 port 41410:11: Bye Bye [preauth] Jan 17 20:34:30 host sshd[22670]: Disconnected from 195.226.194.142 port 41410 [preauth] Jan 17 21:03:40 host sshd[27213]: Did not receive identification string from 205.210.31.25 port 56284 Jan 17 21:12:13 host sshd[28276]: Invalid user admin from 222.114.154.132 port 34590 Jan 17 21:12:13 host sshd[28276]: input_userauth_request: invalid user admin [preauth] Jan 17 21:12:13 host sshd[28276]: pam_unix(sshd:auth): check pass; user unknown Jan 17 21:12:13 host sshd[28276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.114.154.132 Jan 17 21:12:15 host sshd[28276]: Failed password for invalid user admin from 222.114.154.132 port 34590 ssh2 Jan 17 21:12:23 host sshd[28276]: Connection closed by 222.114.154.132 port 34590 [preauth] Jan 17 21:15:22 host sshd[28761]: Invalid user nginx from 118.174.109.65 port 39158 Jan 17 21:15:22 host sshd[28761]: input_userauth_request: invalid user nginx [preauth] Jan 17 21:15:22 host sshd[28761]: pam_unix(sshd:auth): check pass; user unknown Jan 17 21:15:22 host sshd[28761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.109.65 Jan 17 21:15:23 host sshd[28761]: Failed password for invalid user nginx from 118.174.109.65 port 39158 ssh2 Jan 17 21:15:25 host sshd[28761]: pam_unix(sshd:auth): check pass; user unknown Jan 17 21:15:27 host sshd[28761]: Failed password for invalid user nginx from 118.174.109.65 port 39158 ssh2 Jan 17 21:15:28 host sshd[28761]: pam_unix(sshd:auth): check pass; user unknown Jan 17 21:15:30 host sshd[28761]: Failed password for invalid user nginx from 118.174.109.65 port 39158 ssh2 Jan 17 21:15:31 host sshd[28761]: Connection reset by 118.174.109.65 port 39158 [preauth] Jan 17 21:15:31 host sshd[28761]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.109.65 Jan 17 21:17:06 host sshd[28942]: Invalid user pi from 147.53.204.69 port 49098 Jan 17 21:17:06 host sshd[28942]: input_userauth_request: invalid user pi [preauth] Jan 17 21:17:06 host sshd[28942]: pam_unix(sshd:auth): check pass; user unknown Jan 17 21:17:06 host sshd[28942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.53.204.69 Jan 17 21:17:08 host sshd[28942]: Failed password for invalid user pi from 147.53.204.69 port 49098 ssh2 Jan 17 21:17:08 host sshd[28942]: pam_unix(sshd:auth): check pass; user unknown Jan 17 21:17:10 host sshd[28942]: Failed password for invalid user pi from 147.53.204.69 port 49098 ssh2 Jan 17 21:17:11 host sshd[28942]: pam_unix(sshd:auth): check pass; user unknown Jan 17 21:17:13 host sshd[28942]: Failed password for invalid user pi from 147.53.204.69 port 49098 ssh2 Jan 17 21:17:14 host sshd[28942]: pam_unix(sshd:auth): check pass; user unknown Jan 17 21:17:15 host sshd[28942]: Failed password for invalid user pi from 147.53.204.69 port 49098 ssh2 Jan 17 21:17:16 host sshd[28942]: Connection reset by 147.53.204.69 port 49098 [preauth] Jan 17 21:17:16 host sshd[28942]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.53.204.69 Jan 17 21:17:16 host sshd[28942]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 17 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 21:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 21:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=ugotscom user-6=wwwpmcresource user-7=dartsimp user-8=a2zgroup user-9=laundryboniface user-10=wwwkaretakers user-11=cochintaxi user-12=gifterman user-13=palco123 user-14=kottayamcalldriv user-15=phmetals user-16=wwwnexidigital user-17=mrsclean user-18=bonifacegroup user-19=wwwevmhonda user-20=wwwletsstalkfood user-21=straightcurve user-22=vfmassets user-23=wwwtestugo user-24=shalinijames user-25=pmcresources user-26=remysagr user-27=disposeat user-28=wwwkmaorg user-29=woodpeck user-30=wwwkapin feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 21:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 21:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 21:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9esMQj6HyPwblzMM.~ Jan 17 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9esMQj6HyPwblzMM.~' Jan 17 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-9esMQj6HyPwblzMM.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 21:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 21:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 21:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 21:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 21:35:07 host sshd[31883]: Invalid user default from 195.226.194.142 port 35090 Jan 17 21:35:07 host sshd[31883]: input_userauth_request: invalid user default [preauth] Jan 17 21:35:07 host sshd[31883]: pam_unix(sshd:auth): check pass; user unknown Jan 17 21:35:07 host sshd[31883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 17 21:35:09 host sshd[31883]: Failed password for invalid user default from 195.226.194.142 port 35090 ssh2 Jan 17 21:35:09 host sshd[31883]: Received disconnect from 195.226.194.142 port 35090:11: Bye Bye [preauth] Jan 17 21:35:09 host sshd[31883]: Disconnected from 195.226.194.142 port 35090 [preauth] Jan 17 21:36:42 host sshd[32147]: Invalid user norman from 107.189.30.59 port 41780 Jan 17 21:36:42 host sshd[32147]: input_userauth_request: invalid user norman [preauth] Jan 17 21:36:42 host sshd[32147]: pam_unix(sshd:auth): check pass; user unknown Jan 17 21:36:42 host sshd[32147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 17 21:36:44 host sshd[32147]: Failed password for invalid user norman from 107.189.30.59 port 41780 ssh2 Jan 17 21:36:45 host sshd[32147]: Connection closed by 107.189.30.59 port 41780 [preauth] Jan 17 21:43:41 host sshd[587]: User sshd from 194.169.175.102 not allowed because not listed in AllowUsers Jan 17 21:43:41 host sshd[587]: input_userauth_request: invalid user sshd [preauth] Jan 17 21:43:41 host unix_chkpwd[590]: password check failed for user (sshd) Jan 17 21:43:41 host sshd[587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=sshd Jan 17 21:43:41 host sshd[587]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sshd" Jan 17 21:43:43 host sshd[587]: Failed password for invalid user sshd from 194.169.175.102 port 61192 ssh2 Jan 17 21:43:43 host sshd[587]: Received disconnect from 194.169.175.102 port 61192:11: Client disconnecting normally [preauth] Jan 17 21:43:43 host sshd[587]: Disconnected from 194.169.175.102 port 61192 [preauth] Jan 17 21:46:08 host sshd[931]: User root from 31.165.41.196 not allowed because not listed in AllowUsers Jan 17 21:46:08 host sshd[931]: input_userauth_request: invalid user root [preauth] Jan 17 21:46:08 host unix_chkpwd[935]: password check failed for user (root) Jan 17 21:46:08 host sshd[931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.165.41.196 user=root Jan 17 21:46:08 host sshd[931]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 21:46:10 host sshd[931]: Failed password for invalid user root from 31.165.41.196 port 52061 ssh2 Jan 17 21:46:10 host unix_chkpwd[940]: password check failed for user (root) Jan 17 21:46:10 host sshd[931]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 21:46:12 host sshd[931]: Failed password for invalid user root from 31.165.41.196 port 52061 ssh2 Jan 17 21:47:48 host sshd[1128]: Invalid user admin from 119.196.240.38 port 60884 Jan 17 21:47:48 host sshd[1128]: input_userauth_request: invalid user admin [preauth] Jan 17 21:47:48 host sshd[1128]: pam_unix(sshd:auth): check pass; user unknown Jan 17 21:47:48 host sshd[1128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.196.240.38 Jan 17 21:47:49 host sshd[1128]: Failed password for invalid user admin from 119.196.240.38 port 60884 ssh2 Jan 17 21:47:50 host sshd[1128]: Failed password for invalid user admin from 119.196.240.38 port 60884 ssh2 Jan 17 21:47:51 host sshd[1128]: pam_unix(sshd:auth): check pass; user unknown Jan 17 21:47:53 host sshd[1128]: Failed password for invalid user admin from 119.196.240.38 port 60884 ssh2 Jan 17 21:47:53 host sshd[1128]: pam_unix(sshd:auth): check pass; user unknown Jan 17 21:47:55 host sshd[1128]: Failed password for invalid user admin from 119.196.240.38 port 60884 ssh2 Jan 17 21:47:56 host sshd[1128]: Connection reset by 119.196.240.38 port 60884 [preauth] Jan 17 21:47:56 host sshd[1128]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.196.240.38 Jan 17 21:50:50 host sshd[1648]: Invalid user admin from 125.229.3.16 port 44857 Jan 17 21:50:50 host sshd[1648]: input_userauth_request: invalid user admin [preauth] Jan 17 21:50:50 host sshd[1648]: pam_unix(sshd:auth): check pass; user unknown Jan 17 21:50:50 host sshd[1648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.3.16 Jan 17 21:50:52 host sshd[1648]: Failed password for invalid user admin from 125.229.3.16 port 44857 ssh2 Jan 17 21:50:53 host sshd[1648]: Connection reset by 125.229.3.16 port 44857 [preauth] Jan 17 21:59:24 host sshd[2853]: User root from 122.117.22.234 not allowed because not listed in AllowUsers Jan 17 21:59:24 host sshd[2853]: input_userauth_request: invalid user root [preauth] Jan 17 21:59:24 host unix_chkpwd[2858]: password check failed for user (root) Jan 17 21:59:24 host sshd[2853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.22.234 user=root Jan 17 21:59:24 host sshd[2853]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 21:59:26 host sshd[2853]: Failed password for invalid user root from 122.117.22.234 port 51610 ssh2 Jan 17 21:59:27 host unix_chkpwd[2864]: password check failed for user (root) Jan 17 21:59:27 host sshd[2853]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 21:59:29 host sshd[2853]: Failed password for invalid user root from 122.117.22.234 port 51610 ssh2 Jan 17 21:59:30 host unix_chkpwd[2888]: password check failed for user (root) Jan 17 21:59:30 host sshd[2853]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 21:59:32 host sshd[2853]: Failed password for invalid user root from 122.117.22.234 port 51610 ssh2 Jan 17 21:59:33 host unix_chkpwd[2894]: password check failed for user (root) Jan 17 21:59:33 host sshd[2853]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 21:59:35 host sshd[2853]: Failed password for invalid user root from 122.117.22.234 port 51610 ssh2 Jan 17 22:01:36 host sshd[3192]: Invalid user daniel from 200.29.111.182 port 59392 Jan 17 22:01:36 host sshd[3192]: input_userauth_request: invalid user daniel [preauth] Jan 17 22:01:36 host sshd[3192]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:01:36 host sshd[3192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.111.182 Jan 17 22:01:39 host sshd[3192]: Failed password for invalid user daniel from 200.29.111.182 port 59392 ssh2 Jan 17 22:01:39 host sshd[3192]: Received disconnect from 200.29.111.182 port 59392:11: Bye Bye [preauth] Jan 17 22:01:39 host sshd[3192]: Disconnected from 200.29.111.182 port 59392 [preauth] Jan 17 22:02:47 host sshd[3313]: User root from 190.56.224.166 not allowed because not listed in AllowUsers Jan 17 22:02:47 host sshd[3313]: input_userauth_request: invalid user root [preauth] Jan 17 22:02:47 host unix_chkpwd[3316]: password check failed for user (root) Jan 17 22:02:47 host sshd[3313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.56.224.166 user=root Jan 17 22:02:47 host sshd[3313]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 22:02:48 host sshd[3313]: Failed password for invalid user root from 190.56.224.166 port 37988 ssh2 Jan 17 22:02:48 host sshd[3313]: Received disconnect from 190.56.224.166 port 37988:11: Bye Bye [preauth] Jan 17 22:02:48 host sshd[3313]: Disconnected from 190.56.224.166 port 37988 [preauth] Jan 17 22:03:25 host sshd[3390]: User root from 156.236.69.112 not allowed because not listed in AllowUsers Jan 17 22:03:25 host sshd[3390]: input_userauth_request: invalid user root [preauth] Jan 17 22:03:25 host unix_chkpwd[3393]: password check failed for user (root) Jan 17 22:03:25 host sshd[3390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.69.112 user=root Jan 17 22:03:25 host sshd[3390]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 22:03:27 host sshd[3390]: Failed password for invalid user root from 156.236.69.112 port 49920 ssh2 Jan 17 22:03:28 host sshd[3390]: Received disconnect from 156.236.69.112 port 49920:11: Bye Bye [preauth] Jan 17 22:03:28 host sshd[3390]: Disconnected from 156.236.69.112 port 49920 [preauth] Jan 17 22:03:38 host sshd[3427]: User root from 51.89.164.205 not allowed because not listed in AllowUsers Jan 17 22:03:38 host sshd[3427]: input_userauth_request: invalid user root [preauth] Jan 17 22:03:38 host unix_chkpwd[3429]: password check failed for user (root) Jan 17 22:03:38 host sshd[3427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.164.205 user=root Jan 17 22:03:38 host sshd[3427]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 22:03:40 host sshd[3427]: Failed password for invalid user root from 51.89.164.205 port 47942 ssh2 Jan 17 22:03:41 host sshd[3427]: Received disconnect from 51.89.164.205 port 47942:11: Bye Bye [preauth] Jan 17 22:03:41 host sshd[3427]: Disconnected from 51.89.164.205 port 47942 [preauth] Jan 17 22:05:14 host sshd[3729]: User root from 195.226.194.142 not allowed because not listed in AllowUsers Jan 17 22:05:14 host sshd[3729]: input_userauth_request: invalid user root [preauth] Jan 17 22:05:14 host unix_chkpwd[3732]: password check failed for user (root) Jan 17 22:05:14 host sshd[3729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 user=root Jan 17 22:05:14 host sshd[3729]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 22:05:16 host sshd[3729]: Failed password for invalid user root from 195.226.194.142 port 32678 ssh2 Jan 17 22:05:16 host sshd[3729]: Received disconnect from 195.226.194.142 port 32678:11: Bye Bye [preauth] Jan 17 22:05:16 host sshd[3729]: Disconnected from 195.226.194.142 port 32678 [preauth] Jan 17 22:07:48 host sshd[4070]: Invalid user afa from 51.89.164.205 port 39082 Jan 17 22:07:48 host sshd[4070]: input_userauth_request: invalid user afa [preauth] Jan 17 22:07:48 host sshd[4070]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:07:48 host sshd[4070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.164.205 Jan 17 22:07:50 host sshd[4070]: Failed password for invalid user afa from 51.89.164.205 port 39082 ssh2 Jan 17 22:07:50 host sshd[4070]: Received disconnect from 51.89.164.205 port 39082:11: Bye Bye [preauth] Jan 17 22:07:50 host sshd[4070]: Disconnected from 51.89.164.205 port 39082 [preauth] Jan 17 22:08:02 host sshd[4122]: Invalid user fq from 194.110.203.109 port 57146 Jan 17 22:08:02 host sshd[4122]: input_userauth_request: invalid user fq [preauth] Jan 17 22:08:02 host sshd[4122]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:08:02 host sshd[4122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 22:08:04 host sshd[4122]: Failed password for invalid user fq from 194.110.203.109 port 57146 ssh2 Jan 17 22:08:08 host sshd[4122]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:08:10 host sshd[4122]: Failed password for invalid user fq from 194.110.203.109 port 57146 ssh2 Jan 17 22:08:14 host sshd[4122]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:08:16 host sshd[4122]: Failed password for invalid user fq from 194.110.203.109 port 57146 ssh2 Jan 17 22:08:19 host sshd[4122]: Connection closed by 194.110.203.109 port 57146 [preauth] Jan 17 22:08:19 host sshd[4122]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 22:08:23 host sshd[4153]: Invalid user user1 from 190.56.224.166 port 34434 Jan 17 22:08:23 host sshd[4153]: input_userauth_request: invalid user user1 [preauth] Jan 17 22:08:23 host sshd[4153]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:08:23 host sshd[4153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.56.224.166 Jan 17 22:08:25 host sshd[4153]: Failed password for invalid user user1 from 190.56.224.166 port 34434 ssh2 Jan 17 22:08:25 host sshd[4153]: Received disconnect from 190.56.224.166 port 34434:11: Bye Bye [preauth] Jan 17 22:08:25 host sshd[4153]: Disconnected from 190.56.224.166 port 34434 [preauth] Jan 17 22:08:30 host sshd[4193]: User root from 200.29.111.182 not allowed because not listed in AllowUsers Jan 17 22:08:30 host sshd[4193]: input_userauth_request: invalid user root [preauth] Jan 17 22:08:30 host unix_chkpwd[4217]: password check failed for user (root) Jan 17 22:08:30 host sshd[4193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.111.182 user=root Jan 17 22:08:30 host sshd[4193]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 22:08:32 host sshd[4193]: Failed password for invalid user root from 200.29.111.182 port 51404 ssh2 Jan 17 22:08:32 host sshd[4193]: Received disconnect from 200.29.111.182 port 51404:11: Bye Bye [preauth] Jan 17 22:08:32 host sshd[4193]: Disconnected from 200.29.111.182 port 51404 [preauth] Jan 17 22:08:39 host sshd[4256]: User root from 156.236.69.112 not allowed because not listed in AllowUsers Jan 17 22:08:39 host sshd[4256]: input_userauth_request: invalid user root [preauth] Jan 17 22:08:39 host unix_chkpwd[4259]: password check failed for user (root) Jan 17 22:08:39 host sshd[4256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.69.112 user=root Jan 17 22:08:39 host sshd[4256]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 22:08:41 host sshd[4256]: Failed password for invalid user root from 156.236.69.112 port 42104 ssh2 Jan 17 22:09:35 host sshd[4390]: Invalid user admin from 218.173.99.94 port 39805 Jan 17 22:09:35 host sshd[4390]: input_userauth_request: invalid user admin [preauth] Jan 17 22:09:35 host sshd[4390]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:09:35 host sshd[4390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.173.99.94 Jan 17 22:09:37 host sshd[4390]: Failed password for invalid user admin from 218.173.99.94 port 39805 ssh2 Jan 17 22:09:37 host sshd[4390]: Failed password for invalid user admin from 218.173.99.94 port 39805 ssh2 Jan 17 22:09:38 host sshd[4390]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:09:41 host sshd[4390]: Failed password for invalid user admin from 218.173.99.94 port 39805 ssh2 Jan 17 22:09:43 host sshd[4390]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:09:45 host sshd[4390]: Failed password for invalid user admin from 218.173.99.94 port 39805 ssh2 Jan 17 22:09:46 host sshd[4390]: Connection reset by 218.173.99.94 port 39805 [preauth] Jan 17 22:09:46 host sshd[4390]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.173.99.94 Jan 17 22:10:43 host sshd[4644]: Invalid user admin from 121.153.39.114 port 45628 Jan 17 22:10:43 host sshd[4644]: input_userauth_request: invalid user admin [preauth] Jan 17 22:10:43 host sshd[4644]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:10:43 host sshd[4644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.153.39.114 Jan 17 22:10:45 host sshd[4644]: Failed password for invalid user admin from 121.153.39.114 port 45628 ssh2 Jan 17 22:10:45 host sshd[4644]: Connection closed by 121.153.39.114 port 45628 [preauth] Jan 17 22:10:46 host sshd[4652]: Invalid user admin from 121.153.39.114 port 45626 Jan 17 22:10:46 host sshd[4652]: input_userauth_request: invalid user admin [preauth] Jan 17 22:10:46 host sshd[4652]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:10:46 host sshd[4652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.153.39.114 Jan 17 22:10:48 host sshd[4652]: Failed password for invalid user admin from 121.153.39.114 port 45626 ssh2 Jan 17 22:10:48 host sshd[4652]: Failed password for invalid user admin from 121.153.39.114 port 45626 ssh2 Jan 17 22:10:49 host sshd[4652]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:10:52 host sshd[4652]: Failed password for invalid user admin from 121.153.39.114 port 45626 ssh2 Jan 17 22:11:03 host sshd[4733]: User mysql from 95.165.26.27 not allowed because not listed in AllowUsers Jan 17 22:11:03 host sshd[4733]: input_userauth_request: invalid user mysql [preauth] Jan 17 22:11:03 host unix_chkpwd[4736]: password check failed for user (mysql) Jan 17 22:11:03 host sshd[4733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.165.26.27 user=mysql Jan 17 22:11:03 host sshd[4733]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 17 22:11:05 host sshd[4733]: Failed password for invalid user mysql from 95.165.26.27 port 60462 ssh2 Jan 17 22:11:05 host sshd[4733]: Received disconnect from 95.165.26.27 port 60462:11: Bye Bye [preauth] Jan 17 22:11:05 host sshd[4733]: Disconnected from 95.165.26.27 port 60462 [preauth] Jan 17 22:11:07 host sshd[4740]: User root from 82.65.23.62 not allowed because not listed in AllowUsers Jan 17 22:11:07 host sshd[4740]: input_userauth_request: invalid user root [preauth] Jan 17 22:11:07 host unix_chkpwd[4744]: password check failed for user (root) Jan 17 22:11:07 host sshd[4740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.65.23.62 user=root Jan 17 22:11:07 host sshd[4740]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 22:11:09 host sshd[4740]: Failed password for invalid user root from 82.65.23.62 port 41044 ssh2 Jan 17 22:11:09 host sshd[4740]: Received disconnect from 82.65.23.62 port 41044:11: Bye Bye [preauth] Jan 17 22:11:09 host sshd[4740]: Disconnected from 82.65.23.62 port 41044 [preauth] Jan 17 22:11:16 host sshd[4755]: Invalid user db2inst1 from 91.82.126.142 port 56036 Jan 17 22:11:16 host sshd[4755]: input_userauth_request: invalid user db2inst1 [preauth] Jan 17 22:11:16 host sshd[4755]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:11:16 host sshd[4755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.82.126.142 Jan 17 22:11:18 host sshd[4755]: Failed password for invalid user db2inst1 from 91.82.126.142 port 56036 ssh2 Jan 17 22:11:18 host sshd[4755]: Received disconnect from 91.82.126.142 port 56036:11: Bye Bye [preauth] Jan 17 22:11:18 host sshd[4755]: Disconnected from 91.82.126.142 port 56036 [preauth] Jan 17 22:13:29 host sshd[5055]: Invalid user test from 45.161.176.1 port 41454 Jan 17 22:13:29 host sshd[5055]: input_userauth_request: invalid user test [preauth] Jan 17 22:13:29 host sshd[5055]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:13:29 host sshd[5055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.161.176.1 Jan 17 22:13:31 host sshd[5055]: Failed password for invalid user test from 45.161.176.1 port 41454 ssh2 Jan 17 22:13:31 host sshd[5055]: Received disconnect from 45.161.176.1 port 41454:11: Bye Bye [preauth] Jan 17 22:13:31 host sshd[5055]: Disconnected from 45.161.176.1 port 41454 [preauth] Jan 17 22:15:02 host sshd[5292]: Invalid user rancher from 172.96.222.127 port 45816 Jan 17 22:15:02 host sshd[5292]: input_userauth_request: invalid user rancher [preauth] Jan 17 22:15:02 host sshd[5292]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:15:02 host sshd[5292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.96.222.127 Jan 17 22:15:05 host sshd[5292]: Failed password for invalid user rancher from 172.96.222.127 port 45816 ssh2 Jan 17 22:15:05 host sshd[5292]: Received disconnect from 172.96.222.127 port 45816:11: Bye Bye [preauth] Jan 17 22:15:05 host sshd[5292]: Disconnected from 172.96.222.127 port 45816 [preauth] Jan 17 22:16:17 host sshd[5522]: User root from 89.234.212.55 not allowed because not listed in AllowUsers Jan 17 22:16:17 host sshd[5522]: input_userauth_request: invalid user root [preauth] Jan 17 22:16:17 host unix_chkpwd[5525]: password check failed for user (root) Jan 17 22:16:17 host sshd[5522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.234.212.55 user=root Jan 17 22:16:17 host sshd[5522]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 22:16:19 host sshd[5522]: Failed password for invalid user root from 89.234.212.55 port 41009 ssh2 Jan 17 22:16:20 host unix_chkpwd[5528]: password check failed for user (root) Jan 17 22:16:20 host sshd[5522]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 22:16:22 host sshd[5522]: Failed password for invalid user root from 89.234.212.55 port 41009 ssh2 Jan 17 22:16:23 host sshd[5522]: Connection reset by 89.234.212.55 port 41009 [preauth] Jan 17 22:16:23 host sshd[5522]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.234.212.55 user=root Jan 17 22:16:43 host sshd[5574]: Invalid user testuser from 91.82.126.142 port 49419 Jan 17 22:16:43 host sshd[5574]: input_userauth_request: invalid user testuser [preauth] Jan 17 22:16:43 host sshd[5574]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:16:43 host sshd[5574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.82.126.142 Jan 17 22:16:45 host sshd[5574]: Failed password for invalid user testuser from 91.82.126.142 port 49419 ssh2 Jan 17 22:16:45 host sshd[5574]: Received disconnect from 91.82.126.142 port 49419:11: Bye Bye [preauth] Jan 17 22:16:45 host sshd[5574]: Disconnected from 91.82.126.142 port 49419 [preauth] Jan 17 22:17:35 host sshd[5663]: User root from 82.65.23.62 not allowed because not listed in AllowUsers Jan 17 22:17:35 host sshd[5663]: input_userauth_request: invalid user root [preauth] Jan 17 22:17:35 host unix_chkpwd[5666]: password check failed for user (root) Jan 17 22:17:35 host sshd[5663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.65.23.62 user=root Jan 17 22:17:35 host sshd[5663]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 22:17:36 host sshd[5663]: Failed password for invalid user root from 82.65.23.62 port 42402 ssh2 Jan 17 22:17:43 host sshd[5701]: Invalid user administrator from 45.161.176.1 port 60628 Jan 17 22:17:43 host sshd[5701]: input_userauth_request: invalid user administrator [preauth] Jan 17 22:17:43 host sshd[5701]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:17:43 host sshd[5701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.161.176.1 Jan 17 22:17:44 host sshd[5701]: Failed password for invalid user administrator from 45.161.176.1 port 60628 ssh2 Jan 17 22:17:45 host sshd[5701]: Received disconnect from 45.161.176.1 port 60628:11: Bye Bye [preauth] Jan 17 22:17:45 host sshd[5701]: Disconnected from 45.161.176.1 port 60628 [preauth] Jan 17 22:17:56 host sshd[5723]: User root from 91.82.126.142 not allowed because not listed in AllowUsers Jan 17 22:17:56 host sshd[5723]: input_userauth_request: invalid user root [preauth] Jan 17 22:17:56 host unix_chkpwd[5732]: password check failed for user (root) Jan 17 22:17:56 host sshd[5723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.82.126.142 user=root Jan 17 22:17:56 host sshd[5723]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 22:17:58 host sshd[5723]: Failed password for invalid user root from 91.82.126.142 port 64199 ssh2 Jan 17 22:17:58 host sshd[5723]: Received disconnect from 91.82.126.142 port 64199:11: Bye Bye [preauth] Jan 17 22:17:58 host sshd[5723]: Disconnected from 91.82.126.142 port 64199 [preauth] Jan 17 22:19:06 host sshd[5886]: Invalid user alex from 45.161.176.1 port 59854 Jan 17 22:19:06 host sshd[5886]: input_userauth_request: invalid user alex [preauth] Jan 17 22:19:06 host sshd[5886]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:19:06 host sshd[5886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.161.176.1 Jan 17 22:19:08 host sshd[5886]: Failed password for invalid user alex from 45.161.176.1 port 59854 ssh2 Jan 17 22:19:09 host sshd[5886]: Received disconnect from 45.161.176.1 port 59854:11: Bye Bye [preauth] Jan 17 22:19:09 host sshd[5886]: Disconnected from 45.161.176.1 port 59854 [preauth] Jan 17 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=keralaholi user-3=wwwresourcehunte user-4=wwwrmswll user-5=ugotscom user-6=wwwpmcresource user-7=a2zgroup user-8=dartsimp user-9=laundryboniface user-10=cochintaxi user-11=wwwkaretakers user-12=palco123 user-13=gifterman user-14=phmetals user-15=kottayamcalldriv user-16=mrsclean user-17=wwwnexidigital user-18=bonifacegroup user-19=wwwevmhonda user-20=wwwletsstalkfood user-21=straightcurve user-22=vfmassets user-23=shalinijames user-24=wwwtestugo user-25=pmcresources user-26=disposeat user-27=remysagr user-28=wwwkmaorg user-29=wwwkapin user-30=woodpeck feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 22:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wAspswAZ1F6siLyJ.~ Jan 17 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wAspswAZ1F6siLyJ.~' Jan 17 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-wAspswAZ1F6siLyJ.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 22:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 22:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 22:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 22:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 22:21:16 host sshd[6437]: Invalid user controlm from 172.96.222.127 port 43242 Jan 17 22:21:16 host sshd[6437]: input_userauth_request: invalid user controlm [preauth] Jan 17 22:21:16 host sshd[6437]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:21:16 host sshd[6437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.96.222.127 Jan 17 22:21:18 host sshd[6437]: Failed password for invalid user controlm from 172.96.222.127 port 43242 ssh2 Jan 17 22:21:18 host sshd[6437]: Received disconnect from 172.96.222.127 port 43242:11: Bye Bye [preauth] Jan 17 22:21:18 host sshd[6437]: Disconnected from 172.96.222.127 port 43242 [preauth] Jan 17 22:21:36 host sshd[6540]: Invalid user sysadmin from 95.165.26.27 port 34134 Jan 17 22:21:36 host sshd[6540]: input_userauth_request: invalid user sysadmin [preauth] Jan 17 22:21:36 host sshd[6540]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:21:36 host sshd[6540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.165.26.27 Jan 17 22:21:38 host sshd[6540]: Failed password for invalid user sysadmin from 95.165.26.27 port 34134 ssh2 Jan 17 22:21:38 host sshd[6540]: Received disconnect from 95.165.26.27 port 34134:11: Bye Bye [preauth] Jan 17 22:21:38 host sshd[6540]: Disconnected from 95.165.26.27 port 34134 [preauth] Jan 17 22:23:50 host sshd[6803]: Invalid user bitnami from 172.96.222.127 port 37364 Jan 17 22:23:50 host sshd[6803]: input_userauth_request: invalid user bitnami [preauth] Jan 17 22:23:50 host sshd[6803]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:23:50 host sshd[6803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.96.222.127 Jan 17 22:23:52 host sshd[6803]: Failed password for invalid user bitnami from 172.96.222.127 port 37364 ssh2 Jan 17 22:28:14 host sshd[7408]: Invalid user ec2-user from 121.130.238.187 port 62503 Jan 17 22:28:14 host sshd[7408]: input_userauth_request: invalid user ec2-user [preauth] Jan 17 22:28:14 host sshd[7408]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:28:14 host sshd[7408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.130.238.187 Jan 17 22:28:16 host sshd[7408]: Failed password for invalid user ec2-user from 121.130.238.187 port 62503 ssh2 Jan 17 22:28:16 host sshd[7408]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:28:18 host sshd[7408]: Failed password for invalid user ec2-user from 121.130.238.187 port 62503 ssh2 Jan 17 22:28:20 host sshd[7408]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:28:22 host sshd[7408]: Failed password for invalid user ec2-user from 121.130.238.187 port 62503 ssh2 Jan 17 22:28:22 host sshd[7408]: Failed password for invalid user ec2-user from 121.130.238.187 port 62503 ssh2 Jan 17 22:28:23 host sshd[7408]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:28:25 host sshd[7408]: Failed password for invalid user ec2-user from 121.130.238.187 port 62503 ssh2 Jan 17 22:28:25 host sshd[7408]: Connection reset by 121.130.238.187 port 62503 [preauth] Jan 17 22:28:25 host sshd[7408]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.130.238.187 Jan 17 22:28:25 host sshd[7408]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 17 22:28:51 host sshd[7505]: User root from 114.84.194.28 not allowed because not listed in AllowUsers Jan 17 22:28:51 host sshd[7505]: input_userauth_request: invalid user root [preauth] Jan 17 22:28:51 host unix_chkpwd[7509]: password check failed for user (root) Jan 17 22:28:51 host sshd[7505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.84.194.28 user=root Jan 17 22:28:51 host sshd[7505]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 22:28:53 host sshd[7505]: Failed password for invalid user root from 114.84.194.28 port 33260 ssh2 Jan 17 22:28:53 host sshd[7505]: Received disconnect from 114.84.194.28 port 33260:11: Bye Bye [preauth] Jan 17 22:28:53 host sshd[7505]: Disconnected from 114.84.194.28 port 33260 [preauth] Jan 17 22:28:55 host sshd[7511]: User root from 114.84.194.28 not allowed because not listed in AllowUsers Jan 17 22:28:55 host sshd[7511]: input_userauth_request: invalid user root [preauth] Jan 17 22:28:55 host unix_chkpwd[7515]: password check failed for user (root) Jan 17 22:28:55 host sshd[7511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.84.194.28 user=root Jan 17 22:28:55 host sshd[7511]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 22:28:57 host sshd[7511]: Failed password for invalid user root from 114.84.194.28 port 33394 ssh2 Jan 17 22:29:52 host sshd[7634]: Invalid user dlxuser from 119.201.86.171 port 61900 Jan 17 22:29:52 host sshd[7634]: input_userauth_request: invalid user dlxuser [preauth] Jan 17 22:29:52 host sshd[7634]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:29:52 host sshd[7634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.201.86.171 Jan 17 22:29:54 host sshd[7634]: Failed password for invalid user dlxuser from 119.201.86.171 port 61900 ssh2 Jan 17 22:29:54 host sshd[7634]: Connection reset by 119.201.86.171 port 61900 [preauth] Jan 17 22:33:44 host sshd[8217]: Invalid user zyfwp from 220.122.210.2 port 50846 Jan 17 22:33:44 host sshd[8217]: input_userauth_request: invalid user zyfwp [preauth] Jan 17 22:33:44 host sshd[8217]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:33:44 host sshd[8217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.122.210.2 Jan 17 22:33:46 host sshd[8217]: Failed password for invalid user zyfwp from 220.122.210.2 port 50846 ssh2 Jan 17 22:33:47 host sshd[8217]: Connection reset by 220.122.210.2 port 50846 [preauth] Jan 17 22:35:08 host sshd[8394]: Invalid user dmdba from 114.33.107.41 port 48458 Jan 17 22:35:08 host sshd[8394]: input_userauth_request: invalid user dmdba [preauth] Jan 17 22:35:08 host sshd[8394]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:35:08 host sshd[8394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.107.41 Jan 17 22:35:09 host sshd[8394]: Failed password for invalid user dmdba from 114.33.107.41 port 48458 ssh2 Jan 17 22:35:09 host sshd[8394]: Failed password for invalid user dmdba from 114.33.107.41 port 48458 ssh2 Jan 17 22:35:10 host sshd[8394]: Connection closed by 114.33.107.41 port 48458 [preauth] Jan 17 22:37:50 host sshd[8841]: Connection reset by 36.237.104.1 port 44110 [preauth] Jan 17 22:57:00 host sshd[11426]: Invalid user admin from 64.179.203.199 port 52547 Jan 17 22:57:00 host sshd[11426]: input_userauth_request: invalid user admin [preauth] Jan 17 22:57:00 host sshd[11426]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:57:00 host sshd[11426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.179.203.199 Jan 17 22:57:02 host sshd[11426]: Failed password for invalid user admin from 64.179.203.199 port 52547 ssh2 Jan 17 22:57:03 host sshd[11426]: Failed password for invalid user admin from 64.179.203.199 port 52547 ssh2 Jan 17 22:57:04 host sshd[11426]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:57:06 host sshd[11426]: Failed password for invalid user admin from 64.179.203.199 port 52547 ssh2 Jan 17 22:57:07 host sshd[11426]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:57:08 host sshd[11426]: Failed password for invalid user admin from 64.179.203.199 port 52547 ssh2 Jan 17 22:57:09 host sshd[11419]: Invalid user administrator from 189.7.17.61 port 51760 Jan 17 22:57:09 host sshd[11419]: input_userauth_request: invalid user administrator [preauth] Jan 17 22:57:09 host sshd[11419]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:57:09 host sshd[11419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.17.61 Jan 17 22:57:10 host sshd[11426]: pam_unix(sshd:auth): check pass; user unknown Jan 17 22:57:11 host sshd[11426]: Failed password for invalid user admin from 64.179.203.199 port 52547 ssh2 Jan 17 22:57:12 host sshd[11419]: Failed password for invalid user administrator from 189.7.17.61 port 51760 ssh2 Jan 17 22:57:12 host sshd[11426]: Connection reset by 64.179.203.199 port 52547 [preauth] Jan 17 22:57:12 host sshd[11426]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.179.203.199 Jan 17 22:57:12 host sshd[11426]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 17 22:57:13 host sshd[11419]: Received disconnect from 189.7.17.61 port 51760:11: Bye Bye [preauth] Jan 17 22:57:13 host sshd[11419]: Disconnected from 189.7.17.61 port 51760 [preauth] Jan 17 23:12:20 host sshd[13555]: User root from 189.7.17.61 not allowed because not listed in AllowUsers Jan 17 23:12:20 host sshd[13555]: input_userauth_request: invalid user root [preauth] Jan 17 23:12:20 host unix_chkpwd[13560]: password check failed for user (root) Jan 17 23:12:20 host sshd[13555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.17.61 user=root Jan 17 23:12:20 host sshd[13555]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 23:12:22 host sshd[13555]: Failed password for invalid user root from 189.7.17.61 port 34219 ssh2 Jan 17 23:12:23 host sshd[13555]: Received disconnect from 189.7.17.61 port 34219:11: Bye Bye [preauth] Jan 17 23:12:23 host sshd[13555]: Disconnected from 189.7.17.61 port 34219 [preauth] Jan 17 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 17 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=ugotscom user-8=wwwrmswll user-9=wwwresourcehunte user-10=keralaholi user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=wwwkmaorg user-15=disposeat user-16=remysagr user-17=pmcresources user-18=wwwtestugo user-19=shalinijames user-20=vfmassets user-21=straightcurve user-22=wwwletsstalkfood user-23=wwwevmhonda user-24=bonifacegroup user-25=wwwnexidigital user-26=mrsclean user-27=phmetals user-28=kottayamcalldriv user-29=gifterman user-30=palco123 feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 17 23:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 17 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-i1KMMs52HLGbYVAC.~ Jan 17 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-i1KMMs52HLGbYVAC.~' Jan 17 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-i1KMMs52HLGbYVAC.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 17 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 17 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 17 23:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 17 23:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 17 23:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 17 23:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 17 23:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 17 23:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 17 23:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 17 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 17 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 17 23:22:42 host sshd[15286]: User root from 178.62.40.68 not allowed because not listed in AllowUsers Jan 17 23:22:42 host sshd[15286]: input_userauth_request: invalid user root [preauth] Jan 17 23:22:42 host unix_chkpwd[15290]: password check failed for user (root) Jan 17 23:22:42 host sshd[15286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.40.68 user=root Jan 17 23:22:42 host sshd[15286]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 23:22:45 host sshd[15286]: Failed password for invalid user root from 178.62.40.68 port 54940 ssh2 Jan 17 23:22:45 host sshd[15286]: Connection closed by 178.62.40.68 port 54940 [preauth] Jan 17 23:29:51 host sshd[16176]: User root from 178.62.40.68 not allowed because not listed in AllowUsers Jan 17 23:29:51 host sshd[16176]: input_userauth_request: invalid user root [preauth] Jan 17 23:29:51 host unix_chkpwd[16179]: password check failed for user (root) Jan 17 23:29:51 host sshd[16176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.40.68 user=root Jan 17 23:29:51 host sshd[16176]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 23:29:54 host sshd[16176]: Failed password for invalid user root from 178.62.40.68 port 33364 ssh2 Jan 17 23:44:14 host sshd[18407]: Invalid user super from 59.127.37.64 port 45525 Jan 17 23:44:14 host sshd[18407]: input_userauth_request: invalid user super [preauth] Jan 17 23:44:14 host sshd[18407]: pam_unix(sshd:auth): check pass; user unknown Jan 17 23:44:14 host sshd[18407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.37.64 Jan 17 23:44:16 host sshd[18407]: Failed password for invalid user super from 59.127.37.64 port 45525 ssh2 Jan 17 23:44:17 host sshd[18407]: pam_unix(sshd:auth): check pass; user unknown Jan 17 23:44:19 host sshd[18407]: Failed password for invalid user super from 59.127.37.64 port 45525 ssh2 Jan 17 23:44:19 host sshd[18407]: pam_unix(sshd:auth): check pass; user unknown Jan 17 23:44:21 host sshd[18407]: Failed password for invalid user super from 59.127.37.64 port 45525 ssh2 Jan 17 23:44:22 host sshd[18407]: pam_unix(sshd:auth): check pass; user unknown Jan 17 23:44:24 host sshd[18407]: Failed password for invalid user super from 59.127.37.64 port 45525 ssh2 Jan 17 23:44:24 host sshd[18407]: Failed password for invalid user super from 59.127.37.64 port 45525 ssh2 Jan 17 23:44:25 host sshd[18407]: Connection closed by 59.127.37.64 port 45525 [preauth] Jan 17 23:44:25 host sshd[18407]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.37.64 Jan 17 23:44:25 host sshd[18407]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 17 23:47:40 host sshd[18947]: Invalid user admin from 49.171.51.166 port 58295 Jan 17 23:47:40 host sshd[18947]: input_userauth_request: invalid user admin [preauth] Jan 17 23:47:40 host sshd[18947]: pam_unix(sshd:auth): check pass; user unknown Jan 17 23:47:40 host sshd[18947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.171.51.166 Jan 17 23:47:43 host sshd[18947]: Failed password for invalid user admin from 49.171.51.166 port 58295 ssh2 Jan 17 23:47:44 host sshd[18947]: Failed password for invalid user admin from 49.171.51.166 port 58295 ssh2 Jan 17 23:47:44 host sshd[18947]: pam_unix(sshd:auth): check pass; user unknown Jan 17 23:47:46 host sshd[18947]: Failed password for invalid user admin from 49.171.51.166 port 58295 ssh2 Jan 17 23:47:47 host sshd[18947]: pam_unix(sshd:auth): check pass; user unknown Jan 17 23:47:47 host sshd[18955]: Connection reset by 49.174.77.151 port 63961 [preauth] Jan 17 23:47:49 host sshd[18947]: Failed password for invalid user admin from 49.171.51.166 port 58295 ssh2 Jan 17 23:47:49 host sshd[18947]: pam_unix(sshd:auth): check pass; user unknown Jan 17 23:47:51 host sshd[18947]: Failed password for invalid user admin from 49.171.51.166 port 58295 ssh2 Jan 17 23:47:52 host sshd[18947]: pam_unix(sshd:auth): check pass; user unknown Jan 17 23:47:54 host sshd[18947]: Failed password for invalid user admin from 49.171.51.166 port 58295 ssh2 Jan 17 23:47:54 host sshd[18947]: error: maximum authentication attempts exceeded for invalid user admin from 49.171.51.166 port 58295 ssh2 [preauth] Jan 17 23:47:54 host sshd[18947]: Disconnecting: Too many authentication failures [preauth] Jan 17 23:47:54 host sshd[18947]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.171.51.166 Jan 17 23:47:54 host sshd[18947]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 17 23:48:12 host sshd[19021]: User root from 183.62.183.14 not allowed because not listed in AllowUsers Jan 17 23:48:12 host sshd[19021]: input_userauth_request: invalid user root [preauth] Jan 17 23:48:12 host unix_chkpwd[19026]: password check failed for user (root) Jan 17 23:48:12 host sshd[19021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.62.183.14 user=root Jan 17 23:48:12 host sshd[19021]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 23:48:14 host sshd[19021]: Failed password for invalid user root from 183.62.183.14 port 54061 ssh2 Jan 17 23:48:15 host unix_chkpwd[19028]: password check failed for user (root) Jan 17 23:48:15 host sshd[19021]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 23:48:17 host sshd[19021]: Failed password for invalid user root from 183.62.183.14 port 54061 ssh2 Jan 17 23:48:17 host unix_chkpwd[19031]: password check failed for user (root) Jan 17 23:48:17 host sshd[19021]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 23:48:19 host sshd[19021]: Failed password for invalid user root from 183.62.183.14 port 54061 ssh2 Jan 17 23:48:19 host unix_chkpwd[19036]: password check failed for user (root) Jan 17 23:48:19 host sshd[19021]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 23:48:21 host sshd[19021]: Failed password for invalid user root from 183.62.183.14 port 54061 ssh2 Jan 17 23:48:21 host unix_chkpwd[19039]: password check failed for user (root) Jan 17 23:48:21 host sshd[19021]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 23:48:23 host sshd[19021]: Failed password for invalid user root from 183.62.183.14 port 54061 ssh2 Jan 17 23:48:24 host unix_chkpwd[19049]: password check failed for user (root) Jan 17 23:48:24 host sshd[19021]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 17 23:48:26 host sshd[19021]: Failed password for invalid user root from 183.62.183.14 port 54061 ssh2 Jan 17 23:48:26 host sshd[19021]: error: maximum authentication attempts exceeded for invalid user root from 183.62.183.14 port 54061 ssh2 [preauth] Jan 17 23:48:26 host sshd[19021]: Disconnecting: Too many authentication failures [preauth] Jan 17 23:48:26 host sshd[19021]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.62.183.14 user=root Jan 17 23:48:26 host sshd[19021]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 17 23:51:03 host sshd[19393]: Invalid user fr from 194.110.203.109 port 38642 Jan 17 23:51:03 host sshd[19393]: input_userauth_request: invalid user fr [preauth] Jan 17 23:51:03 host sshd[19393]: pam_unix(sshd:auth): check pass; user unknown Jan 17 23:51:03 host sshd[19393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 23:51:05 host sshd[19393]: Failed password for invalid user fr from 194.110.203.109 port 38642 ssh2 Jan 17 23:51:08 host sshd[19393]: pam_unix(sshd:auth): check pass; user unknown Jan 17 23:51:10 host sshd[19393]: Failed password for invalid user fr from 194.110.203.109 port 38642 ssh2 Jan 17 23:51:14 host sshd[19393]: pam_unix(sshd:auth): check pass; user unknown Jan 17 23:51:16 host sshd[19393]: Failed password for invalid user fr from 194.110.203.109 port 38642 ssh2 Jan 17 23:51:19 host sshd[19393]: Connection closed by 194.110.203.109 port 38642 [preauth] Jan 17 23:51:19 host sshd[19393]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 17 23:54:49 host sshd[19928]: Invalid user ubnt from 5.181.80.142 port 59932 Jan 17 23:54:49 host sshd[19928]: input_userauth_request: invalid user ubnt [preauth] Jan 17 23:54:49 host sshd[19928]: pam_unix(sshd:auth): check pass; user unknown Jan 17 23:54:49 host sshd[19928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.181.80.142 Jan 17 23:54:51 host sshd[19928]: Failed password for invalid user ubnt from 5.181.80.142 port 59932 ssh2 Jan 17 23:54:51 host sshd[19928]: Received disconnect from 5.181.80.142 port 59932:11: Bye Bye [preauth] Jan 17 23:54:51 host sshd[19928]: Disconnected from 5.181.80.142 port 59932 [preauth] Jan 17 23:55:02 host sshd[19981]: User mysql from 148.66.132.190 not allowed because not listed in AllowUsers Jan 17 23:55:02 host sshd[19981]: input_userauth_request: invalid user mysql [preauth] Jan 17 23:55:02 host unix_chkpwd[19983]: password check failed for user (mysql) Jan 17 23:55:02 host sshd[19981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190 user=mysql Jan 17 23:55:02 host sshd[19981]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 17 23:55:04 host sshd[19981]: Failed password for invalid user mysql from 148.66.132.190 port 53058 ssh2 Jan 17 23:55:04 host sshd[19981]: Received disconnect from 148.66.132.190 port 53058:11: Bye Bye [preauth] Jan 17 23:55:04 host sshd[19981]: Disconnected from 148.66.132.190 port 53058 [preauth] Jan 18 00:00:33 host sshd[20912]: User root from 59.124.202.193 not allowed because not listed in AllowUsers Jan 18 00:00:33 host sshd[20912]: input_userauth_request: invalid user root [preauth] Jan 18 00:00:33 host unix_chkpwd[20916]: password check failed for user (root) Jan 18 00:00:33 host sshd[20912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.124.202.193 user=root Jan 18 00:00:33 host sshd[20912]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 00:00:35 host sshd[20912]: Failed password for invalid user root from 59.124.202.193 port 60031 ssh2 Jan 18 00:00:37 host unix_chkpwd[20920]: password check failed for user (root) Jan 18 00:00:37 host sshd[20912]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 00:00:39 host sshd[20912]: Failed password for invalid user root from 59.124.202.193 port 60031 ssh2 Jan 18 00:00:40 host unix_chkpwd[20925]: password check failed for user (root) Jan 18 00:00:40 host sshd[20912]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 00:00:41 host sshd[20912]: Failed password for invalid user root from 59.124.202.193 port 60031 ssh2 Jan 18 00:00:42 host unix_chkpwd[20933]: password check failed for user (root) Jan 18 00:00:42 host sshd[20912]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 00:00:44 host sshd[20912]: Failed password for invalid user root from 59.124.202.193 port 60031 ssh2 Jan 18 00:02:49 host sshd[21321]: User root from 148.66.132.190 not allowed because not listed in AllowUsers Jan 18 00:02:49 host sshd[21321]: input_userauth_request: invalid user root [preauth] Jan 18 00:02:49 host unix_chkpwd[21323]: password check failed for user (root) Jan 18 00:02:49 host sshd[21321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190 user=root Jan 18 00:02:49 host sshd[21321]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 00:02:51 host sshd[21321]: Failed password for invalid user root from 148.66.132.190 port 53278 ssh2 Jan 18 00:02:51 host sshd[21321]: Received disconnect from 148.66.132.190 port 53278:11: Bye Bye [preauth] Jan 18 00:02:51 host sshd[21321]: Disconnected from 148.66.132.190 port 53278 [preauth] Jan 18 00:04:18 host sshd[21496]: User root from 148.66.132.190 not allowed because not listed in AllowUsers Jan 18 00:04:18 host sshd[21496]: input_userauth_request: invalid user root [preauth] Jan 18 00:04:18 host unix_chkpwd[21498]: password check failed for user (root) Jan 18 00:04:18 host sshd[21496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.66.132.190 user=root Jan 18 00:04:18 host sshd[21496]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 00:04:21 host sshd[21496]: Failed password for invalid user root from 148.66.132.190 port 47738 ssh2 Jan 18 00:04:21 host sshd[21496]: Received disconnect from 148.66.132.190 port 47738:11: Bye Bye [preauth] Jan 18 00:04:21 host sshd[21496]: Disconnected from 148.66.132.190 port 47738 [preauth] Jan 18 00:06:07 host sshd[21781]: Invalid user support from 122.116.76.100 port 44785 Jan 18 00:06:07 host sshd[21781]: input_userauth_request: invalid user support [preauth] Jan 18 00:06:07 host sshd[21781]: pam_unix(sshd:auth): check pass; user unknown Jan 18 00:06:07 host sshd[21781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.76.100 Jan 18 00:06:09 host sshd[21781]: Failed password for invalid user support from 122.116.76.100 port 44785 ssh2 Jan 18 00:06:10 host sshd[21781]: pam_unix(sshd:auth): check pass; user unknown Jan 18 00:06:11 host sshd[21781]: Failed password for invalid user support from 122.116.76.100 port 44785 ssh2 Jan 18 00:06:12 host sshd[21781]: Connection reset by 122.116.76.100 port 44785 [preauth] Jan 18 00:06:12 host sshd[21781]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.76.100 Jan 18 00:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 00:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 00:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=ugotscom user-8=wwwresourcehunte user-9=keralaholi user-10=wwwrmswll user-11=wwwpmcresource user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=pmcresources user-16=remysagr user-17=disposeat user-18=wwwkmaorg user-19=wwwkapin user-20=woodpeck user-21=kottayamcalldriv user-22=phmetals user-23=palco123 user-24=gifterman user-25=wwwnexidigital user-26=mrsclean user-27=wwwevmhonda user-28=bonifacegroup user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 00:21:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-K4v8iv5Hmuh0izNm.~ Jan 18 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-K4v8iv5Hmuh0izNm.~' Jan 18 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-K4v8iv5Hmuh0izNm.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 00:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 00:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 00:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 00:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 00:24:21 host sshd[26091]: Connection closed by 45.79.181.251 port 32596 [preauth] Jan 18 00:24:24 host sshd[26098]: Connection closed by 45.79.181.251 port 32600 [preauth] Jan 18 00:24:25 host sshd[26108]: Did not receive identification string from 45.79.181.251 port 32602 Jan 18 00:33:49 host sshd[27687]: Invalid user admin from 220.84.234.193 port 59725 Jan 18 00:33:49 host sshd[27687]: input_userauth_request: invalid user admin [preauth] Jan 18 00:33:49 host sshd[27687]: pam_unix(sshd:auth): check pass; user unknown Jan 18 00:33:49 host sshd[27687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.84.234.193 Jan 18 00:33:51 host sshd[27687]: Failed password for invalid user admin from 220.84.234.193 port 59725 ssh2 Jan 18 00:33:52 host sshd[27687]: Connection closed by 220.84.234.193 port 59725 [preauth] Jan 18 00:39:48 host sshd[28634]: Bad protocol version identification '\003' from 92.255.85.183 port 61612 Jan 18 00:56:40 host sshd[31109]: Invalid user zyfwp from 112.168.206.177 port 41274 Jan 18 00:56:40 host sshd[31109]: input_userauth_request: invalid user zyfwp [preauth] Jan 18 00:56:40 host sshd[31109]: pam_unix(sshd:auth): check pass; user unknown Jan 18 00:56:40 host sshd[31109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.168.206.177 Jan 18 00:56:40 host sshd[31112]: Invalid user admin from 121.184.138.195 port 57741 Jan 18 00:56:40 host sshd[31112]: input_userauth_request: invalid user admin [preauth] Jan 18 00:56:40 host sshd[31112]: pam_unix(sshd:auth): check pass; user unknown Jan 18 00:56:40 host sshd[31112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.184.138.195 Jan 18 00:56:41 host sshd[31109]: Failed password for invalid user zyfwp from 112.168.206.177 port 41274 ssh2 Jan 18 00:56:41 host sshd[31112]: Failed password for invalid user admin from 121.184.138.195 port 57741 ssh2 Jan 18 00:56:41 host sshd[31112]: Failed password for invalid user admin from 121.184.138.195 port 57741 ssh2 Jan 18 00:56:41 host sshd[31112]: Connection reset by 121.184.138.195 port 57741 [preauth] Jan 18 00:56:42 host sshd[31109]: pam_unix(sshd:auth): check pass; user unknown Jan 18 00:56:44 host sshd[31109]: Failed password for invalid user zyfwp from 112.168.206.177 port 41274 ssh2 Jan 18 00:56:45 host sshd[31109]: pam_unix(sshd:auth): check pass; user unknown Jan 18 00:56:47 host sshd[31109]: Failed password for invalid user zyfwp from 112.168.206.177 port 41274 ssh2 Jan 18 00:56:48 host sshd[31109]: Connection closed by 112.168.206.177 port 41274 [preauth] Jan 18 00:56:48 host sshd[31109]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.168.206.177 Jan 18 00:58:06 host sshd[31397]: User root from 59.127.142.248 not allowed because not listed in AllowUsers Jan 18 00:58:06 host sshd[31397]: input_userauth_request: invalid user root [preauth] Jan 18 00:58:06 host unix_chkpwd[31401]: password check failed for user (root) Jan 18 00:58:06 host sshd[31397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.142.248 user=root Jan 18 00:58:06 host sshd[31397]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 00:58:08 host sshd[31397]: Failed password for invalid user root from 59.127.142.248 port 60520 ssh2 Jan 18 00:58:09 host unix_chkpwd[31404]: password check failed for user (root) Jan 18 00:58:09 host sshd[31397]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 00:58:11 host sshd[31397]: Failed password for invalid user root from 59.127.142.248 port 60520 ssh2 Jan 18 00:58:12 host unix_chkpwd[31415]: password check failed for user (root) Jan 18 00:58:12 host sshd[31397]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 00:58:14 host sshd[31397]: Failed password for invalid user root from 59.127.142.248 port 60520 ssh2 Jan 18 00:58:14 host unix_chkpwd[31418]: password check failed for user (root) Jan 18 00:58:14 host sshd[31397]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 00:58:17 host sshd[31397]: Failed password for invalid user root from 59.127.142.248 port 60520 ssh2 Jan 18 00:59:06 host sshd[31533]: Invalid user admin from 125.228.161.61 port 41285 Jan 18 00:59:06 host sshd[31533]: input_userauth_request: invalid user admin [preauth] Jan 18 00:59:06 host sshd[31533]: pam_unix(sshd:auth): check pass; user unknown Jan 18 00:59:06 host sshd[31533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.161.61 Jan 18 00:59:08 host sshd[31533]: Failed password for invalid user admin from 125.228.161.61 port 41285 ssh2 Jan 18 00:59:08 host sshd[31533]: Failed password for invalid user admin from 125.228.161.61 port 41285 ssh2 Jan 18 00:59:09 host sshd[31533]: pam_unix(sshd:auth): check pass; user unknown Jan 18 00:59:11 host sshd[31533]: Failed password for invalid user admin from 125.228.161.61 port 41285 ssh2 Jan 18 00:59:12 host sshd[31533]: pam_unix(sshd:auth): check pass; user unknown Jan 18 00:59:14 host sshd[31533]: Failed password for invalid user admin from 125.228.161.61 port 41285 ssh2 Jan 18 00:59:14 host sshd[31533]: pam_unix(sshd:auth): check pass; user unknown Jan 18 00:59:17 host sshd[31533]: Failed password for invalid user admin from 125.228.161.61 port 41285 ssh2 Jan 18 00:59:48 host sshd[31643]: Invalid user super from 122.117.33.133 port 58634 Jan 18 00:59:48 host sshd[31643]: input_userauth_request: invalid user super [preauth] Jan 18 00:59:48 host sshd[31643]: pam_unix(sshd:auth): check pass; user unknown Jan 18 00:59:48 host sshd[31643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.33.133 Jan 18 00:59:50 host sshd[31643]: Failed password for invalid user super from 122.117.33.133 port 58634 ssh2 Jan 18 00:59:50 host sshd[31643]: pam_unix(sshd:auth): check pass; user unknown Jan 18 00:59:53 host sshd[31643]: Failed password for invalid user super from 122.117.33.133 port 58634 ssh2 Jan 18 00:59:53 host sshd[31643]: pam_unix(sshd:auth): check pass; user unknown Jan 18 00:59:55 host sshd[31643]: Failed password for invalid user super from 122.117.33.133 port 58634 ssh2 Jan 18 00:59:56 host sshd[31643]: pam_unix(sshd:auth): check pass; user unknown Jan 18 00:59:58 host sshd[31643]: Failed password for invalid user super from 122.117.33.133 port 58634 ssh2 Jan 18 00:59:58 host sshd[31643]: Failed password for invalid user super from 122.117.33.133 port 58634 ssh2 Jan 18 00:59:58 host sshd[31643]: Connection closed by 122.117.33.133 port 58634 [preauth] Jan 18 00:59:58 host sshd[31643]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.33.133 Jan 18 00:59:58 host sshd[31643]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 18 01:03:47 host sshd[32232]: Did not receive identification string from 107.170.241.29 port 45530 Jan 18 01:10:57 host sshd[735]: Connection reset by 14.45.72.99 port 56462 [preauth] Jan 18 01:11:10 host sshd[765]: Connection reset by 1.34.62.30 port 56674 [preauth] Jan 18 01:15:51 host sshd[1433]: User root from 71.45.192.87 not allowed because not listed in AllowUsers Jan 18 01:15:51 host sshd[1433]: input_userauth_request: invalid user root [preauth] Jan 18 01:15:51 host unix_chkpwd[1440]: password check failed for user (root) Jan 18 01:15:51 host sshd[1433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.45.192.87 user=root Jan 18 01:15:51 host sshd[1433]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 01:15:54 host sshd[1433]: Failed password for invalid user root from 71.45.192.87 port 42985 ssh2 Jan 18 01:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 01:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 01:21:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 01:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 01:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=wwwtestugo user-3=shalinijames user-4=pmcresources user-5=disposeat user-6=remysagr user-7=wwwkmaorg user-8=wwwkapin user-9=woodpeck user-10=gifterman user-11=palco123 user-12=kottayamcalldriv user-13=phmetals user-14=mrsclean user-15=wwwnexidigital user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 01:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 01:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 01:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CrSy6jJFgfmAWuKT.~ Jan 18 01:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CrSy6jJFgfmAWuKT.~' Jan 18 01:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CrSy6jJFgfmAWuKT.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 01:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 01:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 01:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 01:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 01:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 01:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 01:27:53 host sshd[3744]: Connection reset by 60.52.16.193 port 45975 [preauth] Jan 18 01:38:19 host sshd[5198]: User root from 110.35.173.2 not allowed because not listed in AllowUsers Jan 18 01:38:19 host sshd[5198]: input_userauth_request: invalid user root [preauth] Jan 18 01:38:19 host unix_chkpwd[5201]: password check failed for user (root) Jan 18 01:38:19 host sshd[5198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.2 user=root Jan 18 01:38:19 host sshd[5198]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 01:38:21 host sshd[5198]: Failed password for invalid user root from 110.35.173.2 port 4767 ssh2 Jan 18 01:38:21 host sshd[5198]: Received disconnect from 110.35.173.2 port 4767:11: Bye Bye [preauth] Jan 18 01:38:21 host sshd[5198]: Disconnected from 110.35.173.2 port 4767 [preauth] Jan 18 01:40:48 host sshd[5583]: Invalid user fs from 194.110.203.109 port 59672 Jan 18 01:40:48 host sshd[5583]: input_userauth_request: invalid user fs [preauth] Jan 18 01:40:48 host sshd[5583]: pam_unix(sshd:auth): check pass; user unknown Jan 18 01:40:48 host sshd[5583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 01:40:49 host sshd[5583]: Failed password for invalid user fs from 194.110.203.109 port 59672 ssh2 Jan 18 01:40:53 host sshd[5583]: pam_unix(sshd:auth): check pass; user unknown Jan 18 01:40:54 host sshd[5583]: Failed password for invalid user fs from 194.110.203.109 port 59672 ssh2 Jan 18 01:40:58 host sshd[5583]: pam_unix(sshd:auth): check pass; user unknown Jan 18 01:41:00 host sshd[5583]: Failed password for invalid user fs from 194.110.203.109 port 59672 ssh2 Jan 18 01:41:03 host sshd[5583]: Connection closed by 194.110.203.109 port 59672 [preauth] Jan 18 01:41:03 host sshd[5583]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 01:43:17 host sshd[5861]: Invalid user sonar from 211.252.87.118 port 59998 Jan 18 01:43:17 host sshd[5861]: input_userauth_request: invalid user sonar [preauth] Jan 18 01:43:17 host sshd[5861]: pam_unix(sshd:auth): check pass; user unknown Jan 18 01:43:17 host sshd[5861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.87.118 Jan 18 01:43:19 host sshd[5861]: Failed password for invalid user sonar from 211.252.87.118 port 59998 ssh2 Jan 18 01:43:19 host sshd[5861]: Received disconnect from 211.252.87.118 port 59998:11: Bye Bye [preauth] Jan 18 01:43:19 host sshd[5861]: Disconnected from 211.252.87.118 port 59998 [preauth] Jan 18 01:45:01 host sshd[6182]: Did not receive identification string from 101.43.93.18 port 46640 Jan 18 01:45:04 host sshd[6193]: User root from 101.43.93.18 not allowed because not listed in AllowUsers Jan 18 01:45:04 host sshd[6193]: input_userauth_request: invalid user root [preauth] Jan 18 01:45:04 host sshd[6197]: Invalid user pi from 101.43.93.18 port 47038 Jan 18 01:45:04 host sshd[6197]: input_userauth_request: invalid user pi [preauth] Jan 18 01:45:04 host sshd[6206]: User root from 101.43.93.18 not allowed because not listed in AllowUsers Jan 18 01:45:04 host sshd[6206]: input_userauth_request: invalid user root [preauth] Jan 18 01:45:04 host sshd[6204]: Invalid user oracle from 101.43.93.18 port 47040 Jan 18 01:45:04 host sshd[6204]: input_userauth_request: invalid user oracle [preauth] Jan 18 01:45:04 host sshd[6211]: User root from 101.43.93.18 not allowed because not listed in AllowUsers Jan 18 01:45:04 host sshd[6211]: input_userauth_request: invalid user root [preauth] Jan 18 01:45:04 host unix_chkpwd[6222]: password check failed for user (root) Jan 18 01:45:04 host sshd[6193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.93.18 user=root Jan 18 01:45:04 host sshd[6193]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 01:45:04 host sshd[6197]: pam_unix(sshd:auth): check pass; user unknown Jan 18 01:45:04 host sshd[6197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.93.18 Jan 18 01:45:04 host sshd[6204]: pam_unix(sshd:auth): check pass; user unknown Jan 18 01:45:04 host sshd[6204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.93.18 Jan 18 01:45:04 host unix_chkpwd[6224]: password check failed for user (root) Jan 18 01:45:04 host sshd[6206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.93.18 user=root Jan 18 01:45:04 host sshd[6206]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 01:45:04 host unix_chkpwd[6225]: password check failed for user (root) Jan 18 01:45:04 host sshd[6211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.43.93.18 user=root Jan 18 01:45:04 host sshd[6211]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 01:45:06 host sshd[6193]: Failed password for invalid user root from 101.43.93.18 port 47018 ssh2 Jan 18 01:45:06 host sshd[6193]: Connection closed by 101.43.93.18 port 47018 [preauth] Jan 18 01:45:06 host sshd[6197]: Failed password for invalid user pi from 101.43.93.18 port 47038 ssh2 Jan 18 01:45:06 host sshd[6197]: Connection closed by 101.43.93.18 port 47038 [preauth] Jan 18 01:45:07 host sshd[6204]: Failed password for invalid user oracle from 101.43.93.18 port 47040 ssh2 Jan 18 01:45:07 host sshd[6204]: Connection closed by 101.43.93.18 port 47040 [preauth] Jan 18 01:45:07 host sshd[6206]: Failed password for invalid user root from 101.43.93.18 port 47020 ssh2 Jan 18 01:45:07 host sshd[6206]: Connection closed by 101.43.93.18 port 47020 [preauth] Jan 18 01:45:07 host sshd[6211]: Failed password for invalid user root from 101.43.93.18 port 47010 ssh2 Jan 18 01:45:07 host sshd[6211]: Connection closed by 101.43.93.18 port 47010 [preauth] Jan 18 01:46:14 host sshd[6499]: Bad protocol version identification '\026\003\001\001\t\001' from 23.248.175.154 port 43656 Jan 18 01:46:16 host sshd[6502]: Bad protocol version identification 'GET / HTTP/1.1' from 23.248.175.154 port 45046 Jan 18 01:46:17 host sshd[6507]: Bad protocol version identification '' from 23.248.175.154 port 45514 Jan 18 01:47:47 host sshd[6696]: Invalid user ali from 165.227.133.23 port 43380 Jan 18 01:47:47 host sshd[6696]: input_userauth_request: invalid user ali [preauth] Jan 18 01:47:47 host sshd[6696]: pam_unix(sshd:auth): check pass; user unknown Jan 18 01:47:47 host sshd[6696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.133.23 Jan 18 01:47:49 host sshd[6696]: Failed password for invalid user ali from 165.227.133.23 port 43380 ssh2 Jan 18 01:47:49 host sshd[6696]: Received disconnect from 165.227.133.23 port 43380:11: Bye Bye [preauth] Jan 18 01:47:49 host sshd[6696]: Disconnected from 165.227.133.23 port 43380 [preauth] Jan 18 01:48:58 host sshd[6821]: User root from 43.159.50.66 not allowed because not listed in AllowUsers Jan 18 01:48:58 host sshd[6821]: input_userauth_request: invalid user root [preauth] Jan 18 01:48:58 host unix_chkpwd[6824]: password check failed for user (root) Jan 18 01:48:58 host sshd[6821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.50.66 user=root Jan 18 01:48:58 host sshd[6821]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 01:49:00 host sshd[6821]: Failed password for invalid user root from 43.159.50.66 port 40890 ssh2 Jan 18 01:49:00 host sshd[6821]: Received disconnect from 43.159.50.66 port 40890:11: Bye Bye [preauth] Jan 18 01:49:00 host sshd[6821]: Disconnected from 43.159.50.66 port 40890 [preauth] Jan 18 01:49:37 host sshd[6897]: Invalid user kevin from 211.252.87.118 port 60262 Jan 18 01:49:37 host sshd[6897]: input_userauth_request: invalid user kevin [preauth] Jan 18 01:49:37 host sshd[6897]: pam_unix(sshd:auth): check pass; user unknown Jan 18 01:49:37 host sshd[6897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.87.118 Jan 18 01:49:39 host sshd[6897]: Failed password for invalid user kevin from 211.252.87.118 port 60262 ssh2 Jan 18 01:49:39 host sshd[6897]: Received disconnect from 211.252.87.118 port 60262:11: Bye Bye [preauth] Jan 18 01:49:39 host sshd[6897]: Disconnected from 211.252.87.118 port 60262 [preauth] Jan 18 01:50:55 host sshd[7169]: Invalid user admin123 from 165.227.133.23 port 51336 Jan 18 01:50:55 host sshd[7169]: input_userauth_request: invalid user admin123 [preauth] Jan 18 01:50:55 host sshd[7169]: pam_unix(sshd:auth): check pass; user unknown Jan 18 01:50:55 host sshd[7169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.133.23 Jan 18 01:50:55 host sshd[7172]: User root from 211.252.87.118 not allowed because not listed in AllowUsers Jan 18 01:50:55 host sshd[7172]: input_userauth_request: invalid user root [preauth] Jan 18 01:50:55 host unix_chkpwd[7175]: password check failed for user (root) Jan 18 01:50:55 host sshd[7172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.252.87.118 user=root Jan 18 01:50:55 host sshd[7172]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 01:50:57 host sshd[7169]: Failed password for invalid user admin123 from 165.227.133.23 port 51336 ssh2 Jan 18 01:50:57 host sshd[7169]: Received disconnect from 165.227.133.23 port 51336:11: Bye Bye [preauth] Jan 18 01:50:57 host sshd[7169]: Disconnected from 165.227.133.23 port 51336 [preauth] Jan 18 01:50:57 host sshd[7172]: Failed password for invalid user root from 211.252.87.118 port 60372 ssh2 Jan 18 01:51:56 host sshd[7307]: Invalid user mc from 165.227.133.23 port 45412 Jan 18 01:51:56 host sshd[7307]: input_userauth_request: invalid user mc [preauth] Jan 18 01:51:56 host sshd[7307]: pam_unix(sshd:auth): check pass; user unknown Jan 18 01:51:56 host sshd[7307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.133.23 Jan 18 01:51:58 host sshd[7307]: Failed password for invalid user mc from 165.227.133.23 port 45412 ssh2 Jan 18 01:53:04 host sshd[7457]: Invalid user tester from 144.34.212.207 port 34816 Jan 18 01:53:04 host sshd[7457]: input_userauth_request: invalid user tester [preauth] Jan 18 01:53:04 host sshd[7457]: pam_unix(sshd:auth): check pass; user unknown Jan 18 01:53:04 host sshd[7457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.212.207 Jan 18 01:53:06 host sshd[7457]: Failed password for invalid user tester from 144.34.212.207 port 34816 ssh2 Jan 18 01:53:06 host sshd[7457]: Received disconnect from 144.34.212.207 port 34816:11: Bye Bye [preauth] Jan 18 01:53:06 host sshd[7457]: Disconnected from 144.34.212.207 port 34816 [preauth] Jan 18 01:53:50 host sshd[7537]: User root from 43.159.50.66 not allowed because not listed in AllowUsers Jan 18 01:53:50 host sshd[7537]: input_userauth_request: invalid user root [preauth] Jan 18 01:53:50 host unix_chkpwd[7539]: password check failed for user (root) Jan 18 01:53:50 host sshd[7537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.50.66 user=root Jan 18 01:53:50 host sshd[7537]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 01:53:52 host sshd[7537]: Failed password for invalid user root from 43.159.50.66 port 58044 ssh2 Jan 18 01:53:52 host sshd[7537]: Received disconnect from 43.159.50.66 port 58044:11: Bye Bye [preauth] Jan 18 01:53:52 host sshd[7537]: Disconnected from 43.159.50.66 port 58044 [preauth] Jan 18 01:56:45 host sshd[7979]: Invalid user deployer from 144.34.212.207 port 49038 Jan 18 01:56:45 host sshd[7979]: input_userauth_request: invalid user deployer [preauth] Jan 18 01:56:45 host sshd[7979]: pam_unix(sshd:auth): check pass; user unknown Jan 18 01:56:45 host sshd[7979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.212.207 Jan 18 01:56:48 host sshd[7979]: Failed password for invalid user deployer from 144.34.212.207 port 49038 ssh2 Jan 18 01:56:48 host sshd[7979]: Received disconnect from 144.34.212.207 port 49038:11: Bye Bye [preauth] Jan 18 01:56:48 host sshd[7979]: Disconnected from 144.34.212.207 port 49038 [preauth] Jan 18 01:56:55 host sshd[7994]: Invalid user gitlab-runner from 171.236.224.201 port 48014 Jan 18 01:56:55 host sshd[7994]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 18 01:56:55 host sshd[7994]: pam_unix(sshd:auth): check pass; user unknown Jan 18 01:56:55 host sshd[7994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.236.224.201 Jan 18 01:56:55 host sshd[7992]: Invalid user sFTPUser from 171.236.224.201 port 48024 Jan 18 01:56:55 host sshd[7992]: input_userauth_request: invalid user sFTPUser [preauth] Jan 18 01:56:55 host sshd[7992]: pam_unix(sshd:auth): check pass; user unknown Jan 18 01:56:55 host sshd[7992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.236.224.201 Jan 18 01:56:57 host sshd[7994]: Failed password for invalid user gitlab-runner from 171.236.224.201 port 48014 ssh2 Jan 18 01:56:58 host sshd[7992]: Failed password for invalid user sFTPUser from 171.236.224.201 port 48024 ssh2 Jan 18 01:56:59 host sshd[7994]: pam_unix(sshd:auth): check pass; user unknown Jan 18 01:57:02 host sshd[7994]: Failed password for invalid user gitlab-runner from 171.236.224.201 port 48014 ssh2 Jan 18 01:58:08 host sshd[8164]: Invalid user ts3 from 144.34.212.207 port 47456 Jan 18 01:58:08 host sshd[8164]: input_userauth_request: invalid user ts3 [preauth] Jan 18 01:58:08 host sshd[8164]: pam_unix(sshd:auth): check pass; user unknown Jan 18 01:58:08 host sshd[8164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.212.207 Jan 18 01:58:10 host sshd[8164]: Failed password for invalid user ts3 from 144.34.212.207 port 47456 ssh2 Jan 18 01:58:10 host sshd[8164]: Received disconnect from 144.34.212.207 port 47456:11: Bye Bye [preauth] Jan 18 01:58:10 host sshd[8164]: Disconnected from 144.34.212.207 port 47456 [preauth] Jan 18 02:06:51 host sshd[9440]: User root from 61.75.83.20 not allowed because not listed in AllowUsers Jan 18 02:06:51 host sshd[9440]: input_userauth_request: invalid user root [preauth] Jan 18 02:06:51 host unix_chkpwd[9444]: password check failed for user (root) Jan 18 02:06:51 host sshd[9440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.75.83.20 user=root Jan 18 02:06:51 host sshd[9440]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 02:06:53 host sshd[9440]: Failed password for invalid user root from 61.75.83.20 port 36272 ssh2 Jan 18 02:10:58 host sshd[9895]: Invalid user admin from 220.132.148.108 port 54690 Jan 18 02:10:58 host sshd[9895]: input_userauth_request: invalid user admin [preauth] Jan 18 02:10:58 host sshd[9895]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:10:58 host sshd[9895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.148.108 Jan 18 02:10:59 host sshd[9895]: Failed password for invalid user admin from 220.132.148.108 port 54690 ssh2 Jan 18 02:11:00 host sshd[9895]: Failed password for invalid user admin from 220.132.148.108 port 54690 ssh2 Jan 18 02:11:02 host sshd[9895]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:11:03 host sshd[9895]: Failed password for invalid user admin from 220.132.148.108 port 54690 ssh2 Jan 18 02:11:04 host sshd[9895]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:11:06 host sshd[9895]: Failed password for invalid user admin from 220.132.148.108 port 54690 ssh2 Jan 18 02:11:07 host sshd[9895]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:11:10 host sshd[9895]: Failed password for invalid user admin from 220.132.148.108 port 54690 ssh2 Jan 18 02:17:03 host sshd[10846]: Invalid user dlxuser from 211.193.0.220 port 60667 Jan 18 02:17:03 host sshd[10846]: input_userauth_request: invalid user dlxuser [preauth] Jan 18 02:17:03 host sshd[10846]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:17:03 host sshd[10846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.193.0.220 Jan 18 02:17:05 host sshd[10846]: Failed password for invalid user dlxuser from 211.193.0.220 port 60667 ssh2 Jan 18 02:17:06 host sshd[10846]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:17:08 host sshd[10846]: Failed password for invalid user dlxuser from 211.193.0.220 port 60667 ssh2 Jan 18 02:17:09 host sshd[10846]: Failed password for invalid user dlxuser from 211.193.0.220 port 60667 ssh2 Jan 18 02:17:09 host sshd[10846]: Connection closed by 211.193.0.220 port 60667 [preauth] Jan 18 02:17:09 host sshd[10846]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.193.0.220 Jan 18 02:19:20 host sshd[11093]: User root from 210.92.177.92 not allowed because not listed in AllowUsers Jan 18 02:19:20 host sshd[11093]: input_userauth_request: invalid user root [preauth] Jan 18 02:19:20 host unix_chkpwd[11099]: password check failed for user (root) Jan 18 02:19:20 host sshd[11093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.92.177.92 user=root Jan 18 02:19:20 host sshd[11093]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 02:19:22 host sshd[11093]: Failed password for invalid user root from 210.92.177.92 port 61771 ssh2 Jan 18 02:19:23 host unix_chkpwd[11106]: password check failed for user (root) Jan 18 02:19:23 host sshd[11093]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 02:19:24 host sshd[11093]: Failed password for invalid user root from 210.92.177.92 port 61771 ssh2 Jan 18 02:19:25 host unix_chkpwd[11109]: password check failed for user (root) Jan 18 02:19:25 host sshd[11093]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 02:19:26 host sshd[11093]: Failed password for invalid user root from 210.92.177.92 port 61771 ssh2 Jan 18 02:19:28 host unix_chkpwd[11134]: password check failed for user (root) Jan 18 02:19:28 host sshd[11093]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 02:19:30 host sshd[11093]: Failed password for invalid user root from 210.92.177.92 port 61771 ssh2 Jan 18 02:21:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=ugotscom user-8=wwwresourcehunte user-9=keralaholi user-10=wwwrmswll user-11=wwwpmcresource user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=pmcresources user-16=remysagr user-17=disposeat user-18=wwwkmaorg user-19=wwwkapin user-20=woodpeck user-21=kottayamcalldriv user-22=phmetals user-23=palco123 user-24=gifterman user-25=mrsclean user-26=wwwnexidigital user-27=wwwevmhonda user-28=bonifacegroup user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 02:21:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 02:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MeeZZo1zzTqXbPqX.~ Jan 18 02:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MeeZZo1zzTqXbPqX.~' Jan 18 02:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-MeeZZo1zzTqXbPqX.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 02:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 02:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 02:21:15 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 02:21:15 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 02:21:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 02:21:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 02:21:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 02:21:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 02:21:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:21:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 02:21:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:21:17 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:24:32 host sshd[12090]: User tomcat from 101.78.234.109 not allowed because not listed in AllowUsers Jan 18 02:24:32 host sshd[12090]: input_userauth_request: invalid user tomcat [preauth] Jan 18 02:24:32 host unix_chkpwd[12093]: password check failed for user (tomcat) Jan 18 02:24:32 host sshd[12090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.234.109 user=tomcat Jan 18 02:24:32 host sshd[12090]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "tomcat" Jan 18 02:24:35 host sshd[12090]: Failed password for invalid user tomcat from 101.78.234.109 port 49160 ssh2 Jan 18 02:24:35 host sshd[12090]: Received disconnect from 101.78.234.109 port 49160:11: Bye Bye [preauth] Jan 18 02:24:35 host sshd[12090]: Disconnected from 101.78.234.109 port 49160 [preauth] Jan 18 02:26:02 host sshd[12252]: Invalid user allen from 107.189.30.59 port 56472 Jan 18 02:26:02 host sshd[12252]: input_userauth_request: invalid user allen [preauth] Jan 18 02:26:02 host sshd[12252]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:26:02 host sshd[12252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 18 02:26:04 host sshd[12252]: Failed password for invalid user allen from 107.189.30.59 port 56472 ssh2 Jan 18 02:26:05 host sshd[12252]: Connection closed by 107.189.30.59 port 56472 [preauth] Jan 18 02:26:53 host sshd[12356]: User root from 209.141.55.27 not allowed because not listed in AllowUsers Jan 18 02:26:53 host sshd[12356]: input_userauth_request: invalid user root [preauth] Jan 18 02:26:53 host unix_chkpwd[12360]: password check failed for user (root) Jan 18 02:26:53 host sshd[12356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 user=root Jan 18 02:26:53 host sshd[12356]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 02:26:55 host sshd[12356]: Failed password for invalid user root from 209.141.55.27 port 45768 ssh2 Jan 18 02:26:55 host sshd[12356]: Received disconnect from 209.141.55.27 port 45768:11: Normal Shutdown, Thank you for playing [preauth] Jan 18 02:26:55 host sshd[12356]: Disconnected from 209.141.55.27 port 45768 [preauth] Jan 18 02:28:04 host sshd[12597]: Invalid user admin from 36.89.217.30 port 56844 Jan 18 02:28:04 host sshd[12597]: input_userauth_request: invalid user admin [preauth] Jan 18 02:28:04 host sshd[12597]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:28:04 host sshd[12597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.217.30 Jan 18 02:28:06 host sshd[12597]: Failed password for invalid user admin from 36.89.217.30 port 56844 ssh2 Jan 18 02:28:06 host sshd[12597]: Received disconnect from 36.89.217.30 port 56844:11: Bye Bye [preauth] Jan 18 02:28:06 host sshd[12597]: Disconnected from 36.89.217.30 port 56844 [preauth] Jan 18 02:28:46 host sshd[12685]: Invalid user ark from 134.209.69.41 port 34816 Jan 18 02:28:46 host sshd[12685]: input_userauth_request: invalid user ark [preauth] Jan 18 02:28:46 host sshd[12685]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:28:46 host sshd[12685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.69.41 Jan 18 02:28:48 host sshd[12685]: Failed password for invalid user ark from 134.209.69.41 port 34816 ssh2 Jan 18 02:28:48 host sshd[12685]: Received disconnect from 134.209.69.41 port 34816:11: Bye Bye [preauth] Jan 18 02:28:48 host sshd[12685]: Disconnected from 134.209.69.41 port 34816 [preauth] Jan 18 02:28:54 host sshd[12694]: Invalid user admin from 121.121.214.7 port 58963 Jan 18 02:28:54 host sshd[12694]: input_userauth_request: invalid user admin [preauth] Jan 18 02:28:54 host sshd[12694]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:28:54 host sshd[12694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.121.214.7 Jan 18 02:28:56 host sshd[12694]: Failed password for invalid user admin from 121.121.214.7 port 58963 ssh2 Jan 18 02:28:56 host sshd[12694]: Connection reset by 121.121.214.7 port 58963 [preauth] Jan 18 02:29:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 02:29:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:29:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:29:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 02:29:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:29:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:29:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 02:29:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:29:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:29:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 02:29:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:29:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:29:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 02:29:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:29:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:29:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwresourcehunte user-5=keralaholi user-6=wwwrmswll user-7=wwwkaretakers user-8=cochintaxi user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwletsstalkfood user-15=straightcurve user-16=phmetals user-17=kottayamcalldriv user-18=palco123 user-19=gifterman user-20=wwwnexidigital user-21=mrsclean user-22=remysagr user-23=disposeat user-24=wwwkmaorg user-25=wwwkapin user-26=woodpeck user-27=shalinijames user-28=wwwtestugo user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 02:29:01 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 02:29:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:29:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:29:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Jan 18 02:29:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:29:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:29:04 host sshd[12758]: Invalid user ansible from 198.46.152.229 port 52320 Jan 18 02:29:04 host sshd[12758]: input_userauth_request: invalid user ansible [preauth] Jan 18 02:29:04 host sshd[12758]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:29:04 host sshd[12758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.46.152.229 Jan 18 02:29:07 host sshd[12758]: Failed password for invalid user ansible from 198.46.152.229 port 52320 ssh2 Jan 18 02:29:07 host sshd[12758]: Received disconnect from 198.46.152.229 port 52320:11: Bye Bye [preauth] Jan 18 02:29:07 host sshd[12758]: Disconnected from 198.46.152.229 port 52320 [preauth] Jan 18 02:29:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 18 02:29:12 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 18 02:29:12 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 18 02:29:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Jan 18 02:29:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:29:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:29:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Jan 18 02:29:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:29:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:29:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Jan 18 02:29:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:29:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:29:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 18 02:29:32 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 18 02:29:32 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 18 02:29:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Jan 18 02:29:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:29:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:29:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Jan 18 02:29:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:29:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:29:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Jan 18 02:29:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:29:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:29:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Jan 18 02:29:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:29:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:29:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Jan 18 02:29:34 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:29:34 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:30:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Jan 18 02:30:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:30:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:30:09 host sshd[13140]: Invalid user nexus from 101.78.234.109 port 44790 Jan 18 02:30:09 host sshd[13140]: input_userauth_request: invalid user nexus [preauth] Jan 18 02:30:09 host sshd[13140]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:30:09 host sshd[13140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.234.109 Jan 18 02:30:12 host sshd[13140]: Failed password for invalid user nexus from 101.78.234.109 port 44790 ssh2 Jan 18 02:30:12 host sshd[13140]: Received disconnect from 101.78.234.109 port 44790:11: Bye Bye [preauth] Jan 18 02:30:12 host sshd[13140]: Disconnected from 101.78.234.109 port 44790 [preauth] Jan 18 02:30:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Jan 18 02:30:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:30:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Jan 18 02:30:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:30:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Jan 18 02:30:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:30:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 18 02:30:14 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 18 02:30:14 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 18 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Jan 18 02:30:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:30:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 02:30:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 02:30:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 18 02:30:15 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 18 02:30:15 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 18 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Jan 18 02:30:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:30:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:30:22 host sshd[13387]: Invalid user docker from 198.46.152.229 port 47476 Jan 18 02:30:22 host sshd[13387]: input_userauth_request: invalid user docker [preauth] Jan 18 02:30:22 host sshd[13387]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:30:22 host sshd[13387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.46.152.229 Jan 18 02:30:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 18 02:30:23 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 18 02:30:23 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 18 02:30:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Jan 18 02:30:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:30:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:30:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Jan 18 02:30:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:30:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:30:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Jan 18 02:30:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:30:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:30:25 host sshd[13387]: Failed password for invalid user docker from 198.46.152.229 port 47476 ssh2 Jan 18 02:30:25 host sshd[13387]: Received disconnect from 198.46.152.229 port 47476:11: Bye Bye [preauth] Jan 18 02:30:25 host sshd[13387]: Disconnected from 198.46.152.229 port 47476 [preauth] Jan 18 02:30:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Jan 18 02:30:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:30:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Jan 18 02:30:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:30:37 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 18 02:30:44 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 18 02:30:44 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 18 02:30:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Jan 18 02:30:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:30:44 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Jan 18 02:30:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:30:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:30:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Jan 18 02:30:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:30:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:30:46 host sshd[13734]: Invalid user rancher from 134.209.69.41 port 34756 Jan 18 02:30:46 host sshd[13734]: input_userauth_request: invalid user rancher [preauth] Jan 18 02:30:46 host sshd[13734]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:30:46 host sshd[13734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.69.41 Jan 18 02:30:49 host sshd[13734]: Failed password for invalid user rancher from 134.209.69.41 port 34756 ssh2 Jan 18 02:30:49 host sshd[13734]: Received disconnect from 134.209.69.41 port 34756:11: Bye Bye [preauth] Jan 18 02:30:49 host sshd[13734]: Disconnected from 134.209.69.41 port 34756 [preauth] Jan 18 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Jan 18 02:30:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:30:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 18 02:31:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 18 02:31:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 18 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Jan 18 02:31:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:31:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:31:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 18 02:31:16 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 18 02:31:16 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 18 02:31:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Jan 18 02:31:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:31:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Jan 18 02:31:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:31:28 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Jan 18 02:31:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:31:28 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Jan 18 02:31:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:31:28 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 18 02:31:28 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 02:31:28 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 02:31:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Jan 18 02:31:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:31:28 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:31:31 host sshd[14475]: User root from 198.46.152.229 not allowed because not listed in AllowUsers Jan 18 02:31:31 host sshd[14475]: input_userauth_request: invalid user root [preauth] Jan 18 02:31:31 host unix_chkpwd[14481]: password check failed for user (root) Jan 18 02:31:31 host sshd[14475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.46.152.229 user=root Jan 18 02:31:31 host sshd[14475]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 02:31:33 host sshd[14475]: Failed password for invalid user root from 198.46.152.229 port 50914 ssh2 Jan 18 02:31:34 host sshd[14475]: Received disconnect from 198.46.152.229 port 50914:11: Bye Bye [preauth] Jan 18 02:31:34 host sshd[14475]: Disconnected from 198.46.152.229 port 50914 [preauth] Jan 18 02:31:35 host sshd[14484]: User root from 112.186.24.196 not allowed because not listed in AllowUsers Jan 18 02:31:35 host sshd[14484]: input_userauth_request: invalid user root [preauth] Jan 18 02:31:35 host unix_chkpwd[14522]: password check failed for user (root) Jan 18 02:31:35 host sshd[14484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.24.196 user=root Jan 18 02:31:35 host sshd[14484]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 18 02:31:36 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 02:31:36 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 02:31:36 host sshd[14484]: Failed password for invalid user root from 112.186.24.196 port 33573 ssh2 Jan 18 02:31:37 host unix_chkpwd[14562]: password check failed for user (root) Jan 18 02:31:37 host sshd[14484]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 02:31:39 host sshd[14484]: Failed password for invalid user root from 112.186.24.196 port 33573 ssh2 Jan 18 02:31:39 host sshd[14484]: Connection reset by 112.186.24.196 port 33573 [preauth] Jan 18 02:31:39 host sshd[14484]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.24.196 user=root Jan 18 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Jan 18 02:31:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:31:44 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:31:45 host sshd[14649]: Invalid user remnux from 134.209.69.41 port 57276 Jan 18 02:31:45 host sshd[14649]: input_userauth_request: invalid user remnux [preauth] Jan 18 02:31:45 host sshd[14649]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:31:45 host sshd[14649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.69.41 Jan 18 02:31:47 host sshd[14649]: Failed password for invalid user remnux from 134.209.69.41 port 57276 ssh2 Jan 18 02:31:47 host sshd[14649]: Received disconnect from 134.209.69.41 port 57276:11: Bye Bye [preauth] Jan 18 02:31:47 host sshd[14649]: Disconnected from 134.209.69.41 port 57276 [preauth] Jan 18 02:31:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 18 02:31:52 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 02:31:52 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 02:31:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Jan 18 02:31:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:31:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Jan 18 02:32:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Jan 18 02:32:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Jan 18 02:32:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 18 02:32:00 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 18 02:32:00 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 18 02:32:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Jan 18 02:32:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Jan 18 02:32:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 18 02:32:14 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 18 02:32:14 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 18 02:32:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Jan 18 02:32:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Jan 18 02:32:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Jan 18 02:32:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Jan 18 02:32:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:28 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Jan 18 02:32:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 18 02:32:40 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 18 02:32:40 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 18 02:32:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Jan 18 02:32:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:40 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Jan 18 02:32:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:40 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Jan 18 02:32:41 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:41 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Jan 18 02:32:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:51 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwpmcresource WpToolkitNotification send_admin_auto_updates_notification 'available_updates_text=<br/><br/>Updates are available for the following items:<br/><br/>' 'available_updates_list=1. Plugin "All-in-One WP Migration" on Panlys (https://www.panlys.com). Installed version: 6.77. Available version: 7.70.<br/><br/>2. Plugin "Elementor" on Panlys (https://www.panlys.com). Installed version: 3.2.4. Available version: 3.10.1.<br/><br/>' installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in Jan 18 02:32:51 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): Jan 18 02:32:51 host sudo: wp-toolkit : (command continued) require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" Jan 18 02:32:51 host sudo: wp-toolkit : (command continued) (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: [error]FailedToExecuteWpCliCommand: chdir /home/woodpeck/public_html/wp: no such file or directory[/error]#012<br/><br/>' --output=json Jan 18 02:32:51 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:51 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:32:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:32:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:33:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 18 02:33:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 02:33:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 02:33:09 host sshd[16094]: User root from 36.89.217.30 not allowed because not listed in AllowUsers Jan 18 02:33:09 host sshd[16094]: input_userauth_request: invalid user root [preauth] Jan 18 02:33:09 host unix_chkpwd[16097]: password check failed for user (root) Jan 18 02:33:09 host sshd[16094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.217.30 user=root Jan 18 02:33:09 host sshd[16094]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 02:33:11 host sshd[16094]: Failed password for invalid user root from 36.89.217.30 port 40684 ssh2 Jan 18 02:33:11 host sshd[16094]: Received disconnect from 36.89.217.30 port 40684:11: Bye Bye [preauth] Jan 18 02:33:11 host sshd[16094]: Disconnected from 36.89.217.30 port 40684 [preauth] Jan 18 02:37:34 host sshd[16673]: Invalid user zyfwp from 1.176.240.170 port 37396 Jan 18 02:37:34 host sshd[16673]: input_userauth_request: invalid user zyfwp [preauth] Jan 18 02:37:34 host sshd[16673]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:37:34 host sshd[16673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.176.240.170 Jan 18 02:37:36 host sshd[16673]: Failed password for invalid user zyfwp from 1.176.240.170 port 37396 ssh2 Jan 18 02:37:36 host sshd[16673]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:37:38 host sshd[16673]: Failed password for invalid user zyfwp from 1.176.240.170 port 37396 ssh2 Jan 18 02:37:39 host sshd[16673]: Connection reset by 1.176.240.170 port 37396 [preauth] Jan 18 02:37:39 host sshd[16673]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.176.240.170 Jan 18 02:38:09 host sshd[16721]: User root from 1.34.192.10 not allowed because not listed in AllowUsers Jan 18 02:38:09 host sshd[16721]: input_userauth_request: invalid user root [preauth] Jan 18 02:38:09 host unix_chkpwd[16725]: password check failed for user (root) Jan 18 02:38:09 host sshd[16721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.192.10 user=root Jan 18 02:38:09 host sshd[16721]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 02:38:11 host sshd[16721]: Failed password for invalid user root from 1.34.192.10 port 58937 ssh2 Jan 18 02:38:11 host unix_chkpwd[16728]: password check failed for user (root) Jan 18 02:38:11 host sshd[16721]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 02:38:14 host sshd[16721]: Failed password for invalid user root from 1.34.192.10 port 58937 ssh2 Jan 18 02:38:14 host unix_chkpwd[16732]: password check failed for user (root) Jan 18 02:38:14 host sshd[16721]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 02:38:16 host sshd[16721]: Failed password for invalid user root from 1.34.192.10 port 58937 ssh2 Jan 18 02:38:16 host unix_chkpwd[16740]: password check failed for user (root) Jan 18 02:38:16 host sshd[16721]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 02:38:18 host sshd[16721]: Failed password for invalid user root from 1.34.192.10 port 58937 ssh2 Jan 18 02:38:19 host unix_chkpwd[16748]: password check failed for user (root) Jan 18 02:38:19 host sshd[16721]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 02:38:21 host sshd[16721]: Failed password for invalid user root from 1.34.192.10 port 58937 ssh2 Jan 18 02:50:23 host sshd[18535]: Connection closed by 107.170.242.14 port 52308 [preauth] Jan 18 02:50:38 host sshd[18587]: Invalid user vadmin from 112.170.111.17 port 60215 Jan 18 02:50:38 host sshd[18587]: input_userauth_request: invalid user vadmin [preauth] Jan 18 02:50:38 host sshd[18587]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:50:38 host sshd[18587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.170.111.17 Jan 18 02:50:40 host sshd[18587]: Failed password for invalid user vadmin from 112.170.111.17 port 60215 ssh2 Jan 18 02:50:40 host sshd[18587]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:50:43 host sshd[18587]: Failed password for invalid user vadmin from 112.170.111.17 port 60215 ssh2 Jan 18 02:50:43 host sshd[18587]: Failed password for invalid user vadmin from 112.170.111.17 port 60215 ssh2 Jan 18 02:53:09 host sshd[18886]: Invalid user citel from 205.185.113.129 port 38808 Jan 18 02:53:09 host sshd[18886]: input_userauth_request: invalid user citel [preauth] Jan 18 02:53:09 host sshd[18886]: pam_unix(sshd:auth): check pass; user unknown Jan 18 02:53:09 host sshd[18886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 18 02:53:11 host sshd[18886]: Failed password for invalid user citel from 205.185.113.129 port 38808 ssh2 Jan 18 02:53:12 host sshd[18886]: Connection closed by 205.185.113.129 port 38808 [preauth] Jan 18 03:14:46 host sshd[22329]: Invalid user admin from 49.213.236.78 port 42926 Jan 18 03:14:46 host sshd[22329]: input_userauth_request: invalid user admin [preauth] Jan 18 03:14:46 host sshd[22329]: pam_unix(sshd:auth): check pass; user unknown Jan 18 03:14:46 host sshd[22329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.213.236.78 Jan 18 03:14:47 host sshd[22329]: Failed password for invalid user admin from 49.213.236.78 port 42926 ssh2 Jan 18 03:20:54 host sshd[23248]: Did not receive identification string from 149.129.220.222 port 61000 Jan 18 03:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=ugotscom user-8=wwwresourcehunte user-9=keralaholi user-10=wwwrmswll user-11=wwwpmcresource user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=pmcresources user-16=remysagr user-17=disposeat user-18=wwwkmaorg user-19=wwwkapin user-20=woodpeck user-21=phmetals user-22=kottayamcalldriv user-23=palco123 user-24=gifterman user-25=wwwnexidigital user-26=mrsclean user-27=wwwevmhonda user-28=bonifacegroup user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 03:21:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-xmw06xIiy79lLSE4.~ Jan 18 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-xmw06xIiy79lLSE4.~' Jan 18 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-xmw06xIiy79lLSE4.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 03:21:04 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 03:21:04 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 03:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 03:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 03:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 03:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 03:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 03:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 03:30:36 host sshd[24951]: Invalid user ft from 194.110.203.109 port 38820 Jan 18 03:30:36 host sshd[24951]: input_userauth_request: invalid user ft [preauth] Jan 18 03:30:36 host sshd[24951]: pam_unix(sshd:auth): check pass; user unknown Jan 18 03:30:36 host sshd[24951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 03:30:38 host sshd[24951]: Failed password for invalid user ft from 194.110.203.109 port 38820 ssh2 Jan 18 03:30:41 host sshd[24951]: pam_unix(sshd:auth): check pass; user unknown Jan 18 03:30:43 host sshd[24951]: Failed password for invalid user ft from 194.110.203.109 port 38820 ssh2 Jan 18 03:30:46 host sshd[24951]: pam_unix(sshd:auth): check pass; user unknown Jan 18 03:30:48 host sshd[24951]: Failed password for invalid user ft from 194.110.203.109 port 38820 ssh2 Jan 18 03:30:52 host sshd[24951]: Connection closed by 194.110.203.109 port 38820 [preauth] Jan 18 03:30:52 host sshd[24951]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 03:34:17 host sshd[25502]: Bad protocol version identification '\003' from 92.255.85.183 port 63882 Jan 18 03:42:49 host sshd[26667]: User root from 114.44.70.120 not allowed because not listed in AllowUsers Jan 18 03:42:49 host sshd[26667]: input_userauth_request: invalid user root [preauth] Jan 18 03:42:49 host unix_chkpwd[26677]: password check failed for user (root) Jan 18 03:42:49 host sshd[26667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.44.70.120 user=root Jan 18 03:42:49 host sshd[26667]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 03:42:51 host sshd[26672]: Invalid user admin from 114.44.70.120 port 59914 Jan 18 03:42:51 host sshd[26672]: input_userauth_request: invalid user admin [preauth] Jan 18 03:42:51 host sshd[26672]: pam_unix(sshd:auth): check pass; user unknown Jan 18 03:42:51 host sshd[26672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.44.70.120 Jan 18 03:42:51 host sshd[26667]: Failed password for invalid user root from 114.44.70.120 port 59928 ssh2 Jan 18 03:42:52 host unix_chkpwd[26680]: password check failed for user (root) Jan 18 03:42:52 host sshd[26667]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 03:42:52 host sshd[26672]: Failed password for invalid user admin from 114.44.70.120 port 59914 ssh2 Jan 18 03:42:53 host sshd[26672]: Failed password for invalid user admin from 114.44.70.120 port 59914 ssh2 Jan 18 03:42:54 host sshd[26672]: pam_unix(sshd:auth): check pass; user unknown Jan 18 03:42:55 host sshd[26667]: Failed password for invalid user root from 114.44.70.120 port 59928 ssh2 Jan 18 03:42:55 host sshd[26667]: Connection reset by 114.44.70.120 port 59928 [preauth] Jan 18 03:42:55 host sshd[26667]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.44.70.120 user=root Jan 18 03:42:56 host sshd[26672]: Failed password for invalid user admin from 114.44.70.120 port 59914 ssh2 Jan 18 03:42:56 host sshd[26672]: pam_unix(sshd:auth): check pass; user unknown Jan 18 03:42:58 host sshd[26672]: Failed password for invalid user admin from 114.44.70.120 port 59914 ssh2 Jan 18 04:01:10 host sshd[29204]: Invalid user dmdba from 59.25.189.150 port 34006 Jan 18 04:01:10 host sshd[29204]: input_userauth_request: invalid user dmdba [preauth] Jan 18 04:01:10 host sshd[29204]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:01:10 host sshd[29204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.189.150 Jan 18 04:01:11 host sshd[29204]: Failed password for invalid user dmdba from 59.25.189.150 port 34006 ssh2 Jan 18 04:01:15 host sshd[29204]: Failed password for invalid user dmdba from 59.25.189.150 port 34006 ssh2 Jan 18 04:01:16 host sshd[29204]: Connection closed by 59.25.189.150 port 34006 [preauth] Jan 18 04:02:15 host sshd[29492]: User root from 138.68.91.192 not allowed because not listed in AllowUsers Jan 18 04:02:15 host sshd[29492]: input_userauth_request: invalid user root [preauth] Jan 18 04:02:15 host unix_chkpwd[29495]: password check failed for user (root) Jan 18 04:02:15 host sshd[29492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.91.192 user=root Jan 18 04:02:15 host sshd[29492]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:02:17 host sshd[29492]: Failed password for invalid user root from 138.68.91.192 port 51406 ssh2 Jan 18 04:02:17 host sshd[29492]: Received disconnect from 138.68.91.192 port 51406:11: Bye Bye [preauth] Jan 18 04:02:17 host sshd[29492]: Disconnected from 138.68.91.192 port 51406 [preauth] Jan 18 04:02:19 host sshd[29503]: User root from 4.7.94.244 not allowed because not listed in AllowUsers Jan 18 04:02:19 host sshd[29503]: input_userauth_request: invalid user root [preauth] Jan 18 04:02:19 host unix_chkpwd[29506]: password check failed for user (root) Jan 18 04:02:19 host sshd[29503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.7.94.244 user=root Jan 18 04:02:19 host sshd[29503]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:02:20 host sshd[29503]: Failed password for invalid user root from 4.7.94.244 port 54980 ssh2 Jan 18 04:02:20 host sshd[29503]: Received disconnect from 4.7.94.244 port 54980:11: Bye Bye [preauth] Jan 18 04:02:20 host sshd[29503]: Disconnected from 4.7.94.244 port 54980 [preauth] Jan 18 04:03:33 host sshd[29658]: User root from 36.94.152.63 not allowed because not listed in AllowUsers Jan 18 04:03:33 host sshd[29658]: input_userauth_request: invalid user root [preauth] Jan 18 04:03:33 host unix_chkpwd[29660]: password check failed for user (root) Jan 18 04:03:33 host sshd[29658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.94.152.63 user=root Jan 18 04:03:33 host sshd[29658]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:03:35 host sshd[29658]: Failed password for invalid user root from 36.94.152.63 port 38178 ssh2 Jan 18 04:03:35 host sshd[29658]: Received disconnect from 36.94.152.63 port 38178:11: Bye Bye [preauth] Jan 18 04:03:35 host sshd[29658]: Disconnected from 36.94.152.63 port 38178 [preauth] Jan 18 04:03:37 host sshd[29668]: User root from 202.125.94.212 not allowed because not listed in AllowUsers Jan 18 04:03:37 host sshd[29668]: input_userauth_request: invalid user root [preauth] Jan 18 04:03:37 host unix_chkpwd[29674]: password check failed for user (root) Jan 18 04:03:37 host sshd[29668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.125.94.212 user=root Jan 18 04:03:37 host sshd[29668]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:03:39 host sshd[29668]: Failed password for invalid user root from 202.125.94.212 port 49423 ssh2 Jan 18 04:03:39 host sshd[29668]: Received disconnect from 202.125.94.212 port 49423:11: Bye Bye [preauth] Jan 18 04:03:39 host sshd[29668]: Disconnected from 202.125.94.212 port 49423 [preauth] Jan 18 04:04:41 host sshd[29792]: User root from 52.142.11.171 not allowed because not listed in AllowUsers Jan 18 04:04:41 host sshd[29792]: input_userauth_request: invalid user root [preauth] Jan 18 04:04:41 host unix_chkpwd[29795]: password check failed for user (root) Jan 18 04:04:41 host sshd[29792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.142.11.171 user=root Jan 18 04:04:41 host sshd[29792]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:04:43 host sshd[29792]: Failed password for invalid user root from 52.142.11.171 port 1024 ssh2 Jan 18 04:04:43 host sshd[29792]: Received disconnect from 52.142.11.171 port 1024:11: Bye Bye [preauth] Jan 18 04:04:43 host sshd[29792]: Disconnected from 52.142.11.171 port 1024 [preauth] Jan 18 04:04:53 host sshd[29808]: User root from 64.225.22.216 not allowed because not listed in AllowUsers Jan 18 04:04:53 host sshd[29808]: input_userauth_request: invalid user root [preauth] Jan 18 04:04:53 host unix_chkpwd[29814]: password check failed for user (root) Jan 18 04:04:53 host sshd[29808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.22.216 user=root Jan 18 04:04:53 host sshd[29808]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:04:55 host sshd[29808]: Failed password for invalid user root from 64.225.22.216 port 60106 ssh2 Jan 18 04:04:56 host sshd[29808]: Received disconnect from 64.225.22.216 port 60106:11: Bye Bye [preauth] Jan 18 04:04:56 host sshd[29808]: Disconnected from 64.225.22.216 port 60106 [preauth] Jan 18 04:07:18 host sshd[30251]: Invalid user student from 43.154.108.75 port 51366 Jan 18 04:07:18 host sshd[30251]: input_userauth_request: invalid user student [preauth] Jan 18 04:07:18 host sshd[30251]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:07:18 host sshd[30251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.108.75 Jan 18 04:07:20 host sshd[30251]: Failed password for invalid user student from 43.154.108.75 port 51366 ssh2 Jan 18 04:07:20 host sshd[30251]: Received disconnect from 43.154.108.75 port 51366:11: Bye Bye [preauth] Jan 18 04:07:20 host sshd[30251]: Disconnected from 43.154.108.75 port 51366 [preauth] Jan 18 04:08:10 host sshd[30379]: Invalid user testuser from 4.7.94.244 port 43844 Jan 18 04:08:10 host sshd[30379]: input_userauth_request: invalid user testuser [preauth] Jan 18 04:08:10 host sshd[30379]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:08:10 host sshd[30379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.7.94.244 Jan 18 04:08:12 host sshd[30379]: Failed password for invalid user testuser from 4.7.94.244 port 43844 ssh2 Jan 18 04:08:13 host sshd[30379]: Received disconnect from 4.7.94.244 port 43844:11: Bye Bye [preauth] Jan 18 04:08:13 host sshd[30379]: Disconnected from 4.7.94.244 port 43844 [preauth] Jan 18 04:08:26 host sshd[30431]: Invalid user esuser from 36.94.152.63 port 44696 Jan 18 04:08:26 host sshd[30431]: input_userauth_request: invalid user esuser [preauth] Jan 18 04:08:26 host sshd[30431]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:08:26 host sshd[30431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.94.152.63 Jan 18 04:08:28 host sshd[30431]: Failed password for invalid user esuser from 36.94.152.63 port 44696 ssh2 Jan 18 04:08:29 host sshd[30431]: Received disconnect from 36.94.152.63 port 44696:11: Bye Bye [preauth] Jan 18 04:08:29 host sshd[30431]: Disconnected from 36.94.152.63 port 44696 [preauth] Jan 18 04:08:34 host sshd[30492]: Invalid user testuser from 138.68.91.192 port 48450 Jan 18 04:08:34 host sshd[30492]: input_userauth_request: invalid user testuser [preauth] Jan 18 04:08:34 host sshd[30492]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:08:34 host sshd[30492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.91.192 Jan 18 04:08:35 host sshd[30494]: Invalid user zookeeper from 202.125.94.212 port 46774 Jan 18 04:08:35 host sshd[30494]: input_userauth_request: invalid user zookeeper [preauth] Jan 18 04:08:35 host sshd[30494]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:08:35 host sshd[30494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.125.94.212 Jan 18 04:08:36 host sshd[30492]: Failed password for invalid user testuser from 138.68.91.192 port 48450 ssh2 Jan 18 04:08:36 host sshd[30492]: Received disconnect from 138.68.91.192 port 48450:11: Bye Bye [preauth] Jan 18 04:08:36 host sshd[30492]: Disconnected from 138.68.91.192 port 48450 [preauth] Jan 18 04:08:37 host sshd[30494]: Failed password for invalid user zookeeper from 202.125.94.212 port 46774 ssh2 Jan 18 04:08:37 host sshd[30494]: Received disconnect from 202.125.94.212 port 46774:11: Bye Bye [preauth] Jan 18 04:08:37 host sshd[30494]: Disconnected from 202.125.94.212 port 46774 [preauth] Jan 18 04:08:43 host sshd[30567]: Invalid user peertube from 64.225.22.216 port 49256 Jan 18 04:08:43 host sshd[30567]: input_userauth_request: invalid user peertube [preauth] Jan 18 04:08:43 host sshd[30567]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:08:43 host sshd[30567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.22.216 Jan 18 04:08:45 host sshd[30567]: Failed password for invalid user peertube from 64.225.22.216 port 49256 ssh2 Jan 18 04:08:45 host sshd[30567]: Received disconnect from 64.225.22.216 port 49256:11: Bye Bye [preauth] Jan 18 04:08:45 host sshd[30567]: Disconnected from 64.225.22.216 port 49256 [preauth] Jan 18 04:10:08 host sshd[30759]: Invalid user daniel from 52.142.11.171 port 1024 Jan 18 04:10:08 host sshd[30759]: input_userauth_request: invalid user daniel [preauth] Jan 18 04:10:08 host sshd[30759]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:10:08 host sshd[30759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.142.11.171 Jan 18 04:10:10 host sshd[30759]: Failed password for invalid user daniel from 52.142.11.171 port 1024 ssh2 Jan 18 04:10:10 host sshd[30759]: Received disconnect from 52.142.11.171 port 1024:11: Bye Bye [preauth] Jan 18 04:10:10 host sshd[30759]: Disconnected from 52.142.11.171 port 1024 [preauth] Jan 18 04:10:20 host sshd[30826]: Invalid user tigergraph from 43.154.108.75 port 59844 Jan 18 04:10:20 host sshd[30826]: input_userauth_request: invalid user tigergraph [preauth] Jan 18 04:10:20 host sshd[30826]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:10:20 host sshd[30826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.108.75 Jan 18 04:10:22 host sshd[30826]: Failed password for invalid user tigergraph from 43.154.108.75 port 59844 ssh2 Jan 18 04:10:22 host sshd[30826]: Received disconnect from 43.154.108.75 port 59844:11: Bye Bye [preauth] Jan 18 04:10:22 host sshd[30826]: Disconnected from 43.154.108.75 port 59844 [preauth] Jan 18 04:11:48 host sshd[31116]: Invalid user peertube from 43.154.108.75 port 58584 Jan 18 04:11:48 host sshd[31116]: input_userauth_request: invalid user peertube [preauth] Jan 18 04:11:48 host sshd[31116]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:11:48 host sshd[31116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.154.108.75 Jan 18 04:11:50 host sshd[31116]: Failed password for invalid user peertube from 43.154.108.75 port 58584 ssh2 Jan 18 04:11:50 host sshd[31116]: Received disconnect from 43.154.108.75 port 58584:11: Bye Bye [preauth] Jan 18 04:11:50 host sshd[31116]: Disconnected from 43.154.108.75 port 58584 [preauth] Jan 18 04:12:49 host sshd[31269]: Connection closed by 220.246.166.71 port 59332 [preauth] Jan 18 04:15:37 host sshd[31632]: User root from 58.152.194.110 not allowed because not listed in AllowUsers Jan 18 04:15:37 host sshd[31632]: input_userauth_request: invalid user root [preauth] Jan 18 04:15:37 host unix_chkpwd[31634]: password check failed for user (root) Jan 18 04:15:37 host sshd[31632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.152.194.110 user=root Jan 18 04:15:37 host sshd[31632]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:15:39 host sshd[31632]: Failed password for invalid user root from 58.152.194.110 port 44475 ssh2 Jan 18 04:15:39 host sshd[31632]: Received disconnect from 58.152.194.110 port 44475:11: Bye Bye [preauth] Jan 18 04:15:39 host sshd[31632]: Disconnected from 58.152.194.110 port 44475 [preauth] Jan 18 04:15:58 host sshd[31673]: User root from 134.17.89.151 not allowed because not listed in AllowUsers Jan 18 04:15:58 host sshd[31673]: input_userauth_request: invalid user root [preauth] Jan 18 04:15:58 host unix_chkpwd[31677]: password check failed for user (root) Jan 18 04:15:58 host sshd[31673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.89.151 user=root Jan 18 04:15:58 host sshd[31673]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:16:00 host sshd[31673]: Failed password for invalid user root from 134.17.89.151 port 46638 ssh2 Jan 18 04:16:00 host sshd[31673]: Received disconnect from 134.17.89.151 port 46638:11: Bye Bye [preauth] Jan 18 04:16:00 host sshd[31673]: Disconnected from 134.17.89.151 port 46638 [preauth] Jan 18 04:20:22 host sshd[32312]: User root from 134.17.89.151 not allowed because not listed in AllowUsers Jan 18 04:20:22 host sshd[32312]: input_userauth_request: invalid user root [preauth] Jan 18 04:20:22 host unix_chkpwd[32315]: password check failed for user (root) Jan 18 04:20:22 host sshd[32312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.89.151 user=root Jan 18 04:20:22 host sshd[32312]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:20:24 host sshd[32312]: Failed password for invalid user root from 134.17.89.151 port 38106 ssh2 Jan 18 04:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 04:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 04:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkmaorg user-2=disposeat user-3=remysagr user-4=woodpeck user-5=wwwkapin user-6=wwwtestugo user-7=shalinijames user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=straightcurve user-13=wwwletsstalkfood user-14=phmetals user-15=kottayamcalldriv user-16=gifterman user-17=palco123 user-18=wwwnexidigital user-19=mrsclean user-20=cochintaxi user-21=wwwkaretakers user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=wwwrmswll user-29=keralaholi user-30=wwwresourcehunte feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 04:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 04:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 04:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8yHs5HsriByjUvez.~ Jan 18 04:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8yHs5HsriByjUvez.~' Jan 18 04:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8yHs5HsriByjUvez.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 04:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 04:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 04:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 04:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 04:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 04:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 04:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 04:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 04:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 04:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 04:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 04:22:35 host sshd[381]: User root from 58.152.194.110 not allowed because not listed in AllowUsers Jan 18 04:22:35 host sshd[381]: input_userauth_request: invalid user root [preauth] Jan 18 04:22:35 host unix_chkpwd[383]: password check failed for user (root) Jan 18 04:22:35 host sshd[381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.152.194.110 user=root Jan 18 04:22:35 host sshd[381]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:22:37 host sshd[381]: Failed password for invalid user root from 58.152.194.110 port 43540 ssh2 Jan 18 04:22:37 host sshd[381]: Received disconnect from 58.152.194.110 port 43540:11: Bye Bye [preauth] Jan 18 04:22:37 host sshd[381]: Disconnected from 58.152.194.110 port 43540 [preauth] Jan 18 04:23:13 host sshd[574]: Did not receive identification string from 42.193.96.35 port 55656 Jan 18 04:35:20 host sshd[2804]: User root from 137.184.90.33 not allowed because not listed in AllowUsers Jan 18 04:35:20 host sshd[2818]: User root from 137.184.90.33 not allowed because not listed in AllowUsers Jan 18 04:35:20 host sshd[2815]: Invalid user ftpuser from 137.184.90.33 port 50942 Jan 18 04:35:20 host sshd[2791]: Invalid user ftpuser from 137.184.90.33 port 50848 Jan 18 04:35:20 host sshd[2814]: Invalid user testuser from 137.184.90.33 port 50930 Jan 18 04:35:20 host sshd[2818]: input_userauth_request: invalid user root [preauth] Jan 18 04:35:20 host sshd[2791]: input_userauth_request: invalid user ftpuser [preauth] Jan 18 04:35:20 host sshd[2814]: input_userauth_request: invalid user testuser [preauth] Jan 18 04:35:20 host sshd[2804]: input_userauth_request: invalid user root [preauth] Jan 18 04:35:20 host sshd[2815]: input_userauth_request: invalid user ftpuser [preauth] Jan 18 04:35:20 host sshd[2800]: User centos from 137.184.90.33 not allowed because not listed in AllowUsers Jan 18 04:35:20 host sshd[2793]: User root from 137.184.90.33 not allowed because not listed in AllowUsers Jan 18 04:35:20 host sshd[2816]: Invalid user oracle from 137.184.90.33 port 50724 Jan 18 04:35:20 host sshd[2801]: Invalid user ec2-user from 137.184.90.33 port 50604 Jan 18 04:35:20 host sshd[2798]: Invalid user web from 137.184.90.33 port 50608 Jan 18 04:35:20 host sshd[2817]: Invalid user steam from 137.184.90.33 port 50834 Jan 18 04:35:20 host sshd[2798]: input_userauth_request: invalid user web [preauth] Jan 18 04:35:20 host sshd[2793]: input_userauth_request: invalid user root [preauth] Jan 18 04:35:20 host sshd[2803]: User root from 137.184.90.33 not allowed because not listed in AllowUsers Jan 18 04:35:20 host sshd[2806]: Invalid user git from 137.184.90.33 port 50700 Jan 18 04:35:20 host sshd[2817]: input_userauth_request: invalid user steam [preauth] Jan 18 04:35:20 host sshd[2806]: input_userauth_request: invalid user git [preauth] Jan 18 04:35:20 host sshd[2803]: input_userauth_request: invalid user root [preauth] Jan 18 04:35:20 host sshd[2811]: Invalid user web from 137.184.90.33 port 50770 Jan 18 04:35:20 host sshd[2811]: input_userauth_request: invalid user web [preauth] Jan 18 04:35:20 host sshd[2800]: input_userauth_request: invalid user centos [preauth] Jan 18 04:35:20 host sshd[2825]: User root from 137.184.90.33 not allowed because not listed in AllowUsers Jan 18 04:35:20 host sshd[2825]: input_userauth_request: invalid user root [preauth] Jan 18 04:35:20 host sshd[2799]: User root from 137.184.90.33 not allowed because not listed in AllowUsers Jan 18 04:35:20 host sshd[2805]: User root from 137.184.90.33 not allowed because not listed in AllowUsers Jan 18 04:35:20 host sshd[2799]: input_userauth_request: invalid user root [preauth] Jan 18 04:35:20 host sshd[2812]: Invalid user postgres from 137.184.90.33 port 50846 Jan 18 04:35:20 host sshd[2813]: Invalid user vagrant from 137.184.90.33 port 50590 Jan 18 04:35:20 host sshd[2812]: input_userauth_request: invalid user postgres [preauth] Jan 18 04:35:20 host sshd[2820]: Invalid user guest from 137.184.90.33 port 50772 Jan 18 04:35:20 host sshd[2823]: Invalid user admin from 137.184.90.33 port 50678 Jan 18 04:35:20 host sshd[2821]: Invalid user ansadmin from 137.184.90.33 port 50800 Jan 18 04:35:20 host sshd[2823]: input_userauth_request: invalid user admin [preauth] Jan 18 04:35:20 host sshd[2805]: input_userauth_request: invalid user root [preauth] Jan 18 04:35:20 host sshd[2822]: Invalid user user from 137.184.90.33 port 50758 Jan 18 04:35:20 host sshd[2813]: input_userauth_request: invalid user vagrant [preauth] Jan 18 04:35:20 host sshd[2819]: Invalid user admin from 137.184.90.33 port 50784 Jan 18 04:35:20 host sshd[2816]: input_userauth_request: invalid user oracle [preauth] Jan 18 04:35:20 host sshd[2822]: input_userauth_request: invalid user user [preauth] Jan 18 04:35:20 host sshd[2824]: Invalid user postgres from 137.184.90.33 port 50794 Jan 18 04:35:20 host sshd[2824]: input_userauth_request: invalid user postgres [preauth] Jan 18 04:35:20 host sshd[2820]: input_userauth_request: invalid user guest [preauth] Jan 18 04:35:20 host sshd[2821]: input_userauth_request: invalid user ansadmin [preauth] Jan 18 04:35:20 host sshd[2819]: input_userauth_request: invalid user admin [preauth] Jan 18 04:35:20 host sshd[2801]: input_userauth_request: invalid user ec2-user [preauth] Jan 18 04:35:20 host sshd[2791]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:35:20 host sshd[2815]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:35:20 host sshd[2815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 Jan 18 04:35:20 host sshd[2791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 Jan 18 04:35:20 host sshd[2814]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:35:20 host sshd[2814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 Jan 18 04:35:20 host sshd[2798]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:35:20 host sshd[2798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 Jan 18 04:35:20 host sshd[2806]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:35:20 host sshd[2806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 Jan 18 04:35:20 host sshd[2817]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:35:20 host sshd[2817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 Jan 18 04:35:20 host sshd[2811]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:35:20 host sshd[2811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 Jan 18 04:35:20 host sshd[2816]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:35:20 host sshd[2816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 Jan 18 04:35:20 host sshd[2812]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:35:20 host sshd[2812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 Jan 18 04:35:20 host sshd[2819]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:35:20 host sshd[2819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 Jan 18 04:35:20 host sshd[2822]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:35:20 host sshd[2822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 Jan 18 04:35:20 host sshd[2820]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:35:20 host sshd[2820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 Jan 18 04:35:20 host sshd[2813]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:35:20 host sshd[2813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 Jan 18 04:35:20 host sshd[2824]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:35:20 host sshd[2824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 Jan 18 04:35:20 host sshd[2801]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:35:20 host sshd[2801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 Jan 18 04:35:20 host sshd[2823]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:35:20 host sshd[2821]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:35:20 host sshd[2823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 Jan 18 04:35:20 host sshd[2821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 Jan 18 04:35:20 host unix_chkpwd[2853]: password check failed for user (root) Jan 18 04:35:20 host sshd[2804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 user=root Jan 18 04:35:20 host sshd[2804]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:35:20 host unix_chkpwd[2857]: password check failed for user (centos) Jan 18 04:35:20 host sshd[2800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 user=centos Jan 18 04:35:20 host unix_chkpwd[2854]: password check failed for user (root) Jan 18 04:35:20 host sshd[2818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 user=root Jan 18 04:35:20 host sshd[2818]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:35:20 host unix_chkpwd[2855]: password check failed for user (root) Jan 18 04:35:20 host sshd[2793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 user=root Jan 18 04:35:20 host sshd[2793]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:35:20 host unix_chkpwd[2859]: password check failed for user (root) Jan 18 04:35:20 host sshd[2825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 user=root Jan 18 04:35:20 host sshd[2825]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:35:20 host unix_chkpwd[2860]: password check failed for user (root) Jan 18 04:35:20 host sshd[2805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 user=root Jan 18 04:35:20 host sshd[2805]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:35:20 host unix_chkpwd[2856]: password check failed for user (root) Jan 18 04:35:20 host sshd[2803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 user=root Jan 18 04:35:20 host sshd[2803]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:35:20 host unix_chkpwd[2858]: password check failed for user (root) Jan 18 04:35:20 host sshd[2799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.90.33 user=root Jan 18 04:35:20 host sshd[2799]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:35:22 host sshd[2791]: Failed password for invalid user ftpuser from 137.184.90.33 port 50848 ssh2 Jan 18 04:35:22 host sshd[2815]: Failed password for invalid user ftpuser from 137.184.90.33 port 50942 ssh2 Jan 18 04:35:22 host sshd[2814]: Failed password for invalid user testuser from 137.184.90.33 port 50930 ssh2 Jan 18 04:35:22 host sshd[2798]: Failed password for invalid user web from 137.184.90.33 port 50608 ssh2 Jan 18 04:35:22 host sshd[2806]: Failed password for invalid user git from 137.184.90.33 port 50700 ssh2 Jan 18 04:35:22 host sshd[2817]: Failed password for invalid user steam from 137.184.90.33 port 50834 ssh2 Jan 18 04:35:22 host sshd[2811]: Failed password for invalid user web from 137.184.90.33 port 50770 ssh2 Jan 18 04:35:22 host sshd[2816]: Failed password for invalid user oracle from 137.184.90.33 port 50724 ssh2 Jan 18 04:35:22 host sshd[2812]: Failed password for invalid user postgres from 137.184.90.33 port 50846 ssh2 Jan 18 04:35:22 host sshd[2819]: Failed password for invalid user admin from 137.184.90.33 port 50784 ssh2 Jan 18 04:35:22 host sshd[2822]: Failed password for invalid user user from 137.184.90.33 port 50758 ssh2 Jan 18 04:35:22 host sshd[2820]: Failed password for invalid user guest from 137.184.90.33 port 50772 ssh2 Jan 18 04:35:22 host sshd[2813]: Failed password for invalid user vagrant from 137.184.90.33 port 50590 ssh2 Jan 18 04:35:22 host sshd[2824]: Failed password for invalid user postgres from 137.184.90.33 port 50794 ssh2 Jan 18 04:35:22 host sshd[2823]: Failed password for invalid user admin from 137.184.90.33 port 50678 ssh2 Jan 18 04:35:22 host sshd[2801]: Failed password for invalid user ec2-user from 137.184.90.33 port 50604 ssh2 Jan 18 04:35:22 host sshd[2821]: Failed password for invalid user ansadmin from 137.184.90.33 port 50800 ssh2 Jan 18 04:35:22 host sshd[2804]: Failed password for invalid user root from 137.184.90.33 port 50778 ssh2 Jan 18 04:35:22 host sshd[2800]: Failed password for invalid user centos from 137.184.90.33 port 50716 ssh2 Jan 18 04:35:22 host sshd[2818]: Failed password for invalid user root from 137.184.90.33 port 50876 ssh2 Jan 18 04:35:22 host sshd[2793]: Failed password for invalid user root from 137.184.90.33 port 50822 ssh2 Jan 18 04:35:22 host sshd[2825]: Failed password for invalid user root from 137.184.90.33 port 50662 ssh2 Jan 18 04:35:22 host sshd[2805]: Failed password for invalid user root from 137.184.90.33 port 50668 ssh2 Jan 18 04:35:22 host sshd[2803]: Failed password for invalid user root from 137.184.90.33 port 50618 ssh2 Jan 18 04:35:22 host sshd[2799]: Failed password for invalid user root from 137.184.90.33 port 50592 ssh2 Jan 18 04:35:22 host sshd[2791]: Connection closed by 137.184.90.33 port 50848 [preauth] Jan 18 04:35:22 host sshd[2814]: Connection closed by 137.184.90.33 port 50930 [preauth] Jan 18 04:35:22 host sshd[2815]: Connection closed by 137.184.90.33 port 50942 [preauth] Jan 18 04:35:23 host sshd[2798]: Connection closed by 137.184.90.33 port 50608 [preauth] Jan 18 04:35:23 host sshd[2817]: Connection closed by 137.184.90.33 port 50834 [preauth] Jan 18 04:35:23 host sshd[2806]: Connection closed by 137.184.90.33 port 50700 [preauth] Jan 18 04:35:23 host sshd[2811]: Connection closed by 137.184.90.33 port 50770 [preauth] Jan 18 04:35:23 host sshd[2816]: Connection closed by 137.184.90.33 port 50724 [preauth] Jan 18 04:35:23 host sshd[2812]: Connection closed by 137.184.90.33 port 50846 [preauth] Jan 18 04:35:23 host sshd[2819]: Connection closed by 137.184.90.33 port 50784 [preauth] Jan 18 04:35:23 host sshd[2822]: Connection closed by 137.184.90.33 port 50758 [preauth] Jan 18 04:35:23 host sshd[2820]: Connection closed by 137.184.90.33 port 50772 [preauth] Jan 18 04:35:23 host sshd[2813]: Connection closed by 137.184.90.33 port 50590 [preauth] Jan 18 04:35:23 host sshd[2801]: Connection closed by 137.184.90.33 port 50604 [preauth] Jan 18 04:35:23 host sshd[2821]: Connection closed by 137.184.90.33 port 50800 [preauth] Jan 18 04:35:23 host sshd[2823]: Connection closed by 137.184.90.33 port 50678 [preauth] Jan 18 04:35:23 host sshd[2824]: Connection closed by 137.184.90.33 port 50794 [preauth] Jan 18 04:35:23 host sshd[2804]: Connection closed by 137.184.90.33 port 50778 [preauth] Jan 18 04:35:23 host sshd[2800]: Connection closed by 137.184.90.33 port 50716 [preauth] Jan 18 04:35:23 host sshd[2818]: Connection closed by 137.184.90.33 port 50876 [preauth] Jan 18 04:35:23 host sshd[2793]: Connection closed by 137.184.90.33 port 50822 [preauth] Jan 18 04:35:23 host sshd[2805]: Connection closed by 137.184.90.33 port 50668 [preauth] Jan 18 04:35:23 host sshd[2825]: Connection closed by 137.184.90.33 port 50662 [preauth] Jan 18 04:35:23 host sshd[2803]: Connection closed by 137.184.90.33 port 50618 [preauth] Jan 18 04:35:23 host sshd[2799]: Connection closed by 137.184.90.33 port 50592 [preauth] Jan 18 04:38:53 host sshd[3389]: Invalid user postgres from 195.226.194.242 port 40196 Jan 18 04:38:53 host sshd[3389]: input_userauth_request: invalid user postgres [preauth] Jan 18 04:38:53 host sshd[3389]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:38:53 host sshd[3389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 18 04:38:56 host sshd[3389]: Failed password for invalid user postgres from 195.226.194.242 port 40196 ssh2 Jan 18 04:38:56 host sshd[3389]: Received disconnect from 195.226.194.242 port 40196:11: Bye Bye [preauth] Jan 18 04:38:56 host sshd[3389]: Disconnected from 195.226.194.242 port 40196 [preauth] Jan 18 04:40:27 host sshd[3737]: User root from 59.127.21.21 not allowed because not listed in AllowUsers Jan 18 04:40:27 host sshd[3737]: input_userauth_request: invalid user root [preauth] Jan 18 04:40:27 host unix_chkpwd[3740]: password check failed for user (root) Jan 18 04:40:27 host sshd[3737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.21.21 user=root Jan 18 04:40:27 host sshd[3737]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:40:30 host sshd[3737]: Failed password for invalid user root from 59.127.21.21 port 46853 ssh2 Jan 18 04:40:30 host sshd[3737]: Connection reset by 59.127.21.21 port 46853 [preauth] Jan 18 04:41:25 host sshd[3853]: Bad protocol version identification 'MGLNDD_167.71.234.10_22' from 192.241.198.50 port 52684 Jan 18 04:46:26 host sshd[4657]: User root from 110.78.146.31 not allowed because not listed in AllowUsers Jan 18 04:46:26 host sshd[4657]: input_userauth_request: invalid user root [preauth] Jan 18 04:46:26 host unix_chkpwd[4662]: password check failed for user (root) Jan 18 04:46:26 host sshd[4657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.78.146.31 user=root Jan 18 04:46:26 host sshd[4657]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:46:28 host sshd[4657]: Failed password for invalid user root from 110.78.146.31 port 52678 ssh2 Jan 18 04:46:28 host unix_chkpwd[4686]: password check failed for user (root) Jan 18 04:46:28 host sshd[4657]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:46:30 host sshd[4657]: Failed password for invalid user root from 110.78.146.31 port 52678 ssh2 Jan 18 04:46:30 host unix_chkpwd[4694]: password check failed for user (root) Jan 18 04:46:30 host sshd[4657]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:46:33 host sshd[4657]: Failed password for invalid user root from 110.78.146.31 port 52678 ssh2 Jan 18 04:46:33 host unix_chkpwd[4698]: password check failed for user (root) Jan 18 04:46:33 host sshd[4657]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:46:35 host sshd[4657]: Failed password for invalid user root from 110.78.146.31 port 52678 ssh2 Jan 18 04:47:48 host sshd[4878]: Did not receive identification string from 197.227.21.70 port 50998 Jan 18 04:47:49 host sshd[4879]: Invalid user steam from 197.227.21.70 port 51124 Jan 18 04:47:49 host sshd[4879]: input_userauth_request: invalid user steam [preauth] Jan 18 04:47:49 host sshd[4881]: Invalid user ubuntu from 197.227.21.70 port 51114 Jan 18 04:47:49 host sshd[4881]: input_userauth_request: invalid user ubuntu [preauth] Jan 18 04:47:49 host sshd[4880]: Invalid user user from 197.227.21.70 port 51062 Jan 18 04:47:49 host sshd[4880]: input_userauth_request: invalid user user [preauth] Jan 18 04:47:49 host sshd[4882]: Invalid user admin from 197.227.21.70 port 51110 Jan 18 04:47:49 host sshd[4882]: input_userauth_request: invalid user admin [preauth] Jan 18 04:47:49 host sshd[4887]: Invalid user test from 197.227.21.70 port 51128 Jan 18 04:47:49 host sshd[4887]: input_userauth_request: invalid user test [preauth] Jan 18 04:47:49 host sshd[4888]: Invalid user test from 197.227.21.70 port 51106 Jan 18 04:47:49 host sshd[4888]: input_userauth_request: invalid user test [preauth] Jan 18 04:47:49 host sshd[4891]: Invalid user admin from 197.227.21.70 port 51050 Jan 18 04:47:49 host sshd[4891]: input_userauth_request: invalid user admin [preauth] Jan 18 04:47:49 host sshd[4889]: Invalid user user from 197.227.21.70 port 51118 Jan 18 04:47:49 host sshd[4889]: input_userauth_request: invalid user user [preauth] Jan 18 04:47:49 host sshd[4890]: User root from 197.227.21.70 not allowed because not listed in AllowUsers Jan 18 04:47:49 host sshd[4892]: Invalid user admin from 197.227.21.70 port 51104 Jan 18 04:47:49 host sshd[4890]: input_userauth_request: invalid user root [preauth] Jan 18 04:47:49 host sshd[4892]: input_userauth_request: invalid user admin [preauth] Jan 18 04:47:49 host sshd[4893]: Invalid user ansadmin from 197.227.21.70 port 51108 Jan 18 04:47:49 host sshd[4893]: input_userauth_request: invalid user ansadmin [preauth] Jan 18 04:47:49 host sshd[4894]: Invalid user ubuntu from 197.227.21.70 port 51132 Jan 18 04:47:49 host sshd[4894]: input_userauth_request: invalid user ubuntu [preauth] Jan 18 04:47:49 host sshd[4895]: Invalid user pi from 197.227.21.70 port 51086 Jan 18 04:47:49 host sshd[4895]: input_userauth_request: invalid user pi [preauth] Jan 18 04:47:49 host sshd[4897]: Invalid user postgres from 197.227.21.70 port 51098 Jan 18 04:47:49 host sshd[4897]: input_userauth_request: invalid user postgres [preauth] Jan 18 04:47:49 host sshd[4898]: Invalid user admin from 197.227.21.70 port 51072 Jan 18 04:47:49 host sshd[4898]: input_userauth_request: invalid user admin [preauth] Jan 18 04:47:49 host sshd[4900]: Invalid user postgres from 197.227.21.70 port 51122 Jan 18 04:47:49 host sshd[4900]: input_userauth_request: invalid user postgres [preauth] Jan 18 04:47:49 host sshd[4879]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:49 host sshd[4879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:49 host sshd[4881]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:49 host sshd[4881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:49 host sshd[4880]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:49 host sshd[4880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:49 host sshd[4882]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:49 host sshd[4882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:49 host sshd[4887]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:49 host sshd[4887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:49 host sshd[4888]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:49 host sshd[4888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:49 host sshd[4891]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:49 host sshd[4891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:49 host sshd[4889]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:49 host sshd[4889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:49 host sshd[4892]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:49 host sshd[4892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:49 host sshd[4893]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:49 host sshd[4893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:49 host sshd[4894]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:49 host sshd[4894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:49 host sshd[4895]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:49 host sshd[4895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:49 host sshd[4897]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:49 host sshd[4897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:49 host unix_chkpwd[4916]: password check failed for user (root) Jan 18 04:47:49 host sshd[4890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 user=root Jan 18 04:47:49 host sshd[4890]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:47:49 host sshd[4898]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:49 host sshd[4898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:49 host sshd[4900]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:49 host sshd[4900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:50 host sshd[4914]: Invalid user ftpuser from 197.227.21.70 port 51060 Jan 18 04:47:50 host sshd[4914]: input_userauth_request: invalid user ftpuser [preauth] Jan 18 04:47:51 host sshd[4914]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:51 host sshd[4914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:51 host sshd[4879]: Failed password for invalid user steam from 197.227.21.70 port 51124 ssh2 Jan 18 04:47:51 host sshd[4881]: Failed password for invalid user ubuntu from 197.227.21.70 port 51114 ssh2 Jan 18 04:47:51 host sshd[4880]: Failed password for invalid user user from 197.227.21.70 port 51062 ssh2 Jan 18 04:47:51 host sshd[4882]: Failed password for invalid user admin from 197.227.21.70 port 51110 ssh2 Jan 18 04:47:51 host sshd[4887]: Failed password for invalid user test from 197.227.21.70 port 51128 ssh2 Jan 18 04:47:51 host sshd[4888]: Failed password for invalid user test from 197.227.21.70 port 51106 ssh2 Jan 18 04:47:51 host sshd[4891]: Failed password for invalid user admin from 197.227.21.70 port 51050 ssh2 Jan 18 04:47:51 host sshd[4889]: Failed password for invalid user user from 197.227.21.70 port 51118 ssh2 Jan 18 04:47:51 host sshd[4892]: Failed password for invalid user admin from 197.227.21.70 port 51104 ssh2 Jan 18 04:47:51 host sshd[4893]: Failed password for invalid user ansadmin from 197.227.21.70 port 51108 ssh2 Jan 18 04:47:51 host sshd[4894]: Failed password for invalid user ubuntu from 197.227.21.70 port 51132 ssh2 Jan 18 04:47:51 host sshd[4895]: Failed password for invalid user pi from 197.227.21.70 port 51086 ssh2 Jan 18 04:47:51 host sshd[4897]: Failed password for invalid user postgres from 197.227.21.70 port 51098 ssh2 Jan 18 04:47:51 host sshd[4890]: Failed password for invalid user root from 197.227.21.70 port 51064 ssh2 Jan 18 04:47:51 host sshd[4898]: Failed password for invalid user admin from 197.227.21.70 port 51072 ssh2 Jan 18 04:47:51 host sshd[4900]: Failed password for invalid user postgres from 197.227.21.70 port 51122 ssh2 Jan 18 04:47:51 host sshd[4879]: Connection closed by 197.227.21.70 port 51124 [preauth] Jan 18 04:47:51 host sshd[4881]: Connection closed by 197.227.21.70 port 51114 [preauth] Jan 18 04:47:51 host sshd[4880]: Connection closed by 197.227.21.70 port 51062 [preauth] Jan 18 04:47:51 host sshd[4882]: Connection closed by 197.227.21.70 port 51110 [preauth] Jan 18 04:47:51 host sshd[4887]: Connection closed by 197.227.21.70 port 51128 [preauth] Jan 18 04:47:51 host sshd[4888]: Connection closed by 197.227.21.70 port 51106 [preauth] Jan 18 04:47:51 host sshd[4891]: Connection closed by 197.227.21.70 port 51050 [preauth] Jan 18 04:47:51 host sshd[4889]: Connection closed by 197.227.21.70 port 51118 [preauth] Jan 18 04:47:51 host sshd[4892]: Connection closed by 197.227.21.70 port 51104 [preauth] Jan 18 04:47:51 host sshd[4893]: Connection closed by 197.227.21.70 port 51108 [preauth] Jan 18 04:47:51 host sshd[4894]: Connection closed by 197.227.21.70 port 51132 [preauth] Jan 18 04:47:51 host sshd[4895]: Connection closed by 197.227.21.70 port 51086 [preauth] Jan 18 04:47:51 host sshd[4897]: Connection closed by 197.227.21.70 port 51098 [preauth] Jan 18 04:47:51 host sshd[4890]: Connection closed by 197.227.21.70 port 51064 [preauth] Jan 18 04:47:51 host sshd[4898]: Connection closed by 197.227.21.70 port 51072 [preauth] Jan 18 04:47:51 host sshd[4900]: Connection closed by 197.227.21.70 port 51122 [preauth] Jan 18 04:47:52 host sshd[4918]: Invalid user ubuntu from 197.227.21.70 port 51058 Jan 18 04:47:52 host sshd[4918]: input_userauth_request: invalid user ubuntu [preauth] Jan 18 04:47:52 host sshd[4919]: Invalid user web from 197.227.21.70 port 51096 Jan 18 04:47:52 host sshd[4919]: input_userauth_request: invalid user web [preauth] Jan 18 04:47:52 host sshd[4920]: User root from 197.227.21.70 not allowed because not listed in AllowUsers Jan 18 04:47:52 host sshd[4920]: input_userauth_request: invalid user root [preauth] Jan 18 04:47:52 host sshd[4922]: Invalid user ansadmin from 197.227.21.70 port 51074 Jan 18 04:47:52 host sshd[4922]: input_userauth_request: invalid user ansadmin [preauth] Jan 18 04:47:52 host sshd[4921]: Invalid user postgres from 197.227.21.70 port 51116 Jan 18 04:47:52 host sshd[4921]: input_userauth_request: invalid user postgres [preauth] Jan 18 04:47:52 host sshd[4914]: Failed password for invalid user ftpuser from 197.227.21.70 port 51060 ssh2 Jan 18 04:47:52 host sshd[4923]: Invalid user ansadmin from 197.227.21.70 port 51078 Jan 18 04:47:52 host sshd[4923]: input_userauth_request: invalid user ansadmin [preauth] Jan 18 04:47:53 host sshd[4918]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:53 host sshd[4918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:53 host sshd[4919]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:53 host sshd[4919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:53 host sshd[4922]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:53 host sshd[4921]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:53 host sshd[4922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:53 host sshd[4921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:53 host unix_chkpwd[4931]: password check failed for user (root) Jan 18 04:47:53 host sshd[4920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 user=root Jan 18 04:47:53 host sshd[4920]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 04:47:53 host sshd[4914]: Connection closed by 197.227.21.70 port 51060 [preauth] Jan 18 04:47:53 host sshd[4923]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:47:53 host sshd[4923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.21.70 Jan 18 04:47:54 host sshd[4918]: Failed password for invalid user ubuntu from 197.227.21.70 port 51058 ssh2 Jan 18 04:47:54 host sshd[4919]: Failed password for invalid user web from 197.227.21.70 port 51096 ssh2 Jan 18 04:47:54 host sshd[4921]: Failed password for invalid user postgres from 197.227.21.70 port 51116 ssh2 Jan 18 04:47:54 host sshd[4922]: Failed password for invalid user ansadmin from 197.227.21.70 port 51074 ssh2 Jan 18 04:47:54 host sshd[4920]: Failed password for invalid user root from 197.227.21.70 port 51130 ssh2 Jan 18 04:47:54 host sshd[4923]: Failed password for invalid user ansadmin from 197.227.21.70 port 51078 ssh2 Jan 18 04:50:12 host sshd[5392]: Invalid user telnet from 211.114.93.195 port 58537 Jan 18 04:50:12 host sshd[5392]: input_userauth_request: invalid user telnet [preauth] Jan 18 04:50:12 host sshd[5392]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:50:12 host sshd[5392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.114.93.195 Jan 18 04:50:15 host sshd[5392]: Failed password for invalid user telnet from 211.114.93.195 port 58537 ssh2 Jan 18 04:50:17 host sshd[5392]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:50:19 host sshd[5392]: Failed password for invalid user telnet from 211.114.93.195 port 58537 ssh2 Jan 18 04:50:21 host sshd[5392]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:50:22 host sshd[5392]: Failed password for invalid user telnet from 211.114.93.195 port 58537 ssh2 Jan 18 04:50:23 host sshd[5392]: Failed password for invalid user telnet from 211.114.93.195 port 58537 ssh2 Jan 18 04:50:23 host sshd[5392]: Connection reset by 211.114.93.195 port 58537 [preauth] Jan 18 04:50:23 host sshd[5392]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.114.93.195 Jan 18 04:52:44 host sshd[5884]: Invalid user telnet from 182.70.119.208 port 50988 Jan 18 04:52:44 host sshd[5884]: input_userauth_request: invalid user telnet [preauth] Jan 18 04:52:44 host sshd[5884]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:52:44 host sshd[5884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.70.119.208 Jan 18 04:52:45 host sshd[5884]: Failed password for invalid user telnet from 182.70.119.208 port 50988 ssh2 Jan 18 04:52:45 host sshd[5884]: pam_unix(sshd:auth): check pass; user unknown Jan 18 04:52:47 host sshd[5884]: Failed password for invalid user telnet from 182.70.119.208 port 50988 ssh2 Jan 18 04:52:47 host sshd[5884]: Connection reset by 182.70.119.208 port 50988 [preauth] Jan 18 04:52:47 host sshd[5884]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.70.119.208 Jan 18 05:01:35 host sshd[7306]: Invalid user pi from 91.182.225.37 port 60096 Jan 18 05:01:35 host sshd[7306]: input_userauth_request: invalid user pi [preauth] Jan 18 05:01:35 host sshd[7306]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:01:35 host sshd[7306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.182.225.37 Jan 18 05:01:35 host sshd[7308]: Invalid user pi from 91.182.225.37 port 60104 Jan 18 05:01:35 host sshd[7308]: input_userauth_request: invalid user pi [preauth] Jan 18 05:01:35 host sshd[7308]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:01:35 host sshd[7308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.182.225.37 Jan 18 05:01:37 host sshd[7306]: Failed password for invalid user pi from 91.182.225.37 port 60096 ssh2 Jan 18 05:01:37 host sshd[7306]: Connection closed by 91.182.225.37 port 60096 [preauth] Jan 18 05:01:37 host sshd[7308]: Failed password for invalid user pi from 91.182.225.37 port 60104 ssh2 Jan 18 05:01:37 host sshd[7308]: Connection closed by 91.182.225.37 port 60104 [preauth] Jan 18 05:05:12 host sshd[7823]: Invalid user gitlab-runner from 114.32.176.215 port 40669 Jan 18 05:05:12 host sshd[7823]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 18 05:05:12 host sshd[7823]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:05:12 host sshd[7823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.176.215 Jan 18 05:05:14 host sshd[7823]: Failed password for invalid user gitlab-runner from 114.32.176.215 port 40669 ssh2 Jan 18 05:05:15 host sshd[7823]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:05:17 host sshd[7823]: Failed password for invalid user gitlab-runner from 114.32.176.215 port 40669 ssh2 Jan 18 05:05:18 host sshd[7823]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:05:19 host sshd[7823]: Failed password for invalid user gitlab-runner from 114.32.176.215 port 40669 ssh2 Jan 18 05:05:20 host sshd[7823]: Failed password for invalid user gitlab-runner from 114.32.176.215 port 40669 ssh2 Jan 18 05:05:21 host sshd[7823]: Connection closed by 114.32.176.215 port 40669 [preauth] Jan 18 05:05:21 host sshd[7823]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.176.215 Jan 18 05:08:40 host sshd[8457]: Invalid user installer from 1.55.215.71 port 46566 Jan 18 05:08:40 host sshd[8457]: input_userauth_request: invalid user installer [preauth] Jan 18 05:08:40 host sshd[8457]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:08:40 host sshd[8457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.55.215.71 Jan 18 05:08:42 host sshd[8457]: Failed password for invalid user installer from 1.55.215.71 port 46566 ssh2 Jan 18 05:08:42 host sshd[8457]: Received disconnect from 1.55.215.71 port 46566:11: Bye Bye [preauth] Jan 18 05:08:42 host sshd[8457]: Disconnected from 1.55.215.71 port 46566 [preauth] Jan 18 05:09:09 host sshd[8571]: Invalid user openvpn from 195.226.194.242 port 63462 Jan 18 05:09:09 host sshd[8571]: input_userauth_request: invalid user openvpn [preauth] Jan 18 05:09:09 host sshd[8571]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:09:09 host sshd[8571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 18 05:09:12 host sshd[8571]: Failed password for invalid user openvpn from 195.226.194.242 port 63462 ssh2 Jan 18 05:09:12 host sshd[8571]: Received disconnect from 195.226.194.242 port 63462:11: Bye Bye [preauth] Jan 18 05:09:12 host sshd[8571]: Disconnected from 195.226.194.242 port 63462 [preauth] Jan 18 05:12:30 host sshd[9144]: Did not receive identification string from 101.89.219.59 port 53492 Jan 18 05:12:31 host sshd[9147]: User centos from 101.89.219.59 not allowed because not listed in AllowUsers Jan 18 05:12:31 host sshd[9147]: input_userauth_request: invalid user centos [preauth] Jan 18 05:12:31 host sshd[9148]: Invalid user steam from 101.89.219.59 port 53696 Jan 18 05:12:31 host sshd[9148]: input_userauth_request: invalid user steam [preauth] Jan 18 05:12:31 host sshd[9150]: Invalid user user from 101.89.219.59 port 53700 Jan 18 05:12:31 host sshd[9150]: input_userauth_request: invalid user user [preauth] Jan 18 05:12:31 host sshd[9152]: User root from 101.89.219.59 not allowed because not listed in AllowUsers Jan 18 05:12:31 host sshd[9152]: input_userauth_request: invalid user root [preauth] Jan 18 05:12:31 host sshd[9154]: Invalid user guest from 101.89.219.59 port 53698 Jan 18 05:12:31 host sshd[9154]: input_userauth_request: invalid user guest [preauth] Jan 18 05:12:32 host unix_chkpwd[9159]: password check failed for user (centos) Jan 18 05:12:32 host sshd[9147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.219.59 user=centos Jan 18 05:12:32 host sshd[9148]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:12:32 host sshd[9148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.219.59 Jan 18 05:12:32 host sshd[9150]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:12:32 host sshd[9150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.219.59 Jan 18 05:12:32 host unix_chkpwd[9160]: password check failed for user (root) Jan 18 05:12:32 host sshd[9152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.219.59 user=root Jan 18 05:12:32 host sshd[9152]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 05:12:32 host sshd[9154]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:12:32 host sshd[9154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.219.59 Jan 18 05:12:33 host sshd[9147]: Failed password for invalid user centos from 101.89.219.59 port 53702 ssh2 Jan 18 05:12:33 host sshd[9148]: Failed password for invalid user steam from 101.89.219.59 port 53696 ssh2 Jan 18 05:12:33 host sshd[9150]: Failed password for invalid user user from 101.89.219.59 port 53700 ssh2 Jan 18 05:12:34 host sshd[9152]: Failed password for invalid user root from 101.89.219.59 port 53694 ssh2 Jan 18 05:12:34 host sshd[9154]: Failed password for invalid user guest from 101.89.219.59 port 53698 ssh2 Jan 18 05:12:34 host sshd[9147]: Connection closed by 101.89.219.59 port 53702 [preauth] Jan 18 05:12:34 host sshd[9148]: Connection closed by 101.89.219.59 port 53696 [preauth] Jan 18 05:12:34 host sshd[9150]: Connection closed by 101.89.219.59 port 53700 [preauth] Jan 18 05:12:34 host sshd[9152]: Connection closed by 101.89.219.59 port 53694 [preauth] Jan 18 05:12:34 host sshd[9154]: Connection closed by 101.89.219.59 port 53698 [preauth] Jan 18 05:14:52 host sshd[9533]: Invalid user terraria from 1.55.215.71 port 46382 Jan 18 05:14:52 host sshd[9533]: input_userauth_request: invalid user terraria [preauth] Jan 18 05:14:52 host sshd[9533]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:14:52 host sshd[9533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.55.215.71 Jan 18 05:14:54 host sshd[9533]: Failed password for invalid user terraria from 1.55.215.71 port 46382 ssh2 Jan 18 05:14:54 host sshd[9533]: Received disconnect from 1.55.215.71 port 46382:11: Bye Bye [preauth] Jan 18 05:14:54 host sshd[9533]: Disconnected from 1.55.215.71 port 46382 [preauth] Jan 18 05:16:21 host sshd[9704]: Invalid user mark from 1.55.215.71 port 45376 Jan 18 05:16:21 host sshd[9704]: input_userauth_request: invalid user mark [preauth] Jan 18 05:16:21 host sshd[9704]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:16:21 host sshd[9704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.55.215.71 Jan 18 05:16:23 host sshd[9704]: Failed password for invalid user mark from 1.55.215.71 port 45376 ssh2 Jan 18 05:16:23 host sshd[9704]: Received disconnect from 1.55.215.71 port 45376:11: Bye Bye [preauth] Jan 18 05:16:23 host sshd[9704]: Disconnected from 1.55.215.71 port 45376 [preauth] Jan 18 05:18:36 host sshd[9975]: User root from 114.33.169.67 not allowed because not listed in AllowUsers Jan 18 05:18:36 host sshd[9975]: input_userauth_request: invalid user root [preauth] Jan 18 05:18:36 host unix_chkpwd[9978]: password check failed for user (root) Jan 18 05:18:36 host sshd[9975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.169.67 user=root Jan 18 05:18:36 host sshd[9975]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 05:18:37 host sshd[9975]: Failed password for invalid user root from 114.33.169.67 port 46207 ssh2 Jan 18 05:18:38 host sshd[9975]: Connection reset by 114.33.169.67 port 46207 [preauth] Jan 18 05:19:56 host sshd[10249]: Invalid user ftptest from 194.110.203.109 port 33676 Jan 18 05:19:56 host sshd[10249]: input_userauth_request: invalid user ftptest [preauth] Jan 18 05:19:56 host sshd[10249]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:19:56 host sshd[10249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 05:19:58 host sshd[10249]: Failed password for invalid user ftptest from 194.110.203.109 port 33676 ssh2 Jan 18 05:20:01 host sshd[10249]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:20:03 host sshd[10249]: Failed password for invalid user ftptest from 194.110.203.109 port 33676 ssh2 Jan 18 05:20:06 host sshd[10249]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:20:08 host sshd[10249]: Failed password for invalid user ftptest from 194.110.203.109 port 33676 ssh2 Jan 18 05:20:11 host sshd[10249]: Connection closed by 194.110.203.109 port 33676 [preauth] Jan 18 05:20:11 host sshd[10249]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 05:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 05:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 05:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=wwwresourcehunte user-5=keralaholi user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=wwwkapin user-26=woodpeck user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 05:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 05:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 18 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 18 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 18 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 18 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 18 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Jan 18 05:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 18 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 18 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 18 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 18 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Jan 18 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 18 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 18 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Jan 18 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session closed for user travelboniface Jan 18 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Jan 18 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 18 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 18 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 18 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-pglGLsSL9aA4vmiD.wp-toolkit-identifier Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 18 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-pglGLsSL9aA4vmiD.wp-toolkit-identifier Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 18 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Jan 18 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Jan 18 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Jan 18 05:21:07 host sudo: pam_unix(sudo:session): session closed for user dartsimp Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user straightcurve Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user gifterman Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user phmetals Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user disposeat Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user remysagr Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user vfmassets Jan 18 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 18 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 18 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Jan 18 05:21:09 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 18 05:21:09 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 18 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Jan 18 05:21:09 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Jan 18 05:21:09 host sudo: pam_unix(sudo:session): session closed for user pmcresources Jan 18 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 18 05:21:09 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 18 05:21:09 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 18 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 18 05:21:09 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 18 05:21:09 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 18 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-TyuQLVN1YYajacWB.wp-toolkit-identifier Jan 18 05:21:09 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 18 05:21:09 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 18 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-TyuQLVN1YYajacWB.wp-toolkit-identifier Jan 18 05:21:09 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 18 05:21:09 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 18 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Jan 18 05:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Jan 18 05:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 05:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DzUaTeiTH7xOLMRD.~ Jan 18 05:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DzUaTeiTH7xOLMRD.~' Jan 18 05:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DzUaTeiTH7xOLMRD.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 05:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 05:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:21:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 05:21:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 05:21:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 05:24:35 host sshd[11495]: Invalid user postgres from 211.185.214.155 port 5280 Jan 18 05:24:35 host sshd[11495]: input_userauth_request: invalid user postgres [preauth] Jan 18 05:24:35 host sshd[11495]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:24:35 host sshd[11495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.185.214.155 Jan 18 05:24:37 host sshd[11495]: Failed password for invalid user postgres from 211.185.214.155 port 5280 ssh2 Jan 18 05:24:38 host sshd[11495]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:24:40 host sshd[11495]: Failed password for invalid user postgres from 211.185.214.155 port 5280 ssh2 Jan 18 05:24:40 host sshd[11495]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:24:43 host sshd[11495]: Failed password for invalid user postgres from 211.185.214.155 port 5280 ssh2 Jan 18 05:27:12 host sshd[11914]: Invalid user admin from 59.14.48.160 port 62792 Jan 18 05:27:12 host sshd[11914]: input_userauth_request: invalid user admin [preauth] Jan 18 05:27:12 host sshd[11914]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:27:12 host sshd[11914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.14.48.160 Jan 18 05:27:14 host sshd[11914]: Failed password for invalid user admin from 59.14.48.160 port 62792 ssh2 Jan 18 05:27:15 host sshd[11914]: Failed password for invalid user admin from 59.14.48.160 port 62792 ssh2 Jan 18 05:27:15 host sshd[11914]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:27:17 host sshd[11914]: Failed password for invalid user admin from 59.14.48.160 port 62792 ssh2 Jan 18 05:27:18 host sshd[11914]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:27:20 host sshd[11914]: Failed password for invalid user admin from 59.14.48.160 port 62792 ssh2 Jan 18 05:27:21 host sshd[11914]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:27:23 host sshd[11914]: Failed password for invalid user admin from 59.14.48.160 port 62792 ssh2 Jan 18 05:27:24 host sshd[11914]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:27:26 host sshd[11914]: Failed password for invalid user admin from 59.14.48.160 port 62792 ssh2 Jan 18 05:27:26 host sshd[11914]: error: maximum authentication attempts exceeded for invalid user admin from 59.14.48.160 port 62792 ssh2 [preauth] Jan 18 05:27:26 host sshd[11914]: Disconnecting: Too many authentication failures [preauth] Jan 18 05:27:26 host sshd[11914]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.14.48.160 Jan 18 05:27:26 host sshd[11914]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 18 05:29:36 host sshd[12247]: User root from 222.109.39.194 not allowed because not listed in AllowUsers Jan 18 05:29:36 host sshd[12247]: input_userauth_request: invalid user root [preauth] Jan 18 05:29:36 host unix_chkpwd[12253]: password check failed for user (root) Jan 18 05:29:36 host sshd[12247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.109.39.194 user=root Jan 18 05:29:36 host sshd[12247]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 05:29:38 host sshd[12247]: Failed password for invalid user root from 222.109.39.194 port 62646 ssh2 Jan 18 05:29:39 host unix_chkpwd[12258]: password check failed for user (root) Jan 18 05:29:39 host sshd[12247]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 05:29:40 host sshd[12247]: Failed password for invalid user root from 222.109.39.194 port 62646 ssh2 Jan 18 05:29:41 host sshd[12247]: Connection reset by 222.109.39.194 port 62646 [preauth] Jan 18 05:29:41 host sshd[12247]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.109.39.194 user=root Jan 18 05:36:03 host sshd[13165]: Invalid user ubnt from 14.46.175.37 port 62430 Jan 18 05:36:03 host sshd[13165]: input_userauth_request: invalid user ubnt [preauth] Jan 18 05:36:03 host sshd[13165]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:36:03 host sshd[13165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.46.175.37 Jan 18 05:36:05 host sshd[13165]: Failed password for invalid user ubnt from 14.46.175.37 port 62430 ssh2 Jan 18 05:36:06 host sshd[13165]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:36:08 host sshd[13165]: Failed password for invalid user ubnt from 14.46.175.37 port 62430 ssh2 Jan 18 05:36:08 host sshd[13165]: Failed password for invalid user ubnt from 14.46.175.37 port 62430 ssh2 Jan 18 05:36:09 host sshd[13165]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:36:11 host sshd[13165]: Failed password for invalid user ubnt from 14.46.175.37 port 62430 ssh2 Jan 18 05:36:11 host sshd[13165]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:36:13 host sshd[13165]: Failed password for invalid user ubnt from 14.46.175.37 port 62430 ssh2 Jan 18 05:52:13 host sshd[15758]: Connection reset by 113.180.187.138 port 33385 [preauth] Jan 18 05:54:10 host sshd[15992]: User root from 114.35.40.35 not allowed because not listed in AllowUsers Jan 18 05:54:10 host sshd[15992]: input_userauth_request: invalid user root [preauth] Jan 18 05:54:10 host unix_chkpwd[16000]: password check failed for user (root) Jan 18 05:54:10 host sshd[15992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.40.35 user=root Jan 18 05:54:10 host sshd[15992]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 05:54:12 host sshd[15992]: Failed password for invalid user root from 114.35.40.35 port 54329 ssh2 Jan 18 05:54:13 host unix_chkpwd[16005]: password check failed for user (root) Jan 18 05:54:13 host sshd[15992]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 05:54:15 host sshd[15992]: Failed password for invalid user root from 114.35.40.35 port 54329 ssh2 Jan 18 05:54:17 host unix_chkpwd[16009]: password check failed for user (root) Jan 18 05:54:17 host sshd[15992]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 05:54:19 host sshd[15992]: Failed password for invalid user root from 114.35.40.35 port 54329 ssh2 Jan 18 05:54:20 host unix_chkpwd[16015]: password check failed for user (root) Jan 18 05:54:20 host sshd[15992]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 05:54:23 host sshd[15992]: Failed password for invalid user root from 114.35.40.35 port 54329 ssh2 Jan 18 05:57:09 host sshd[16527]: User root from 181.191.9.163 not allowed because not listed in AllowUsers Jan 18 05:57:09 host sshd[16527]: input_userauth_request: invalid user root [preauth] Jan 18 05:57:09 host unix_chkpwd[16533]: password check failed for user (root) Jan 18 05:57:09 host sshd[16527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.191.9.163 user=root Jan 18 05:57:09 host sshd[16527]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 05:57:11 host sshd[16527]: Failed password for invalid user root from 181.191.9.163 port 49250 ssh2 Jan 18 05:57:12 host sshd[16527]: Received disconnect from 181.191.9.163 port 49250:11: Bye Bye [preauth] Jan 18 05:57:12 host sshd[16527]: Disconnected from 181.191.9.163 port 49250 [preauth] Jan 18 05:57:17 host sshd[16547]: User root from 150.230.87.21 not allowed because not listed in AllowUsers Jan 18 05:57:17 host sshd[16547]: input_userauth_request: invalid user root [preauth] Jan 18 05:57:17 host unix_chkpwd[16551]: password check failed for user (root) Jan 18 05:57:17 host sshd[16547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.230.87.21 user=root Jan 18 05:57:17 host sshd[16547]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 05:57:19 host sshd[16547]: Failed password for invalid user root from 150.230.87.21 port 47140 ssh2 Jan 18 05:57:20 host sshd[16547]: Received disconnect from 150.230.87.21 port 47140:11: Bye Bye [preauth] Jan 18 05:57:20 host sshd[16547]: Disconnected from 150.230.87.21 port 47140 [preauth] Jan 18 05:57:50 host sshd[16622]: Invalid user bot from 14.225.217.182 port 46704 Jan 18 05:57:50 host sshd[16622]: input_userauth_request: invalid user bot [preauth] Jan 18 05:57:50 host sshd[16622]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:57:50 host sshd[16622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.217.182 Jan 18 05:57:52 host sshd[16622]: Failed password for invalid user bot from 14.225.217.182 port 46704 ssh2 Jan 18 05:57:52 host sshd[16622]: Received disconnect from 14.225.217.182 port 46704:11: Bye Bye [preauth] Jan 18 05:57:52 host sshd[16622]: Disconnected from 14.225.217.182 port 46704 [preauth] Jan 18 05:58:19 host sshd[16665]: Connection closed by 167.248.133.60 port 47042 [preauth] Jan 18 05:58:38 host sshd[16739]: Invalid user admin from 61.83.61.187 port 60303 Jan 18 05:58:38 host sshd[16739]: input_userauth_request: invalid user admin [preauth] Jan 18 05:58:38 host sshd[16739]: pam_unix(sshd:auth): check pass; user unknown Jan 18 05:58:38 host sshd[16739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.83.61.187 Jan 18 05:58:40 host sshd[16739]: Failed password for invalid user admin from 61.83.61.187 port 60303 ssh2 Jan 18 05:58:40 host sshd[16739]: Connection reset by 61.83.61.187 port 60303 [preauth] Jan 18 06:01:11 host sshd[17105]: User root from 143.110.190.26 not allowed because not listed in AllowUsers Jan 18 06:01:11 host sshd[17105]: input_userauth_request: invalid user root [preauth] Jan 18 06:01:11 host unix_chkpwd[17107]: password check failed for user (root) Jan 18 06:01:11 host sshd[17105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.190.26 user=root Jan 18 06:01:11 host sshd[17105]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 06:01:13 host sshd[17105]: Failed password for invalid user root from 143.110.190.26 port 59510 ssh2 Jan 18 06:01:13 host sshd[17105]: Received disconnect from 143.110.190.26 port 59510:11: Bye Bye [preauth] Jan 18 06:01:13 host sshd[17105]: Disconnected from 143.110.190.26 port 59510 [preauth] Jan 18 06:01:40 host sshd[17190]: User root from 14.225.217.182 not allowed because not listed in AllowUsers Jan 18 06:01:40 host sshd[17190]: input_userauth_request: invalid user root [preauth] Jan 18 06:01:40 host unix_chkpwd[17192]: password check failed for user (root) Jan 18 06:01:40 host sshd[17190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.225.217.182 user=root Jan 18 06:01:40 host sshd[17190]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 06:01:42 host sshd[17190]: Failed password for invalid user root from 14.225.217.182 port 59516 ssh2 Jan 18 06:01:42 host sshd[17190]: Received disconnect from 14.225.217.182 port 59516:11: Bye Bye [preauth] Jan 18 06:01:42 host sshd[17190]: Disconnected from 14.225.217.182 port 59516 [preauth] Jan 18 06:02:03 host sshd[17255]: Invalid user max from 150.230.87.21 port 47328 Jan 18 06:02:03 host sshd[17255]: input_userauth_request: invalid user max [preauth] Jan 18 06:02:03 host sshd[17255]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:02:03 host sshd[17255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.230.87.21 Jan 18 06:02:04 host sshd[17255]: Failed password for invalid user max from 150.230.87.21 port 47328 ssh2 Jan 18 06:02:05 host sshd[17255]: Received disconnect from 150.230.87.21 port 47328:11: Bye Bye [preauth] Jan 18 06:02:05 host sshd[17255]: Disconnected from 150.230.87.21 port 47328 [preauth] Jan 18 06:02:38 host sshd[17498]: User root from 181.191.9.163 not allowed because not listed in AllowUsers Jan 18 06:02:38 host sshd[17498]: input_userauth_request: invalid user root [preauth] Jan 18 06:02:38 host unix_chkpwd[17502]: password check failed for user (root) Jan 18 06:02:38 host sshd[17498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.191.9.163 user=root Jan 18 06:02:38 host sshd[17498]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 06:02:40 host sshd[17498]: Failed password for invalid user root from 181.191.9.163 port 42664 ssh2 Jan 18 06:02:40 host sshd[17498]: Received disconnect from 181.191.9.163 port 42664:11: Bye Bye [preauth] Jan 18 06:02:40 host sshd[17498]: Disconnected from 181.191.9.163 port 42664 [preauth] Jan 18 06:02:43 host sshd[17520]: Invalid user vishnu from 143.110.190.26 port 54954 Jan 18 06:02:43 host sshd[17520]: input_userauth_request: invalid user vishnu [preauth] Jan 18 06:02:43 host sshd[17520]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:02:43 host sshd[17520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.190.26 Jan 18 06:02:45 host sshd[17520]: Failed password for invalid user vishnu from 143.110.190.26 port 54954 ssh2 Jan 18 06:02:45 host sshd[17520]: Received disconnect from 143.110.190.26 port 54954:11: Bye Bye [preauth] Jan 18 06:02:45 host sshd[17520]: Disconnected from 143.110.190.26 port 54954 [preauth] Jan 18 06:04:27 host sshd[17876]: Invalid user vadmin from 219.85.47.26 port 49958 Jan 18 06:04:27 host sshd[17876]: input_userauth_request: invalid user vadmin [preauth] Jan 18 06:04:27 host sshd[17876]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:04:27 host sshd[17876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.85.47.26 Jan 18 06:04:29 host sshd[17876]: Failed password for invalid user vadmin from 219.85.47.26 port 49958 ssh2 Jan 18 06:04:30 host sshd[17876]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:04:32 host sshd[17876]: Failed password for invalid user vadmin from 219.85.47.26 port 49958 ssh2 Jan 18 06:04:33 host sshd[17876]: Failed password for invalid user vadmin from 219.85.47.26 port 49958 ssh2 Jan 18 06:04:34 host sshd[17876]: Connection closed by 219.85.47.26 port 49958 [preauth] Jan 18 06:04:34 host sshd[17876]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.85.47.26 Jan 18 06:04:37 host sshd[17909]: User root from 222.101.75.181 not allowed because not listed in AllowUsers Jan 18 06:04:37 host sshd[17909]: input_userauth_request: invalid user root [preauth] Jan 18 06:04:37 host unix_chkpwd[17913]: password check failed for user (root) Jan 18 06:04:37 host sshd[17909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.101.75.181 user=root Jan 18 06:04:37 host sshd[17909]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 06:04:39 host sshd[17909]: Failed password for invalid user root from 222.101.75.181 port 60148 ssh2 Jan 18 06:04:41 host unix_chkpwd[17916]: password check failed for user (root) Jan 18 06:04:41 host sshd[17909]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 06:04:42 host sshd[17909]: Failed password for invalid user root from 222.101.75.181 port 60148 ssh2 Jan 18 06:04:44 host unix_chkpwd[17921]: password check failed for user (root) Jan 18 06:04:44 host sshd[17909]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 06:04:46 host sshd[17909]: Failed password for invalid user root from 222.101.75.181 port 60148 ssh2 Jan 18 06:04:47 host unix_chkpwd[17924]: password check failed for user (root) Jan 18 06:04:47 host sshd[17909]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 06:04:49 host sshd[17909]: Failed password for invalid user root from 222.101.75.181 port 60148 ssh2 Jan 18 06:09:58 host sshd[18721]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 18 06:09:58 host sshd[18721]: input_userauth_request: invalid user root [preauth] Jan 18 06:09:58 host unix_chkpwd[18726]: password check failed for user (root) Jan 18 06:09:58 host sshd[18721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 18 06:09:58 host sshd[18721]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 06:10:00 host sshd[18721]: Failed password for invalid user root from 195.226.194.242 port 53402 ssh2 Jan 18 06:10:00 host sshd[18721]: Received disconnect from 195.226.194.242 port 53402:11: Bye Bye [preauth] Jan 18 06:10:00 host sshd[18721]: Disconnected from 195.226.194.242 port 53402 [preauth] Jan 18 06:15:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 06:15:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:15:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:15:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 06:15:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:15:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:15:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 06:15:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:15:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:15:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 06:15:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:15:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:15:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 06:15:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:15:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:15:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 06:15:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:15:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:15:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 06:15:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:15:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 06:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 06:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=keralaholi user-2=wwwresourcehunte user-3=wwwrmswll user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=cochintaxi user-11=wwwkaretakers user-12=wwwnexidigital user-13=mrsclean user-14=palco123 user-15=gifterman user-16=phmetals user-17=kottayamcalldriv user-18=straightcurve user-19=wwwletsstalkfood user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=shalinijames user-25=wwwtestugo user-26=wwwkapin user-27=woodpeck user-28=disposeat user-29=remysagr user-30=wwwkmaorg feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 06:21:08 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 06:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 06:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-xuNoapPP6Jw0i47G.~ Jan 18 06:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-xuNoapPP6Jw0i47G.~' Jan 18 06:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-xuNoapPP6Jw0i47G.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 06:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 06:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 06:21:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 06:21:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 06:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 06:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 06:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 06:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 06:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 06:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 06:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 06:24:55 host sshd[21445]: Connection closed by 172.104.11.46 port 18846 [preauth] Jan 18 06:24:56 host sshd[21448]: Connection closed by 172.104.11.46 port 18848 [preauth] Jan 18 06:24:58 host sshd[21451]: Connection closed by 172.104.11.46 port 18860 [preauth] Jan 18 06:29:13 host sshd[22059]: Invalid user vadmin from 219.240.197.127 port 61507 Jan 18 06:29:13 host sshd[22059]: input_userauth_request: invalid user vadmin [preauth] Jan 18 06:29:13 host sshd[22059]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:29:13 host sshd[22059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.240.197.127 Jan 18 06:29:15 host sshd[22059]: Failed password for invalid user vadmin from 219.240.197.127 port 61507 ssh2 Jan 18 06:29:15 host sshd[22059]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:29:17 host sshd[22059]: Failed password for invalid user vadmin from 219.240.197.127 port 61507 ssh2 Jan 18 06:29:17 host sshd[22059]: Connection closed by 219.240.197.127 port 61507 [preauth] Jan 18 06:29:17 host sshd[22059]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.240.197.127 Jan 18 06:36:46 host sshd[23375]: User root from 72.76.221.152 not allowed because not listed in AllowUsers Jan 18 06:36:46 host sshd[23375]: input_userauth_request: invalid user root [preauth] Jan 18 06:36:46 host unix_chkpwd[23379]: password check failed for user (root) Jan 18 06:36:46 host sshd[23375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.76.221.152 user=root Jan 18 06:36:46 host sshd[23375]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 06:36:48 host sshd[23375]: Failed password for invalid user root from 72.76.221.152 port 58098 ssh2 Jan 18 06:36:49 host sshd[23375]: Connection reset by 72.76.221.152 port 58098 [preauth] Jan 18 06:55:15 host sshd[26435]: Did not receive identification string from 139.59.152.202 port 60988 Jan 18 06:55:17 host sshd[26438]: Invalid user pi from 139.59.152.202 port 39080 Jan 18 06:55:17 host sshd[26438]: input_userauth_request: invalid user pi [preauth] Jan 18 06:55:17 host sshd[26442]: Invalid user admin from 139.59.152.202 port 39070 Jan 18 06:55:17 host sshd[26442]: input_userauth_request: invalid user admin [preauth] Jan 18 06:55:17 host sshd[26439]: Invalid user ftpuser from 139.59.152.202 port 39074 Jan 18 06:55:17 host sshd[26439]: input_userauth_request: invalid user ftpuser [preauth] Jan 18 06:55:17 host sshd[26443]: User root from 139.59.152.202 not allowed because not listed in AllowUsers Jan 18 06:55:17 host sshd[26443]: input_userauth_request: invalid user root [preauth] Jan 18 06:55:17 host sshd[26437]: Invalid user admin from 139.59.152.202 port 39056 Jan 18 06:55:17 host sshd[26437]: input_userauth_request: invalid user admin [preauth] Jan 18 06:55:17 host sshd[26436]: User root from 139.59.152.202 not allowed because not listed in AllowUsers Jan 18 06:55:17 host sshd[26436]: input_userauth_request: invalid user root [preauth] Jan 18 06:55:17 host sshd[26441]: Invalid user halo from 139.59.152.202 port 39064 Jan 18 06:55:17 host sshd[26441]: input_userauth_request: invalid user halo [preauth] Jan 18 06:55:17 host sshd[26448]: Invalid user web from 139.59.152.202 port 39048 Jan 18 06:55:17 host sshd[26444]: Invalid user test from 139.59.152.202 port 39104 Jan 18 06:55:17 host sshd[26440]: Invalid user web from 139.59.152.202 port 39034 Jan 18 06:55:17 host sshd[26444]: input_userauth_request: invalid user test [preauth] Jan 18 06:55:17 host sshd[26448]: input_userauth_request: invalid user web [preauth] Jan 18 06:55:17 host sshd[26440]: input_userauth_request: invalid user web [preauth] Jan 18 06:55:17 host sshd[26446]: Invalid user ubuntu from 139.59.152.202 port 39062 Jan 18 06:55:17 host sshd[26445]: Invalid user esuser from 139.59.152.202 port 39066 Jan 18 06:55:17 host sshd[26447]: Invalid user ubuntu from 139.59.152.202 port 39058 Jan 18 06:55:17 host sshd[26445]: input_userauth_request: invalid user esuser [preauth] Jan 18 06:55:17 host sshd[26446]: input_userauth_request: invalid user ubuntu [preauth] Jan 18 06:55:17 host sshd[26447]: input_userauth_request: invalid user ubuntu [preauth] Jan 18 06:55:17 host sshd[26449]: Invalid user steam from 139.59.152.202 port 39098 Jan 18 06:55:17 host sshd[26449]: input_userauth_request: invalid user steam [preauth] Jan 18 06:55:17 host sshd[26450]: Invalid user postgres from 139.59.152.202 port 39106 Jan 18 06:55:17 host sshd[26452]: Invalid user ubuntu from 139.59.152.202 port 39072 Jan 18 06:55:17 host sshd[26450]: input_userauth_request: invalid user postgres [preauth] Jan 18 06:55:17 host sshd[26452]: input_userauth_request: invalid user ubuntu [preauth] Jan 18 06:55:17 host sshd[26451]: User root from 139.59.152.202 not allowed because not listed in AllowUsers Jan 18 06:55:17 host sshd[26451]: input_userauth_request: invalid user root [preauth] Jan 18 06:55:17 host sshd[26453]: Invalid user vagrant from 139.59.152.202 port 39032 Jan 18 06:55:17 host sshd[26453]: input_userauth_request: invalid user vagrant [preauth] Jan 18 06:55:17 host sshd[26454]: Invalid user ansible from 139.59.152.202 port 39068 Jan 18 06:55:17 host sshd[26458]: Invalid user testuser from 139.59.152.202 port 39086 Jan 18 06:55:17 host sshd[26454]: input_userauth_request: invalid user ansible [preauth] Jan 18 06:55:17 host sshd[26458]: input_userauth_request: invalid user testuser [preauth] Jan 18 06:55:17 host sshd[26459]: Invalid user emqx from 139.59.152.202 port 39040 Jan 18 06:55:17 host sshd[26461]: User root from 139.59.152.202 not allowed because not listed in AllowUsers Jan 18 06:55:17 host sshd[26459]: input_userauth_request: invalid user emqx [preauth] Jan 18 06:55:17 host sshd[26461]: input_userauth_request: invalid user root [preauth] Jan 18 06:55:17 host sshd[26460]: Invalid user postgres from 139.59.152.202 port 39030 Jan 18 06:55:17 host sshd[26460]: input_userauth_request: invalid user postgres [preauth] Jan 18 06:55:17 host sshd[26465]: Invalid user ubnt from 139.59.152.202 port 39090 Jan 18 06:55:17 host sshd[26465]: input_userauth_request: invalid user ubnt [preauth] Jan 18 06:55:17 host sshd[26439]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26442]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host sshd[26442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host sshd[26438]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host sshd[26437]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host sshd[26441]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host sshd[26444]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host sshd[26440]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host sshd[26448]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host unix_chkpwd[26488]: password check failed for user (root) Jan 18 06:55:17 host unix_chkpwd[26489]: password check failed for user (root) Jan 18 06:55:17 host sshd[26436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 user=root Jan 18 06:55:17 host sshd[26436]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 06:55:17 host sshd[26443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 user=root Jan 18 06:55:17 host sshd[26443]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 06:55:17 host sshd[26445]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26446]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host sshd[26446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host sshd[26447]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host sshd[26449]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host sshd[26450]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host sshd[26452]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host sshd[26453]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host sshd[26454]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host sshd[26458]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host sshd[26459]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host unix_chkpwd[26490]: password check failed for user (root) Jan 18 06:55:17 host sshd[26451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 user=root Jan 18 06:55:17 host sshd[26451]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 06:55:17 host sshd[26460]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:17 host unix_chkpwd[26491]: password check failed for user (root) Jan 18 06:55:17 host sshd[26461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 user=root Jan 18 06:55:17 host sshd[26461]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 06:55:17 host sshd[26465]: pam_unix(sshd:auth): check pass; user unknown Jan 18 06:55:17 host sshd[26465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.152.202 Jan 18 06:55:19 host sshd[26439]: Failed password for invalid user ftpuser from 139.59.152.202 port 39074 ssh2 Jan 18 06:55:19 host sshd[26442]: Failed password for invalid user admin from 139.59.152.202 port 39070 ssh2 Jan 18 06:55:19 host sshd[26438]: Failed password for invalid user pi from 139.59.152.202 port 39080 ssh2 Jan 18 06:55:19 host sshd[26441]: Failed password for invalid user halo from 139.59.152.202 port 39064 ssh2 Jan 18 06:55:19 host sshd[26437]: Failed password for invalid user admin from 139.59.152.202 port 39056 ssh2 Jan 18 06:55:19 host sshd[26444]: Failed password for invalid user test from 139.59.152.202 port 39104 ssh2 Jan 18 06:55:19 host sshd[26440]: Failed password for invalid user web from 139.59.152.202 port 39034 ssh2 Jan 18 06:55:19 host sshd[26448]: Failed password for invalid user web from 139.59.152.202 port 39048 ssh2 Jan 18 06:55:19 host sshd[26436]: Failed password for invalid user root from 139.59.152.202 port 39092 ssh2 Jan 18 06:55:19 host sshd[26443]: Failed password for invalid user root from 139.59.152.202 port 39088 ssh2 Jan 18 06:55:19 host sshd[26446]: Failed password for invalid user ubuntu from 139.59.152.202 port 39062 ssh2 Jan 18 06:55:19 host sshd[26445]: Failed password for invalid user esuser from 139.59.152.202 port 39066 ssh2 Jan 18 06:55:19 host sshd[26447]: Failed password for invalid user ubuntu from 139.59.152.202 port 39058 ssh2 Jan 18 06:55:19 host sshd[26449]: Failed password for invalid user steam from 139.59.152.202 port 39098 ssh2 Jan 18 06:55:19 host sshd[26450]: Failed password for invalid user postgres from 139.59.152.202 port 39106 ssh2 Jan 18 06:55:19 host sshd[26452]: Failed password for invalid user ubuntu from 139.59.152.202 port 39072 ssh2 Jan 18 06:55:20 host sshd[26453]: Failed password for invalid user vagrant from 139.59.152.202 port 39032 ssh2 Jan 18 06:55:20 host sshd[26454]: Failed password for invalid user ansible from 139.59.152.202 port 39068 ssh2 Jan 18 06:55:20 host sshd[26458]: Failed password for invalid user testuser from 139.59.152.202 port 39086 ssh2 Jan 18 06:55:20 host sshd[26459]: Failed password for invalid user emqx from 139.59.152.202 port 39040 ssh2 Jan 18 06:55:20 host sshd[26451]: Failed password for invalid user root from 139.59.152.202 port 39050 ssh2 Jan 18 06:55:20 host sshd[26460]: Failed password for invalid user postgres from 139.59.152.202 port 39030 ssh2 Jan 18 06:55:20 host sshd[26461]: Failed password for invalid user root from 139.59.152.202 port 39084 ssh2 Jan 18 06:55:20 host sshd[26465]: Failed password for invalid user ubnt from 139.59.152.202 port 39090 ssh2 Jan 18 06:55:20 host sshd[26439]: Connection closed by 139.59.152.202 port 39074 [preauth] Jan 18 06:55:20 host sshd[26438]: Connection closed by 139.59.152.202 port 39080 [preauth] Jan 18 06:55:20 host sshd[26442]: Connection closed by 139.59.152.202 port 39070 [preauth] Jan 18 06:55:20 host sshd[26437]: Connection closed by 139.59.152.202 port 39056 [preauth] Jan 18 06:55:20 host sshd[26448]: Connection closed by 139.59.152.202 port 39048 [preauth] Jan 18 06:55:20 host sshd[26440]: Connection closed by 139.59.152.202 port 39034 [preauth] Jan 18 06:55:20 host sshd[26441]: Connection closed by 139.59.152.202 port 39064 [preauth] Jan 18 06:55:20 host sshd[26444]: Connection closed by 139.59.152.202 port 39104 [preauth] Jan 18 06:55:20 host sshd[26443]: Connection closed by 139.59.152.202 port 39088 [preauth] Jan 18 06:55:20 host sshd[26436]: Connection closed by 139.59.152.202 port 39092 [preauth] Jan 18 07:02:33 host sshd[27859]: Invalid user fu from 194.110.203.109 port 54678 Jan 18 07:02:33 host sshd[27859]: input_userauth_request: invalid user fu [preauth] Jan 18 07:02:33 host sshd[27859]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:02:33 host sshd[27859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 07:02:35 host sshd[27859]: Failed password for invalid user fu from 194.110.203.109 port 54678 ssh2 Jan 18 07:02:38 host sshd[27859]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:02:40 host sshd[27859]: Failed password for invalid user fu from 194.110.203.109 port 54678 ssh2 Jan 18 07:02:43 host sshd[27859]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:02:45 host sshd[27859]: Failed password for invalid user fu from 194.110.203.109 port 54678 ssh2 Jan 18 07:02:49 host sshd[27859]: Connection closed by 194.110.203.109 port 54678 [preauth] Jan 18 07:02:49 host sshd[27859]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 07:03:02 host sshd[27907]: Invalid user super from 171.243.9.242 port 35522 Jan 18 07:03:02 host sshd[27907]: input_userauth_request: invalid user super [preauth] Jan 18 07:03:02 host sshd[27907]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:03:02 host sshd[27907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.243.9.242 Jan 18 07:03:04 host sshd[27907]: Failed password for invalid user super from 171.243.9.242 port 35522 ssh2 Jan 18 07:03:05 host sshd[27907]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:03:07 host sshd[27907]: Failed password for invalid user super from 171.243.9.242 port 35522 ssh2 Jan 18 07:03:08 host sshd[27907]: Connection reset by 171.243.9.242 port 35522 [preauth] Jan 18 07:03:08 host sshd[27907]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.243.9.242 Jan 18 07:03:35 host sshd[28004]: User root from 114.35.27.243 not allowed because not listed in AllowUsers Jan 18 07:03:35 host sshd[28004]: input_userauth_request: invalid user root [preauth] Jan 18 07:03:35 host unix_chkpwd[28009]: password check failed for user (root) Jan 18 07:03:35 host sshd[28004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.27.243 user=root Jan 18 07:03:35 host sshd[28004]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 07:03:38 host sshd[28004]: Failed password for invalid user root from 114.35.27.243 port 60918 ssh2 Jan 18 07:03:39 host unix_chkpwd[28017]: password check failed for user (root) Jan 18 07:03:39 host sshd[28004]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 07:03:41 host sshd[28004]: Failed password for invalid user root from 114.35.27.243 port 60918 ssh2 Jan 18 07:03:41 host unix_chkpwd[28022]: password check failed for user (root) Jan 18 07:03:41 host sshd[28004]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 07:03:43 host sshd[28004]: Failed password for invalid user root from 114.35.27.243 port 60918 ssh2 Jan 18 07:03:44 host unix_chkpwd[28026]: password check failed for user (root) Jan 18 07:03:44 host sshd[28004]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 07:03:45 host sshd[28004]: Failed password for invalid user root from 114.35.27.243 port 60918 ssh2 Jan 18 07:10:30 host sshd[29127]: Invalid user suporte from 195.226.194.242 port 44332 Jan 18 07:10:30 host sshd[29127]: input_userauth_request: invalid user suporte [preauth] Jan 18 07:10:30 host sshd[29127]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:10:30 host sshd[29127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 18 07:10:31 host sshd[29127]: Failed password for invalid user suporte from 195.226.194.242 port 44332 ssh2 Jan 18 07:10:32 host sshd[29127]: Received disconnect from 195.226.194.242 port 44332:11: Bye Bye [preauth] Jan 18 07:10:32 host sshd[29127]: Disconnected from 195.226.194.242 port 44332 [preauth] Jan 18 07:17:09 host sshd[30181]: Invalid user marvin from 107.189.30.59 port 42932 Jan 18 07:17:09 host sshd[30181]: input_userauth_request: invalid user marvin [preauth] Jan 18 07:17:09 host sshd[30181]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:17:09 host sshd[30181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 18 07:17:11 host sshd[30181]: Failed password for invalid user marvin from 107.189.30.59 port 42932 ssh2 Jan 18 07:17:12 host sshd[30181]: Connection closed by 107.189.30.59 port 42932 [preauth] Jan 18 07:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=bonifacegroup user-2=wwwevmhonda user-3=wwwletsstalkfood user-4=straightcurve user-5=gifterman user-6=palco123 user-7=phmetals user-8=kottayamcalldriv user-9=mrsclean user-10=wwwnexidigital user-11=remysagr user-12=disposeat user-13=wwwkmaorg user-14=wwwkapin user-15=woodpeck user-16=vfmassets user-17=wwwtestugo user-18=shalinijames user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=wwwrmswll user-23=wwwresourcehunte user-24=keralaholi user-25=ugotscom user-26=cochintaxi user-27=wwwkaretakers user-28=dartsimp user-29=a2zgroup user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 07:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IfUa9wzVHCSMvLiC.~ Jan 18 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IfUa9wzVHCSMvLiC.~' Jan 18 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-IfUa9wzVHCSMvLiC.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 07:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 07:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 07:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 07:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 07:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 07:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 07:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 07:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 07:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 07:22:00 host sshd[31187]: Bad protocol version identification 'ABCDEFGHIJKLMNOPQRSTUVWXYZ9999' from 172.104.131.24 port 38914 Jan 18 07:24:43 host sshd[31772]: Did not receive identification string from 43.142.76.35 port 40434 Jan 18 07:24:44 host sshd[31775]: Invalid user ec2-user from 43.142.76.35 port 45994 Jan 18 07:24:44 host sshd[31775]: input_userauth_request: invalid user ec2-user [preauth] Jan 18 07:24:44 host sshd[31776]: Invalid user bot from 43.142.76.35 port 45970 Jan 18 07:24:44 host sshd[31777]: Invalid user user from 43.142.76.35 port 45954 Jan 18 07:24:44 host sshd[31777]: input_userauth_request: invalid user user [preauth] Jan 18 07:24:44 host sshd[31776]: input_userauth_request: invalid user bot [preauth] Jan 18 07:24:44 host sshd[31779]: Invalid user vagrant from 43.142.76.35 port 46002 Jan 18 07:24:44 host sshd[31779]: input_userauth_request: invalid user vagrant [preauth] Jan 18 07:24:44 host sshd[31783]: Invalid user postgres from 43.142.76.35 port 46032 Jan 18 07:24:44 host sshd[31783]: input_userauth_request: invalid user postgres [preauth] Jan 18 07:24:44 host sshd[31778]: Invalid user admin from 43.142.76.35 port 45962 Jan 18 07:24:44 host sshd[31778]: input_userauth_request: invalid user admin [preauth] Jan 18 07:24:44 host sshd[31782]: User root from 43.142.76.35 not allowed because not listed in AllowUsers Jan 18 07:24:44 host sshd[31782]: input_userauth_request: invalid user root [preauth] Jan 18 07:24:44 host sshd[31780]: Invalid user oracle from 43.142.76.35 port 46012 Jan 18 07:24:44 host sshd[31780]: input_userauth_request: invalid user oracle [preauth] Jan 18 07:24:44 host sshd[31781]: User root from 43.142.76.35 not allowed because not listed in AllowUsers Jan 18 07:24:44 host sshd[31781]: input_userauth_request: invalid user root [preauth] Jan 18 07:24:44 host sshd[31784]: Invalid user user from 43.142.76.35 port 45966 Jan 18 07:24:44 host sshd[31784]: input_userauth_request: invalid user user [preauth] Jan 18 07:24:44 host sshd[31789]: Invalid user steam from 43.142.76.35 port 45998 Jan 18 07:24:44 host sshd[31789]: input_userauth_request: invalid user steam [preauth] Jan 18 07:24:44 host sshd[31785]: Invalid user oracle from 43.142.76.35 port 45968 Jan 18 07:24:44 host sshd[31785]: input_userauth_request: invalid user oracle [preauth] Jan 18 07:24:44 host sshd[31787]: Invalid user es from 43.142.76.35 port 45986 Jan 18 07:24:44 host sshd[31787]: input_userauth_request: invalid user es [preauth] Jan 18 07:24:45 host sshd[31795]: Invalid user ansadmin from 43.142.76.35 port 46024 Jan 18 07:24:45 host sshd[31795]: input_userauth_request: invalid user ansadmin [preauth] Jan 18 07:24:45 host sshd[31793]: Invalid user postgres from 43.142.76.35 port 45956 Jan 18 07:24:45 host sshd[31793]: input_userauth_request: invalid user postgres [preauth] Jan 18 07:24:45 host sshd[31786]: Invalid user admin from 43.142.76.35 port 45976 Jan 18 07:24:45 host sshd[31786]: input_userauth_request: invalid user admin [preauth] Jan 18 07:24:45 host sshd[31796]: User root from 43.142.76.35 not allowed because not listed in AllowUsers Jan 18 07:24:45 host sshd[31796]: input_userauth_request: invalid user root [preauth] Jan 18 07:24:45 host sshd[31798]: Invalid user hadoop from 43.142.76.35 port 46014 Jan 18 07:24:45 host sshd[31798]: input_userauth_request: invalid user hadoop [preauth] Jan 18 07:24:45 host sshd[31799]: Invalid user test from 43.142.76.35 port 45964 Jan 18 07:24:45 host sshd[31799]: input_userauth_request: invalid user test [preauth] Jan 18 07:24:45 host sshd[31800]: User root from 43.142.76.35 not allowed because not listed in AllowUsers Jan 18 07:24:45 host sshd[31800]: input_userauth_request: invalid user root [preauth] Jan 18 07:24:45 host sshd[31794]: Invalid user ubuntu from 43.142.76.35 port 46008 Jan 18 07:24:45 host sshd[31797]: User root from 43.142.76.35 not allowed because not listed in AllowUsers Jan 18 07:24:45 host sshd[31797]: input_userauth_request: invalid user root [preauth] Jan 18 07:24:45 host sshd[31794]: input_userauth_request: invalid user ubuntu [preauth] Jan 18 07:24:45 host sshd[31803]: User root from 43.142.76.35 not allowed because not listed in AllowUsers Jan 18 07:24:45 host sshd[31803]: input_userauth_request: invalid user root [preauth] Jan 18 07:24:45 host sshd[31802]: Invalid user testuser from 43.142.76.35 port 46028 Jan 18 07:24:45 host sshd[31802]: input_userauth_request: invalid user testuser [preauth] Jan 18 07:24:45 host sshd[31809]: User root from 43.142.76.35 not allowed because not listed in AllowUsers Jan 18 07:24:45 host sshd[31809]: input_userauth_request: invalid user root [preauth] Jan 18 07:24:45 host sshd[31813]: Invalid user admin from 43.142.76.35 port 45996 Jan 18 07:24:45 host sshd[31813]: input_userauth_request: invalid user admin [preauth] Jan 18 07:24:45 host sshd[31775]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host sshd[31776]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host sshd[31779]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host sshd[31777]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host sshd[31783]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host sshd[31778]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host sshd[31780]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host sshd[31784]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host sshd[31789]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host unix_chkpwd[31838]: password check failed for user (root) Jan 18 07:24:45 host sshd[31782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 user=root Jan 18 07:24:45 host sshd[31782]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 07:24:45 host sshd[31787]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host sshd[31785]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host unix_chkpwd[31840]: password check failed for user (root) Jan 18 07:24:45 host sshd[31781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 user=root Jan 18 07:24:45 host sshd[31781]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 07:24:45 host sshd[31795]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host sshd[31793]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host sshd[31786]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host sshd[31798]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host sshd[31799]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host sshd[31794]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host sshd[31802]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:45 host unix_chkpwd[31841]: password check failed for user (root) Jan 18 07:24:45 host sshd[31796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 user=root Jan 18 07:24:45 host sshd[31796]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 07:24:45 host unix_chkpwd[31843]: password check failed for user (root) Jan 18 07:24:45 host sshd[31800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 user=root Jan 18 07:24:45 host sshd[31800]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 07:24:45 host unix_chkpwd[31844]: password check failed for user (root) Jan 18 07:24:45 host sshd[31803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 user=root Jan 18 07:24:45 host sshd[31803]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 07:24:45 host unix_chkpwd[31842]: password check failed for user (root) Jan 18 07:24:45 host sshd[31797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 user=root Jan 18 07:24:45 host sshd[31797]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 07:24:45 host unix_chkpwd[31845]: password check failed for user (root) Jan 18 07:24:45 host sshd[31809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 user=root Jan 18 07:24:45 host sshd[31809]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 07:24:45 host sshd[31813]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:45 host sshd[31813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:46 host sshd[31830]: Invalid user tester from 43.142.76.35 port 45984 Jan 18 07:24:46 host sshd[31830]: input_userauth_request: invalid user tester [preauth] Jan 18 07:24:46 host sshd[31828]: Invalid user zjw from 43.142.76.35 port 45990 Jan 18 07:24:46 host sshd[31828]: input_userauth_request: invalid user zjw [preauth] Jan 18 07:24:46 host sshd[31831]: Invalid user postgres from 43.142.76.35 port 46004 Jan 18 07:24:46 host sshd[31831]: input_userauth_request: invalid user postgres [preauth] Jan 18 07:24:46 host sshd[31830]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:46 host sshd[31830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:46 host sshd[31828]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:46 host sshd[31828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:46 host sshd[31831]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:24:46 host sshd[31831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.142.76.35 Jan 18 07:24:46 host sshd[31775]: Failed password for invalid user ec2-user from 43.142.76.35 port 45994 ssh2 Jan 18 07:24:46 host sshd[31776]: Failed password for invalid user bot from 43.142.76.35 port 45970 ssh2 Jan 18 07:24:46 host sshd[31779]: Failed password for invalid user vagrant from 43.142.76.35 port 46002 ssh2 Jan 18 07:24:46 host sshd[31777]: Failed password for invalid user user from 43.142.76.35 port 45954 ssh2 Jan 18 07:24:46 host sshd[31783]: Failed password for invalid user postgres from 43.142.76.35 port 46032 ssh2 Jan 18 07:24:46 host sshd[31778]: Failed password for invalid user admin from 43.142.76.35 port 45962 ssh2 Jan 18 07:24:46 host sshd[31780]: Failed password for invalid user oracle from 43.142.76.35 port 46012 ssh2 Jan 18 07:24:46 host sshd[31784]: Failed password for invalid user user from 43.142.76.35 port 45966 ssh2 Jan 18 07:24:46 host sshd[31789]: Failed password for invalid user steam from 43.142.76.35 port 45998 ssh2 Jan 18 07:24:46 host sshd[31782]: Failed password for invalid user root from 43.142.76.35 port 45978 ssh2 Jan 18 07:24:46 host sshd[31787]: Failed password for invalid user es from 43.142.76.35 port 45986 ssh2 Jan 18 07:24:46 host sshd[31785]: Failed password for invalid user oracle from 43.142.76.35 port 45968 ssh2 Jan 18 07:24:46 host sshd[31781]: Failed password for invalid user root from 43.142.76.35 port 46020 ssh2 Jan 18 07:24:46 host sshd[31795]: Failed password for invalid user ansadmin from 43.142.76.35 port 46024 ssh2 Jan 18 07:24:46 host sshd[31793]: Failed password for invalid user postgres from 43.142.76.35 port 45956 ssh2 Jan 18 07:24:46 host sshd[31786]: Failed password for invalid user admin from 43.142.76.35 port 45976 ssh2 Jan 18 07:24:46 host sshd[31798]: Failed password for invalid user hadoop from 43.142.76.35 port 46014 ssh2 Jan 18 07:24:46 host sshd[31799]: Failed password for invalid user test from 43.142.76.35 port 45964 ssh2 Jan 18 07:24:46 host sshd[31794]: Failed password for invalid user ubuntu from 43.142.76.35 port 46008 ssh2 Jan 18 07:24:46 host sshd[31802]: Failed password for invalid user testuser from 43.142.76.35 port 46028 ssh2 Jan 18 07:24:46 host sshd[31796]: Failed password for invalid user root from 43.142.76.35 port 45992 ssh2 Jan 18 07:24:46 host sshd[31800]: Failed password for invalid user root from 43.142.76.35 port 45958 ssh2 Jan 18 07:24:47 host sshd[31803]: Failed password for invalid user root from 43.142.76.35 port 46026 ssh2 Jan 18 07:24:47 host sshd[31797]: Failed password for invalid user root from 43.142.76.35 port 46000 ssh2 Jan 18 07:24:47 host sshd[31809]: Failed password for invalid user root from 43.142.76.35 port 46018 ssh2 Jan 18 07:24:47 host sshd[31813]: Failed password for invalid user admin from 43.142.76.35 port 45996 ssh2 Jan 18 07:24:48 host sshd[31830]: Failed password for invalid user tester from 43.142.76.35 port 45984 ssh2 Jan 18 07:24:48 host sshd[31828]: Failed password for invalid user zjw from 43.142.76.35 port 45990 ssh2 Jan 18 07:24:48 host sshd[31831]: Failed password for invalid user postgres from 43.142.76.35 port 46004 ssh2 Jan 18 07:29:30 host sshd[390]: Invalid user kevin from 90.187.195.53 port 44334 Jan 18 07:29:30 host sshd[390]: input_userauth_request: invalid user kevin [preauth] Jan 18 07:29:30 host sshd[390]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:29:30 host sshd[390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.187.195.53 Jan 18 07:29:32 host sshd[390]: Failed password for invalid user kevin from 90.187.195.53 port 44334 ssh2 Jan 18 07:29:33 host sshd[390]: Received disconnect from 90.187.195.53 port 44334:11: Bye Bye [preauth] Jan 18 07:29:33 host sshd[390]: Disconnected from 90.187.195.53 port 44334 [preauth] Jan 18 07:32:24 host sshd[841]: Invalid user remnux from 152.32.190.176 port 47452 Jan 18 07:32:24 host sshd[841]: input_userauth_request: invalid user remnux [preauth] Jan 18 07:32:24 host sshd[841]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:32:24 host sshd[841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.190.176 Jan 18 07:32:27 host sshd[841]: Failed password for invalid user remnux from 152.32.190.176 port 47452 ssh2 Jan 18 07:32:27 host sshd[841]: Received disconnect from 152.32.190.176 port 47452:11: Bye Bye [preauth] Jan 18 07:32:27 host sshd[841]: Disconnected from 152.32.190.176 port 47452 [preauth] Jan 18 07:33:57 host sshd[1167]: Invalid user ark from 167.99.236.74 port 46834 Jan 18 07:33:57 host sshd[1167]: input_userauth_request: invalid user ark [preauth] Jan 18 07:33:57 host sshd[1167]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:33:57 host sshd[1167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.236.74 Jan 18 07:33:59 host sshd[1167]: Failed password for invalid user ark from 167.99.236.74 port 46834 ssh2 Jan 18 07:34:00 host sshd[1167]: Received disconnect from 167.99.236.74 port 46834:11: Bye Bye [preauth] Jan 18 07:34:00 host sshd[1167]: Disconnected from 167.99.236.74 port 46834 [preauth] Jan 18 07:34:02 host sshd[1173]: User root from 119.193.209.204 not allowed because not listed in AllowUsers Jan 18 07:34:02 host sshd[1173]: input_userauth_request: invalid user root [preauth] Jan 18 07:34:02 host unix_chkpwd[1189]: password check failed for user (root) Jan 18 07:34:02 host sshd[1173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.193.209.204 user=root Jan 18 07:34:02 host sshd[1173]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 07:34:04 host sshd[1173]: Failed password for invalid user root from 119.193.209.204 port 33589 ssh2 Jan 18 07:34:05 host unix_chkpwd[1195]: password check failed for user (root) Jan 18 07:34:05 host sshd[1173]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 07:34:08 host sshd[1173]: Failed password for invalid user root from 119.193.209.204 port 33589 ssh2 Jan 18 07:34:09 host unix_chkpwd[1205]: password check failed for user (root) Jan 18 07:34:09 host sshd[1173]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 07:34:11 host sshd[1173]: Failed password for invalid user root from 119.193.209.204 port 33589 ssh2 Jan 18 07:35:40 host sshd[1576]: User root from 90.187.195.53 not allowed because not listed in AllowUsers Jan 18 07:35:40 host sshd[1576]: input_userauth_request: invalid user root [preauth] Jan 18 07:35:40 host unix_chkpwd[1579]: password check failed for user (root) Jan 18 07:35:40 host sshd[1576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.187.195.53 user=root Jan 18 07:35:40 host sshd[1576]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 07:35:42 host sshd[1576]: Failed password for invalid user root from 90.187.195.53 port 44198 ssh2 Jan 18 07:35:42 host sshd[1576]: Received disconnect from 90.187.195.53 port 44198:11: Bye Bye [preauth] Jan 18 07:35:42 host sshd[1576]: Disconnected from 90.187.195.53 port 44198 [preauth] Jan 18 07:35:55 host sshd[1654]: Invalid user dockeradmin from 167.99.236.74 port 34722 Jan 18 07:35:55 host sshd[1654]: input_userauth_request: invalid user dockeradmin [preauth] Jan 18 07:35:55 host sshd[1654]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:35:55 host sshd[1654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.236.74 Jan 18 07:35:57 host sshd[1654]: Failed password for invalid user dockeradmin from 167.99.236.74 port 34722 ssh2 Jan 18 07:35:57 host sshd[1654]: Received disconnect from 167.99.236.74 port 34722:11: Bye Bye [preauth] Jan 18 07:35:57 host sshd[1654]: Disconnected from 167.99.236.74 port 34722 [preauth] Jan 18 07:36:45 host sshd[1842]: User root from 152.32.190.176 not allowed because not listed in AllowUsers Jan 18 07:36:45 host sshd[1842]: input_userauth_request: invalid user root [preauth] Jan 18 07:36:45 host unix_chkpwd[1846]: password check failed for user (root) Jan 18 07:36:45 host sshd[1842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.190.176 user=root Jan 18 07:36:45 host sshd[1842]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 07:36:48 host sshd[1842]: Failed password for invalid user root from 152.32.190.176 port 59868 ssh2 Jan 18 07:36:48 host sshd[1842]: Received disconnect from 152.32.190.176 port 59868:11: Bye Bye [preauth] Jan 18 07:36:48 host sshd[1842]: Disconnected from 152.32.190.176 port 59868 [preauth] Jan 18 07:37:02 host sshd[1931]: Invalid user kali from 167.99.236.74 port 38288 Jan 18 07:37:02 host sshd[1931]: input_userauth_request: invalid user kali [preauth] Jan 18 07:37:02 host sshd[1931]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:37:02 host sshd[1931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.236.74 Jan 18 07:37:03 host sshd[1931]: Failed password for invalid user kali from 167.99.236.74 port 38288 ssh2 Jan 18 07:37:04 host sshd[1931]: Received disconnect from 167.99.236.74 port 38288:11: Bye Bye [preauth] Jan 18 07:37:04 host sshd[1931]: Disconnected from 167.99.236.74 port 38288 [preauth] Jan 18 07:37:31 host sshd[2015]: Connection closed by 169.228.66.212 port 51574 [preauth] Jan 18 07:37:34 host sshd[2083]: Invalid user nginx from 220.118.36.133 port 39969 Jan 18 07:37:34 host sshd[2083]: input_userauth_request: invalid user nginx [preauth] Jan 18 07:37:34 host sshd[2083]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:37:34 host sshd[2083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.118.36.133 Jan 18 07:37:36 host sshd[2083]: Failed password for invalid user nginx from 220.118.36.133 port 39969 ssh2 Jan 18 07:37:37 host sshd[2083]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:37:39 host sshd[2083]: Failed password for invalid user nginx from 220.118.36.133 port 39969 ssh2 Jan 18 07:37:40 host sshd[2083]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:37:42 host sshd[2083]: Failed password for invalid user nginx from 220.118.36.133 port 39969 ssh2 Jan 18 07:41:04 host sshd[2813]: Invalid user vyos from 195.226.194.242 port 28546 Jan 18 07:41:04 host sshd[2813]: input_userauth_request: invalid user vyos [preauth] Jan 18 07:41:04 host sshd[2813]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:41:04 host sshd[2813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 18 07:41:06 host sshd[2813]: Failed password for invalid user vyos from 195.226.194.242 port 28546 ssh2 Jan 18 07:41:07 host sshd[2813]: Received disconnect from 195.226.194.242 port 28546:11: Bye Bye [preauth] Jan 18 07:41:07 host sshd[2813]: Disconnected from 195.226.194.242 port 28546 [preauth] Jan 18 07:43:04 host sshd[3022]: Invalid user admin from 73.205.122.220 port 47607 Jan 18 07:43:04 host sshd[3022]: input_userauth_request: invalid user admin [preauth] Jan 18 07:43:04 host sshd[3022]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:43:04 host sshd[3022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.205.122.220 Jan 18 07:43:05 host sshd[3022]: Failed password for invalid user admin from 73.205.122.220 port 47607 ssh2 Jan 18 07:43:08 host sshd[3022]: Connection reset by 73.205.122.220 port 47607 [preauth] Jan 18 07:47:50 host sshd[4046]: Invalid user steam from 183.99.161.113 port 34846 Jan 18 07:47:50 host sshd[4046]: input_userauth_request: invalid user steam [preauth] Jan 18 07:47:50 host sshd[4046]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:47:50 host sshd[4046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.99.161.113 Jan 18 07:47:53 host sshd[4046]: Failed password for invalid user steam from 183.99.161.113 port 34846 ssh2 Jan 18 07:47:53 host sshd[4046]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:47:55 host sshd[4046]: Failed password for invalid user steam from 183.99.161.113 port 34846 ssh2 Jan 18 07:47:56 host sshd[4046]: Failed password for invalid user steam from 183.99.161.113 port 34846 ssh2 Jan 18 07:47:57 host sshd[4046]: Connection closed by 183.99.161.113 port 34846 [preauth] Jan 18 07:47:57 host sshd[4046]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.99.161.113 Jan 18 07:50:52 host sshd[4606]: Invalid user ubuntu from 61.60.166.201 port 32939 Jan 18 07:50:52 host sshd[4606]: input_userauth_request: invalid user ubuntu [preauth] Jan 18 07:50:52 host sshd[4606]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:50:52 host sshd[4606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.60.166.201 Jan 18 07:50:54 host sshd[4606]: Failed password for invalid user ubuntu from 61.60.166.201 port 32939 ssh2 Jan 18 07:50:54 host sshd[4606]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:50:56 host sshd[4606]: Failed password for invalid user ubuntu from 61.60.166.201 port 32939 ssh2 Jan 18 07:50:56 host sshd[4606]: pam_unix(sshd:auth): check pass; user unknown Jan 18 07:50:59 host sshd[4606]: Failed password for invalid user ubuntu from 61.60.166.201 port 32939 ssh2 Jan 18 07:50:59 host sshd[4606]: Connection reset by 61.60.166.201 port 32939 [preauth] Jan 18 07:50:59 host sshd[4606]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.60.166.201 Jan 18 07:58:08 host sshd[5590]: Did not receive identification string from 46.101.97.107 port 61000 Jan 18 08:07:46 host sshd[7029]: User root from 143.198.79.85 not allowed because not listed in AllowUsers Jan 18 08:07:46 host sshd[7029]: input_userauth_request: invalid user root [preauth] Jan 18 08:07:46 host unix_chkpwd[7036]: password check failed for user (root) Jan 18 08:07:46 host sshd[7029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.79.85 user=root Jan 18 08:07:46 host sshd[7029]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 08:07:48 host sshd[7029]: Failed password for invalid user root from 143.198.79.85 port 48702 ssh2 Jan 18 08:07:49 host sshd[7029]: Received disconnect from 143.198.79.85 port 48702:11: Bye Bye [preauth] Jan 18 08:07:49 host sshd[7029]: Disconnected from 143.198.79.85 port 48702 [preauth] Jan 18 08:08:59 host sshd[7171]: Invalid user temp from 185.137.27.170 port 44930 Jan 18 08:08:59 host sshd[7171]: input_userauth_request: invalid user temp [preauth] Jan 18 08:08:59 host sshd[7171]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:08:59 host sshd[7171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.137.27.170 Jan 18 08:09:02 host sshd[7171]: Failed password for invalid user temp from 185.137.27.170 port 44930 ssh2 Jan 18 08:09:02 host sshd[7171]: Received disconnect from 185.137.27.170 port 44930:11: Bye Bye [preauth] Jan 18 08:09:02 host sshd[7171]: Disconnected from 185.137.27.170 port 44930 [preauth] Jan 18 08:09:26 host sshd[7221]: Invalid user arkserver from 164.92.210.129 port 45566 Jan 18 08:09:26 host sshd[7221]: input_userauth_request: invalid user arkserver [preauth] Jan 18 08:09:26 host sshd[7221]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:09:26 host sshd[7221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.210.129 Jan 18 08:09:28 host sshd[7221]: Failed password for invalid user arkserver from 164.92.210.129 port 45566 ssh2 Jan 18 08:09:28 host sshd[7221]: Received disconnect from 164.92.210.129 port 45566:11: Bye Bye [preauth] Jan 18 08:09:28 host sshd[7221]: Disconnected from 164.92.210.129 port 45566 [preauth] Jan 18 08:09:36 host sshd[7272]: Invalid user dockeradmin from 142.93.211.159 port 47540 Jan 18 08:09:36 host sshd[7272]: input_userauth_request: invalid user dockeradmin [preauth] Jan 18 08:09:36 host sshd[7272]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:09:36 host sshd[7272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.211.159 Jan 18 08:09:38 host sshd[7272]: Failed password for invalid user dockeradmin from 142.93.211.159 port 47540 ssh2 Jan 18 08:09:38 host sshd[7272]: Received disconnect from 142.93.211.159 port 47540:11: Bye Bye [preauth] Jan 18 08:09:38 host sshd[7272]: Disconnected from 142.93.211.159 port 47540 [preauth] Jan 18 08:09:47 host sshd[7284]: Invalid user prueba from 167.172.112.115 port 33586 Jan 18 08:09:47 host sshd[7284]: input_userauth_request: invalid user prueba [preauth] Jan 18 08:09:47 host sshd[7284]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:09:47 host sshd[7284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.112.115 Jan 18 08:09:49 host sshd[7284]: Failed password for invalid user prueba from 167.172.112.115 port 33586 ssh2 Jan 18 08:09:49 host sshd[7284]: Received disconnect from 167.172.112.115 port 33586:11: Bye Bye [preauth] Jan 18 08:09:49 host sshd[7284]: Disconnected from 167.172.112.115 port 33586 [preauth] Jan 18 08:11:28 host sshd[7611]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 18 08:11:28 host sshd[7611]: input_userauth_request: invalid user root [preauth] Jan 18 08:11:28 host unix_chkpwd[7622]: password check failed for user (root) Jan 18 08:11:28 host sshd[7611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 18 08:11:28 host sshd[7611]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 08:11:30 host sshd[7611]: Failed password for invalid user root from 195.226.194.242 port 30550 ssh2 Jan 18 08:11:30 host sshd[7611]: Received disconnect from 195.226.194.242 port 30550:11: Bye Bye [preauth] Jan 18 08:11:30 host sshd[7611]: Disconnected from 195.226.194.242 port 30550 [preauth] Jan 18 08:11:52 host sshd[7684]: User root from 103.10.20.136 not allowed because not listed in AllowUsers Jan 18 08:11:52 host sshd[7684]: input_userauth_request: invalid user root [preauth] Jan 18 08:11:52 host unix_chkpwd[7688]: password check failed for user (root) Jan 18 08:11:52 host sshd[7684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.10.20.136 user=root Jan 18 08:11:52 host sshd[7684]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 08:11:54 host sshd[7684]: Failed password for invalid user root from 103.10.20.136 port 50768 ssh2 Jan 18 08:11:54 host sshd[7684]: Received disconnect from 103.10.20.136 port 50768:11: Bye Bye [preauth] Jan 18 08:11:54 host sshd[7684]: Disconnected from 103.10.20.136 port 50768 [preauth] Jan 18 08:13:17 host sshd[7869]: Invalid user frappe from 164.92.210.129 port 34262 Jan 18 08:13:17 host sshd[7869]: input_userauth_request: invalid user frappe [preauth] Jan 18 08:13:17 host sshd[7869]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:13:17 host sshd[7869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.210.129 Jan 18 08:13:19 host sshd[7869]: Failed password for invalid user frappe from 164.92.210.129 port 34262 ssh2 Jan 18 08:13:19 host sshd[7869]: Received disconnect from 164.92.210.129 port 34262:11: Bye Bye [preauth] Jan 18 08:13:19 host sshd[7869]: Disconnected from 164.92.210.129 port 34262 [preauth] Jan 18 08:13:48 host sshd[7940]: User root from 142.93.211.159 not allowed because not listed in AllowUsers Jan 18 08:13:48 host sshd[7940]: input_userauth_request: invalid user root [preauth] Jan 18 08:13:48 host unix_chkpwd[7942]: password check failed for user (root) Jan 18 08:13:48 host sshd[7940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.211.159 user=root Jan 18 08:13:48 host sshd[7940]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 08:13:51 host sshd[7940]: Failed password for invalid user root from 142.93.211.159 port 36510 ssh2 Jan 18 08:13:51 host sshd[7940]: Received disconnect from 142.93.211.159 port 36510:11: Bye Bye [preauth] Jan 18 08:13:51 host sshd[7940]: Disconnected from 142.93.211.159 port 36510 [preauth] Jan 18 08:13:55 host sshd[8012]: Invalid user esuser from 143.198.79.85 port 48032 Jan 18 08:13:55 host sshd[8012]: input_userauth_request: invalid user esuser [preauth] Jan 18 08:13:55 host sshd[8012]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:13:55 host sshd[8012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.79.85 Jan 18 08:13:57 host sshd[8012]: Failed password for invalid user esuser from 143.198.79.85 port 48032 ssh2 Jan 18 08:13:58 host sshd[8012]: Received disconnect from 143.198.79.85 port 48032:11: Bye Bye [preauth] Jan 18 08:13:58 host sshd[8012]: Disconnected from 143.198.79.85 port 48032 [preauth] Jan 18 08:14:01 host sshd[8053]: Invalid user user3 from 167.172.112.115 port 40872 Jan 18 08:14:01 host sshd[8053]: input_userauth_request: invalid user user3 [preauth] Jan 18 08:14:01 host sshd[8053]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:14:01 host sshd[8053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.112.115 Jan 18 08:14:04 host sshd[8053]: Failed password for invalid user user3 from 167.172.112.115 port 40872 ssh2 Jan 18 08:14:04 host sshd[8053]: Received disconnect from 167.172.112.115 port 40872:11: Bye Bye [preauth] Jan 18 08:14:04 host sshd[8053]: Disconnected from 167.172.112.115 port 40872 [preauth] Jan 18 08:14:21 host sshd[8097]: Invalid user ts2 from 103.10.20.136 port 57298 Jan 18 08:14:21 host sshd[8097]: input_userauth_request: invalid user ts2 [preauth] Jan 18 08:14:21 host sshd[8097]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:14:21 host sshd[8097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.10.20.136 Jan 18 08:14:22 host sshd[8100]: Invalid user ftptest from 164.92.210.129 port 60984 Jan 18 08:14:22 host sshd[8100]: input_userauth_request: invalid user ftptest [preauth] Jan 18 08:14:22 host sshd[8100]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:14:22 host sshd[8100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.210.129 Jan 18 08:14:23 host sshd[8097]: Failed password for invalid user ts2 from 103.10.20.136 port 57298 ssh2 Jan 18 08:14:23 host sshd[8097]: Received disconnect from 103.10.20.136 port 57298:11: Bye Bye [preauth] Jan 18 08:14:23 host sshd[8097]: Disconnected from 103.10.20.136 port 57298 [preauth] Jan 18 08:14:25 host sshd[8100]: Failed password for invalid user ftptest from 164.92.210.129 port 60984 ssh2 Jan 18 08:14:27 host sshd[8137]: Invalid user seafile from 68.183.87.50 port 43980 Jan 18 08:14:27 host sshd[8137]: input_userauth_request: invalid user seafile [preauth] Jan 18 08:14:27 host sshd[8137]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:14:27 host sshd[8137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.87.50 Jan 18 08:14:28 host sshd[8137]: Failed password for invalid user seafile from 68.183.87.50 port 43980 ssh2 Jan 18 08:14:28 host sshd[8137]: Received disconnect from 68.183.87.50 port 43980:11: Bye Bye [preauth] Jan 18 08:14:28 host sshd[8137]: Disconnected from 68.183.87.50 port 43980 [preauth] Jan 18 08:14:56 host sshd[8229]: Invalid user admin from 185.137.27.170 port 39036 Jan 18 08:14:56 host sshd[8229]: input_userauth_request: invalid user admin [preauth] Jan 18 08:14:56 host sshd[8229]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:14:56 host sshd[8229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.137.27.170 Jan 18 08:14:58 host sshd[8229]: Failed password for invalid user admin from 185.137.27.170 port 39036 ssh2 Jan 18 08:14:58 host sshd[8229]: Received disconnect from 185.137.27.170 port 39036:11: Bye Bye [preauth] Jan 18 08:14:58 host sshd[8229]: Disconnected from 185.137.27.170 port 39036 [preauth] Jan 18 08:15:02 host sshd[8262]: Invalid user pi from 211.34.251.153 port 33894 Jan 18 08:15:02 host sshd[8262]: input_userauth_request: invalid user pi [preauth] Jan 18 08:15:02 host sshd[8265]: Invalid user pi from 211.34.251.153 port 33898 Jan 18 08:15:02 host sshd[8265]: input_userauth_request: invalid user pi [preauth] Jan 18 08:15:02 host sshd[8262]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:15:02 host sshd[8262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.34.251.153 Jan 18 08:15:02 host sshd[8265]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:15:02 host sshd[8265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.34.251.153 Jan 18 08:15:04 host sshd[8262]: Failed password for invalid user pi from 211.34.251.153 port 33894 ssh2 Jan 18 08:15:04 host sshd[8265]: Failed password for invalid user pi from 211.34.251.153 port 33898 ssh2 Jan 18 08:15:04 host sshd[8262]: Connection closed by 211.34.251.153 port 33894 [preauth] Jan 18 08:15:04 host sshd[8265]: Connection closed by 211.34.251.153 port 33898 [preauth] Jan 18 08:15:16 host sshd[8287]: User root from 167.172.112.115 not allowed because not listed in AllowUsers Jan 18 08:15:16 host sshd[8287]: input_userauth_request: invalid user root [preauth] Jan 18 08:15:16 host unix_chkpwd[8292]: password check failed for user (root) Jan 18 08:15:16 host sshd[8287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.112.115 user=root Jan 18 08:15:16 host sshd[8287]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 08:15:18 host sshd[8287]: Failed password for invalid user root from 167.172.112.115 port 42328 ssh2 Jan 18 08:16:21 host sshd[8546]: Invalid user user1 from 185.137.27.170 port 33226 Jan 18 08:16:21 host sshd[8546]: input_userauth_request: invalid user user1 [preauth] Jan 18 08:16:21 host sshd[8546]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:16:21 host sshd[8546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.137.27.170 Jan 18 08:16:23 host sshd[8546]: Failed password for invalid user user1 from 185.137.27.170 port 33226 ssh2 Jan 18 08:16:23 host sshd[8546]: Received disconnect from 185.137.27.170 port 33226:11: Bye Bye [preauth] Jan 18 08:16:23 host sshd[8546]: Disconnected from 185.137.27.170 port 33226 [preauth] Jan 18 08:18:45 host sshd[8866]: Invalid user user1 from 68.183.87.50 port 51294 Jan 18 08:18:45 host sshd[8866]: input_userauth_request: invalid user user1 [preauth] Jan 18 08:18:45 host sshd[8866]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:18:45 host sshd[8866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.87.50 Jan 18 08:18:47 host sshd[8866]: Failed password for invalid user user1 from 68.183.87.50 port 51294 ssh2 Jan 18 08:18:47 host sshd[8866]: Received disconnect from 68.183.87.50 port 51294:11: Bye Bye [preauth] Jan 18 08:18:47 host sshd[8866]: Disconnected from 68.183.87.50 port 51294 [preauth] Jan 18 08:18:58 host sshd[8814]: User root from 220.133.141.70 not allowed because not listed in AllowUsers Jan 18 08:18:58 host sshd[8814]: input_userauth_request: invalid user root [preauth] Jan 18 08:18:58 host unix_chkpwd[8880]: password check failed for user (root) Jan 18 08:18:58 host sshd[8814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.141.70 user=root Jan 18 08:18:58 host sshd[8814]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 08:19:00 host sshd[8814]: Failed password for invalid user root from 220.133.141.70 port 54566 ssh2 Jan 18 08:19:08 host sshd[8814]: Connection reset by 220.133.141.70 port 54566 [preauth] Jan 18 08:20:56 host sshd[9122]: Invalid user installer from 68.183.87.50 port 49872 Jan 18 08:20:56 host sshd[9122]: input_userauth_request: invalid user installer [preauth] Jan 18 08:20:56 host sshd[9122]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:20:56 host sshd[9122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.87.50 Jan 18 08:20:57 host sshd[9122]: Failed password for invalid user installer from 68.183.87.50 port 49872 ssh2 Jan 18 08:20:57 host sshd[9122]: Received disconnect from 68.183.87.50 port 49872:11: Bye Bye [preauth] Jan 18 08:20:57 host sshd[9122]: Disconnected from 68.183.87.50 port 49872 [preauth] Jan 18 08:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 08:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 08:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 08:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 08:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 08:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 08:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 08:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 08:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 08:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 08:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 08:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 08:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 08:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=dartsimp user-4=a2zgroup user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=wwwrmswll user-10=keralaholi user-11=wwwresourcehunte user-12=disposeat user-13=wwwkmaorg user-14=remysagr user-15=woodpeck user-16=wwwkapin user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=straightcurve user-24=wwwletsstalkfood user-25=phmetals user-26=kottayamcalldriv user-27=gifterman user-28=palco123 user-29=mrsclean user-30=wwwnexidigital feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 08:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 08:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 08:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fxZx8c9QCMTShkhA.~ Jan 18 08:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fxZx8c9QCMTShkhA.~' Jan 18 08:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fxZx8c9QCMTShkhA.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 08:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 08:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 08:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 08:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 08:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 08:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 08:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 08:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 08:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 08:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 08:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 08:25:17 host sshd[9983]: Invalid user hplip from 104.244.74.6 port 58174 Jan 18 08:25:17 host sshd[9983]: input_userauth_request: invalid user hplip [preauth] Jan 18 08:25:17 host sshd[9983]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:25:17 host sshd[9983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 18 08:25:20 host sshd[9983]: Failed password for invalid user hplip from 104.244.74.6 port 58174 ssh2 Jan 18 08:25:20 host sshd[9983]: Connection closed by 104.244.74.6 port 58174 [preauth] Jan 18 08:29:17 host sshd[10598]: Invalid user hplip from 104.244.74.6 port 43514 Jan 18 08:29:17 host sshd[10598]: input_userauth_request: invalid user hplip [preauth] Jan 18 08:29:17 host sshd[10598]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:29:17 host sshd[10598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 18 08:29:18 host sshd[10598]: Failed password for invalid user hplip from 104.244.74.6 port 43514 ssh2 Jan 18 08:29:19 host sshd[10598]: Connection closed by 104.244.74.6 port 43514 [preauth] Jan 18 08:32:55 host sshd[11082]: User root from 187.220.14.210 not allowed because not listed in AllowUsers Jan 18 08:32:55 host sshd[11082]: input_userauth_request: invalid user root [preauth] Jan 18 08:32:55 host unix_chkpwd[11155]: password check failed for user (root) Jan 18 08:32:55 host sshd[11082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.220.14.210 user=root Jan 18 08:32:55 host sshd[11082]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 08:32:57 host sshd[11082]: Failed password for invalid user root from 187.220.14.210 port 40948 ssh2 Jan 18 08:32:59 host unix_chkpwd[11206]: password check failed for user (root) Jan 18 08:32:59 host sshd[11082]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 08:33:01 host sshd[11082]: Failed password for invalid user root from 187.220.14.210 port 40948 ssh2 Jan 18 08:33:02 host sshd[11082]: Connection reset by 187.220.14.210 port 40948 [preauth] Jan 18 08:33:02 host sshd[11082]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.220.14.210 user=root Jan 18 08:35:18 host sshd[11575]: Invalid user justin from 209.141.56.48 port 40718 Jan 18 08:35:18 host sshd[11575]: input_userauth_request: invalid user justin [preauth] Jan 18 08:35:18 host sshd[11575]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:35:18 host sshd[11575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 18 08:35:19 host sshd[11575]: Failed password for invalid user justin from 209.141.56.48 port 40718 ssh2 Jan 18 08:35:20 host sshd[11575]: Connection closed by 209.141.56.48 port 40718 [preauth] Jan 18 08:44:43 host sshd[13233]: Invalid user fv from 194.110.203.109 port 60872 Jan 18 08:44:43 host sshd[13233]: input_userauth_request: invalid user fv [preauth] Jan 18 08:44:43 host sshd[13233]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:44:43 host sshd[13233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 08:44:45 host sshd[13233]: Failed password for invalid user fv from 194.110.203.109 port 60872 ssh2 Jan 18 08:44:48 host sshd[13233]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:44:50 host sshd[13233]: Failed password for invalid user fv from 194.110.203.109 port 60872 ssh2 Jan 18 08:44:53 host sshd[13233]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:44:56 host sshd[13233]: Failed password for invalid user fv from 194.110.203.109 port 60872 ssh2 Jan 18 08:44:59 host sshd[13233]: Connection closed by 194.110.203.109 port 60872 [preauth] Jan 18 08:44:59 host sshd[13233]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 08:46:16 host sshd[13471]: Invalid user vagrant from 59.24.2.176 port 40656 Jan 18 08:46:16 host sshd[13471]: input_userauth_request: invalid user vagrant [preauth] Jan 18 08:46:16 host sshd[13471]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:46:16 host sshd[13471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.24.2.176 Jan 18 08:46:18 host sshd[13471]: Failed password for invalid user vagrant from 59.24.2.176 port 40656 ssh2 Jan 18 08:46:19 host sshd[13471]: Failed password for invalid user vagrant from 59.24.2.176 port 40656 ssh2 Jan 18 08:46:19 host sshd[13471]: Connection reset by 59.24.2.176 port 40656 [preauth] Jan 18 08:51:04 host sshd[14236]: Invalid user jboss from 178.33.6.226 port 59288 Jan 18 08:51:04 host sshd[14236]: input_userauth_request: invalid user jboss [preauth] Jan 18 08:51:04 host sshd[14236]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:51:04 host sshd[14236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.6.226 Jan 18 08:51:06 host sshd[14236]: Failed password for invalid user jboss from 178.33.6.226 port 59288 ssh2 Jan 18 08:51:07 host sshd[14236]: Received disconnect from 178.33.6.226 port 59288:11: Bye Bye [preauth] Jan 18 08:51:07 host sshd[14236]: Disconnected from 178.33.6.226 port 59288 [preauth] Jan 18 08:53:06 host sshd[14507]: Invalid user jboss from 54.39.177.44 port 59996 Jan 18 08:53:06 host sshd[14507]: input_userauth_request: invalid user jboss [preauth] Jan 18 08:53:06 host sshd[14507]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:53:06 host sshd[14507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.177.44 Jan 18 08:53:08 host sshd[14507]: Failed password for invalid user jboss from 54.39.177.44 port 59996 ssh2 Jan 18 08:53:08 host sshd[14507]: Received disconnect from 54.39.177.44 port 59996:11: Bye Bye [preauth] Jan 18 08:53:08 host sshd[14507]: Disconnected from 54.39.177.44 port 59996 [preauth] Jan 18 08:54:48 host sshd[14822]: Invalid user testuser from 45.240.88.106 port 43196 Jan 18 08:54:48 host sshd[14822]: input_userauth_request: invalid user testuser [preauth] Jan 18 08:54:48 host sshd[14822]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:54:48 host sshd[14822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.240.88.106 Jan 18 08:54:50 host sshd[14822]: Failed password for invalid user testuser from 45.240.88.106 port 43196 ssh2 Jan 18 08:54:50 host sshd[14822]: Received disconnect from 45.240.88.106 port 43196:11: Bye Bye [preauth] Jan 18 08:54:50 host sshd[14822]: Disconnected from 45.240.88.106 port 43196 [preauth] Jan 18 08:55:09 host sshd[14888]: User root from 14.161.27.163 not allowed because not listed in AllowUsers Jan 18 08:55:09 host sshd[14888]: input_userauth_request: invalid user root [preauth] Jan 18 08:55:09 host unix_chkpwd[14890]: password check failed for user (root) Jan 18 08:55:09 host sshd[14888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.27.163 user=root Jan 18 08:55:09 host sshd[14888]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 08:55:11 host sshd[14888]: Failed password for invalid user root from 14.161.27.163 port 39684 ssh2 Jan 18 08:55:11 host sshd[14888]: Received disconnect from 14.161.27.163 port 39684:11: Bye Bye [preauth] Jan 18 08:55:11 host sshd[14888]: Disconnected from 14.161.27.163 port 39684 [preauth] Jan 18 08:55:43 host sshd[14975]: Invalid user web from 134.209.200.13 port 36750 Jan 18 08:55:43 host sshd[14975]: input_userauth_request: invalid user web [preauth] Jan 18 08:55:43 host sshd[14975]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:55:43 host sshd[14975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.200.13 Jan 18 08:55:45 host sshd[14975]: Failed password for invalid user web from 134.209.200.13 port 36750 ssh2 Jan 18 08:55:45 host sshd[14975]: Received disconnect from 134.209.200.13 port 36750:11: Bye Bye [preauth] Jan 18 08:55:45 host sshd[14975]: Disconnected from 134.209.200.13 port 36750 [preauth] Jan 18 08:55:55 host sshd[14894]: User root from 123.240.202.59 not allowed because not listed in AllowUsers Jan 18 08:55:55 host sshd[14894]: input_userauth_request: invalid user root [preauth] Jan 18 08:55:55 host unix_chkpwd[15008]: password check failed for user (root) Jan 18 08:55:55 host sshd[14894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.240.202.59 user=root Jan 18 08:55:55 host sshd[14894]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 08:55:57 host sshd[14894]: Failed password for invalid user root from 123.240.202.59 port 40499 ssh2 Jan 18 08:55:58 host unix_chkpwd[15012]: password check failed for user (root) Jan 18 08:55:58 host sshd[14894]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 08:56:00 host sshd[14894]: Failed password for invalid user root from 123.240.202.59 port 40499 ssh2 Jan 18 08:56:01 host unix_chkpwd[15016]: password check failed for user (root) Jan 18 08:56:01 host sshd[14894]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 08:56:03 host sshd[14894]: Failed password for invalid user root from 123.240.202.59 port 40499 ssh2 Jan 18 08:56:04 host sshd[14894]: Connection reset by 123.240.202.59 port 40499 [preauth] Jan 18 08:56:04 host sshd[14894]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.240.202.59 user=root Jan 18 08:56:46 host sshd[15153]: User root from 27.112.78.28 not allowed because not listed in AllowUsers Jan 18 08:56:46 host sshd[15153]: input_userauth_request: invalid user root [preauth] Jan 18 08:56:46 host unix_chkpwd[15156]: password check failed for user (root) Jan 18 08:56:46 host sshd[15153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.112.78.28 user=root Jan 18 08:56:46 host sshd[15153]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 08:56:48 host sshd[15153]: Failed password for invalid user root from 27.112.78.28 port 45132 ssh2 Jan 18 08:56:48 host sshd[15153]: Received disconnect from 27.112.78.28 port 45132:11: Bye Bye [preauth] Jan 18 08:56:48 host sshd[15153]: Disconnected from 27.112.78.28 port 45132 [preauth] Jan 18 08:57:03 host sshd[15184]: User root from 61.7.147.42 not allowed because not listed in AllowUsers Jan 18 08:57:03 host sshd[15184]: input_userauth_request: invalid user root [preauth] Jan 18 08:57:03 host unix_chkpwd[15186]: password check failed for user (root) Jan 18 08:57:03 host sshd[15184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.7.147.42 user=root Jan 18 08:57:03 host sshd[15184]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 08:57:05 host sshd[15184]: Failed password for invalid user root from 61.7.147.42 port 19940 ssh2 Jan 18 08:57:05 host sshd[15184]: Received disconnect from 61.7.147.42 port 19940:11: Bye Bye [preauth] Jan 18 08:57:05 host sshd[15184]: Disconnected from 61.7.147.42 port 19940 [preauth] Jan 18 08:57:36 host sshd[15305]: Invalid user arkserver from 134.209.200.13 port 36124 Jan 18 08:57:36 host sshd[15305]: input_userauth_request: invalid user arkserver [preauth] Jan 18 08:57:36 host sshd[15305]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:57:36 host sshd[15305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.200.13 Jan 18 08:57:38 host sshd[15305]: Failed password for invalid user arkserver from 134.209.200.13 port 36124 ssh2 Jan 18 08:57:38 host sshd[15305]: Received disconnect from 134.209.200.13 port 36124:11: Bye Bye [preauth] Jan 18 08:57:38 host sshd[15305]: Disconnected from 134.209.200.13 port 36124 [preauth] Jan 18 08:57:39 host sshd[15309]: Invalid user terraria from 178.33.6.226 port 39592 Jan 18 08:57:39 host sshd[15309]: input_userauth_request: invalid user terraria [preauth] Jan 18 08:57:39 host sshd[15309]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:57:39 host sshd[15309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.6.226 Jan 18 08:57:41 host sshd[15309]: Failed password for invalid user terraria from 178.33.6.226 port 39592 ssh2 Jan 18 08:57:41 host sshd[15309]: Received disconnect from 178.33.6.226 port 39592:11: Bye Bye [preauth] Jan 18 08:57:41 host sshd[15309]: Disconnected from 178.33.6.226 port 39592 [preauth] Jan 18 08:57:50 host sshd[15328]: Invalid user kafka from 138.197.162.56 port 32912 Jan 18 08:57:50 host sshd[15328]: input_userauth_request: invalid user kafka [preauth] Jan 18 08:57:50 host sshd[15328]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:57:50 host sshd[15328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.162.56 Jan 18 08:57:51 host sshd[15332]: Invalid user webadmin from 43.157.26.210 port 34200 Jan 18 08:57:51 host sshd[15332]: input_userauth_request: invalid user webadmin [preauth] Jan 18 08:57:51 host sshd[15332]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:57:51 host sshd[15332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.26.210 Jan 18 08:57:52 host sshd[15328]: Failed password for invalid user kafka from 138.197.162.56 port 32912 ssh2 Jan 18 08:57:52 host sshd[15328]: Received disconnect from 138.197.162.56 port 32912:11: Bye Bye [preauth] Jan 18 08:57:52 host sshd[15328]: Disconnected from 138.197.162.56 port 32912 [preauth] Jan 18 08:57:53 host sshd[15332]: Failed password for invalid user webadmin from 43.157.26.210 port 34200 ssh2 Jan 18 08:57:54 host sshd[15332]: Received disconnect from 43.157.26.210 port 34200:11: Bye Bye [preauth] Jan 18 08:57:54 host sshd[15332]: Disconnected from 43.157.26.210 port 34200 [preauth] Jan 18 08:58:10 host sshd[15379]: Invalid user terraria from 54.39.177.44 port 49712 Jan 18 08:58:10 host sshd[15379]: input_userauth_request: invalid user terraria [preauth] Jan 18 08:58:10 host sshd[15379]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:58:10 host sshd[15379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.177.44 Jan 18 08:58:12 host sshd[15379]: Failed password for invalid user terraria from 54.39.177.44 port 49712 ssh2 Jan 18 08:58:12 host sshd[15379]: Received disconnect from 54.39.177.44 port 49712:11: Bye Bye [preauth] Jan 18 08:58:12 host sshd[15379]: Disconnected from 54.39.177.44 port 49712 [preauth] Jan 18 08:58:22 host sshd[15498]: Invalid user builder from 27.112.78.28 port 41216 Jan 18 08:58:22 host sshd[15498]: input_userauth_request: invalid user builder [preauth] Jan 18 08:58:22 host sshd[15498]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:58:23 host sshd[15498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.112.78.28 Jan 18 08:58:24 host sshd[15498]: Failed password for invalid user builder from 27.112.78.28 port 41216 ssh2 Jan 18 08:58:25 host sshd[15498]: Received disconnect from 27.112.78.28 port 41216:11: Bye Bye [preauth] Jan 18 08:58:25 host sshd[15498]: Disconnected from 27.112.78.28 port 41216 [preauth] Jan 18 08:58:44 host sshd[15589]: Invalid user manager from 43.134.176.134 port 50936 Jan 18 08:58:44 host sshd[15589]: input_userauth_request: invalid user manager [preauth] Jan 18 08:58:44 host sshd[15589]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:58:44 host sshd[15589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.176.134 Jan 18 08:58:44 host sshd[15587]: Invalid user arkserver from 134.209.200.13 port 59782 Jan 18 08:58:44 host sshd[15587]: input_userauth_request: invalid user arkserver [preauth] Jan 18 08:58:44 host sshd[15587]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:58:44 host sshd[15587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.200.13 Jan 18 08:58:45 host sshd[15589]: Failed password for invalid user manager from 43.134.176.134 port 50936 ssh2 Jan 18 08:58:45 host sshd[15589]: Received disconnect from 43.134.176.134 port 50936:11: Bye Bye [preauth] Jan 18 08:58:45 host sshd[15589]: Disconnected from 43.134.176.134 port 50936 [preauth] Jan 18 08:58:46 host sshd[15587]: Failed password for invalid user arkserver from 134.209.200.13 port 59782 ssh2 Jan 18 08:58:46 host sshd[15587]: Received disconnect from 134.209.200.13 port 59782:11: Bye Bye [preauth] Jan 18 08:58:46 host sshd[15587]: Disconnected from 134.209.200.13 port 59782 [preauth] Jan 18 08:58:59 host sshd[15642]: Invalid user hplip from 104.244.74.6 port 48346 Jan 18 08:58:59 host sshd[15642]: input_userauth_request: invalid user hplip [preauth] Jan 18 08:58:59 host sshd[15642]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:58:59 host sshd[15642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 18 08:59:01 host sshd[15642]: Failed password for invalid user hplip from 104.244.74.6 port 48346 ssh2 Jan 18 08:59:02 host sshd[15642]: Connection closed by 104.244.74.6 port 48346 [preauth] Jan 18 08:59:18 host sshd[15706]: Invalid user builder from 54.39.177.44 port 44356 Jan 18 08:59:18 host sshd[15706]: input_userauth_request: invalid user builder [preauth] Jan 18 08:59:18 host sshd[15706]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:59:18 host sshd[15706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.177.44 Jan 18 08:59:20 host sshd[15706]: Failed password for invalid user builder from 54.39.177.44 port 44356 ssh2 Jan 18 08:59:26 host sshd[15747]: Invalid user deamon from 178.33.6.226 port 55612 Jan 18 08:59:26 host sshd[15747]: input_userauth_request: invalid user deamon [preauth] Jan 18 08:59:26 host sshd[15747]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:59:26 host sshd[15747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.33.6.226 Jan 18 08:59:28 host sshd[15747]: Failed password for invalid user deamon from 178.33.6.226 port 55612 ssh2 Jan 18 08:59:28 host sshd[15747]: Received disconnect from 178.33.6.226 port 55612:11: Bye Bye [preauth] Jan 18 08:59:28 host sshd[15747]: Disconnected from 178.33.6.226 port 55612 [preauth] Jan 18 08:59:42 host sshd[15837]: Invalid user int from 43.157.26.210 port 59616 Jan 18 08:59:42 host sshd[15837]: input_userauth_request: invalid user int [preauth] Jan 18 08:59:42 host sshd[15837]: pam_unix(sshd:auth): check pass; user unknown Jan 18 08:59:42 host sshd[15837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.26.210 Jan 18 08:59:44 host sshd[15837]: Failed password for invalid user int from 43.157.26.210 port 59616 ssh2 Jan 18 08:59:44 host sshd[15837]: Received disconnect from 43.157.26.210 port 59616:11: Bye Bye [preauth] Jan 18 08:59:44 host sshd[15837]: Disconnected from 43.157.26.210 port 59616 [preauth] Jan 18 09:00:51 host sshd[16055]: User root from 45.240.88.106 not allowed because not listed in AllowUsers Jan 18 09:00:51 host sshd[16055]: input_userauth_request: invalid user root [preauth] Jan 18 09:00:51 host unix_chkpwd[16058]: password check failed for user (root) Jan 18 09:00:51 host sshd[16055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.240.88.106 user=root Jan 18 09:00:51 host sshd[16055]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 09:00:52 host sshd[16055]: Failed password for invalid user root from 45.240.88.106 port 44704 ssh2 Jan 18 09:00:52 host sshd[16055]: Received disconnect from 45.240.88.106 port 44704:11: Bye Bye [preauth] Jan 18 09:00:52 host sshd[16055]: Disconnected from 45.240.88.106 port 44704 [preauth] Jan 18 09:00:53 host sshd[16060]: Invalid user demo from 43.157.26.210 port 53848 Jan 18 09:00:53 host sshd[16060]: input_userauth_request: invalid user demo [preauth] Jan 18 09:00:53 host sshd[16060]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:00:53 host sshd[16060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.26.210 Jan 18 09:00:55 host sshd[16060]: Failed password for invalid user demo from 43.157.26.210 port 53848 ssh2 Jan 18 09:00:55 host sshd[16060]: Received disconnect from 43.157.26.210 port 53848:11: Bye Bye [preauth] Jan 18 09:00:55 host sshd[16060]: Disconnected from 43.157.26.210 port 53848 [preauth] Jan 18 09:01:24 host sshd[16197]: Invalid user master from 138.197.162.56 port 52084 Jan 18 09:01:24 host sshd[16197]: input_userauth_request: invalid user master [preauth] Jan 18 09:01:24 host sshd[16197]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:01:24 host sshd[16197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.162.56 Jan 18 09:01:26 host sshd[16197]: Failed password for invalid user master from 138.197.162.56 port 52084 ssh2 Jan 18 09:01:26 host sshd[16197]: Received disconnect from 138.197.162.56 port 52084:11: Bye Bye [preauth] Jan 18 09:01:26 host sshd[16197]: Disconnected from 138.197.162.56 port 52084 [preauth] Jan 18 09:02:01 host sshd[16281]: Invalid user kali from 14.161.27.163 port 34728 Jan 18 09:02:01 host sshd[16281]: input_userauth_request: invalid user kali [preauth] Jan 18 09:02:01 host sshd[16281]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:02:01 host sshd[16281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.161.27.163 Jan 18 09:02:04 host sshd[16281]: Failed password for invalid user kali from 14.161.27.163 port 34728 ssh2 Jan 18 09:02:04 host sshd[16281]: Received disconnect from 14.161.27.163 port 34728:11: Bye Bye [preauth] Jan 18 09:02:04 host sshd[16281]: Disconnected from 14.161.27.163 port 34728 [preauth] Jan 18 09:02:32 host sshd[16397]: Connection closed by 114.35.102.81 port 58905 [preauth] Jan 18 09:02:34 host sshd[16415]: Invalid user testuser from 138.197.162.56 port 51286 Jan 18 09:02:34 host sshd[16415]: input_userauth_request: invalid user testuser [preauth] Jan 18 09:02:34 host sshd[16415]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:02:34 host sshd[16415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.162.56 Jan 18 09:02:36 host sshd[16415]: Failed password for invalid user testuser from 138.197.162.56 port 51286 ssh2 Jan 18 09:02:37 host sshd[16415]: Received disconnect from 138.197.162.56 port 51286:11: Bye Bye [preauth] Jan 18 09:02:37 host sshd[16415]: Disconnected from 138.197.162.56 port 51286 [preauth] Jan 18 09:03:12 host sshd[16537]: Invalid user kafka from 130.162.135.31 port 37286 Jan 18 09:03:12 host sshd[16537]: input_userauth_request: invalid user kafka [preauth] Jan 18 09:03:12 host sshd[16537]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:03:12 host sshd[16537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.135.31 Jan 18 09:03:15 host sshd[16537]: Failed password for invalid user kafka from 130.162.135.31 port 37286 ssh2 Jan 18 09:03:15 host sshd[16537]: Received disconnect from 130.162.135.31 port 37286:11: Bye Bye [preauth] Jan 18 09:03:15 host sshd[16537]: Disconnected from 130.162.135.31 port 37286 [preauth] Jan 18 09:03:49 host sshd[16740]: Invalid user a from 43.134.176.134 port 55152 Jan 18 09:03:49 host sshd[16740]: input_userauth_request: invalid user a [preauth] Jan 18 09:03:49 host sshd[16740]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:03:49 host sshd[16740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.176.134 Jan 18 09:03:52 host sshd[16740]: Failed password for invalid user a from 43.134.176.134 port 55152 ssh2 Jan 18 09:03:52 host sshd[16740]: Received disconnect from 43.134.176.134 port 55152:11: Bye Bye [preauth] Jan 18 09:03:52 host sshd[16740]: Disconnected from 43.134.176.134 port 55152 [preauth] Jan 18 09:05:23 host sshd[17010]: User sshd from 194.169.175.102 not allowed because not listed in AllowUsers Jan 18 09:05:23 host sshd[17010]: input_userauth_request: invalid user sshd [preauth] Jan 18 09:05:23 host unix_chkpwd[17020]: password check failed for user (sshd) Jan 18 09:05:23 host sshd[17010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=sshd Jan 18 09:05:23 host sshd[17010]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sshd" Jan 18 09:05:25 host sshd[17010]: Failed password for invalid user sshd from 194.169.175.102 port 51317 ssh2 Jan 18 09:05:25 host sshd[17010]: Received disconnect from 194.169.175.102 port 51317:11: Client disconnecting normally [preauth] Jan 18 09:05:25 host sshd[17010]: Disconnected from 194.169.175.102 port 51317 [preauth] Jan 18 09:05:38 host sshd[17120]: Invalid user acs from 43.134.176.134 port 57468 Jan 18 09:05:38 host sshd[17120]: input_userauth_request: invalid user acs [preauth] Jan 18 09:05:38 host sshd[17120]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:05:38 host sshd[17120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.176.134 Jan 18 09:05:41 host sshd[17120]: Failed password for invalid user acs from 43.134.176.134 port 57468 ssh2 Jan 18 09:06:40 host sshd[17300]: Invalid user alex from 130.162.135.31 port 37396 Jan 18 09:06:40 host sshd[17300]: input_userauth_request: invalid user alex [preauth] Jan 18 09:06:40 host sshd[17300]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:06:40 host sshd[17300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.135.31 Jan 18 09:06:42 host sshd[17300]: Failed password for invalid user alex from 130.162.135.31 port 37396 ssh2 Jan 18 09:06:42 host sshd[17300]: Received disconnect from 130.162.135.31 port 37396:11: Bye Bye [preauth] Jan 18 09:06:42 host sshd[17300]: Disconnected from 130.162.135.31 port 37396 [preauth] Jan 18 09:08:49 host sshd[17746]: Invalid user mc from 130.162.135.31 port 37502 Jan 18 09:08:49 host sshd[17746]: input_userauth_request: invalid user mc [preauth] Jan 18 09:08:49 host sshd[17746]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:08:49 host sshd[17746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.135.31 Jan 18 09:08:51 host sshd[17746]: Failed password for invalid user mc from 130.162.135.31 port 37502 ssh2 Jan 18 09:10:27 host sshd[18083]: Bad protocol version identification '\026\003\001' from 106.75.182.206 port 33994 Jan 18 09:10:43 host sshd[18133]: Bad protocol version identification 'USER anonymous' from 106.75.182.206 port 37978 Jan 18 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 09:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 09:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 09:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 09:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 09:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 09:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 09:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=shalinijames user-2=wwwtestugo user-3=vfmassets user-4=pmcresources user-5=disposeat user-6=remysagr user-7=wwwkmaorg user-8=wwwkapin user-9=woodpeck user-10=phmetals user-11=kottayamcalldriv user-12=palco123 user-13=gifterman user-14=wwwnexidigital user-15=mrsclean user-16=wwwevmhonda user-17=bonifacegroup user-18=wwwletsstalkfood user-19=straightcurve user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=ugotscom user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 09:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 09:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 09:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zk2TYBXdlSBSqKhq.~ Jan 18 09:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zk2TYBXdlSBSqKhq.~' Jan 18 09:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zk2TYBXdlSBSqKhq.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 09:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 09:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 09:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 09:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 09:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 09:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 09:23:29 host sshd[20825]: Invalid user ubnt from 125.228.28.243 port 48178 Jan 18 09:23:29 host sshd[20825]: input_userauth_request: invalid user ubnt [preauth] Jan 18 09:23:29 host sshd[20825]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:23:29 host sshd[20825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.28.243 Jan 18 09:23:32 host sshd[20825]: Failed password for invalid user ubnt from 125.228.28.243 port 48178 ssh2 Jan 18 09:23:33 host sshd[20825]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:23:34 host sshd[20825]: Failed password for invalid user ubnt from 125.228.28.243 port 48178 ssh2 Jan 18 09:23:35 host sshd[20825]: Failed password for invalid user ubnt from 125.228.28.243 port 48178 ssh2 Jan 18 09:23:35 host sshd[20825]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:23:38 host sshd[20825]: Failed password for invalid user ubnt from 125.228.28.243 port 48178 ssh2 Jan 18 09:23:38 host sshd[20825]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:23:40 host sshd[20825]: Failed password for invalid user ubnt from 125.228.28.243 port 48178 ssh2 Jan 18 09:25:55 host sshd[21259]: Invalid user admin from 175.183.32.151 port 33480 Jan 18 09:25:55 host sshd[21259]: input_userauth_request: invalid user admin [preauth] Jan 18 09:25:55 host sshd[21259]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:25:55 host sshd[21259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.183.32.151 Jan 18 09:25:57 host sshd[21259]: Failed password for invalid user admin from 175.183.32.151 port 33480 ssh2 Jan 18 09:25:57 host sshd[21259]: Failed password for invalid user admin from 175.183.32.151 port 33480 ssh2 Jan 18 09:25:58 host sshd[21259]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:26:00 host sshd[21259]: Failed password for invalid user admin from 175.183.32.151 port 33480 ssh2 Jan 18 09:26:00 host sshd[21259]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:26:03 host sshd[21259]: Failed password for invalid user admin from 175.183.32.151 port 33480 ssh2 Jan 18 09:26:03 host sshd[21259]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:26:04 host sshd[21259]: Failed password for invalid user admin from 175.183.32.151 port 33480 ssh2 Jan 18 09:26:06 host sshd[21259]: Connection reset by 175.183.32.151 port 33480 [preauth] Jan 18 09:26:06 host sshd[21259]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.183.32.151 Jan 18 09:26:06 host sshd[21259]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 18 09:27:24 host sshd[21464]: User root from 59.126.116.127 not allowed because not listed in AllowUsers Jan 18 09:27:24 host sshd[21464]: input_userauth_request: invalid user root [preauth] Jan 18 09:27:24 host unix_chkpwd[21468]: password check failed for user (root) Jan 18 09:27:24 host sshd[21464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.116.127 user=root Jan 18 09:27:24 host sshd[21464]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 09:27:26 host sshd[21464]: Failed password for invalid user root from 59.126.116.127 port 52966 ssh2 Jan 18 09:27:26 host unix_chkpwd[21473]: password check failed for user (root) Jan 18 09:27:26 host sshd[21464]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 09:27:28 host sshd[21464]: Failed password for invalid user root from 59.126.116.127 port 52966 ssh2 Jan 18 09:27:29 host unix_chkpwd[21499]: password check failed for user (root) Jan 18 09:27:29 host sshd[21464]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 09:27:32 host sshd[21464]: Failed password for invalid user root from 59.126.116.127 port 52966 ssh2 Jan 18 09:27:33 host sshd[21464]: Connection reset by 59.126.116.127 port 52966 [preauth] Jan 18 09:27:33 host sshd[21464]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.116.127 user=root Jan 18 09:29:00 host sshd[21695]: Invalid user ubnt from 36.231.188.232 port 39672 Jan 18 09:29:00 host sshd[21695]: input_userauth_request: invalid user ubnt [preauth] Jan 18 09:29:00 host sshd[21695]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:29:00 host sshd[21695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.231.188.232 Jan 18 09:29:02 host sshd[21695]: Failed password for invalid user ubnt from 36.231.188.232 port 39672 ssh2 Jan 18 09:29:03 host sshd[21695]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:29:05 host sshd[21695]: Failed password for invalid user ubnt from 36.231.188.232 port 39672 ssh2 Jan 18 09:29:05 host sshd[21695]: Connection reset by 36.231.188.232 port 39672 [preauth] Jan 18 09:29:05 host sshd[21695]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.231.188.232 Jan 18 09:35:51 host sshd[22779]: Connection reset by 220.134.12.214 port 55283 [preauth] Jan 18 09:36:10 host sshd[22811]: Invalid user kira from 103.119.155.83 port 47322 Jan 18 09:36:10 host sshd[22811]: input_userauth_request: invalid user kira [preauth] Jan 18 09:36:10 host sshd[22811]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:36:10 host sshd[22811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.119.155.83 Jan 18 09:36:12 host sshd[22811]: Failed password for invalid user kira from 103.119.155.83 port 47322 ssh2 Jan 18 09:36:12 host sshd[22811]: Received disconnect from 103.119.155.83 port 47322:11: Bye Bye [preauth] Jan 18 09:36:12 host sshd[22811]: Disconnected from 103.119.155.83 port 47322 [preauth] Jan 18 09:36:29 host sshd[22860]: User root from 180.168.95.234 not allowed because not listed in AllowUsers Jan 18 09:36:29 host sshd[22860]: input_userauth_request: invalid user root [preauth] Jan 18 09:36:29 host unix_chkpwd[22863]: password check failed for user (root) Jan 18 09:36:29 host sshd[22860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.95.234 user=root Jan 18 09:36:29 host sshd[22860]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 09:36:32 host sshd[22860]: Failed password for invalid user root from 180.168.95.234 port 41454 ssh2 Jan 18 09:36:32 host sshd[22860]: Received disconnect from 180.168.95.234 port 41454:11: Bye Bye [preauth] Jan 18 09:36:32 host sshd[22860]: Disconnected from 180.168.95.234 port 41454 [preauth] Jan 18 09:37:33 host sshd[22991]: User root from 134.209.127.189 not allowed because not listed in AllowUsers Jan 18 09:37:33 host sshd[22991]: input_userauth_request: invalid user root [preauth] Jan 18 09:37:33 host unix_chkpwd[22995]: password check failed for user (root) Jan 18 09:37:33 host sshd[22991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.127.189 user=root Jan 18 09:37:33 host sshd[22991]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 09:37:35 host sshd[22991]: Failed password for invalid user root from 134.209.127.189 port 35086 ssh2 Jan 18 09:37:35 host sshd[22991]: Received disconnect from 134.209.127.189 port 35086:11: Bye Bye [preauth] Jan 18 09:37:35 host sshd[22991]: Disconnected from 134.209.127.189 port 35086 [preauth] Jan 18 09:37:59 host sshd[23017]: User root from 202.179.0.89 not allowed because not listed in AllowUsers Jan 18 09:37:59 host sshd[23017]: input_userauth_request: invalid user root [preauth] Jan 18 09:37:59 host unix_chkpwd[23020]: password check failed for user (root) Jan 18 09:37:59 host sshd[23017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.179.0.89 user=root Jan 18 09:37:59 host sshd[23017]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 09:38:01 host sshd[23017]: Failed password for invalid user root from 202.179.0.89 port 12398 ssh2 Jan 18 09:38:01 host sshd[23017]: Received disconnect from 202.179.0.89 port 12398:11: Bye Bye [preauth] Jan 18 09:38:01 host sshd[23017]: Disconnected from 202.179.0.89 port 12398 [preauth] Jan 18 09:38:48 host sshd[23145]: Invalid user vagrant from 114.34.129.50 port 34757 Jan 18 09:38:48 host sshd[23145]: input_userauth_request: invalid user vagrant [preauth] Jan 18 09:38:48 host sshd[23145]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:38:48 host sshd[23145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.129.50 Jan 18 09:38:51 host sshd[23145]: Failed password for invalid user vagrant from 114.34.129.50 port 34757 ssh2 Jan 18 09:38:52 host sshd[23145]: Failed password for invalid user vagrant from 114.34.129.50 port 34757 ssh2 Jan 18 09:38:53 host sshd[23145]: Connection closed by 114.34.129.50 port 34757 [preauth] Jan 18 09:39:07 host sshd[23190]: User root from 38.87.247.82 not allowed because not listed in AllowUsers Jan 18 09:39:07 host sshd[23190]: input_userauth_request: invalid user root [preauth] Jan 18 09:39:07 host unix_chkpwd[23194]: password check failed for user (root) Jan 18 09:39:07 host sshd[23190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.87.247.82 user=root Jan 18 09:39:07 host sshd[23190]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 09:39:09 host sshd[23190]: Failed password for invalid user root from 38.87.247.82 port 55622 ssh2 Jan 18 09:39:10 host sshd[23190]: Received disconnect from 38.87.247.82 port 55622:11: Bye Bye [preauth] Jan 18 09:39:10 host sshd[23190]: Disconnected from 38.87.247.82 port 55622 [preauth] Jan 18 09:40:00 host sshd[23309]: Invalid user usr from 221.164.234.19 port 44677 Jan 18 09:40:00 host sshd[23309]: input_userauth_request: invalid user usr [preauth] Jan 18 09:40:00 host sshd[23309]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:40:00 host sshd[23309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.164.234.19 Jan 18 09:40:02 host sshd[23309]: Failed password for invalid user usr from 221.164.234.19 port 44677 ssh2 Jan 18 09:40:03 host sshd[23309]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:40:05 host sshd[23309]: Failed password for invalid user usr from 221.164.234.19 port 44677 ssh2 Jan 18 09:40:05 host sshd[23309]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:40:07 host sshd[23309]: Failed password for invalid user usr from 221.164.234.19 port 44677 ssh2 Jan 18 09:40:08 host sshd[23309]: Connection reset by 221.164.234.19 port 44677 [preauth] Jan 18 09:40:08 host sshd[23309]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.164.234.19 Jan 18 09:42:18 host sshd[23743]: Invalid user hb from 45.156.21.70 port 51520 Jan 18 09:42:18 host sshd[23743]: input_userauth_request: invalid user hb [preauth] Jan 18 09:42:18 host sshd[23743]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:42:18 host sshd[23743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.156.21.70 Jan 18 09:42:20 host sshd[23743]: Failed password for invalid user hb from 45.156.21.70 port 51520 ssh2 Jan 18 09:42:20 host sshd[23743]: Received disconnect from 45.156.21.70 port 51520:11: Bye Bye [preauth] Jan 18 09:42:20 host sshd[23743]: Disconnected from 45.156.21.70 port 51520 [preauth] Jan 18 09:42:37 host sshd[23844]: Invalid user frappe from 180.168.95.234 port 39364 Jan 18 09:42:37 host sshd[23844]: input_userauth_request: invalid user frappe [preauth] Jan 18 09:42:37 host sshd[23844]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:42:37 host sshd[23844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.95.234 Jan 18 09:42:37 host sshd[23848]: Invalid user alex from 201.184.50.251 port 58616 Jan 18 09:42:37 host sshd[23848]: input_userauth_request: invalid user alex [preauth] Jan 18 09:42:37 host sshd[23848]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:42:37 host sshd[23848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.50.251 Jan 18 09:42:39 host sshd[23844]: Failed password for invalid user frappe from 180.168.95.234 port 39364 ssh2 Jan 18 09:42:39 host sshd[23844]: Received disconnect from 180.168.95.234 port 39364:11: Bye Bye [preauth] Jan 18 09:42:39 host sshd[23844]: Disconnected from 180.168.95.234 port 39364 [preauth] Jan 18 09:42:40 host sshd[23848]: Failed password for invalid user alex from 201.184.50.251 port 58616 ssh2 Jan 18 09:42:40 host sshd[23848]: Received disconnect from 201.184.50.251 port 58616:11: Bye Bye [preauth] Jan 18 09:42:40 host sshd[23848]: Disconnected from 201.184.50.251 port 58616 [preauth] Jan 18 09:42:43 host sshd[23890]: Invalid user hz from 103.119.155.83 port 50242 Jan 18 09:42:43 host sshd[23890]: input_userauth_request: invalid user hz [preauth] Jan 18 09:42:43 host sshd[23890]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:42:43 host sshd[23890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.119.155.83 Jan 18 09:42:45 host sshd[23890]: Failed password for invalid user hz from 103.119.155.83 port 50242 ssh2 Jan 18 09:42:45 host sshd[23890]: Received disconnect from 103.119.155.83 port 50242:11: Bye Bye [preauth] Jan 18 09:42:45 host sshd[23890]: Disconnected from 103.119.155.83 port 50242 [preauth] Jan 18 09:42:53 host sshd[23913]: Invalid user frappe from 134.209.127.189 port 54024 Jan 18 09:42:53 host sshd[23913]: input_userauth_request: invalid user frappe [preauth] Jan 18 09:42:53 host sshd[23913]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:42:53 host sshd[23913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.127.189 Jan 18 09:42:53 host sshd[23921]: Invalid user hz from 202.179.0.89 port 35460 Jan 18 09:42:53 host sshd[23921]: input_userauth_request: invalid user hz [preauth] Jan 18 09:42:53 host sshd[23921]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:42:53 host sshd[23921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.179.0.89 Jan 18 09:42:55 host sshd[23913]: Failed password for invalid user frappe from 134.209.127.189 port 54024 ssh2 Jan 18 09:42:55 host sshd[23913]: Received disconnect from 134.209.127.189 port 54024:11: Bye Bye [preauth] Jan 18 09:42:55 host sshd[23913]: Disconnected from 134.209.127.189 port 54024 [preauth] Jan 18 09:42:56 host sshd[23921]: Failed password for invalid user hz from 202.179.0.89 port 35460 ssh2 Jan 18 09:42:56 host sshd[23921]: Received disconnect from 202.179.0.89 port 35460:11: Bye Bye [preauth] Jan 18 09:42:56 host sshd[23921]: Disconnected from 202.179.0.89 port 35460 [preauth] Jan 18 09:44:08 host sshd[24137]: Invalid user hb from 103.119.155.83 port 49024 Jan 18 09:44:08 host sshd[24137]: input_userauth_request: invalid user hb [preauth] Jan 18 09:44:08 host sshd[24137]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:44:08 host sshd[24137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.119.155.83 Jan 18 09:44:10 host sshd[24137]: Failed password for invalid user hb from 103.119.155.83 port 49024 ssh2 Jan 18 09:44:10 host sshd[24137]: Received disconnect from 103.119.155.83 port 49024:11: Bye Bye [preauth] Jan 18 09:44:10 host sshd[24137]: Disconnected from 103.119.155.83 port 49024 [preauth] Jan 18 09:44:17 host sshd[24175]: Invalid user kira from 45.156.21.70 port 37658 Jan 18 09:44:17 host sshd[24175]: input_userauth_request: invalid user kira [preauth] Jan 18 09:44:17 host sshd[24175]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:44:17 host sshd[24175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.156.21.70 Jan 18 09:44:19 host sshd[24175]: Failed password for invalid user kira from 45.156.21.70 port 37658 ssh2 Jan 18 09:44:19 host sshd[24175]: Received disconnect from 45.156.21.70 port 37658:11: Bye Bye [preauth] Jan 18 09:44:19 host sshd[24175]: Disconnected from 45.156.21.70 port 37658 [preauth] Jan 18 09:44:46 host sshd[24286]: Invalid user hb from 201.184.50.251 port 56602 Jan 18 09:44:46 host sshd[24286]: input_userauth_request: invalid user hb [preauth] Jan 18 09:44:46 host sshd[24286]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:44:46 host sshd[24286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.50.251 Jan 18 09:44:48 host sshd[24286]: Failed password for invalid user hb from 201.184.50.251 port 56602 ssh2 Jan 18 09:44:48 host sshd[24286]: Received disconnect from 201.184.50.251 port 56602:11: Bye Bye [preauth] Jan 18 09:44:48 host sshd[24286]: Disconnected from 201.184.50.251 port 56602 [preauth] Jan 18 09:45:54 host sshd[24549]: Invalid user factorio from 45.156.21.70 port 45134 Jan 18 09:45:54 host sshd[24549]: input_userauth_request: invalid user factorio [preauth] Jan 18 09:45:54 host sshd[24549]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:45:54 host sshd[24549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.156.21.70 Jan 18 09:45:56 host sshd[24549]: Failed password for invalid user factorio from 45.156.21.70 port 45134 ssh2 Jan 18 09:45:56 host sshd[24549]: Received disconnect from 45.156.21.70 port 45134:11: Bye Bye [preauth] Jan 18 09:45:56 host sshd[24549]: Disconnected from 45.156.21.70 port 45134 [preauth] Jan 18 09:46:11 host sshd[24607]: Invalid user frappe from 201.184.50.251 port 51250 Jan 18 09:46:11 host sshd[24607]: input_userauth_request: invalid user frappe [preauth] Jan 18 09:46:11 host sshd[24607]: pam_unix(sshd:auth): check pass; user unknown Jan 18 09:46:11 host sshd[24607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.184.50.251 Jan 18 09:46:13 host sshd[24607]: Failed password for invalid user frappe from 201.184.50.251 port 51250 ssh2 Jan 18 09:46:14 host sshd[24607]: Received disconnect from 201.184.50.251 port 51250:11: Bye Bye [preauth] Jan 18 09:46:14 host sshd[24607]: Disconnected from 201.184.50.251 port 51250 [preauth] Jan 18 09:49:26 host sshd[25050]: User root from 38.87.247.82 not allowed because not listed in AllowUsers Jan 18 09:49:26 host sshd[25050]: input_userauth_request: invalid user root [preauth] Jan 18 09:49:26 host unix_chkpwd[25053]: password check failed for user (root) Jan 18 09:49:26 host sshd[25050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.87.247.82 user=root Jan 18 09:49:26 host sshd[25050]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 09:49:29 host sshd[25050]: Failed password for invalid user root from 38.87.247.82 port 40122 ssh2 Jan 18 10:01:03 host sshd[26949]: Invalid user ONTUSER from 113.176.76.139 port 58829 Jan 18 10:01:03 host sshd[26949]: input_userauth_request: invalid user ONTUSER [preauth] Jan 18 10:01:03 host sshd[26949]: pam_unix(sshd:auth): check pass; user unknown Jan 18 10:01:03 host sshd[26949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.176.76.139 Jan 18 10:01:05 host sshd[26953]: User root from 113.176.76.139 not allowed because not listed in AllowUsers Jan 18 10:01:05 host sshd[26953]: input_userauth_request: invalid user root [preauth] Jan 18 10:01:05 host unix_chkpwd[26956]: password check failed for user (root) Jan 18 10:01:05 host sshd[26953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.176.76.139 user=root Jan 18 10:01:05 host sshd[26953]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 10:01:06 host sshd[26949]: Failed password for invalid user ONTUSER from 113.176.76.139 port 58829 ssh2 Jan 18 10:01:07 host sshd[26953]: Failed password for invalid user root from 113.176.76.139 port 58837 ssh2 Jan 18 10:01:07 host sshd[26949]: pam_unix(sshd:auth): check pass; user unknown Jan 18 10:01:07 host sshd[26953]: Connection reset by 113.176.76.139 port 58837 [preauth] Jan 18 10:01:09 host sshd[26949]: Failed password for invalid user ONTUSER from 113.176.76.139 port 58829 ssh2 Jan 18 10:01:09 host sshd[26949]: Failed password for invalid user ONTUSER from 113.176.76.139 port 58829 ssh2 Jan 18 10:01:09 host sshd[26949]: Connection closed by 113.176.76.139 port 58829 [preauth] Jan 18 10:01:09 host sshd[26949]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.176.76.139 Jan 18 10:15:45 host sshd[29502]: Invalid user support from 65.158.137.178 port 62361 Jan 18 10:15:45 host sshd[29502]: input_userauth_request: invalid user support [preauth] Jan 18 10:15:45 host sshd[29502]: pam_unix(sshd:auth): check pass; user unknown Jan 18 10:15:45 host sshd[29502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.158.137.178 Jan 18 10:15:46 host sshd[29502]: Failed password for invalid user support from 65.158.137.178 port 62361 ssh2 Jan 18 10:15:47 host sshd[29502]: pam_unix(sshd:auth): check pass; user unknown Jan 18 10:15:49 host sshd[29502]: Failed password for invalid user support from 65.158.137.178 port 62361 ssh2 Jan 18 10:15:50 host sshd[29502]: pam_unix(sshd:auth): check pass; user unknown Jan 18 10:15:52 host sshd[29502]: Failed password for invalid user support from 65.158.137.178 port 62361 ssh2 Jan 18 10:15:53 host sshd[29502]: Connection reset by 65.158.137.178 port 62361 [preauth] Jan 18 10:15:53 host sshd[29502]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.158.137.178 Jan 18 10:19:59 host sshd[30076]: Invalid user dmdba from 220.134.225.206 port 44454 Jan 18 10:19:59 host sshd[30076]: input_userauth_request: invalid user dmdba [preauth] Jan 18 10:19:59 host sshd[30076]: pam_unix(sshd:auth): check pass; user unknown Jan 18 10:19:59 host sshd[30076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.225.206 Jan 18 10:20:01 host sshd[30076]: Failed password for invalid user dmdba from 220.134.225.206 port 44454 ssh2 Jan 18 10:20:01 host sshd[30076]: Failed password for invalid user dmdba from 220.134.225.206 port 44454 ssh2 Jan 18 10:20:02 host sshd[30076]: Connection closed by 220.134.225.206 port 44454 [preauth] Jan 18 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 10:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 10:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 10:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 10:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 10:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 10:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 10:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 10:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=ugotscom user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=wwwpmcresource user-7=dartsimp user-8=a2zgroup user-9=laundryboniface user-10=wwwkaretakers user-11=cochintaxi user-12=phmetals user-13=kottayamcalldriv user-14=gifterman user-15=palco123 user-16=wwwnexidigital user-17=mrsclean user-18=wwwevmhonda user-19=bonifacegroup user-20=straightcurve user-21=wwwletsstalkfood user-22=wwwtestugo user-23=shalinijames user-24=vfmassets user-25=pmcresources user-26=disposeat user-27=wwwkmaorg user-28=remysagr user-29=wwwkapin user-30=woodpeck feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 10:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 10:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 10:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-qJOhH8PU9QLeMO48.~ Jan 18 10:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-qJOhH8PU9QLeMO48.~' Jan 18 10:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-qJOhH8PU9QLeMO48.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 10:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 10:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 10:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 10:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 10:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 10:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 10:23:03 host sshd[30812]: Invalid user vadmin from 222.112.19.89 port 60397 Jan 18 10:23:03 host sshd[30812]: input_userauth_request: invalid user vadmin [preauth] Jan 18 10:23:03 host sshd[30812]: pam_unix(sshd:auth): check pass; user unknown Jan 18 10:23:03 host sshd[30812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.112.19.89 Jan 18 10:23:05 host sshd[30812]: Failed password for invalid user vadmin from 222.112.19.89 port 60397 ssh2 Jan 18 10:23:06 host sshd[30812]: pam_unix(sshd:auth): check pass; user unknown Jan 18 10:23:08 host sshd[30812]: Failed password for invalid user vadmin from 222.112.19.89 port 60397 ssh2 Jan 18 10:23:09 host sshd[30812]: Connection reset by 222.112.19.89 port 60397 [preauth] Jan 18 10:23:09 host sshd[30812]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.112.19.89 Jan 18 10:25:33 host sshd[31172]: User root from 220.119.92.214 not allowed because not listed in AllowUsers Jan 18 10:25:33 host sshd[31172]: input_userauth_request: invalid user root [preauth] Jan 18 10:25:33 host unix_chkpwd[31182]: password check failed for user (root) Jan 18 10:25:33 host sshd[31172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.119.92.214 user=root Jan 18 10:25:33 host sshd[31172]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 10:25:35 host sshd[31172]: Failed password for invalid user root from 220.119.92.214 port 36995 ssh2 Jan 18 10:25:35 host sshd[31172]: Connection reset by 220.119.92.214 port 36995 [preauth] Jan 18 10:25:38 host sshd[31187]: Invalid user default from 78.10.234.22 port 40200 Jan 18 10:25:38 host sshd[31187]: input_userauth_request: invalid user default [preauth] Jan 18 10:25:38 host sshd[31187]: pam_unix(sshd:auth): check pass; user unknown Jan 18 10:25:38 host sshd[31187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.10.234.22 Jan 18 10:25:41 host sshd[31187]: Failed password for invalid user default from 78.10.234.22 port 40200 ssh2 Jan 18 10:25:42 host sshd[31187]: Connection reset by 78.10.234.22 port 40200 [preauth] Jan 18 10:27:34 host sshd[31473]: Invalid user fw from 194.110.203.109 port 44660 Jan 18 10:27:34 host sshd[31473]: input_userauth_request: invalid user fw [preauth] Jan 18 10:27:34 host sshd[31473]: pam_unix(sshd:auth): check pass; user unknown Jan 18 10:27:34 host sshd[31473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 10:27:37 host sshd[31473]: Failed password for invalid user fw from 194.110.203.109 port 44660 ssh2 Jan 18 10:27:40 host sshd[31473]: pam_unix(sshd:auth): check pass; user unknown Jan 18 10:27:41 host sshd[31473]: Failed password for invalid user fw from 194.110.203.109 port 44660 ssh2 Jan 18 10:27:45 host sshd[31473]: pam_unix(sshd:auth): check pass; user unknown Jan 18 10:27:47 host sshd[31473]: Failed password for invalid user fw from 194.110.203.109 port 44660 ssh2 Jan 18 10:27:50 host sshd[31473]: Connection closed by 194.110.203.109 port 44660 [preauth] Jan 18 10:27:50 host sshd[31473]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 10:29:50 host sshd[31862]: User root from 114.33.153.175 not allowed because not listed in AllowUsers Jan 18 10:29:50 host sshd[31862]: input_userauth_request: invalid user root [preauth] Jan 18 10:29:50 host unix_chkpwd[31877]: password check failed for user (root) Jan 18 10:29:50 host sshd[31862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.153.175 user=root Jan 18 10:29:50 host sshd[31862]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 10:29:52 host sshd[31862]: Failed password for invalid user root from 114.33.153.175 port 40550 ssh2 Jan 18 10:29:52 host sshd[31862]: Connection reset by 114.33.153.175 port 40550 [preauth] Jan 18 10:32:28 host sshd[32221]: Invalid user admin from 210.91.130.137 port 62082 Jan 18 10:32:28 host sshd[32221]: input_userauth_request: invalid user admin [preauth] Jan 18 10:32:28 host sshd[32221]: pam_unix(sshd:auth): check pass; user unknown Jan 18 10:32:28 host sshd[32221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.91.130.137 Jan 18 10:32:30 host sshd[32221]: Failed password for invalid user admin from 210.91.130.137 port 62082 ssh2 Jan 18 10:32:30 host sshd[32221]: Connection reset by 210.91.130.137 port 62082 [preauth] Jan 18 10:35:30 host sshd[302]: Connection reset by 170.250.225.151 port 34642 [preauth] Jan 18 10:46:13 host sshd[1959]: Connection reset by 121.157.182.16 port 61188 [preauth] Jan 18 10:58:13 host sshd[4019]: User root from 87.26.122.156 not allowed because not listed in AllowUsers Jan 18 10:58:13 host sshd[4019]: input_userauth_request: invalid user root [preauth] Jan 18 10:58:13 host unix_chkpwd[4022]: password check failed for user (root) Jan 18 10:58:13 host sshd[4019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.26.122.156 user=root Jan 18 10:58:13 host sshd[4019]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 10:58:15 host sshd[4019]: Failed password for invalid user root from 87.26.122.156 port 43519 ssh2 Jan 18 10:58:16 host unix_chkpwd[4025]: password check failed for user (root) Jan 18 10:58:16 host sshd[4019]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 10:58:18 host sshd[4019]: Failed password for invalid user root from 87.26.122.156 port 43519 ssh2 Jan 18 10:58:19 host unix_chkpwd[4030]: password check failed for user (root) Jan 18 10:58:19 host sshd[4019]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 10:58:21 host sshd[4019]: Failed password for invalid user root from 87.26.122.156 port 43519 ssh2 Jan 18 10:58:22 host sshd[4019]: Connection reset by 87.26.122.156 port 43519 [preauth] Jan 18 10:58:22 host sshd[4019]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.26.122.156 user=root Jan 18 11:06:07 host sshd[5551]: Invalid user airflow from 14.63.203.207 port 52836 Jan 18 11:06:07 host sshd[5551]: input_userauth_request: invalid user airflow [preauth] Jan 18 11:06:07 host sshd[5551]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:06:07 host sshd[5551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.203.207 Jan 18 11:06:09 host sshd[5551]: Failed password for invalid user airflow from 14.63.203.207 port 52836 ssh2 Jan 18 11:06:09 host sshd[5551]: Received disconnect from 14.63.203.207 port 52836:11: Bye Bye [preauth] Jan 18 11:06:09 host sshd[5551]: Disconnected from 14.63.203.207 port 52836 [preauth] Jan 18 11:06:54 host sshd[5658]: Invalid user hadoop from 123.138.161.107 port 51212 Jan 18 11:06:54 host sshd[5658]: input_userauth_request: invalid user hadoop [preauth] Jan 18 11:06:54 host sshd[5658]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:06:54 host sshd[5658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.161.107 Jan 18 11:06:56 host sshd[5658]: Failed password for invalid user hadoop from 123.138.161.107 port 51212 ssh2 Jan 18 11:06:56 host sshd[5658]: Received disconnect from 123.138.161.107 port 51212:11: Bye Bye [preauth] Jan 18 11:06:56 host sshd[5658]: Disconnected from 123.138.161.107 port 51212 [preauth] Jan 18 11:11:52 host sshd[6527]: Invalid user temp from 14.63.203.207 port 50648 Jan 18 11:11:52 host sshd[6527]: input_userauth_request: invalid user temp [preauth] Jan 18 11:11:52 host sshd[6527]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:11:52 host sshd[6527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.203.207 Jan 18 11:11:54 host sshd[6527]: Failed password for invalid user temp from 14.63.203.207 port 50648 ssh2 Jan 18 11:11:54 host sshd[6527]: Received disconnect from 14.63.203.207 port 50648:11: Bye Bye [preauth] Jan 18 11:11:54 host sshd[6527]: Disconnected from 14.63.203.207 port 50648 [preauth] Jan 18 11:12:58 host sshd[6842]: Invalid user zjw from 14.63.203.207 port 36724 Jan 18 11:12:58 host sshd[6842]: input_userauth_request: invalid user zjw [preauth] Jan 18 11:12:58 host sshd[6842]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:12:58 host sshd[6842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.203.207 Jan 18 11:13:00 host sshd[6842]: Failed password for invalid user zjw from 14.63.203.207 port 36724 ssh2 Jan 18 11:16:37 host sshd[7632]: Invalid user ts3 from 123.138.161.107 port 52700 Jan 18 11:16:37 host sshd[7632]: input_userauth_request: invalid user ts3 [preauth] Jan 18 11:16:37 host sshd[7632]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:16:37 host sshd[7632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.161.107 Jan 18 11:16:39 host sshd[7632]: Failed password for invalid user ts3 from 123.138.161.107 port 52700 ssh2 Jan 18 11:16:40 host sshd[7632]: Received disconnect from 123.138.161.107 port 52700:11: Bye Bye [preauth] Jan 18 11:16:40 host sshd[7632]: Disconnected from 123.138.161.107 port 52700 [preauth] Jan 18 11:16:48 host sshd[7652]: Invalid user support from 125.228.32.127 port 44299 Jan 18 11:16:48 host sshd[7652]: input_userauth_request: invalid user support [preauth] Jan 18 11:16:48 host sshd[7652]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:16:48 host sshd[7652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.32.127 Jan 18 11:16:50 host sshd[7652]: Failed password for invalid user support from 125.228.32.127 port 44299 ssh2 Jan 18 11:16:51 host sshd[7652]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:16:53 host sshd[7652]: Failed password for invalid user support from 125.228.32.127 port 44299 ssh2 Jan 18 11:16:54 host sshd[7652]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:16:57 host sshd[7652]: Failed password for invalid user support from 125.228.32.127 port 44299 ssh2 Jan 18 11:16:57 host sshd[7652]: Failed password for invalid user support from 125.228.32.127 port 44299 ssh2 Jan 18 11:16:58 host sshd[7652]: Connection reset by 125.228.32.127 port 44299 [preauth] Jan 18 11:16:58 host sshd[7652]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.32.127 Jan 18 11:17:17 host sshd[7757]: User root from 123.138.161.107 not allowed because not listed in AllowUsers Jan 18 11:17:17 host sshd[7757]: input_userauth_request: invalid user root [preauth] Jan 18 11:17:17 host unix_chkpwd[7765]: password check failed for user (root) Jan 18 11:17:17 host sshd[7757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.138.161.107 user=root Jan 18 11:17:17 host sshd[7757]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 11:17:20 host sshd[7757]: Failed password for invalid user root from 123.138.161.107 port 60588 ssh2 Jan 18 11:17:20 host sshd[7757]: Received disconnect from 123.138.161.107 port 60588:11: Bye Bye [preauth] Jan 18 11:17:20 host sshd[7757]: Disconnected from 123.138.161.107 port 60588 [preauth] Jan 18 11:20:24 host sshd[8564]: Invalid user pi from 220.80.142.228 port 61148 Jan 18 11:20:24 host sshd[8564]: input_userauth_request: invalid user pi [preauth] Jan 18 11:20:24 host sshd[8564]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:20:24 host sshd[8564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.80.142.228 Jan 18 11:20:26 host sshd[8564]: Failed password for invalid user pi from 220.80.142.228 port 61148 ssh2 Jan 18 11:20:26 host sshd[8564]: Connection reset by 220.80.142.228 port 61148 [preauth] Jan 18 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 11:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 11:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 11:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 11:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 11:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 11:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 11:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 11:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 11:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=wwwrmswll user-3=wwwresourcehunte user-4=keralaholi user-5=ugotscom user-6=wwwpmcresource user-7=dartsimp user-8=a2zgroup user-9=laundryboniface user-10=wwwkaretakers user-11=cochintaxi user-12=gifterman user-13=palco123 user-14=phmetals user-15=kottayamcalldriv user-16=mrsclean user-17=wwwnexidigital user-18=bonifacegroup user-19=wwwevmhonda user-20=wwwletsstalkfood user-21=straightcurve user-22=vfmassets user-23=wwwtestugo user-24=shalinijames user-25=pmcresources user-26=disposeat user-27=wwwkmaorg user-28=remysagr user-29=wwwkapin user-30=woodpeck feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 11:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 11:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 11:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ERXE4ctfbI7pvk19.~ Jan 18 11:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ERXE4ctfbI7pvk19.~' Jan 18 11:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ERXE4ctfbI7pvk19.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 11:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 11:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 11:21:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 11:21:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 11:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 11:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 11:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 11:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 11:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 11:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 11:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 11:35:28 host sshd[11691]: Invalid user bigipuser3 from 159.196.28.11 port 45796 Jan 18 11:35:28 host sshd[11691]: input_userauth_request: invalid user bigipuser3 [preauth] Jan 18 11:35:28 host sshd[11691]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:35:28 host sshd[11691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.196.28.11 Jan 18 11:35:31 host sshd[11691]: Failed password for invalid user bigipuser3 from 159.196.28.11 port 45796 ssh2 Jan 18 11:35:32 host sshd[11691]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:35:34 host sshd[11691]: Failed password for invalid user bigipuser3 from 159.196.28.11 port 45796 ssh2 Jan 18 11:35:35 host sshd[11691]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:35:37 host sshd[11691]: Failed password for invalid user bigipuser3 from 159.196.28.11 port 45796 ssh2 Jan 18 11:35:39 host sshd[11691]: Failed password for invalid user bigipuser3 from 159.196.28.11 port 45796 ssh2 Jan 18 11:35:39 host sshd[11691]: Connection closed by 159.196.28.11 port 45796 [preauth] Jan 18 11:35:39 host sshd[11691]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.196.28.11 Jan 18 11:37:23 host sshd[12211]: Connection reset by 119.77.134.56 port 52692 [preauth] Jan 18 11:38:03 host sshd[12305]: Did not receive identification string from 46.101.97.107 port 61000 Jan 18 11:46:16 host sshd[13454]: Invalid user steam from 111.33.43.86 port 8893 Jan 18 11:46:16 host sshd[13454]: input_userauth_request: invalid user steam [preauth] Jan 18 11:46:16 host sshd[13454]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:46:16 host sshd[13454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.33.43.86 Jan 18 11:46:18 host sshd[13454]: Failed password for invalid user steam from 111.33.43.86 port 8893 ssh2 Jan 18 11:46:18 host sshd[13454]: Received disconnect from 111.33.43.86 port 8893:11: Bye Bye [preauth] Jan 18 11:46:18 host sshd[13454]: Disconnected from 111.33.43.86 port 8893 [preauth] Jan 18 11:46:40 host sshd[13610]: Invalid user media from 179.48.124.242 port 55380 Jan 18 11:46:40 host sshd[13610]: input_userauth_request: invalid user media [preauth] Jan 18 11:46:40 host sshd[13610]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:46:40 host sshd[13610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.48.124.242 Jan 18 11:46:42 host sshd[13610]: Failed password for invalid user media from 179.48.124.242 port 55380 ssh2 Jan 18 11:46:42 host sshd[13610]: Received disconnect from 179.48.124.242 port 55380:11: Bye Bye [preauth] Jan 18 11:46:42 host sshd[13610]: Disconnected from 179.48.124.242 port 55380 [preauth] Jan 18 11:47:03 host sshd[13646]: User root from 46.101.2.4 not allowed because not listed in AllowUsers Jan 18 11:47:03 host sshd[13646]: input_userauth_request: invalid user root [preauth] Jan 18 11:47:03 host unix_chkpwd[13652]: password check failed for user (root) Jan 18 11:47:03 host sshd[13646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.2.4 user=root Jan 18 11:47:03 host sshd[13646]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 11:47:05 host sshd[13646]: Failed password for invalid user root from 46.101.2.4 port 38590 ssh2 Jan 18 11:47:05 host sshd[13646]: Received disconnect from 46.101.2.4 port 38590:11: Bye Bye [preauth] Jan 18 11:47:05 host sshd[13646]: Disconnected from 46.101.2.4 port 38590 [preauth] Jan 18 11:47:37 host sshd[13722]: Invalid user packer from 111.220.139.23 port 59972 Jan 18 11:47:37 host sshd[13722]: input_userauth_request: invalid user packer [preauth] Jan 18 11:47:37 host sshd[13722]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:47:37 host sshd[13722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.220.139.23 Jan 18 11:47:39 host sshd[13722]: Failed password for invalid user packer from 111.220.139.23 port 59972 ssh2 Jan 18 11:47:39 host sshd[13722]: Received disconnect from 111.220.139.23 port 59972:11: Bye Bye [preauth] Jan 18 11:47:39 host sshd[13722]: Disconnected from 111.220.139.23 port 59972 [preauth] Jan 18 11:47:45 host sshd[13737]: Invalid user user from 142.93.58.181 port 56290 Jan 18 11:47:45 host sshd[13737]: input_userauth_request: invalid user user [preauth] Jan 18 11:47:45 host sshd[13737]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:47:45 host sshd[13737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.58.181 Jan 18 11:47:47 host sshd[13737]: Failed password for invalid user user from 142.93.58.181 port 56290 ssh2 Jan 18 11:47:47 host sshd[13737]: Received disconnect from 142.93.58.181 port 56290:11: Bye Bye [preauth] Jan 18 11:47:47 host sshd[13737]: Disconnected from 142.93.58.181 port 56290 [preauth] Jan 18 11:48:10 host sshd[13790]: Invalid user smart from 162.216.141.255 port 57114 Jan 18 11:48:10 host sshd[13790]: input_userauth_request: invalid user smart [preauth] Jan 18 11:48:10 host sshd[13790]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:48:10 host sshd[13790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.216.141.255 Jan 18 11:48:12 host sshd[13790]: Failed password for invalid user smart from 162.216.141.255 port 57114 ssh2 Jan 18 11:48:12 host sshd[13790]: Received disconnect from 162.216.141.255 port 57114:11: Bye Bye [preauth] Jan 18 11:48:12 host sshd[13790]: Disconnected from 162.216.141.255 port 57114 [preauth] Jan 18 11:48:19 host sshd[13805]: Invalid user elastic from 139.59.248.243 port 36128 Jan 18 11:48:19 host sshd[13805]: input_userauth_request: invalid user elastic [preauth] Jan 18 11:48:19 host sshd[13805]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:48:19 host sshd[13805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.248.243 Jan 18 11:48:21 host sshd[13805]: Failed password for invalid user elastic from 139.59.248.243 port 36128 ssh2 Jan 18 11:48:21 host sshd[13805]: Received disconnect from 139.59.248.243 port 36128:11: Bye Bye [preauth] Jan 18 11:48:21 host sshd[13805]: Disconnected from 139.59.248.243 port 36128 [preauth] Jan 18 11:49:28 host sshd[13932]: Invalid user remnux from 165.22.20.44 port 56176 Jan 18 11:49:28 host sshd[13932]: input_userauth_request: invalid user remnux [preauth] Jan 18 11:49:28 host sshd[13932]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:49:28 host sshd[13932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.20.44 Jan 18 11:49:30 host sshd[13932]: Failed password for invalid user remnux from 165.22.20.44 port 56176 ssh2 Jan 18 11:49:30 host sshd[13932]: Received disconnect from 165.22.20.44 port 56176:11: Bye Bye [preauth] Jan 18 11:49:30 host sshd[13932]: Disconnected from 165.22.20.44 port 56176 [preauth] Jan 18 11:50:50 host sshd[14181]: Invalid user deploy from 45.10.152.15 port 45886 Jan 18 11:50:50 host sshd[14181]: input_userauth_request: invalid user deploy [preauth] Jan 18 11:50:50 host sshd[14181]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:50:51 host sshd[14181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.10.152.15 Jan 18 11:50:53 host sshd[14181]: Failed password for invalid user deploy from 45.10.152.15 port 45886 ssh2 Jan 18 11:50:53 host sshd[14181]: Received disconnect from 45.10.152.15 port 45886:11: Bye Bye [preauth] Jan 18 11:50:53 host sshd[14181]: Disconnected from 45.10.152.15 port 45886 [preauth] Jan 18 11:51:01 host sshd[14206]: Invalid user jack from 179.184.199.23 port 51098 Jan 18 11:51:01 host sshd[14206]: input_userauth_request: invalid user jack [preauth] Jan 18 11:51:01 host sshd[14206]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:51:01 host sshd[14206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.184.199.23 Jan 18 11:51:03 host sshd[14206]: Failed password for invalid user jack from 179.184.199.23 port 51098 ssh2 Jan 18 11:51:03 host sshd[14206]: Received disconnect from 179.184.199.23 port 51098:11: Bye Bye [preauth] Jan 18 11:51:03 host sshd[14206]: Disconnected from 179.184.199.23 port 51098 [preauth] Jan 18 11:52:51 host sshd[14540]: Invalid user remnux from 46.101.2.4 port 48816 Jan 18 11:52:51 host sshd[14540]: input_userauth_request: invalid user remnux [preauth] Jan 18 11:52:51 host sshd[14540]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:52:51 host sshd[14540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.2.4 Jan 18 11:52:54 host sshd[14540]: Failed password for invalid user remnux from 46.101.2.4 port 48816 ssh2 Jan 18 11:52:54 host sshd[14540]: Received disconnect from 46.101.2.4 port 48816:11: Bye Bye [preauth] Jan 18 11:52:54 host sshd[14540]: Disconnected from 46.101.2.4 port 48816 [preauth] Jan 18 11:52:59 host sshd[14594]: Invalid user packer from 142.93.58.181 port 49924 Jan 18 11:52:59 host sshd[14594]: input_userauth_request: invalid user packer [preauth] Jan 18 11:52:59 host sshd[14594]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:52:59 host sshd[14594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.58.181 Jan 18 11:53:01 host sshd[14594]: Failed password for invalid user packer from 142.93.58.181 port 49924 ssh2 Jan 18 11:53:01 host sshd[14594]: Received disconnect from 142.93.58.181 port 49924:11: Bye Bye [preauth] Jan 18 11:53:01 host sshd[14594]: Disconnected from 142.93.58.181 port 49924 [preauth] Jan 18 11:53:04 host sshd[14612]: User root from 139.59.248.243 not allowed because not listed in AllowUsers Jan 18 11:53:04 host sshd[14612]: input_userauth_request: invalid user root [preauth] Jan 18 11:53:04 host unix_chkpwd[14615]: password check failed for user (root) Jan 18 11:53:04 host sshd[14612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.248.243 user=root Jan 18 11:53:04 host sshd[14612]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 11:53:06 host sshd[14612]: Failed password for invalid user root from 139.59.248.243 port 40660 ssh2 Jan 18 11:53:06 host sshd[14612]: Received disconnect from 139.59.248.243 port 40660:11: Bye Bye [preauth] Jan 18 11:53:06 host sshd[14612]: Disconnected from 139.59.248.243 port 40660 [preauth] Jan 18 11:53:18 host sshd[14671]: Invalid user steam from 111.220.139.23 port 55100 Jan 18 11:53:18 host sshd[14671]: input_userauth_request: invalid user steam [preauth] Jan 18 11:53:18 host sshd[14671]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:53:18 host sshd[14671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.220.139.23 Jan 18 11:53:20 host sshd[14671]: Failed password for invalid user steam from 111.220.139.23 port 55100 ssh2 Jan 18 11:53:20 host sshd[14671]: Received disconnect from 111.220.139.23 port 55100:11: Bye Bye [preauth] Jan 18 11:53:20 host sshd[14671]: Disconnected from 111.220.139.23 port 55100 [preauth] Jan 18 11:53:37 host sshd[14729]: Invalid user user from 162.216.141.255 port 48878 Jan 18 11:53:37 host sshd[14729]: input_userauth_request: invalid user user [preauth] Jan 18 11:53:37 host sshd[14729]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:53:37 host sshd[14729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.216.141.255 Jan 18 11:53:39 host sshd[14729]: Failed password for invalid user user from 162.216.141.255 port 48878 ssh2 Jan 18 11:53:39 host sshd[14729]: Received disconnect from 162.216.141.255 port 48878:11: Bye Bye [preauth] Jan 18 11:53:39 host sshd[14729]: Disconnected from 162.216.141.255 port 48878 [preauth] Jan 18 11:53:45 host sshd[14739]: User root from 179.184.199.23 not allowed because not listed in AllowUsers Jan 18 11:53:45 host sshd[14739]: input_userauth_request: invalid user root [preauth] Jan 18 11:53:45 host unix_chkpwd[14746]: password check failed for user (root) Jan 18 11:53:45 host sshd[14739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.184.199.23 user=root Jan 18 11:53:45 host sshd[14739]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 11:53:47 host sshd[14739]: Failed password for invalid user root from 179.184.199.23 port 40882 ssh2 Jan 18 11:53:47 host sshd[14739]: Received disconnect from 179.184.199.23 port 40882:11: Bye Bye [preauth] Jan 18 11:53:47 host sshd[14739]: Disconnected from 179.184.199.23 port 40882 [preauth] Jan 18 11:54:00 host sshd[14792]: Invalid user ntc from 142.93.58.181 port 44224 Jan 18 11:54:00 host sshd[14792]: input_userauth_request: invalid user ntc [preauth] Jan 18 11:54:00 host sshd[14792]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:54:00 host sshd[14792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.58.181 Jan 18 11:54:02 host sshd[14792]: Failed password for invalid user ntc from 142.93.58.181 port 44224 ssh2 Jan 18 11:54:05 host sshd[14849]: Invalid user test from 45.10.152.15 port 57968 Jan 18 11:54:05 host sshd[14849]: input_userauth_request: invalid user test [preauth] Jan 18 11:54:05 host sshd[14849]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:54:05 host sshd[14849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.10.152.15 Jan 18 11:54:06 host sshd[14849]: Failed password for invalid user test from 45.10.152.15 port 57968 ssh2 Jan 18 11:54:07 host sshd[14849]: Received disconnect from 45.10.152.15 port 57968:11: Bye Bye [preauth] Jan 18 11:54:07 host sshd[14849]: Disconnected from 45.10.152.15 port 57968 [preauth] Jan 18 11:54:46 host sshd[14925]: User root from 111.220.139.23 not allowed because not listed in AllowUsers Jan 18 11:54:46 host sshd[14925]: input_userauth_request: invalid user root [preauth] Jan 18 11:54:46 host unix_chkpwd[14930]: password check failed for user (root) Jan 18 11:54:46 host sshd[14925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.220.139.23 user=root Jan 18 11:54:46 host sshd[14925]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 11:54:48 host sshd[14925]: Failed password for invalid user root from 111.220.139.23 port 49504 ssh2 Jan 18 11:54:48 host sshd[14925]: Received disconnect from 111.220.139.23 port 49504:11: Bye Bye [preauth] Jan 18 11:54:48 host sshd[14925]: Disconnected from 111.220.139.23 port 49504 [preauth] Jan 18 11:55:09 host sshd[15016]: Invalid user training from 162.216.141.255 port 47250 Jan 18 11:55:09 host sshd[15016]: input_userauth_request: invalid user training [preauth] Jan 18 11:55:09 host sshd[15016]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:55:09 host sshd[15016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.216.141.255 Jan 18 11:55:12 host sshd[15016]: Failed password for invalid user training from 162.216.141.255 port 47250 ssh2 Jan 18 11:55:19 host sshd[15057]: User root from 45.10.152.15 not allowed because not listed in AllowUsers Jan 18 11:55:19 host sshd[15057]: input_userauth_request: invalid user root [preauth] Jan 18 11:55:19 host unix_chkpwd[15062]: password check failed for user (root) Jan 18 11:55:19 host sshd[15057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.10.152.15 user=root Jan 18 11:55:19 host sshd[15057]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 11:55:21 host sshd[15057]: Failed password for invalid user root from 45.10.152.15 port 56308 ssh2 Jan 18 11:55:21 host sshd[15057]: Received disconnect from 45.10.152.15 port 56308:11: Bye Bye [preauth] Jan 18 11:55:21 host sshd[15057]: Disconnected from 45.10.152.15 port 56308 [preauth] Jan 18 11:55:32 host sshd[15150]: User root from 175.205.244.176 not allowed because not listed in AllowUsers Jan 18 11:55:32 host sshd[15150]: input_userauth_request: invalid user root [preauth] Jan 18 11:55:32 host unix_chkpwd[15164]: password check failed for user (root) Jan 18 11:55:32 host sshd[15150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.205.244.176 user=root Jan 18 11:55:32 host sshd[15150]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 11:55:34 host sshd[15150]: Failed password for invalid user root from 175.205.244.176 port 61555 ssh2 Jan 18 11:55:35 host sshd[15150]: Connection reset by 175.205.244.176 port 61555 [preauth] Jan 18 11:57:05 host sshd[15416]: Invalid user elastic from 111.33.43.86 port 52595 Jan 18 11:57:05 host sshd[15416]: input_userauth_request: invalid user elastic [preauth] Jan 18 11:57:05 host sshd[15416]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:57:05 host sshd[15416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.33.43.86 Jan 18 11:57:07 host sshd[15416]: Failed password for invalid user elastic from 111.33.43.86 port 52595 ssh2 Jan 18 11:57:07 host sshd[15416]: Received disconnect from 111.33.43.86 port 52595:11: Bye Bye [preauth] Jan 18 11:57:07 host sshd[15416]: Disconnected from 111.33.43.86 port 52595 [preauth] Jan 18 11:57:59 host sshd[15611]: Invalid user test from 111.33.43.86 port 59577 Jan 18 11:57:59 host sshd[15611]: input_userauth_request: invalid user test [preauth] Jan 18 11:57:59 host sshd[15611]: pam_unix(sshd:auth): check pass; user unknown Jan 18 11:57:59 host sshd[15611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.33.43.86 Jan 18 11:58:00 host sshd[15611]: Failed password for invalid user test from 111.33.43.86 port 59577 ssh2 Jan 18 11:58:00 host sshd[15611]: Received disconnect from 111.33.43.86 port 59577:11: Bye Bye [preauth] Jan 18 11:58:00 host sshd[15611]: Disconnected from 111.33.43.86 port 59577 [preauth] Jan 18 12:06:48 host sshd[16921]: Invalid user ravi from 103.38.4.238 port 55176 Jan 18 12:06:48 host sshd[16921]: input_userauth_request: invalid user ravi [preauth] Jan 18 12:06:48 host sshd[16921]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:06:48 host sshd[16921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.4.238 Jan 18 12:06:50 host sshd[16921]: Failed password for invalid user ravi from 103.38.4.238 port 55176 ssh2 Jan 18 12:06:50 host sshd[16921]: Received disconnect from 103.38.4.238 port 55176:11: Bye Bye [preauth] Jan 18 12:06:50 host sshd[16921]: Disconnected from 103.38.4.238 port 55176 [preauth] Jan 18 12:07:03 host sshd[16970]: Invalid user ec2-user from 179.48.124.242 port 59470 Jan 18 12:07:03 host sshd[16970]: input_userauth_request: invalid user ec2-user [preauth] Jan 18 12:07:03 host sshd[16970]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:07:03 host sshd[16970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.48.124.242 Jan 18 12:07:05 host sshd[16970]: Failed password for invalid user ec2-user from 179.48.124.242 port 59470 ssh2 Jan 18 12:07:06 host sshd[16970]: Received disconnect from 179.48.124.242 port 59470:11: Bye Bye [preauth] Jan 18 12:07:06 host sshd[16970]: Disconnected from 179.48.124.242 port 59470 [preauth] Jan 18 12:08:19 host sshd[17199]: User root from 179.48.124.242 not allowed because not listed in AllowUsers Jan 18 12:08:19 host sshd[17199]: input_userauth_request: invalid user root [preauth] Jan 18 12:08:19 host unix_chkpwd[17204]: password check failed for user (root) Jan 18 12:08:19 host sshd[17199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.48.124.242 user=root Jan 18 12:08:19 host sshd[17199]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 12:08:21 host sshd[17199]: Failed password for invalid user root from 179.48.124.242 port 55010 ssh2 Jan 18 12:08:26 host sshd[17297]: User root from 59.126.32.51 not allowed because not listed in AllowUsers Jan 18 12:08:26 host sshd[17297]: input_userauth_request: invalid user root [preauth] Jan 18 12:08:26 host unix_chkpwd[17353]: password check failed for user (root) Jan 18 12:08:26 host sshd[17297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.32.51 user=root Jan 18 12:08:26 host sshd[17297]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 12:08:28 host sshd[17297]: Failed password for invalid user root from 59.126.32.51 port 36910 ssh2 Jan 18 12:08:28 host sshd[17297]: Connection reset by 59.126.32.51 port 36910 [preauth] Jan 18 12:11:57 host sshd[18142]: User root from 103.38.4.238 not allowed because not listed in AllowUsers Jan 18 12:11:57 host sshd[18142]: input_userauth_request: invalid user root [preauth] Jan 18 12:11:57 host unix_chkpwd[18146]: password check failed for user (root) Jan 18 12:11:57 host sshd[18142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.4.238 user=root Jan 18 12:11:57 host sshd[18142]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 12:11:59 host sshd[18142]: Failed password for invalid user root from 103.38.4.238 port 45458 ssh2 Jan 18 12:11:59 host sshd[18142]: Received disconnect from 103.38.4.238 port 45458:11: Bye Bye [preauth] Jan 18 12:11:59 host sshd[18142]: Disconnected from 103.38.4.238 port 45458 [preauth] Jan 18 12:13:59 host sshd[18686]: Invalid user vincent from 107.189.30.59 port 57624 Jan 18 12:13:59 host sshd[18686]: input_userauth_request: invalid user vincent [preauth] Jan 18 12:13:59 host sshd[18686]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:13:59 host sshd[18686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 18 12:14:01 host sshd[18686]: Failed password for invalid user vincent from 107.189.30.59 port 57624 ssh2 Jan 18 12:14:03 host sshd[18686]: Connection closed by 107.189.30.59 port 57624 [preauth] Jan 18 12:14:09 host sshd[18734]: Invalid user vadmin from 211.223.185.206 port 60903 Jan 18 12:14:09 host sshd[18734]: input_userauth_request: invalid user vadmin [preauth] Jan 18 12:14:09 host sshd[18734]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:14:09 host sshd[18734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.223.185.206 Jan 18 12:14:10 host sshd[18734]: Failed password for invalid user vadmin from 211.223.185.206 port 60903 ssh2 Jan 18 12:14:10 host sshd[18734]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:14:13 host sshd[18734]: Failed password for invalid user vadmin from 211.223.185.206 port 60903 ssh2 Jan 18 12:14:13 host sshd[18734]: Connection reset by 211.223.185.206 port 60903 [preauth] Jan 18 12:14:13 host sshd[18734]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.223.185.206 Jan 18 12:16:45 host sshd[19686]: Invalid user fx from 194.110.203.109 port 39714 Jan 18 12:16:45 host sshd[19686]: input_userauth_request: invalid user fx [preauth] Jan 18 12:16:45 host sshd[19686]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:16:45 host sshd[19686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 12:16:47 host sshd[19686]: Failed password for invalid user fx from 194.110.203.109 port 39714 ssh2 Jan 18 12:16:50 host sshd[19686]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:16:51 host sshd[19686]: Failed password for invalid user fx from 194.110.203.109 port 39714 ssh2 Jan 18 12:16:55 host sshd[19686]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:16:57 host sshd[19686]: Failed password for invalid user fx from 194.110.203.109 port 39714 ssh2 Jan 18 12:17:00 host sshd[19686]: Connection closed by 194.110.203.109 port 39714 [preauth] Jan 18 12:17:00 host sshd[19686]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 12:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 12:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 12:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 12:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 12:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 12:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 12:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 12:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 12:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 12:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 12:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=wwwrmswll user-8=keralaholi user-9=wwwresourcehunte user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=pmcresources user-16=disposeat user-17=wwwkmaorg user-18=remysagr user-19=woodpeck user-20=wwwkapin user-21=gifterman user-22=palco123 user-23=phmetals user-24=kottayamcalldriv user-25=mrsclean user-26=wwwnexidigital user-27=bonifacegroup user-28=wwwevmhonda user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 12:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 12:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 12:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8pOxWuMAlUANPDTh.~ Jan 18 12:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8pOxWuMAlUANPDTh.~' Jan 18 12:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8pOxWuMAlUANPDTh.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 12:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 12:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 12:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 12:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 12:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 12:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 12:21:08 host sshd[21515]: Invalid user vadmin from 78.189.47.153 port 49448 Jan 18 12:21:08 host sshd[21515]: input_userauth_request: invalid user vadmin [preauth] Jan 18 12:21:08 host sshd[21515]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:21:08 host sshd[21515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.189.47.153 Jan 18 12:21:11 host sshd[21515]: Failed password for invalid user vadmin from 78.189.47.153 port 49448 ssh2 Jan 18 12:21:11 host sshd[21515]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:21:13 host sshd[21515]: Failed password for invalid user vadmin from 78.189.47.153 port 49448 ssh2 Jan 18 12:21:14 host sshd[21515]: Failed password for invalid user vadmin from 78.189.47.153 port 49448 ssh2 Jan 18 12:21:16 host sshd[21515]: Connection reset by 78.189.47.153 port 49448 [preauth] Jan 18 12:21:16 host sshd[21515]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.189.47.153 Jan 18 12:28:24 host sshd[22946]: Connection closed by 45.79.172.21 port 24620 [preauth] Jan 18 12:28:27 host sshd[22956]: Connection closed by 45.79.172.21 port 24628 [preauth] Jan 18 12:28:30 host sshd[22982]: Connection closed by 45.79.172.21 port 22662 [preauth] Jan 18 12:31:56 host sshd[23502]: Invalid user user from 103.250.144.169 port 38116 Jan 18 12:31:56 host sshd[23502]: input_userauth_request: invalid user user [preauth] Jan 18 12:31:56 host sshd[23502]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:31:56 host sshd[23502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.250.144.169 Jan 18 12:31:58 host sshd[23502]: Failed password for invalid user user from 103.250.144.169 port 38116 ssh2 Jan 18 12:31:59 host sshd[23502]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:32:01 host sshd[23502]: Failed password for invalid user user from 103.250.144.169 port 38116 ssh2 Jan 18 12:32:02 host sshd[23502]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:32:04 host sshd[23502]: Failed password for invalid user user from 103.250.144.169 port 38116 ssh2 Jan 18 12:32:05 host sshd[23502]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:32:07 host sshd[23502]: Failed password for invalid user user from 103.250.144.169 port 38116 ssh2 Jan 18 12:32:08 host sshd[23502]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:32:10 host sshd[23502]: Failed password for invalid user user from 103.250.144.169 port 38116 ssh2 Jan 18 12:32:10 host sshd[23502]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:32:12 host sshd[23502]: Failed password for invalid user user from 103.250.144.169 port 38116 ssh2 Jan 18 12:32:12 host sshd[23502]: error: maximum authentication attempts exceeded for invalid user user from 103.250.144.169 port 38116 ssh2 [preauth] Jan 18 12:32:12 host sshd[23502]: Disconnecting: Too many authentication failures [preauth] Jan 18 12:32:12 host sshd[23502]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.250.144.169 Jan 18 12:32:12 host sshd[23502]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 18 12:33:32 host sshd[23739]: Invalid user support from 114.34.89.28 port 41498 Jan 18 12:33:32 host sshd[23739]: input_userauth_request: invalid user support [preauth] Jan 18 12:33:32 host sshd[23739]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:33:32 host sshd[23739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.89.28 Jan 18 12:33:33 host sshd[23742]: Invalid user oracle from 114.34.89.28 port 41517 Jan 18 12:33:33 host sshd[23742]: input_userauth_request: invalid user oracle [preauth] Jan 18 12:33:33 host sshd[23742]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:33:33 host sshd[23742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.89.28 Jan 18 12:33:35 host sshd[23739]: Failed password for invalid user support from 114.34.89.28 port 41498 ssh2 Jan 18 12:33:35 host sshd[23739]: Connection reset by 114.34.89.28 port 41498 [preauth] Jan 18 12:33:36 host sshd[23742]: Failed password for invalid user oracle from 114.34.89.28 port 41517 ssh2 Jan 18 12:33:36 host sshd[23742]: Connection reset by 114.34.89.28 port 41517 [preauth] Jan 18 12:43:44 host sshd[25309]: Invalid user hikvision from 111.249.82.55 port 43508 Jan 18 12:43:44 host sshd[25309]: input_userauth_request: invalid user hikvision [preauth] Jan 18 12:43:44 host sshd[25309]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:43:44 host sshd[25309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.249.82.55 Jan 18 12:43:46 host sshd[25309]: Failed password for invalid user hikvision from 111.249.82.55 port 43508 ssh2 Jan 18 12:43:47 host sshd[25309]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:43:48 host sshd[25309]: Failed password for invalid user hikvision from 111.249.82.55 port 43508 ssh2 Jan 18 12:43:49 host sshd[25309]: Connection reset by 111.249.82.55 port 43508 [preauth] Jan 18 12:43:49 host sshd[25309]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.249.82.55 Jan 18 12:48:15 host sshd[25973]: Invalid user ubnt from 175.143.30.19 port 54126 Jan 18 12:48:15 host sshd[25973]: input_userauth_request: invalid user ubnt [preauth] Jan 18 12:48:15 host sshd[25973]: pam_unix(sshd:auth): check pass; user unknown Jan 18 12:48:15 host sshd[25973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.143.30.19 Jan 18 12:48:17 host sshd[25973]: Failed password for invalid user ubnt from 175.143.30.19 port 54126 ssh2 Jan 18 12:48:17 host sshd[25973]: Connection reset by 175.143.30.19 port 54126 [preauth] Jan 18 12:58:25 host sshd[27410]: Did not receive identification string from 103.203.57.11 port 40282 Jan 18 12:58:44 host sshd[27462]: User root from 41.86.17.229 not allowed because not listed in AllowUsers Jan 18 12:58:44 host sshd[27462]: input_userauth_request: invalid user root [preauth] Jan 18 12:58:45 host unix_chkpwd[27465]: password check failed for user (root) Jan 18 12:58:45 host sshd[27462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.86.17.229 user=root Jan 18 12:58:45 host sshd[27462]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 12:58:46 host sshd[27462]: Failed password for invalid user root from 41.86.17.229 port 56798 ssh2 Jan 18 12:58:47 host unix_chkpwd[27468]: password check failed for user (root) Jan 18 12:58:47 host sshd[27462]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 12:58:49 host sshd[27462]: Failed password for invalid user root from 41.86.17.229 port 56798 ssh2 Jan 18 12:58:49 host unix_chkpwd[27472]: password check failed for user (root) Jan 18 12:58:49 host sshd[27462]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 12:58:51 host sshd[27462]: Failed password for invalid user root from 41.86.17.229 port 56798 ssh2 Jan 18 12:58:52 host unix_chkpwd[27475]: password check failed for user (root) Jan 18 12:58:52 host sshd[27462]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 12:58:53 host sshd[27462]: Failed password for invalid user root from 41.86.17.229 port 56798 ssh2 Jan 18 12:59:24 host sshd[27550]: User root from 121.180.81.149 not allowed because not listed in AllowUsers Jan 18 12:59:24 host sshd[27550]: input_userauth_request: invalid user root [preauth] Jan 18 12:59:24 host unix_chkpwd[27558]: password check failed for user (root) Jan 18 12:59:24 host sshd[27550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.180.81.149 user=root Jan 18 12:59:24 host sshd[27550]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 12:59:27 host sshd[27550]: Failed password for invalid user root from 121.180.81.149 port 61858 ssh2 Jan 18 12:59:28 host unix_chkpwd[27582]: password check failed for user (root) Jan 18 12:59:28 host sshd[27550]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 12:59:30 host sshd[27550]: Failed password for invalid user root from 121.180.81.149 port 61858 ssh2 Jan 18 12:59:31 host unix_chkpwd[27590]: password check failed for user (root) Jan 18 12:59:31 host sshd[27550]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 12:59:33 host sshd[27550]: Failed password for invalid user root from 121.180.81.149 port 61858 ssh2 Jan 18 12:59:34 host unix_chkpwd[27596]: password check failed for user (root) Jan 18 12:59:34 host sshd[27550]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 12:59:36 host sshd[27550]: Failed password for invalid user root from 121.180.81.149 port 61858 ssh2 Jan 18 12:59:36 host sshd[27550]: Connection reset by 121.180.81.149 port 61858 [preauth] Jan 18 12:59:36 host sshd[27550]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.180.81.149 user=root Jan 18 12:59:36 host sshd[27550]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 18 13:02:47 host sshd[28144]: Invalid user admin from 112.186.184.222 port 60979 Jan 18 13:02:47 host sshd[28144]: input_userauth_request: invalid user admin [preauth] Jan 18 13:02:47 host sshd[28144]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:02:47 host sshd[28144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.184.222 Jan 18 13:02:49 host sshd[28144]: Failed password for invalid user admin from 112.186.184.222 port 60979 ssh2 Jan 18 13:02:50 host sshd[28144]: Failed password for invalid user admin from 112.186.184.222 port 60979 ssh2 Jan 18 13:02:51 host sshd[28144]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:02:53 host sshd[28144]: Failed password for invalid user admin from 112.186.184.222 port 60979 ssh2 Jan 18 13:02:54 host sshd[28144]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:02:55 host sshd[28144]: Failed password for invalid user admin from 112.186.184.222 port 60979 ssh2 Jan 18 13:02:56 host sshd[28144]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:02:58 host sshd[28144]: Failed password for invalid user admin from 112.186.184.222 port 60979 ssh2 Jan 18 13:11:45 host sshd[29493]: Invalid user Admin from 175.194.219.239 port 47437 Jan 18 13:11:45 host sshd[29493]: input_userauth_request: invalid user Admin [preauth] Jan 18 13:11:45 host sshd[29493]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:11:45 host sshd[29493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.194.219.239 Jan 18 13:11:48 host sshd[29493]: Failed password for invalid user Admin from 175.194.219.239 port 47437 ssh2 Jan 18 13:11:48 host sshd[29493]: Connection reset by 175.194.219.239 port 47437 [preauth] Jan 18 13:15:18 host sshd[30101]: Connection reset by 123.1.71.148 port 63338 [preauth] Jan 18 13:18:24 host sshd[30630]: User root from 220.132.40.212 not allowed because not listed in AllowUsers Jan 18 13:18:24 host sshd[30630]: input_userauth_request: invalid user root [preauth] Jan 18 13:18:24 host unix_chkpwd[30637]: password check failed for user (root) Jan 18 13:18:24 host sshd[30630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.40.212 user=root Jan 18 13:18:24 host sshd[30630]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 13:18:26 host sshd[30630]: Failed password for invalid user root from 220.132.40.212 port 41283 ssh2 Jan 18 13:18:27 host unix_chkpwd[30650]: password check failed for user (root) Jan 18 13:18:27 host sshd[30630]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 13:18:30 host sshd[30630]: Failed password for invalid user root from 220.132.40.212 port 41283 ssh2 Jan 18 13:18:31 host unix_chkpwd[30676]: password check failed for user (root) Jan 18 13:18:31 host sshd[30630]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 13:18:33 host sshd[30630]: Failed password for invalid user root from 220.132.40.212 port 41283 ssh2 Jan 18 13:18:33 host unix_chkpwd[30685]: password check failed for user (root) Jan 18 13:18:33 host sshd[30630]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 13:18:35 host sshd[30630]: Failed password for invalid user root from 220.132.40.212 port 41283 ssh2 Jan 18 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 13:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 13:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 13:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 13:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 13:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 13:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 13:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 13:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 13:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 13:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 13:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=woodpeck user-2=wwwkapin user-3=remysagr user-4=disposeat user-5=wwwkmaorg user-6=pmcresources user-7=vfmassets user-8=wwwtestugo user-9=shalinijames user-10=straightcurve user-11=wwwletsstalkfood user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwnexidigital user-15=mrsclean user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=wwwkaretakers user-21=cochintaxi user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 13:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 13:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 13:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-25iHUksyELK6at4U.~ Jan 18 13:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-25iHUksyELK6at4U.~' Jan 18 13:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-25iHUksyELK6at4U.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 13:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 13:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 13:21:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 13:21:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 13:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 13:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 13:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 13:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 13:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 13:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 13:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 13:22:53 host sshd[31495]: User root from 197.5.145.93 not allowed because not listed in AllowUsers Jan 18 13:22:53 host sshd[31495]: input_userauth_request: invalid user root [preauth] Jan 18 13:22:53 host unix_chkpwd[31498]: password check failed for user (root) Jan 18 13:22:53 host sshd[31495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.93 user=root Jan 18 13:22:53 host sshd[31495]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 13:22:54 host sshd[31495]: Failed password for invalid user root from 197.5.145.93 port 34011 ssh2 Jan 18 13:22:54 host sshd[31495]: Received disconnect from 197.5.145.93 port 34011:11: Bye Bye [preauth] Jan 18 13:22:54 host sshd[31495]: Disconnected from 197.5.145.93 port 34011 [preauth] Jan 18 13:29:36 host sshd[32452]: User root from 91.195.158.163 not allowed because not listed in AllowUsers Jan 18 13:29:36 host sshd[32452]: input_userauth_request: invalid user root [preauth] Jan 18 13:29:36 host unix_chkpwd[32455]: password check failed for user (root) Jan 18 13:29:36 host sshd[32452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.195.158.163 user=root Jan 18 13:29:36 host sshd[32452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 13:29:38 host sshd[32452]: Failed password for invalid user root from 91.195.158.163 port 42167 ssh2 Jan 18 13:29:39 host unix_chkpwd[32460]: password check failed for user (root) Jan 18 13:29:39 host sshd[32452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 13:29:39 host sshd[32457]: Invalid user conectar from 197.5.145.93 port 34013 Jan 18 13:29:39 host sshd[32457]: input_userauth_request: invalid user conectar [preauth] Jan 18 13:29:39 host sshd[32457]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:29:39 host sshd[32457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.5.145.93 Jan 18 13:29:41 host sshd[32452]: Failed password for invalid user root from 91.195.158.163 port 42167 ssh2 Jan 18 13:29:41 host sshd[32457]: Failed password for invalid user conectar from 197.5.145.93 port 34013 ssh2 Jan 18 13:29:41 host sshd[32457]: Received disconnect from 197.5.145.93 port 34013:11: Bye Bye [preauth] Jan 18 13:29:41 host sshd[32457]: Disconnected from 197.5.145.93 port 34013 [preauth] Jan 18 13:29:41 host unix_chkpwd[32468]: password check failed for user (root) Jan 18 13:29:41 host sshd[32452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 13:29:43 host sshd[32452]: Failed password for invalid user root from 91.195.158.163 port 42167 ssh2 Jan 18 13:29:43 host unix_chkpwd[32472]: password check failed for user (root) Jan 18 13:29:43 host sshd[32452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 13:29:45 host sshd[32452]: Failed password for invalid user root from 91.195.158.163 port 42167 ssh2 Jan 18 13:31:38 host sshd[398]: Connection reset by 59.126.35.92 port 49127 [preauth] Jan 18 13:36:51 host sshd[1118]: Connection reset by 121.187.152.29 port 59760 [preauth] Jan 18 13:42:07 host sshd[1700]: Invalid user http from 195.3.147.77 port 30657 Jan 18 13:42:07 host sshd[1700]: input_userauth_request: invalid user http [preauth] Jan 18 13:42:07 host sshd[1700]: Failed none for invalid user http from 195.3.147.77 port 30657 ssh2 Jan 18 13:42:08 host sshd[1700]: Disconnecting: Change of username or service not allowed: (http,ssh-connection) -> (factory,ssh-connection) [preauth] Jan 18 13:42:10 host sshd[1748]: Invalid user factory from 195.3.147.77 port 50603 Jan 18 13:42:10 host sshd[1748]: input_userauth_request: invalid user factory [preauth] Jan 18 13:42:11 host sshd[1748]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:42:11 host sshd[1748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.3.147.77 Jan 18 13:42:13 host sshd[1748]: Failed password for invalid user factory from 195.3.147.77 port 50603 ssh2 Jan 18 13:42:13 host sshd[1748]: Disconnecting: Change of username or service not allowed: (factory,ssh-connection) -> (3comcso,ssh-connection) [preauth] Jan 18 13:42:16 host sshd[1757]: Invalid user 3comcso from 195.3.147.77 port 20678 Jan 18 13:42:16 host sshd[1757]: input_userauth_request: invalid user 3comcso [preauth] Jan 18 13:42:17 host sshd[1757]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:42:17 host sshd[1757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.3.147.77 Jan 18 13:42:18 host sshd[1757]: Failed password for invalid user 3comcso from 195.3.147.77 port 20678 ssh2 Jan 18 13:42:20 host sshd[1757]: Disconnecting: Change of username or service not allowed: (3comcso,ssh-connection) -> (,ssh-connection) [preauth] Jan 18 13:48:37 host sshd[3008]: Invalid user bitwarden from 152.32.226.121 port 38880 Jan 18 13:48:37 host sshd[3008]: input_userauth_request: invalid user bitwarden [preauth] Jan 18 13:48:37 host sshd[3008]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:48:37 host sshd[3008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.226.121 Jan 18 13:48:39 host sshd[3008]: Failed password for invalid user bitwarden from 152.32.226.121 port 38880 ssh2 Jan 18 13:48:39 host sshd[3008]: Received disconnect from 152.32.226.121 port 38880:11: Bye Bye [preauth] Jan 18 13:48:39 host sshd[3008]: Disconnected from 152.32.226.121 port 38880 [preauth] Jan 18 13:48:49 host sshd[3026]: User root from 118.70.180.189 not allowed because not listed in AllowUsers Jan 18 13:48:49 host sshd[3026]: input_userauth_request: invalid user root [preauth] Jan 18 13:48:49 host unix_chkpwd[3029]: password check failed for user (root) Jan 18 13:48:49 host sshd[3026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.180.189 user=root Jan 18 13:48:49 host sshd[3026]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 13:48:51 host sshd[3026]: Failed password for invalid user root from 118.70.180.189 port 57873 ssh2 Jan 18 13:48:51 host sshd[3026]: Received disconnect from 118.70.180.189 port 57873:11: Bye Bye [preauth] Jan 18 13:48:51 host sshd[3026]: Disconnected from 118.70.180.189 port 57873 [preauth] Jan 18 13:48:59 host sshd[3037]: Invalid user tom from 103.162.20.122 port 43326 Jan 18 13:48:59 host sshd[3037]: input_userauth_request: invalid user tom [preauth] Jan 18 13:48:59 host sshd[3037]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:48:59 host sshd[3037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.162.20.122 Jan 18 13:49:01 host sshd[3037]: Failed password for invalid user tom from 103.162.20.122 port 43326 ssh2 Jan 18 13:49:01 host sshd[3037]: Received disconnect from 103.162.20.122 port 43326:11: Bye Bye [preauth] Jan 18 13:49:01 host sshd[3037]: Disconnected from 103.162.20.122 port 43326 [preauth] Jan 18 13:49:22 host sshd[3184]: Invalid user gpadmin from 81.30.195.246 port 57270 Jan 18 13:49:22 host sshd[3184]: input_userauth_request: invalid user gpadmin [preauth] Jan 18 13:49:22 host sshd[3184]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:49:22 host sshd[3184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.195.246 Jan 18 13:49:24 host sshd[3184]: Failed password for invalid user gpadmin from 81.30.195.246 port 57270 ssh2 Jan 18 13:49:24 host sshd[3184]: Received disconnect from 81.30.195.246 port 57270:11: Bye Bye [preauth] Jan 18 13:49:24 host sshd[3184]: Disconnected from 81.30.195.246 port 57270 [preauth] Jan 18 13:50:11 host sshd[3311]: Invalid user user from 114.32.196.29 port 58287 Jan 18 13:50:11 host sshd[3311]: input_userauth_request: invalid user user [preauth] Jan 18 13:50:11 host sshd[3311]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:50:11 host sshd[3311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.196.29 Jan 18 13:50:13 host sshd[3311]: Failed password for invalid user user from 114.32.196.29 port 58287 ssh2 Jan 18 13:50:16 host sshd[3311]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:50:18 host sshd[3311]: Failed password for invalid user user from 114.32.196.29 port 58287 ssh2 Jan 18 13:50:20 host sshd[3324]: User root from 103.175.16.22 not allowed because not listed in AllowUsers Jan 18 13:50:20 host sshd[3324]: input_userauth_request: invalid user root [preauth] Jan 18 13:50:20 host unix_chkpwd[3328]: password check failed for user (root) Jan 18 13:50:20 host sshd[3324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.175.16.22 user=root Jan 18 13:50:20 host sshd[3324]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 13:50:20 host sshd[3311]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:50:21 host sshd[3324]: Failed password for invalid user root from 103.175.16.22 port 59424 ssh2 Jan 18 13:50:21 host sshd[3311]: Failed password for invalid user user from 114.32.196.29 port 58287 ssh2 Jan 18 13:50:22 host sshd[3324]: Received disconnect from 103.175.16.22 port 59424:11: Bye Bye [preauth] Jan 18 13:50:22 host sshd[3324]: Disconnected from 103.175.16.22 port 59424 [preauth] Jan 18 13:50:22 host sshd[3311]: Connection reset by 114.32.196.29 port 58287 [preauth] Jan 18 13:50:22 host sshd[3311]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.196.29 Jan 18 13:50:50 host sshd[3408]: Invalid user administrator from 152.32.226.121 port 25778 Jan 18 13:50:50 host sshd[3408]: input_userauth_request: invalid user administrator [preauth] Jan 18 13:50:50 host sshd[3408]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:50:50 host sshd[3408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.226.121 Jan 18 13:50:53 host sshd[3408]: Failed password for invalid user administrator from 152.32.226.121 port 25778 ssh2 Jan 18 13:50:53 host sshd[3408]: Received disconnect from 152.32.226.121 port 25778:11: Bye Bye [preauth] Jan 18 13:50:53 host sshd[3408]: Disconnected from 152.32.226.121 port 25778 [preauth] Jan 18 13:51:15 host sshd[3451]: Invalid user gpadmin from 139.59.39.185 port 34404 Jan 18 13:51:15 host sshd[3451]: input_userauth_request: invalid user gpadmin [preauth] Jan 18 13:51:15 host sshd[3451]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:51:15 host sshd[3451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.39.185 Jan 18 13:51:17 host sshd[3451]: Failed password for invalid user gpadmin from 139.59.39.185 port 34404 ssh2 Jan 18 13:51:17 host sshd[3451]: Received disconnect from 139.59.39.185 port 34404:11: Bye Bye [preauth] Jan 18 13:51:17 host sshd[3451]: Disconnected from 139.59.39.185 port 34404 [preauth] Jan 18 13:51:22 host sshd[3457]: Invalid user bet from 134.209.211.170 port 39850 Jan 18 13:51:22 host sshd[3457]: input_userauth_request: invalid user bet [preauth] Jan 18 13:51:22 host sshd[3457]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:51:22 host sshd[3457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.211.170 Jan 18 13:51:24 host sshd[3457]: Failed password for invalid user bet from 134.209.211.170 port 39850 ssh2 Jan 18 13:51:24 host sshd[3457]: Received disconnect from 134.209.211.170 port 39850:11: Bye Bye [preauth] Jan 18 13:51:24 host sshd[3457]: Disconnected from 134.209.211.170 port 39850 [preauth] Jan 18 13:52:07 host sshd[3577]: Invalid user ntc from 152.32.226.121 port 52672 Jan 18 13:52:07 host sshd[3577]: input_userauth_request: invalid user ntc [preauth] Jan 18 13:52:07 host sshd[3577]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:52:07 host sshd[3577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.226.121 Jan 18 13:52:10 host sshd[3577]: Failed password for invalid user ntc from 152.32.226.121 port 52672 ssh2 Jan 18 13:52:10 host sshd[3577]: Received disconnect from 152.32.226.121 port 52672:11: Bye Bye [preauth] Jan 18 13:52:10 host sshd[3577]: Disconnected from 152.32.226.121 port 52672 [preauth] Jan 18 13:52:22 host sshd[3620]: Invalid user steam from 183.108.54.139 port 61416 Jan 18 13:52:22 host sshd[3620]: input_userauth_request: invalid user steam [preauth] Jan 18 13:52:22 host sshd[3620]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:52:22 host sshd[3620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.108.54.139 Jan 18 13:52:23 host sshd[3620]: Failed password for invalid user steam from 183.108.54.139 port 61416 ssh2 Jan 18 13:52:24 host sshd[3620]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:52:26 host sshd[3620]: Failed password for invalid user steam from 183.108.54.139 port 61416 ssh2 Jan 18 13:52:26 host sshd[3631]: Invalid user elastic from 14.97.218.174 port 33409 Jan 18 13:52:26 host sshd[3631]: input_userauth_request: invalid user elastic [preauth] Jan 18 13:52:26 host sshd[3631]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:52:26 host sshd[3631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.97.218.174 Jan 18 13:52:27 host sshd[3620]: Connection reset by 183.108.54.139 port 61416 [preauth] Jan 18 13:52:27 host sshd[3620]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.108.54.139 Jan 18 13:52:29 host sshd[3631]: Failed password for invalid user elastic from 14.97.218.174 port 33409 ssh2 Jan 18 13:52:29 host sshd[3631]: Received disconnect from 14.97.218.174 port 33409:11: Bye Bye [preauth] Jan 18 13:52:29 host sshd[3631]: Disconnected from 14.97.218.174 port 33409 [preauth] Jan 18 13:53:46 host sshd[3805]: Invalid user gpadmin from 159.65.91.105 port 53254 Jan 18 13:53:46 host sshd[3805]: input_userauth_request: invalid user gpadmin [preauth] Jan 18 13:53:46 host sshd[3805]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:53:46 host sshd[3805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.91.105 Jan 18 13:53:47 host sshd[3805]: Failed password for invalid user gpadmin from 159.65.91.105 port 53254 ssh2 Jan 18 13:53:47 host sshd[3805]: Received disconnect from 159.65.91.105 port 53254:11: Bye Bye [preauth] Jan 18 13:53:47 host sshd[3805]: Disconnected from 159.65.91.105 port 53254 [preauth] Jan 18 13:54:22 host sshd[3891]: Invalid user tom from 118.70.180.188 port 55583 Jan 18 13:54:22 host sshd[3891]: input_userauth_request: invalid user tom [preauth] Jan 18 13:54:22 host sshd[3891]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:54:22 host sshd[3891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.180.188 Jan 18 13:54:23 host sshd[3894]: Invalid user kevin from 103.162.20.122 port 40614 Jan 18 13:54:23 host sshd[3894]: input_userauth_request: invalid user kevin [preauth] Jan 18 13:54:23 host sshd[3894]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:54:23 host sshd[3894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.162.20.122 Jan 18 13:54:23 host sshd[3891]: Failed password for invalid user tom from 118.70.180.188 port 55583 ssh2 Jan 18 13:54:23 host sshd[3891]: Received disconnect from 118.70.180.188 port 55583:11: Bye Bye [preauth] Jan 18 13:54:23 host sshd[3891]: Disconnected from 118.70.180.188 port 55583 [preauth] Jan 18 13:54:25 host sshd[3894]: Failed password for invalid user kevin from 103.162.20.122 port 40614 ssh2 Jan 18 13:54:25 host sshd[3894]: Received disconnect from 103.162.20.122 port 40614:11: Bye Bye [preauth] Jan 18 13:54:25 host sshd[3894]: Disconnected from 103.162.20.122 port 40614 [preauth] Jan 18 13:54:37 host sshd[4052]: Invalid user elastic from 134.209.211.170 port 51880 Jan 18 13:54:37 host sshd[4052]: input_userauth_request: invalid user elastic [preauth] Jan 18 13:54:37 host sshd[4052]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:54:37 host sshd[4052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.211.170 Jan 18 13:54:39 host sshd[4052]: Failed password for invalid user elastic from 134.209.211.170 port 51880 ssh2 Jan 18 13:54:39 host sshd[4052]: Received disconnect from 134.209.211.170 port 51880:11: Bye Bye [preauth] Jan 18 13:54:39 host sshd[4052]: Disconnected from 134.209.211.170 port 51880 [preauth] Jan 18 13:54:43 host sshd[4066]: Invalid user oscar from 81.30.195.246 port 51098 Jan 18 13:54:43 host sshd[4066]: input_userauth_request: invalid user oscar [preauth] Jan 18 13:54:43 host sshd[4066]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:54:43 host sshd[4066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.195.246 Jan 18 13:54:45 host sshd[4066]: Failed password for invalid user oscar from 81.30.195.246 port 51098 ssh2 Jan 18 13:54:45 host sshd[4066]: Received disconnect from 81.30.195.246 port 51098:11: Bye Bye [preauth] Jan 18 13:54:45 host sshd[4066]: Disconnected from 81.30.195.246 port 51098 [preauth] Jan 18 13:54:58 host sshd[4088]: Invalid user oscar from 14.97.218.174 port 2148 Jan 18 13:54:58 host sshd[4088]: input_userauth_request: invalid user oscar [preauth] Jan 18 13:54:58 host sshd[4088]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:54:58 host sshd[4088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.97.218.174 Jan 18 13:55:00 host sshd[4088]: Failed password for invalid user oscar from 14.97.218.174 port 2148 ssh2 Jan 18 13:55:00 host sshd[4088]: Received disconnect from 14.97.218.174 port 2148:11: Bye Bye [preauth] Jan 18 13:55:00 host sshd[4088]: Disconnected from 14.97.218.174 port 2148 [preauth] Jan 18 13:55:07 host sshd[4117]: Invalid user administrator from 159.65.91.105 port 53244 Jan 18 13:55:07 host sshd[4117]: input_userauth_request: invalid user administrator [preauth] Jan 18 13:55:07 host sshd[4117]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:55:07 host sshd[4117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.91.105 Jan 18 13:55:09 host sshd[4117]: Failed password for invalid user administrator from 159.65.91.105 port 53244 ssh2 Jan 18 13:55:09 host sshd[4117]: Received disconnect from 159.65.91.105 port 53244:11: Bye Bye [preauth] Jan 18 13:55:09 host sshd[4117]: Disconnected from 159.65.91.105 port 53244 [preauth] Jan 18 13:55:17 host sshd[4135]: Invalid user ark from 139.59.39.185 port 36690 Jan 18 13:55:17 host sshd[4135]: input_userauth_request: invalid user ark [preauth] Jan 18 13:55:17 host sshd[4135]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:55:17 host sshd[4135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.39.185 Jan 18 13:55:18 host sshd[4135]: Failed password for invalid user ark from 139.59.39.185 port 36690 ssh2 Jan 18 13:55:18 host sshd[4135]: Received disconnect from 139.59.39.185 port 36690:11: Bye Bye [preauth] Jan 18 13:55:18 host sshd[4135]: Disconnected from 139.59.39.185 port 36690 [preauth] Jan 18 13:55:40 host sshd[4197]: Invalid user postgres from 134.209.211.170 port 49018 Jan 18 13:55:40 host sshd[4197]: input_userauth_request: invalid user postgres [preauth] Jan 18 13:55:40 host sshd[4197]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:55:40 host sshd[4197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.211.170 Jan 18 13:55:41 host sshd[4206]: Invalid user admin1 from 118.70.180.188 port 54385 Jan 18 13:55:41 host sshd[4206]: input_userauth_request: invalid user admin1 [preauth] Jan 18 13:55:41 host sshd[4206]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:55:41 host sshd[4206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.180.188 Jan 18 13:55:42 host sshd[4197]: Failed password for invalid user postgres from 134.209.211.170 port 49018 ssh2 Jan 18 13:55:42 host sshd[4197]: Received disconnect from 134.209.211.170 port 49018:11: Bye Bye [preauth] Jan 18 13:55:42 host sshd[4197]: Disconnected from 134.209.211.170 port 49018 [preauth] Jan 18 13:55:43 host sshd[4206]: Failed password for invalid user admin1 from 118.70.180.188 port 54385 ssh2 Jan 18 13:55:43 host sshd[4206]: Received disconnect from 118.70.180.188 port 54385:11: Bye Bye [preauth] Jan 18 13:55:43 host sshd[4206]: Disconnected from 118.70.180.188 port 54385 [preauth] Jan 18 13:55:52 host sshd[4247]: Invalid user oscar from 81.30.195.246 port 45580 Jan 18 13:55:52 host sshd[4247]: input_userauth_request: invalid user oscar [preauth] Jan 18 13:55:52 host sshd[4247]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:55:52 host sshd[4247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.195.246 Jan 18 13:55:54 host sshd[4247]: Failed password for invalid user oscar from 81.30.195.246 port 45580 ssh2 Jan 18 13:55:54 host sshd[4247]: Received disconnect from 81.30.195.246 port 45580:11: Bye Bye [preauth] Jan 18 13:55:54 host sshd[4247]: Disconnected from 81.30.195.246 port 45580 [preauth] Jan 18 13:56:01 host sshd[4287]: Invalid user test1 from 103.162.20.122 port 39620 Jan 18 13:56:01 host sshd[4287]: input_userauth_request: invalid user test1 [preauth] Jan 18 13:56:01 host sshd[4287]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:56:01 host sshd[4287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.162.20.122 Jan 18 13:56:03 host sshd[4287]: Failed password for invalid user test1 from 103.162.20.122 port 39620 ssh2 Jan 18 13:56:03 host sshd[4287]: Received disconnect from 103.162.20.122 port 39620:11: Bye Bye [preauth] Jan 18 13:56:03 host sshd[4287]: Disconnected from 103.162.20.122 port 39620 [preauth] Jan 18 13:56:12 host sshd[4343]: Invalid user postgres from 103.175.16.22 port 50242 Jan 18 13:56:12 host sshd[4343]: input_userauth_request: invalid user postgres [preauth] Jan 18 13:56:12 host sshd[4343]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:56:12 host sshd[4343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.175.16.22 Jan 18 13:56:13 host sshd[4343]: Failed password for invalid user postgres from 103.175.16.22 port 50242 ssh2 Jan 18 13:56:14 host sshd[4348]: Invalid user arkserver from 159.65.91.105 port 51970 Jan 18 13:56:14 host sshd[4348]: input_userauth_request: invalid user arkserver [preauth] Jan 18 13:56:14 host sshd[4348]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:56:14 host sshd[4348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.91.105 Jan 18 13:56:14 host sshd[4343]: Received disconnect from 103.175.16.22 port 50242:11: Bye Bye [preauth] Jan 18 13:56:14 host sshd[4343]: Disconnected from 103.175.16.22 port 50242 [preauth] Jan 18 13:56:16 host sshd[4348]: Failed password for invalid user arkserver from 159.65.91.105 port 51970 ssh2 Jan 18 13:56:28 host sshd[4449]: Invalid user test from 14.97.218.174 port 9211 Jan 18 13:56:28 host sshd[4449]: input_userauth_request: invalid user test [preauth] Jan 18 13:56:28 host sshd[4449]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:56:28 host sshd[4449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.97.218.174 Jan 18 13:56:29 host sshd[4449]: Failed password for invalid user test from 14.97.218.174 port 9211 ssh2 Jan 18 13:56:29 host sshd[4449]: Received disconnect from 14.97.218.174 port 9211:11: Bye Bye [preauth] Jan 18 13:56:29 host sshd[4449]: Disconnected from 14.97.218.174 port 9211 [preauth] Jan 18 13:56:34 host sshd[4489]: Invalid user master from 139.59.39.185 port 34252 Jan 18 13:56:34 host sshd[4489]: input_userauth_request: invalid user master [preauth] Jan 18 13:56:34 host sshd[4489]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:56:34 host sshd[4489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.39.185 Jan 18 13:56:36 host sshd[4489]: Failed password for invalid user master from 139.59.39.185 port 34252 ssh2 Jan 18 13:57:04 host sshd[4567]: Invalid user master from 118.70.180.188 port 53189 Jan 18 13:57:04 host sshd[4567]: input_userauth_request: invalid user master [preauth] Jan 18 13:57:04 host sshd[4567]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:57:04 host sshd[4567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.180.188 Jan 18 13:57:06 host sshd[4567]: Failed password for invalid user master from 118.70.180.188 port 53189 ssh2 Jan 18 13:59:09 host sshd[4865]: Invalid user terry from 209.141.56.48 port 58532 Jan 18 13:59:09 host sshd[4865]: input_userauth_request: invalid user terry [preauth] Jan 18 13:59:09 host sshd[4865]: pam_unix(sshd:auth): check pass; user unknown Jan 18 13:59:09 host sshd[4865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 18 13:59:11 host sshd[4865]: Failed password for invalid user terry from 209.141.56.48 port 58532 ssh2 Jan 18 13:59:12 host sshd[4865]: Connection closed by 209.141.56.48 port 58532 [preauth] Jan 18 14:02:43 host sshd[5533]: Invalid user fy from 194.110.203.109 port 55848 Jan 18 14:02:43 host sshd[5533]: input_userauth_request: invalid user fy [preauth] Jan 18 14:02:43 host sshd[5533]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:02:43 host sshd[5533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 14:02:45 host sshd[5533]: Failed password for invalid user fy from 194.110.203.109 port 55848 ssh2 Jan 18 14:02:49 host sshd[5533]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:02:50 host sshd[5533]: Failed password for invalid user fy from 194.110.203.109 port 55848 ssh2 Jan 18 14:02:54 host sshd[5533]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:02:56 host sshd[5533]: Failed password for invalid user fy from 194.110.203.109 port 55848 ssh2 Jan 18 14:02:59 host sshd[5533]: Connection closed by 194.110.203.109 port 55848 [preauth] Jan 18 14:02:59 host sshd[5533]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 14:04:41 host sshd[5772]: Connection reset by 81.8.65.148 port 7867 [preauth] Jan 18 14:08:26 host sshd[6267]: User root from 123.240.182.181 not allowed because not listed in AllowUsers Jan 18 14:08:26 host sshd[6267]: input_userauth_request: invalid user root [preauth] Jan 18 14:08:26 host unix_chkpwd[6278]: password check failed for user (root) Jan 18 14:08:26 host sshd[6267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.240.182.181 user=root Jan 18 14:08:26 host sshd[6267]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 14:08:28 host sshd[6267]: Failed password for invalid user root from 123.240.182.181 port 39159 ssh2 Jan 18 14:08:28 host unix_chkpwd[6302]: password check failed for user (root) Jan 18 14:08:28 host sshd[6267]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 14:08:31 host sshd[6267]: Failed password for invalid user root from 123.240.182.181 port 39159 ssh2 Jan 18 14:08:31 host unix_chkpwd[6306]: password check failed for user (root) Jan 18 14:08:31 host sshd[6267]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 14:08:33 host sshd[6267]: Failed password for invalid user root from 123.240.182.181 port 39159 ssh2 Jan 18 14:08:33 host unix_chkpwd[6309]: password check failed for user (root) Jan 18 14:08:33 host sshd[6267]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 14:08:36 host sshd[6267]: Failed password for invalid user root from 123.240.182.181 port 39159 ssh2 Jan 18 14:08:36 host unix_chkpwd[6330]: password check failed for user (root) Jan 18 14:08:36 host sshd[6267]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 14:08:38 host sshd[6267]: Failed password for invalid user root from 123.240.182.181 port 39159 ssh2 Jan 18 14:10:29 host sshd[6582]: Invalid user ec2-user from 82.53.79.212 port 58339 Jan 18 14:10:29 host sshd[6582]: input_userauth_request: invalid user ec2-user [preauth] Jan 18 14:10:29 host sshd[6582]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:10:29 host sshd[6582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.53.79.212 Jan 18 14:10:31 host sshd[6582]: Failed password for invalid user ec2-user from 82.53.79.212 port 58339 ssh2 Jan 18 14:10:32 host sshd[6582]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:10:34 host sshd[6582]: Failed password for invalid user ec2-user from 82.53.79.212 port 58339 ssh2 Jan 18 14:10:35 host sshd[6582]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:10:37 host sshd[6582]: Failed password for invalid user ec2-user from 82.53.79.212 port 58339 ssh2 Jan 18 14:10:37 host sshd[6582]: Failed password for invalid user ec2-user from 82.53.79.212 port 58339 ssh2 Jan 18 14:10:38 host sshd[6582]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:10:40 host sshd[6582]: Failed password for invalid user ec2-user from 82.53.79.212 port 58339 ssh2 Jan 18 14:10:41 host sshd[6582]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:10:43 host sshd[6582]: Failed password for invalid user ec2-user from 82.53.79.212 port 58339 ssh2 Jan 18 14:10:43 host sshd[6582]: error: maximum authentication attempts exceeded for invalid user ec2-user from 82.53.79.212 port 58339 ssh2 [preauth] Jan 18 14:10:43 host sshd[6582]: Disconnecting: Too many authentication failures [preauth] Jan 18 14:10:43 host sshd[6582]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.53.79.212 Jan 18 14:10:43 host sshd[6582]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 18 14:10:49 host sshd[6773]: User root from 35.234.63.166 not allowed because not listed in AllowUsers Jan 18 14:10:49 host sshd[6773]: input_userauth_request: invalid user root [preauth] Jan 18 14:10:49 host unix_chkpwd[6775]: password check failed for user (root) Jan 18 14:10:49 host sshd[6773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.234.63.166 user=root Jan 18 14:10:49 host sshd[6773]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 14:10:50 host sshd[6773]: Failed password for invalid user root from 35.234.63.166 port 33958 ssh2 Jan 18 14:10:50 host sshd[6773]: Received disconnect from 35.234.63.166 port 33958:11: Bye Bye [preauth] Jan 18 14:10:50 host sshd[6773]: Disconnected from 35.234.63.166 port 33958 [preauth] Jan 18 14:11:18 host sshd[6831]: User root from 95.51.122.85 not allowed because not listed in AllowUsers Jan 18 14:11:18 host sshd[6831]: input_userauth_request: invalid user root [preauth] Jan 18 14:11:18 host unix_chkpwd[6834]: password check failed for user (root) Jan 18 14:11:18 host sshd[6831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.51.122.85 user=root Jan 18 14:11:18 host sshd[6831]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 14:11:18 host sshd[6829]: User root from 43.135.153.55 not allowed because not listed in AllowUsers Jan 18 14:11:18 host sshd[6829]: input_userauth_request: invalid user root [preauth] Jan 18 14:11:18 host unix_chkpwd[6835]: password check failed for user (root) Jan 18 14:11:18 host sshd[6829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.153.55 user=root Jan 18 14:11:18 host sshd[6829]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 14:11:20 host sshd[6831]: Failed password for invalid user root from 95.51.122.85 port 49592 ssh2 Jan 18 14:11:20 host sshd[6831]: Received disconnect from 95.51.122.85 port 49592:11: Bye Bye [preauth] Jan 18 14:11:20 host sshd[6831]: Disconnected from 95.51.122.85 port 49592 [preauth] Jan 18 14:11:20 host sshd[6829]: Failed password for invalid user root from 43.135.153.55 port 59986 ssh2 Jan 18 14:11:20 host sshd[6829]: Received disconnect from 43.135.153.55 port 59986:11: Bye Bye [preauth] Jan 18 14:11:20 host sshd[6829]: Disconnected from 43.135.153.55 port 59986 [preauth] Jan 18 14:12:30 host sshd[6970]: User root from 211.43.15.80 not allowed because not listed in AllowUsers Jan 18 14:12:30 host sshd[6970]: input_userauth_request: invalid user root [preauth] Jan 18 14:12:30 host unix_chkpwd[6973]: password check failed for user (root) Jan 18 14:12:30 host sshd[6970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.43.15.80 user=root Jan 18 14:12:30 host sshd[6970]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 14:12:32 host sshd[6970]: Failed password for invalid user root from 211.43.15.80 port 58058 ssh2 Jan 18 14:12:32 host sshd[6970]: Received disconnect from 211.43.15.80 port 58058:11: Bye Bye [preauth] Jan 18 14:12:32 host sshd[6970]: Disconnected from 211.43.15.80 port 58058 [preauth] Jan 18 14:13:24 host sshd[7071]: Invalid user hadoop from 202.160.145.243 port 56432 Jan 18 14:13:24 host sshd[7071]: input_userauth_request: invalid user hadoop [preauth] Jan 18 14:13:24 host sshd[7071]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:13:24 host sshd[7071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.160.145.243 Jan 18 14:13:25 host sshd[7071]: Failed password for invalid user hadoop from 202.160.145.243 port 56432 ssh2 Jan 18 14:13:25 host sshd[7071]: Received disconnect from 202.160.145.243 port 56432:11: Bye Bye [preauth] Jan 18 14:13:25 host sshd[7071]: Disconnected from 202.160.145.243 port 56432 [preauth] Jan 18 14:15:27 host sshd[7301]: Invalid user webadmin from 142.44.247.187 port 60664 Jan 18 14:15:27 host sshd[7301]: input_userauth_request: invalid user webadmin [preauth] Jan 18 14:15:27 host sshd[7301]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:15:27 host sshd[7301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.247.187 Jan 18 14:15:30 host sshd[7301]: Failed password for invalid user webadmin from 142.44.247.187 port 60664 ssh2 Jan 18 14:15:30 host sshd[7301]: Received disconnect from 142.44.247.187 port 60664:11: Bye Bye [preauth] Jan 18 14:15:30 host sshd[7301]: Disconnected from 142.44.247.187 port 60664 [preauth] Jan 18 14:16:25 host sshd[7538]: Invalid user albert from 35.234.63.166 port 34016 Jan 18 14:16:25 host sshd[7538]: input_userauth_request: invalid user albert [preauth] Jan 18 14:16:25 host sshd[7538]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:16:25 host sshd[7538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.234.63.166 Jan 18 14:16:27 host sshd[7538]: Failed password for invalid user albert from 35.234.63.166 port 34016 ssh2 Jan 18 14:16:27 host sshd[7538]: Received disconnect from 35.234.63.166 port 34016:11: Bye Bye [preauth] Jan 18 14:16:27 host sshd[7538]: Disconnected from 35.234.63.166 port 34016 [preauth] Jan 18 14:16:43 host sshd[7614]: User root from 43.135.153.55 not allowed because not listed in AllowUsers Jan 18 14:16:43 host sshd[7614]: input_userauth_request: invalid user root [preauth] Jan 18 14:16:43 host unix_chkpwd[7617]: password check failed for user (root) Jan 18 14:16:43 host sshd[7614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.135.153.55 user=root Jan 18 14:16:43 host sshd[7614]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 14:16:45 host sshd[7614]: Failed password for invalid user root from 43.135.153.55 port 58664 ssh2 Jan 18 14:16:45 host sshd[7614]: Received disconnect from 43.135.153.55 port 58664:11: Bye Bye [preauth] Jan 18 14:16:45 host sshd[7614]: Disconnected from 43.135.153.55 port 58664 [preauth] Jan 18 14:17:06 host sshd[7677]: Invalid user ts2 from 211.43.15.80 port 49306 Jan 18 14:17:06 host sshd[7677]: input_userauth_request: invalid user ts2 [preauth] Jan 18 14:17:06 host sshd[7677]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:17:06 host sshd[7677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.43.15.80 Jan 18 14:17:07 host sshd[7677]: Failed password for invalid user ts2 from 211.43.15.80 port 49306 ssh2 Jan 18 14:17:07 host sshd[7677]: Received disconnect from 211.43.15.80 port 49306:11: Bye Bye [preauth] Jan 18 14:17:07 host sshd[7677]: Disconnected from 211.43.15.80 port 49306 [preauth] Jan 18 14:17:40 host sshd[7787]: Invalid user sales1 from 118.70.180.189 port 64647 Jan 18 14:17:40 host sshd[7787]: input_userauth_request: invalid user sales1 [preauth] Jan 18 14:17:40 host sshd[7787]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:17:40 host sshd[7787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.180.189 Jan 18 14:17:42 host sshd[7787]: Failed password for invalid user sales1 from 118.70.180.189 port 64647 ssh2 Jan 18 14:17:42 host sshd[7787]: Received disconnect from 118.70.180.189 port 64647:11: Bye Bye [preauth] Jan 18 14:17:42 host sshd[7787]: Disconnected from 118.70.180.189 port 64647 [preauth] Jan 18 14:17:47 host sshd[7800]: Invalid user postgres from 142.44.247.187 port 55264 Jan 18 14:17:47 host sshd[7800]: input_userauth_request: invalid user postgres [preauth] Jan 18 14:17:47 host sshd[7800]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:17:47 host sshd[7800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.247.187 Jan 18 14:17:49 host sshd[7800]: Failed password for invalid user postgres from 142.44.247.187 port 55264 ssh2 Jan 18 14:17:49 host sshd[7800]: Received disconnect from 142.44.247.187 port 55264:11: Bye Bye [preauth] Jan 18 14:17:49 host sshd[7800]: Disconnected from 142.44.247.187 port 55264 [preauth] Jan 18 14:18:01 host sshd[7849]: Invalid user ts2 from 95.51.122.85 port 47142 Jan 18 14:18:01 host sshd[7849]: input_userauth_request: invalid user ts2 [preauth] Jan 18 14:18:01 host sshd[7849]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:18:01 host sshd[7849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.51.122.85 Jan 18 14:18:03 host sshd[7849]: Failed password for invalid user ts2 from 95.51.122.85 port 47142 ssh2 Jan 18 14:18:03 host sshd[7849]: Received disconnect from 95.51.122.85 port 47142:11: Bye Bye [preauth] Jan 18 14:18:03 host sshd[7849]: Disconnected from 95.51.122.85 port 47142 [preauth] Jan 18 14:18:19 host sshd[7923]: Invalid user pivpn from 202.160.145.243 port 50224 Jan 18 14:18:19 host sshd[7923]: input_userauth_request: invalid user pivpn [preauth] Jan 18 14:18:19 host sshd[7923]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:18:19 host sshd[7923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.160.145.243 Jan 18 14:18:20 host sshd[7923]: Failed password for invalid user pivpn from 202.160.145.243 port 50224 ssh2 Jan 18 14:18:20 host sshd[7923]: Received disconnect from 202.160.145.243 port 50224:11: Bye Bye [preauth] Jan 18 14:18:20 host sshd[7923]: Disconnected from 202.160.145.243 port 50224 [preauth] Jan 18 14:18:52 host sshd[7986]: Invalid user kafka from 142.44.247.187 port 59862 Jan 18 14:18:52 host sshd[7986]: input_userauth_request: invalid user kafka [preauth] Jan 18 14:18:52 host sshd[7986]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:18:52 host sshd[7986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.247.187 Jan 18 14:18:54 host sshd[7986]: Failed password for invalid user kafka from 142.44.247.187 port 59862 ssh2 Jan 18 14:18:54 host sshd[7986]: Received disconnect from 142.44.247.187 port 59862:11: Bye Bye [preauth] Jan 18 14:18:54 host sshd[7986]: Disconnected from 142.44.247.187 port 59862 [preauth] Jan 18 14:19:55 host sshd[8127]: Invalid user mapr from 202.160.145.243 port 33332 Jan 18 14:19:55 host sshd[8127]: input_userauth_request: invalid user mapr [preauth] Jan 18 14:19:55 host sshd[8127]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:19:55 host sshd[8127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.160.145.243 Jan 18 14:19:57 host sshd[8127]: Failed password for invalid user mapr from 202.160.145.243 port 33332 ssh2 Jan 18 14:19:57 host sshd[8127]: Received disconnect from 202.160.145.243 port 33332:11: Bye Bye [preauth] Jan 18 14:19:57 host sshd[8127]: Disconnected from 202.160.145.243 port 33332 [preauth] Jan 18 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 14:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 14:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 14:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 14:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 14:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 14:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 14:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 14:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 14:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 14:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 14:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=ugotscom user-8=wwwresourcehunte user-9=keralaholi user-10=wwwrmswll user-11=wwwpmcresource user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=pmcresources user-16=disposeat user-17=wwwkmaorg user-18=remysagr user-19=woodpeck user-20=wwwkapin user-21=phmetals user-22=kottayamcalldriv user-23=palco123 user-24=gifterman user-25=mrsclean user-26=wwwnexidigital user-27=wwwevmhonda user-28=bonifacegroup user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 14:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 14:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 14:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gUsp1G6rtR8zYD4Q.~ Jan 18 14:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gUsp1G6rtR8zYD4Q.~' Jan 18 14:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-gUsp1G6rtR8zYD4Q.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 14:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 14:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 14:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 14:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 14:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 14:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 14:25:38 host sshd[9188]: Invalid user nginx from 183.109.210.172 port 59154 Jan 18 14:25:38 host sshd[9188]: input_userauth_request: invalid user nginx [preauth] Jan 18 14:25:38 host sshd[9188]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:25:38 host sshd[9188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.109.210.172 Jan 18 14:25:40 host sshd[9188]: Failed password for invalid user nginx from 183.109.210.172 port 59154 ssh2 Jan 18 14:25:41 host sshd[9188]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:25:43 host sshd[9207]: Invalid user vadmin from 220.135.26.2 port 60621 Jan 18 14:25:43 host sshd[9207]: input_userauth_request: invalid user vadmin [preauth] Jan 18 14:25:43 host sshd[9207]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:25:43 host sshd[9207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.26.2 Jan 18 14:25:43 host sshd[9188]: Failed password for invalid user nginx from 183.109.210.172 port 59154 ssh2 Jan 18 14:25:45 host sshd[9188]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:25:45 host sshd[9207]: Failed password for invalid user vadmin from 220.135.26.2 port 60621 ssh2 Jan 18 14:25:46 host sshd[9207]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:25:46 host sshd[9188]: Failed password for invalid user nginx from 183.109.210.172 port 59154 ssh2 Jan 18 14:25:47 host sshd[9188]: Failed password for invalid user nginx from 183.109.210.172 port 59154 ssh2 Jan 18 14:25:48 host sshd[9188]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:25:48 host sshd[9207]: Failed password for invalid user vadmin from 220.135.26.2 port 60621 ssh2 Jan 18 14:25:49 host sshd[9207]: Failed password for invalid user vadmin from 220.135.26.2 port 60621 ssh2 Jan 18 14:25:49 host sshd[9207]: Connection closed by 220.135.26.2 port 60621 [preauth] Jan 18 14:25:49 host sshd[9207]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.26.2 Jan 18 14:25:50 host sshd[9188]: Failed password for invalid user nginx from 183.109.210.172 port 59154 ssh2 Jan 18 14:25:51 host sshd[9188]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:25:53 host sshd[9188]: Failed password for invalid user nginx from 183.109.210.172 port 59154 ssh2 Jan 18 14:25:53 host sshd[9188]: error: maximum authentication attempts exceeded for invalid user nginx from 183.109.210.172 port 59154 ssh2 [preauth] Jan 18 14:25:53 host sshd[9188]: Disconnecting: Too many authentication failures [preauth] Jan 18 14:25:53 host sshd[9188]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.109.210.172 Jan 18 14:25:53 host sshd[9188]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 18 14:27:12 host sshd[9395]: User root from 59.127.234.24 not allowed because not listed in AllowUsers Jan 18 14:27:12 host sshd[9395]: input_userauth_request: invalid user root [preauth] Jan 18 14:27:12 host unix_chkpwd[9401]: password check failed for user (root) Jan 18 14:27:12 host sshd[9395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.234.24 user=root Jan 18 14:27:12 host sshd[9395]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 14:27:14 host sshd[9395]: Failed password for invalid user root from 59.127.234.24 port 36977 ssh2 Jan 18 14:27:15 host unix_chkpwd[9404]: password check failed for user (root) Jan 18 14:27:15 host sshd[9395]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 14:27:16 host sshd[9395]: Failed password for invalid user root from 59.127.234.24 port 36977 ssh2 Jan 18 14:27:17 host sshd[9395]: Connection reset by 59.127.234.24 port 36977 [preauth] Jan 18 14:27:17 host sshd[9395]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.234.24 user=root Jan 18 14:29:20 host sshd[9727]: Invalid user terry from 209.141.56.48 port 35130 Jan 18 14:29:20 host sshd[9727]: input_userauth_request: invalid user terry [preauth] Jan 18 14:29:20 host sshd[9727]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:29:20 host sshd[9727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 18 14:29:22 host sshd[9727]: Failed password for invalid user terry from 209.141.56.48 port 35130 ssh2 Jan 18 14:29:23 host sshd[9727]: Connection closed by 209.141.56.48 port 35130 [preauth] Jan 18 14:31:45 host sshd[10053]: User root from 100.15.215.175 not allowed because not listed in AllowUsers Jan 18 14:31:45 host sshd[10053]: input_userauth_request: invalid user root [preauth] Jan 18 14:31:45 host unix_chkpwd[10058]: password check failed for user (root) Jan 18 14:31:45 host sshd[10053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=100.15.215.175 user=root Jan 18 14:31:45 host sshd[10053]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 14:31:47 host sshd[10053]: Failed password for invalid user root from 100.15.215.175 port 62813 ssh2 Jan 18 14:31:48 host unix_chkpwd[10063]: password check failed for user (root) Jan 18 14:31:48 host sshd[10053]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 14:31:50 host sshd[10053]: Failed password for invalid user root from 100.15.215.175 port 62813 ssh2 Jan 18 14:31:51 host unix_chkpwd[10074]: password check failed for user (root) Jan 18 14:31:51 host sshd[10053]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 14:31:53 host sshd[10053]: Failed password for invalid user root from 100.15.215.175 port 62813 ssh2 Jan 18 14:31:54 host unix_chkpwd[10080]: password check failed for user (root) Jan 18 14:31:54 host sshd[10053]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 14:31:55 host sshd[10053]: Failed password for invalid user root from 100.15.215.175 port 62813 ssh2 Jan 18 14:31:56 host sshd[10053]: Connection reset by 100.15.215.175 port 62813 [preauth] Jan 18 14:31:56 host sshd[10053]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=100.15.215.175 user=root Jan 18 14:31:56 host sshd[10053]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 18 14:35:02 host sshd[10633]: Invalid user ec2-user from 59.126.150.149 port 36390 Jan 18 14:35:02 host sshd[10633]: input_userauth_request: invalid user ec2-user [preauth] Jan 18 14:35:02 host sshd[10633]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:35:02 host sshd[10633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.150.149 Jan 18 14:35:04 host sshd[10633]: Failed password for invalid user ec2-user from 59.126.150.149 port 36390 ssh2 Jan 18 14:35:06 host sshd[10633]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:35:08 host sshd[10633]: Failed password for invalid user ec2-user from 59.126.150.149 port 36390 ssh2 Jan 18 14:35:09 host sshd[10633]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:35:11 host sshd[10633]: Failed password for invalid user ec2-user from 59.126.150.149 port 36390 ssh2 Jan 18 14:35:12 host sshd[10633]: Failed password for invalid user ec2-user from 59.126.150.149 port 36390 ssh2 Jan 18 14:35:12 host sshd[10633]: Connection reset by 59.126.150.149 port 36390 [preauth] Jan 18 14:35:12 host sshd[10633]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.150.149 Jan 18 14:51:19 host sshd[13036]: Invalid user admin from 128.199.136.139 port 46946 Jan 18 14:51:19 host sshd[13036]: input_userauth_request: invalid user admin [preauth] Jan 18 14:51:19 host sshd[13036]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:51:19 host sshd[13036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.136.139 Jan 18 14:51:21 host sshd[13036]: Failed password for invalid user admin from 128.199.136.139 port 46946 ssh2 Jan 18 14:51:21 host sshd[13036]: Connection closed by 128.199.136.139 port 46946 [preauth] Jan 18 14:54:14 host sshd[13393]: Invalid user ONTUSER from 220.133.223.157 port 54503 Jan 18 14:54:14 host sshd[13393]: input_userauth_request: invalid user ONTUSER [preauth] Jan 18 14:54:14 host sshd[13393]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:54:14 host sshd[13393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.223.157 Jan 18 14:54:16 host sshd[13393]: Failed password for invalid user ONTUSER from 220.133.223.157 port 54503 ssh2 Jan 18 14:54:17 host sshd[13393]: pam_unix(sshd:auth): check pass; user unknown Jan 18 14:54:19 host sshd[13393]: Failed password for invalid user ONTUSER from 220.133.223.157 port 54503 ssh2 Jan 18 14:54:19 host sshd[13393]: Failed password for invalid user ONTUSER from 220.133.223.157 port 54503 ssh2 Jan 18 14:54:19 host sshd[13393]: Connection reset by 220.133.223.157 port 54503 [preauth] Jan 18 14:54:19 host sshd[13393]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.223.157 Jan 18 14:59:41 host sshd[14285]: Did not receive identification string from 149.129.220.222 port 61000 Jan 18 15:04:15 host sshd[14869]: Invalid user user from 96.69.52.5 port 57372 Jan 18 15:04:15 host sshd[14869]: input_userauth_request: invalid user user [preauth] Jan 18 15:04:15 host sshd[14869]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:04:15 host sshd[14869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.52.5 Jan 18 15:04:16 host sshd[14869]: Failed password for invalid user user from 96.69.52.5 port 57372 ssh2 Jan 18 15:04:17 host sshd[14869]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:04:19 host sshd[14869]: Failed password for invalid user user from 96.69.52.5 port 57372 ssh2 Jan 18 15:04:20 host sshd[14869]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:04:22 host sshd[14869]: Failed password for invalid user user from 96.69.52.5 port 57372 ssh2 Jan 18 15:04:23 host sshd[14869]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:04:26 host sshd[14869]: Failed password for invalid user user from 96.69.52.5 port 57372 ssh2 Jan 18 15:04:27 host sshd[14869]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:04:28 host sshd[14869]: Failed password for invalid user user from 96.69.52.5 port 57372 ssh2 Jan 18 15:06:35 host sshd[15289]: Invalid user admin from 121.153.216.202 port 63575 Jan 18 15:06:35 host sshd[15289]: input_userauth_request: invalid user admin [preauth] Jan 18 15:06:35 host sshd[15289]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:06:35 host sshd[15289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.153.216.202 Jan 18 15:06:37 host sshd[15289]: Failed password for invalid user admin from 121.153.216.202 port 63575 ssh2 Jan 18 15:06:38 host sshd[15289]: Failed password for invalid user admin from 121.153.216.202 port 63575 ssh2 Jan 18 15:06:38 host sshd[15289]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:06:41 host sshd[15289]: Failed password for invalid user admin from 121.153.216.202 port 63575 ssh2 Jan 18 15:06:42 host sshd[15289]: Connection reset by 121.153.216.202 port 63575 [preauth] Jan 18 15:06:42 host sshd[15289]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.153.216.202 Jan 18 15:10:11 host sshd[15727]: Invalid user terry from 209.141.56.48 port 34008 Jan 18 15:10:11 host sshd[15727]: input_userauth_request: invalid user terry [preauth] Jan 18 15:10:11 host sshd[15727]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:10:11 host sshd[15727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 18 15:10:13 host sshd[15727]: Failed password for invalid user terry from 209.141.56.48 port 34008 ssh2 Jan 18 15:10:13 host sshd[15727]: Connection closed by 209.141.56.48 port 34008 [preauth] Jan 18 15:20:10 host sshd[17198]: Invalid user backuprestore from 205.185.113.129 port 54652 Jan 18 15:20:10 host sshd[17198]: input_userauth_request: invalid user backuprestore [preauth] Jan 18 15:20:10 host sshd[17198]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:20:10 host sshd[17198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 18 15:20:12 host sshd[17198]: Failed password for invalid user backuprestore from 205.185.113.129 port 54652 ssh2 Jan 18 15:20:13 host sshd[17198]: Connection closed by 205.185.113.129 port 54652 [preauth] Jan 18 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 15:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 15:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 15:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=shalinijames user-3=wwwtestugo user-4=pmcresources user-5=wwwkmaorg user-6=disposeat user-7=remysagr user-8=wwwkapin user-9=woodpeck user-10=palco123 user-11=gifterman user-12=kottayamcalldriv user-13=phmetals user-14=mrsclean user-15=wwwnexidigital user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 15:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 15:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 15:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mtLW7CcQwYHFlXIs.~ Jan 18 15:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mtLW7CcQwYHFlXIs.~' Jan 18 15:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-mtLW7CcQwYHFlXIs.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 15:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 15:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 15:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 15:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 15:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 15:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 15:28:15 host sshd[18723]: Connection reset by 126.28.12.129 port 34639 [preauth] Jan 18 15:31:34 host sshd[19331]: User root from 121.159.193.163 not allowed because not listed in AllowUsers Jan 18 15:31:34 host sshd[19331]: input_userauth_request: invalid user root [preauth] Jan 18 15:31:34 host unix_chkpwd[19339]: password check failed for user (root) Jan 18 15:31:34 host sshd[19331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.159.193.163 user=root Jan 18 15:31:34 host sshd[19331]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 15:31:36 host sshd[19331]: Failed password for invalid user root from 121.159.193.163 port 61978 ssh2 Jan 18 15:31:37 host sshd[19331]: Connection reset by 121.159.193.163 port 61978 [preauth] Jan 18 15:36:22 host sshd[20086]: Invalid user terry from 209.141.56.48 port 52926 Jan 18 15:36:22 host sshd[20086]: input_userauth_request: invalid user terry [preauth] Jan 18 15:36:22 host sshd[20086]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:36:22 host sshd[20086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 18 15:36:24 host sshd[20086]: Failed password for invalid user terry from 209.141.56.48 port 52926 ssh2 Jan 18 15:36:24 host sshd[20086]: Connection closed by 209.141.56.48 port 52926 [preauth] Jan 18 15:38:42 host sshd[20384]: Invalid user terry from 209.141.56.48 port 56556 Jan 18 15:38:42 host sshd[20384]: input_userauth_request: invalid user terry [preauth] Jan 18 15:38:42 host sshd[20384]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:38:42 host sshd[20384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 18 15:38:44 host sshd[20384]: Failed password for invalid user terry from 209.141.56.48 port 56556 ssh2 Jan 18 15:38:44 host sshd[20384]: Connection closed by 209.141.56.48 port 56556 [preauth] Jan 18 15:46:08 host sshd[21510]: Invalid user fz from 194.110.203.109 port 39910 Jan 18 15:46:08 host sshd[21510]: input_userauth_request: invalid user fz [preauth] Jan 18 15:46:08 host sshd[21510]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:46:08 host sshd[21510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 15:46:09 host sshd[21510]: Failed password for invalid user fz from 194.110.203.109 port 39910 ssh2 Jan 18 15:46:12 host sshd[21510]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:46:15 host sshd[21510]: Failed password for invalid user fz from 194.110.203.109 port 39910 ssh2 Jan 18 15:46:18 host sshd[21510]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:46:20 host sshd[21510]: Failed password for invalid user fz from 194.110.203.109 port 39910 ssh2 Jan 18 15:46:23 host sshd[21510]: Connection closed by 194.110.203.109 port 39910 [preauth] Jan 18 15:46:23 host sshd[21510]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 15:53:35 host sshd[22622]: Invalid user admin from 59.126.185.56 port 34778 Jan 18 15:53:35 host sshd[22622]: input_userauth_request: invalid user admin [preauth] Jan 18 15:53:35 host sshd[22622]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:53:35 host sshd[22622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.185.56 Jan 18 15:53:37 host sshd[22622]: Failed password for invalid user admin from 59.126.185.56 port 34778 ssh2 Jan 18 15:53:37 host sshd[22622]: Failed password for invalid user admin from 59.126.185.56 port 34778 ssh2 Jan 18 15:53:38 host sshd[22622]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:53:40 host sshd[22622]: Failed password for invalid user admin from 59.126.185.56 port 34778 ssh2 Jan 18 15:53:41 host sshd[22622]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:53:42 host sshd[22622]: Failed password for invalid user admin from 59.126.185.56 port 34778 ssh2 Jan 18 15:53:43 host sshd[22622]: pam_unix(sshd:auth): check pass; user unknown Jan 18 15:53:45 host sshd[22622]: Failed password for invalid user admin from 59.126.185.56 port 34778 ssh2 Jan 18 16:07:23 host sshd[24630]: Invalid user elasticsearch from 14.99.4.82 port 50708 Jan 18 16:07:23 host sshd[24630]: input_userauth_request: invalid user elasticsearch [preauth] Jan 18 16:07:23 host sshd[24630]: pam_unix(sshd:auth): check pass; user unknown Jan 18 16:07:23 host sshd[24630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.4.82 Jan 18 16:07:24 host sshd[24630]: Failed password for invalid user elasticsearch from 14.99.4.82 port 50708 ssh2 Jan 18 16:07:24 host sshd[24630]: Received disconnect from 14.99.4.82 port 50708:11: Bye Bye [preauth] Jan 18 16:07:24 host sshd[24630]: Disconnected from 14.99.4.82 port 50708 [preauth] Jan 18 16:08:44 host sshd[24790]: Invalid user ec2-user from 79.45.153.175 port 39157 Jan 18 16:08:44 host sshd[24790]: input_userauth_request: invalid user ec2-user [preauth] Jan 18 16:08:44 host sshd[24790]: pam_unix(sshd:auth): check pass; user unknown Jan 18 16:08:44 host sshd[24790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.45.153.175 Jan 18 16:08:47 host sshd[24790]: Failed password for invalid user ec2-user from 79.45.153.175 port 39157 ssh2 Jan 18 16:08:47 host sshd[24790]: pam_unix(sshd:auth): check pass; user unknown Jan 18 16:08:49 host sshd[24790]: Failed password for invalid user ec2-user from 79.45.153.175 port 39157 ssh2 Jan 18 16:08:50 host sshd[24790]: Connection reset by 79.45.153.175 port 39157 [preauth] Jan 18 16:08:50 host sshd[24790]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.45.153.175 Jan 18 16:09:59 host sshd[24925]: User root from 202.83.17.243 not allowed because not listed in AllowUsers Jan 18 16:09:59 host sshd[24925]: input_userauth_request: invalid user root [preauth] Jan 18 16:09:59 host unix_chkpwd[24927]: password check failed for user (root) Jan 18 16:09:59 host sshd[24925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.17.243 user=root Jan 18 16:09:59 host sshd[24925]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 16:10:01 host sshd[24925]: Failed password for invalid user root from 202.83.17.243 port 57062 ssh2 Jan 18 16:10:01 host sshd[24925]: Received disconnect from 202.83.17.243 port 57062:11: Bye Bye [preauth] Jan 18 16:10:01 host sshd[24925]: Disconnected from 202.83.17.243 port 57062 [preauth] Jan 18 16:11:31 host sshd[25211]: Invalid user deamon from 14.99.4.82 port 54656 Jan 18 16:11:31 host sshd[25211]: input_userauth_request: invalid user deamon [preauth] Jan 18 16:11:31 host sshd[25211]: pam_unix(sshd:auth): check pass; user unknown Jan 18 16:11:31 host sshd[25211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.4.82 Jan 18 16:11:33 host sshd[25211]: Failed password for invalid user deamon from 14.99.4.82 port 54656 ssh2 Jan 18 16:11:33 host sshd[25211]: Received disconnect from 14.99.4.82 port 54656:11: Bye Bye [preauth] Jan 18 16:11:33 host sshd[25211]: Disconnected from 14.99.4.82 port 54656 [preauth] Jan 18 16:12:08 host sshd[25278]: Invalid user ubuntu from 61.80.194.115 port 60036 Jan 18 16:12:08 host sshd[25278]: input_userauth_request: invalid user ubuntu [preauth] Jan 18 16:12:08 host sshd[25278]: pam_unix(sshd:auth): check pass; user unknown Jan 18 16:12:08 host sshd[25278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.80.194.115 Jan 18 16:12:10 host sshd[25278]: Failed password for invalid user ubuntu from 61.80.194.115 port 60036 ssh2 Jan 18 16:12:10 host sshd[25278]: Connection reset by 61.80.194.115 port 60036 [preauth] Jan 18 16:12:56 host sshd[25363]: User root from 202.83.17.243 not allowed because not listed in AllowUsers Jan 18 16:12:56 host sshd[25363]: input_userauth_request: invalid user root [preauth] Jan 18 16:12:56 host unix_chkpwd[25365]: password check failed for user (root) Jan 18 16:12:56 host sshd[25363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.83.17.243 user=root Jan 18 16:12:56 host sshd[25363]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 16:12:59 host sshd[25363]: Failed password for invalid user root from 202.83.17.243 port 52084 ssh2 Jan 18 16:12:59 host sshd[25363]: Received disconnect from 202.83.17.243 port 52084:11: Bye Bye [preauth] Jan 18 16:12:59 host sshd[25363]: Disconnected from 202.83.17.243 port 52084 [preauth] Jan 18 16:15:09 host sshd[25656]: Invalid user nginx from 122.117.50.131 port 56519 Jan 18 16:15:09 host sshd[25656]: input_userauth_request: invalid user nginx [preauth] Jan 18 16:15:09 host sshd[25656]: pam_unix(sshd:auth): check pass; user unknown Jan 18 16:15:09 host sshd[25656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.50.131 Jan 18 16:15:11 host sshd[25656]: Failed password for invalid user nginx from 122.117.50.131 port 56519 ssh2 Jan 18 16:15:12 host sshd[25656]: pam_unix(sshd:auth): check pass; user unknown Jan 18 16:15:14 host sshd[25656]: Failed password for invalid user nginx from 122.117.50.131 port 56519 ssh2 Jan 18 16:15:15 host sshd[25656]: Connection reset by 122.117.50.131 port 56519 [preauth] Jan 18 16:15:15 host sshd[25656]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.50.131 Jan 18 16:15:53 host sshd[25868]: User root from 14.99.4.82 not allowed because not listed in AllowUsers Jan 18 16:15:53 host sshd[25868]: input_userauth_request: invalid user root [preauth] Jan 18 16:15:53 host unix_chkpwd[25870]: password check failed for user (root) Jan 18 16:15:53 host sshd[25868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.99.4.82 user=root Jan 18 16:15:53 host sshd[25868]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 16:15:56 host sshd[25868]: Failed password for invalid user root from 14.99.4.82 port 47108 ssh2 Jan 18 16:15:56 host sshd[25868]: Received disconnect from 14.99.4.82 port 47108:11: Bye Bye [preauth] Jan 18 16:15:56 host sshd[25868]: Disconnected from 14.99.4.82 port 47108 [preauth] Jan 18 16:18:48 host sshd[26243]: User root from 103.224.36.226 not allowed because not listed in AllowUsers Jan 18 16:18:48 host sshd[26243]: input_userauth_request: invalid user root [preauth] Jan 18 16:18:48 host unix_chkpwd[26248]: password check failed for user (root) Jan 18 16:18:48 host sshd[26243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.224.36.226 user=root Jan 18 16:18:48 host sshd[26243]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 16:18:49 host sshd[26243]: Failed password for invalid user root from 103.224.36.226 port 41964 ssh2 Jan 18 16:18:49 host sshd[26243]: Received disconnect from 103.224.36.226 port 41964:11: Bye Bye [preauth] Jan 18 16:18:49 host sshd[26243]: Disconnected from 103.224.36.226 port 41964 [preauth] Jan 18 16:19:40 host sshd[26342]: Invalid user support from 114.34.195.135 port 44804 Jan 18 16:19:40 host sshd[26342]: input_userauth_request: invalid user support [preauth] Jan 18 16:19:40 host sshd[26342]: pam_unix(sshd:auth): check pass; user unknown Jan 18 16:19:40 host sshd[26342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.195.135 Jan 18 16:19:41 host sshd[26342]: Failed password for invalid user support from 114.34.195.135 port 44804 ssh2 Jan 18 16:19:42 host sshd[26342]: pam_unix(sshd:auth): check pass; user unknown Jan 18 16:19:44 host sshd[26342]: Failed password for invalid user support from 114.34.195.135 port 44804 ssh2 Jan 18 16:19:45 host sshd[26342]: Connection reset by 114.34.195.135 port 44804 [preauth] Jan 18 16:19:45 host sshd[26342]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.195.135 Jan 18 16:20:10 host sshd[26420]: Invalid user informix from 103.224.36.226 port 39204 Jan 18 16:20:10 host sshd[26420]: input_userauth_request: invalid user informix [preauth] Jan 18 16:20:10 host sshd[26420]: pam_unix(sshd:auth): check pass; user unknown Jan 18 16:20:10 host sshd[26420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.224.36.226 Jan 18 16:20:12 host sshd[26420]: Failed password for invalid user informix from 103.224.36.226 port 39204 ssh2 Jan 18 16:20:12 host sshd[26420]: Received disconnect from 103.224.36.226 port 39204:11: Bye Bye [preauth] Jan 18 16:20:12 host sshd[26420]: Disconnected from 103.224.36.226 port 39204 [preauth] Jan 18 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 16:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 16:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 16:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=ugotscom user-8=wwwrmswll user-9=wwwresourcehunte user-10=keralaholi user-11=wwwpmcresource user-12=wwwtestugo user-13=shalinijames user-14=vfmassets user-15=pmcresources user-16=remysagr user-17=disposeat user-18=wwwkmaorg user-19=wwwkapin user-20=woodpeck user-21=kottayamcalldriv user-22=phmetals user-23=gifterman user-24=palco123 user-25=mrsclean user-26=wwwnexidigital user-27=wwwevmhonda user-28=bonifacegroup user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 16:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 16:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 16:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Z4NOXfbVaNVDiXul.~ Jan 18 16:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Z4NOXfbVaNVDiXul.~' Jan 18 16:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Z4NOXfbVaNVDiXul.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 16:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 16:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 16:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 16:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 16:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 16:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 16:28:07 host sshd[27782]: Invalid user admin from 181.111.20.111 port 49878 Jan 18 16:28:07 host sshd[27782]: input_userauth_request: invalid user admin [preauth] Jan 18 16:28:07 host sshd[27782]: pam_unix(sshd:auth): check pass; user unknown Jan 18 16:28:07 host sshd[27782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.111.20.111 Jan 18 16:28:08 host sshd[27782]: Failed password for invalid user admin from 181.111.20.111 port 49878 ssh2 Jan 18 16:28:10 host sshd[27782]: Connection reset by 181.111.20.111 port 49878 [preauth] Jan 18 16:39:56 host sshd[29326]: Invalid user dnsekakf2$$ from 49.213.248.204 port 56712 Jan 18 16:39:56 host sshd[29326]: input_userauth_request: invalid user dnsekakf2$$ [preauth] Jan 18 16:39:56 host sshd[29326]: pam_unix(sshd:auth): check pass; user unknown Jan 18 16:39:56 host sshd[29326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.213.248.204 Jan 18 16:39:58 host sshd[29326]: Failed password for invalid user dnsekakf2$$ from 49.213.248.204 port 56712 ssh2 Jan 18 16:39:59 host sshd[29326]: Failed password for invalid user dnsekakf2$$ from 49.213.248.204 port 56712 ssh2 Jan 18 16:39:59 host sshd[29326]: Connection closed by 49.213.248.204 port 56712 [preauth] Jan 18 16:42:21 host sshd[29735]: Invalid user zyfwp from 114.33.66.157 port 56120 Jan 18 16:42:21 host sshd[29735]: input_userauth_request: invalid user zyfwp [preauth] Jan 18 16:42:21 host sshd[29735]: pam_unix(sshd:auth): check pass; user unknown Jan 18 16:42:21 host sshd[29735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.66.157 Jan 18 16:42:23 host sshd[29735]: Failed password for invalid user zyfwp from 114.33.66.157 port 56120 ssh2 Jan 18 16:42:24 host sshd[29735]: Connection reset by 114.33.66.157 port 56120 [preauth] Jan 18 16:43:28 host sshd[29860]: Invalid user admin from 175.203.118.149 port 43290 Jan 18 16:43:28 host sshd[29860]: input_userauth_request: invalid user admin [preauth] Jan 18 16:43:28 host sshd[29860]: pam_unix(sshd:auth): check pass; user unknown Jan 18 16:43:28 host sshd[29860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.203.118.149 Jan 18 16:43:30 host sshd[29860]: Failed password for invalid user admin from 175.203.118.149 port 43290 ssh2 Jan 18 16:43:31 host sshd[29860]: Failed password for invalid user admin from 175.203.118.149 port 43290 ssh2 Jan 18 16:43:31 host sshd[29860]: Connection reset by 175.203.118.149 port 43290 [preauth] Jan 18 16:51:08 host sshd[30947]: Invalid user user from 110.239.141.231 port 35263 Jan 18 16:51:08 host sshd[30947]: input_userauth_request: invalid user user [preauth] Jan 18 16:51:08 host sshd[30947]: pam_unix(sshd:auth): check pass; user unknown Jan 18 16:51:08 host sshd[30947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.239.141.231 Jan 18 16:51:11 host sshd[30947]: Failed password for invalid user user from 110.239.141.231 port 35263 ssh2 Jan 18 16:51:11 host sshd[30947]: Connection closed by 110.239.141.231 port 35263 [preauth] Jan 18 16:57:25 host sshd[31792]: User root from 59.126.249.176 not allowed because not listed in AllowUsers Jan 18 16:57:25 host sshd[31792]: input_userauth_request: invalid user root [preauth] Jan 18 16:57:25 host unix_chkpwd[31795]: password check failed for user (root) Jan 18 16:57:25 host sshd[31792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.249.176 user=root Jan 18 16:57:25 host sshd[31792]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 16:57:27 host sshd[31792]: Failed password for invalid user root from 59.126.249.176 port 46807 ssh2 Jan 18 16:57:28 host unix_chkpwd[31819]: password check failed for user (root) Jan 18 16:57:28 host sshd[31792]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 16:57:30 host sshd[31792]: Failed password for invalid user root from 59.126.249.176 port 46807 ssh2 Jan 18 16:57:30 host sshd[31792]: Connection reset by 59.126.249.176 port 46807 [preauth] Jan 18 16:57:30 host sshd[31792]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.249.176 user=root Jan 18 17:06:50 host sshd[793]: Did not receive identification string from 143.110.189.156 port 37922 Jan 18 17:07:23 host sshd[853]: Invalid user admin from 143.110.189.156 port 60730 Jan 18 17:07:23 host sshd[853]: input_userauth_request: invalid user admin [preauth] Jan 18 17:07:23 host sshd[853]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:07:23 host sshd[853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.189.156 Jan 18 17:07:26 host sshd[853]: Failed password for invalid user admin from 143.110.189.156 port 60730 ssh2 Jan 18 17:07:26 host sshd[853]: Connection closed by 143.110.189.156 port 60730 [preauth] Jan 18 17:07:40 host sshd[890]: Invalid user dnsekakf2$$ from 81.10.112.130 port 35430 Jan 18 17:07:40 host sshd[890]: input_userauth_request: invalid user dnsekakf2$$ [preauth] Jan 18 17:07:40 host sshd[890]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:07:40 host sshd[890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.10.112.130 Jan 18 17:07:42 host sshd[890]: Failed password for invalid user dnsekakf2$$ from 81.10.112.130 port 35430 ssh2 Jan 18 17:07:43 host sshd[890]: Connection reset by 81.10.112.130 port 35430 [preauth] Jan 18 17:08:08 host sshd[940]: Invalid user admin from 143.110.189.156 port 44510 Jan 18 17:08:08 host sshd[940]: input_userauth_request: invalid user admin [preauth] Jan 18 17:08:08 host sshd[940]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:08:08 host sshd[940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.189.156 Jan 18 17:08:10 host sshd[940]: Failed password for invalid user admin from 143.110.189.156 port 44510 ssh2 Jan 18 17:08:10 host sshd[940]: Connection closed by 143.110.189.156 port 44510 [preauth] Jan 18 17:10:44 host sshd[1416]: Invalid user admin from 211.24.100.56 port 42721 Jan 18 17:10:44 host sshd[1416]: input_userauth_request: invalid user admin [preauth] Jan 18 17:10:45 host sshd[1416]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:10:45 host sshd[1416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.24.100.56 Jan 18 17:10:46 host sshd[1416]: Failed password for invalid user admin from 211.24.100.56 port 42721 ssh2 Jan 18 17:10:47 host sshd[1416]: Connection closed by 211.24.100.56 port 42721 [preauth] Jan 18 17:13:31 host sshd[1787]: User root from 114.34.125.68 not allowed because not listed in AllowUsers Jan 18 17:13:31 host sshd[1787]: input_userauth_request: invalid user root [preauth] Jan 18 17:13:31 host unix_chkpwd[1794]: password check failed for user (root) Jan 18 17:13:31 host sshd[1787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.125.68 user=root Jan 18 17:13:31 host sshd[1787]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 17:13:33 host sshd[1787]: Failed password for invalid user root from 114.34.125.68 port 33952 ssh2 Jan 18 17:13:33 host unix_chkpwd[1807]: password check failed for user (root) Jan 18 17:13:33 host sshd[1787]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 17:13:36 host sshd[1787]: Failed password for invalid user root from 114.34.125.68 port 33952 ssh2 Jan 18 17:13:36 host unix_chkpwd[1811]: password check failed for user (root) Jan 18 17:13:36 host sshd[1787]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 17:13:38 host sshd[1787]: Failed password for invalid user root from 114.34.125.68 port 33952 ssh2 Jan 18 17:13:40 host unix_chkpwd[1818]: password check failed for user (root) Jan 18 17:13:40 host sshd[1787]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 17:13:42 host sshd[1787]: Failed password for invalid user root from 114.34.125.68 port 33952 ssh2 Jan 18 17:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=wwwevmhonda user-4=bonifacegroup user-5=mrsclean user-6=wwwnexidigital user-7=phmetals user-8=kottayamcalldriv user-9=gifterman user-10=palco123 user-11=wwwkapin user-12=woodpeck user-13=remysagr user-14=disposeat user-15=wwwkmaorg user-16=pmcresources user-17=wwwtestugo user-18=shalinijames user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=wwwrmswll user-23=wwwresourcehunte user-24=keralaholi user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 17:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bBTwiuPlCWiHYbgi.~ Jan 18 17:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bBTwiuPlCWiHYbgi.~' Jan 18 17:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bBTwiuPlCWiHYbgi.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 17:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 17:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 17:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 17:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 17:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 17:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 17:21:29 host sshd[3241]: Invalid user pi from 176.149.224.221 port 44170 Jan 18 17:21:29 host sshd[3241]: input_userauth_request: invalid user pi [preauth] Jan 18 17:21:29 host sshd[3243]: Invalid user pi from 176.149.224.221 port 44176 Jan 18 17:21:29 host sshd[3243]: input_userauth_request: invalid user pi [preauth] Jan 18 17:21:30 host sshd[3241]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:21:30 host sshd[3241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.149.224.221 Jan 18 17:21:30 host sshd[3243]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:21:30 host sshd[3243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.149.224.221 Jan 18 17:21:31 host sshd[3241]: Failed password for invalid user pi from 176.149.224.221 port 44170 ssh2 Jan 18 17:21:31 host sshd[3243]: Failed password for invalid user pi from 176.149.224.221 port 44176 ssh2 Jan 18 17:21:31 host sshd[3241]: Connection closed by 176.149.224.221 port 44170 [preauth] Jan 18 17:21:32 host sshd[3243]: Connection closed by 176.149.224.221 port 44176 [preauth] Jan 18 17:22:33 host sshd[3361]: Invalid user glenn from 107.189.30.59 port 44084 Jan 18 17:22:33 host sshd[3361]: input_userauth_request: invalid user glenn [preauth] Jan 18 17:22:33 host sshd[3361]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:22:33 host sshd[3361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 18 17:22:35 host sshd[3361]: Failed password for invalid user glenn from 107.189.30.59 port 44084 ssh2 Jan 18 17:22:36 host sshd[3361]: Connection closed by 107.189.30.59 port 44084 [preauth] Jan 18 17:29:22 host sshd[4290]: User root from 183.80.11.233 not allowed because not listed in AllowUsers Jan 18 17:29:22 host sshd[4290]: input_userauth_request: invalid user root [preauth] Jan 18 17:29:22 host unix_chkpwd[4294]: password check failed for user (root) Jan 18 17:29:22 host sshd[4290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.80.11.233 user=root Jan 18 17:29:22 host sshd[4290]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 17:29:25 host sshd[4290]: Failed password for invalid user root from 183.80.11.233 port 43034 ssh2 Jan 18 17:29:25 host sshd[4290]: Connection closed by 183.80.11.233 port 43034 [preauth] Jan 18 17:36:18 host sshd[5253]: Invalid user g from 194.110.203.109 port 59104 Jan 18 17:36:18 host sshd[5253]: input_userauth_request: invalid user g [preauth] Jan 18 17:36:18 host sshd[5253]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:36:18 host sshd[5253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 17:36:20 host sshd[5253]: Failed password for invalid user g from 194.110.203.109 port 59104 ssh2 Jan 18 17:36:23 host sshd[5253]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:36:25 host sshd[5253]: Failed password for invalid user g from 194.110.203.109 port 59104 ssh2 Jan 18 17:36:28 host sshd[5253]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:36:31 host sshd[5253]: Failed password for invalid user g from 194.110.203.109 port 59104 ssh2 Jan 18 17:36:34 host sshd[5253]: Connection closed by 194.110.203.109 port 59104 [preauth] Jan 18 17:36:34 host sshd[5253]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 17:36:47 host sshd[5301]: Invalid user admin from 125.228.178.73 port 49096 Jan 18 17:36:47 host sshd[5301]: input_userauth_request: invalid user admin [preauth] Jan 18 17:36:47 host sshd[5301]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:36:47 host sshd[5301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.178.73 Jan 18 17:36:50 host sshd[5301]: Failed password for invalid user admin from 125.228.178.73 port 49096 ssh2 Jan 18 17:36:51 host sshd[5301]: Failed password for invalid user admin from 125.228.178.73 port 49096 ssh2 Jan 18 17:36:52 host sshd[5301]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:36:54 host sshd[5301]: Failed password for invalid user admin from 125.228.178.73 port 49096 ssh2 Jan 18 17:36:55 host sshd[5301]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:36:56 host sshd[5301]: Failed password for invalid user admin from 125.228.178.73 port 49096 ssh2 Jan 18 17:36:58 host sshd[5301]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:37:00 host sshd[5301]: Failed password for invalid user admin from 125.228.178.73 port 49096 ssh2 Jan 18 17:40:19 host sshd[5909]: Invalid user conectar from 43.134.186.121 port 48578 Jan 18 17:40:19 host sshd[5909]: input_userauth_request: invalid user conectar [preauth] Jan 18 17:40:19 host sshd[5909]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:40:19 host sshd[5909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.186.121 Jan 18 17:40:21 host sshd[5909]: Failed password for invalid user conectar from 43.134.186.121 port 48578 ssh2 Jan 18 17:40:21 host sshd[5909]: Received disconnect from 43.134.186.121 port 48578:11: Bye Bye [preauth] Jan 18 17:40:21 host sshd[5909]: Disconnected from 43.134.186.121 port 48578 [preauth] Jan 18 17:40:41 host sshd[5961]: Invalid user docker from 104.248.51.246 port 51358 Jan 18 17:40:41 host sshd[5961]: input_userauth_request: invalid user docker [preauth] Jan 18 17:40:41 host sshd[5961]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:40:41 host sshd[5961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.51.246 Jan 18 17:40:43 host sshd[5961]: Failed password for invalid user docker from 104.248.51.246 port 51358 ssh2 Jan 18 17:40:43 host sshd[5961]: Received disconnect from 104.248.51.246 port 51358:11: Bye Bye [preauth] Jan 18 17:40:43 host sshd[5961]: Disconnected from 104.248.51.246 port 51358 [preauth] Jan 18 17:41:11 host sshd[6033]: Invalid user hadoop from 80.87.33.100 port 35650 Jan 18 17:41:11 host sshd[6033]: input_userauth_request: invalid user hadoop [preauth] Jan 18 17:41:11 host sshd[6033]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:41:11 host sshd[6033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.87.33.100 Jan 18 17:41:13 host sshd[6033]: Failed password for invalid user hadoop from 80.87.33.100 port 35650 ssh2 Jan 18 17:41:13 host sshd[6033]: Received disconnect from 80.87.33.100 port 35650:11: Bye Bye [preauth] Jan 18 17:41:13 host sshd[6033]: Disconnected from 80.87.33.100 port 35650 [preauth] Jan 18 17:41:22 host sshd[6051]: User root from 51.38.226.20 not allowed because not listed in AllowUsers Jan 18 17:41:22 host sshd[6051]: input_userauth_request: invalid user root [preauth] Jan 18 17:41:22 host unix_chkpwd[6053]: password check failed for user (root) Jan 18 17:41:22 host sshd[6051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.226.20 user=root Jan 18 17:41:22 host sshd[6051]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 17:41:24 host sshd[6051]: Failed password for invalid user root from 51.38.226.20 port 36180 ssh2 Jan 18 17:41:24 host sshd[6051]: Received disconnect from 51.38.226.20 port 36180:11: Bye Bye [preauth] Jan 18 17:41:24 host sshd[6051]: Disconnected from 51.38.226.20 port 36180 [preauth] Jan 18 17:41:30 host sshd[6082]: Invalid user app from 34.125.201.253 port 59776 Jan 18 17:41:30 host sshd[6082]: input_userauth_request: invalid user app [preauth] Jan 18 17:41:30 host sshd[6082]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:41:30 host sshd[6082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.125.201.253 Jan 18 17:41:32 host sshd[6082]: Failed password for invalid user app from 34.125.201.253 port 59776 ssh2 Jan 18 17:41:32 host sshd[6082]: Received disconnect from 34.125.201.253 port 59776:11: Bye Bye [preauth] Jan 18 17:41:32 host sshd[6082]: Disconnected from 34.125.201.253 port 59776 [preauth] Jan 18 17:43:34 host sshd[6433]: Invalid user weblogic from 92.27.157.252 port 43411 Jan 18 17:43:34 host sshd[6433]: input_userauth_request: invalid user weblogic [preauth] Jan 18 17:43:34 host sshd[6433]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:43:34 host sshd[6433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.27.157.252 Jan 18 17:43:36 host sshd[6433]: Failed password for invalid user weblogic from 92.27.157.252 port 43411 ssh2 Jan 18 17:43:36 host sshd[6433]: Received disconnect from 92.27.157.252 port 43411:11: Bye Bye [preauth] Jan 18 17:43:36 host sshd[6433]: Disconnected from 92.27.157.252 port 43411 [preauth] Jan 18 17:45:13 host sshd[6637]: Invalid user cat from 202.64.141.218 port 41698 Jan 18 17:45:13 host sshd[6637]: input_userauth_request: invalid user cat [preauth] Jan 18 17:45:13 host sshd[6637]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:45:13 host sshd[6637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.64.141.218 Jan 18 17:45:15 host sshd[6637]: Failed password for invalid user cat from 202.64.141.218 port 41698 ssh2 Jan 18 17:45:15 host sshd[6637]: Received disconnect from 202.64.141.218 port 41698:11: Bye Bye [preauth] Jan 18 17:45:15 host sshd[6637]: Disconnected from 202.64.141.218 port 41698 [preauth] Jan 18 17:46:14 host sshd[6744]: User root from 104.248.51.246 not allowed because not listed in AllowUsers Jan 18 17:46:14 host sshd[6744]: input_userauth_request: invalid user root [preauth] Jan 18 17:46:15 host unix_chkpwd[6747]: password check failed for user (root) Jan 18 17:46:15 host sshd[6744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.51.246 user=root Jan 18 17:46:15 host sshd[6744]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 17:46:17 host sshd[6744]: Failed password for invalid user root from 104.248.51.246 port 57724 ssh2 Jan 18 17:46:17 host sshd[6744]: Received disconnect from 104.248.51.246 port 57724:11: Bye Bye [preauth] Jan 18 17:46:17 host sshd[6744]: Disconnected from 104.248.51.246 port 57724 [preauth] Jan 18 17:46:23 host sshd[6788]: User root from 34.125.201.253 not allowed because not listed in AllowUsers Jan 18 17:46:23 host sshd[6788]: input_userauth_request: invalid user root [preauth] Jan 18 17:46:23 host unix_chkpwd[6792]: password check failed for user (root) Jan 18 17:46:23 host sshd[6788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.125.201.253 user=root Jan 18 17:46:23 host sshd[6788]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 17:46:25 host sshd[6788]: Failed password for invalid user root from 34.125.201.253 port 60120 ssh2 Jan 18 17:46:26 host sshd[6788]: Received disconnect from 34.125.201.253 port 60120:11: Bye Bye [preauth] Jan 18 17:46:26 host sshd[6788]: Disconnected from 34.125.201.253 port 60120 [preauth] Jan 18 17:46:40 host sshd[6865]: Invalid user ansible from 43.134.186.121 port 46834 Jan 18 17:46:40 host sshd[6865]: input_userauth_request: invalid user ansible [preauth] Jan 18 17:46:40 host sshd[6865]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:46:40 host sshd[6865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.186.121 Jan 18 17:46:42 host sshd[6865]: Failed password for invalid user ansible from 43.134.186.121 port 46834 ssh2 Jan 18 17:46:42 host sshd[6865]: Received disconnect from 43.134.186.121 port 46834:11: Bye Bye [preauth] Jan 18 17:46:42 host sshd[6865]: Disconnected from 43.134.186.121 port 46834 [preauth] Jan 18 17:46:53 host sshd[6883]: Invalid user weblogic from 80.87.33.100 port 60204 Jan 18 17:46:53 host sshd[6883]: input_userauth_request: invalid user weblogic [preauth] Jan 18 17:46:53 host sshd[6883]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:46:53 host sshd[6883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.87.33.100 Jan 18 17:46:55 host sshd[6883]: Failed password for invalid user weblogic from 80.87.33.100 port 60204 ssh2 Jan 18 17:46:55 host sshd[6883]: Received disconnect from 80.87.33.100 port 60204:11: Bye Bye [preauth] Jan 18 17:46:55 host sshd[6883]: Disconnected from 80.87.33.100 port 60204 [preauth] Jan 18 17:47:02 host sshd[6906]: Invalid user hadoop from 51.38.226.20 port 33204 Jan 18 17:47:02 host sshd[6906]: input_userauth_request: invalid user hadoop [preauth] Jan 18 17:47:02 host sshd[6906]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:47:02 host sshd[6906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.226.20 Jan 18 17:47:04 host sshd[6906]: Failed password for invalid user hadoop from 51.38.226.20 port 33204 ssh2 Jan 18 17:47:05 host sshd[6906]: Received disconnect from 51.38.226.20 port 33204:11: Bye Bye [preauth] Jan 18 17:47:05 host sshd[6906]: Disconnected from 51.38.226.20 port 33204 [preauth] Jan 18 17:47:10 host sshd[6923]: User root from 92.27.157.252 not allowed because not listed in AllowUsers Jan 18 17:47:10 host sshd[6923]: input_userauth_request: invalid user root [preauth] Jan 18 17:47:10 host unix_chkpwd[6991]: password check failed for user (root) Jan 18 17:47:10 host sshd[6923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.27.157.252 user=root Jan 18 17:47:10 host sshd[6923]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 17:47:12 host sshd[6923]: Failed password for invalid user root from 92.27.157.252 port 36819 ssh2 Jan 18 17:47:12 host sshd[6923]: Received disconnect from 92.27.157.252 port 36819:11: Bye Bye [preauth] Jan 18 17:47:12 host sshd[6923]: Disconnected from 92.27.157.252 port 36819 [preauth] Jan 18 17:47:24 host sshd[7090]: User root from 202.64.141.218 not allowed because not listed in AllowUsers Jan 18 17:47:24 host sshd[7090]: input_userauth_request: invalid user root [preauth] Jan 18 17:47:24 host unix_chkpwd[7093]: password check failed for user (root) Jan 18 17:47:24 host sshd[7090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.64.141.218 user=root Jan 18 17:47:24 host sshd[7090]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 17:47:26 host sshd[7090]: Failed password for invalid user root from 202.64.141.218 port 44828 ssh2 Jan 18 17:47:26 host sshd[7090]: Received disconnect from 202.64.141.218 port 44828:11: Bye Bye [preauth] Jan 18 17:47:26 host sshd[7090]: Disconnected from 202.64.141.218 port 44828 [preauth] Jan 18 17:47:43 host sshd[7165]: Invalid user support from 173.56.122.212 port 51801 Jan 18 17:47:43 host sshd[7165]: input_userauth_request: invalid user support [preauth] Jan 18 17:47:44 host sshd[7165]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:47:44 host sshd[7165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.56.122.212 Jan 18 17:47:45 host sshd[7165]: Failed password for invalid user support from 173.56.122.212 port 51801 ssh2 Jan 18 17:47:46 host sshd[7165]: Connection closed by 173.56.122.212 port 51801 [preauth] Jan 18 17:47:55 host sshd[7185]: User root from 43.134.186.121 not allowed because not listed in AllowUsers Jan 18 17:47:55 host sshd[7185]: input_userauth_request: invalid user root [preauth] Jan 18 17:47:55 host unix_chkpwd[7187]: password check failed for user (root) Jan 18 17:47:55 host sshd[7185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.186.121 user=root Jan 18 17:47:55 host sshd[7185]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 17:47:57 host sshd[7185]: Failed password for invalid user root from 43.134.186.121 port 37554 ssh2 Jan 18 17:47:57 host sshd[7185]: Received disconnect from 43.134.186.121 port 37554:11: Bye Bye [preauth] Jan 18 17:47:57 host sshd[7185]: Disconnected from 43.134.186.121 port 37554 [preauth] Jan 18 17:48:03 host sshd[7237]: User root from 80.87.33.100 not allowed because not listed in AllowUsers Jan 18 17:48:03 host sshd[7237]: input_userauth_request: invalid user root [preauth] Jan 18 17:48:03 host unix_chkpwd[7240]: password check failed for user (root) Jan 18 17:48:03 host sshd[7237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.87.33.100 user=root Jan 18 17:48:03 host sshd[7237]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 17:48:04 host sshd[7237]: Failed password for invalid user root from 80.87.33.100 port 54326 ssh2 Jan 18 17:48:05 host sshd[7237]: Received disconnect from 80.87.33.100 port 54326:11: Bye Bye [preauth] Jan 18 17:48:05 host sshd[7237]: Disconnected from 80.87.33.100 port 54326 [preauth] Jan 18 17:48:46 host sshd[7358]: Did not receive identification string from 1.116.135.59 port 37788 Jan 18 17:51:58 host sshd[7799]: Invalid user oracle from 149.90.157.108 port 44633 Jan 18 17:51:58 host sshd[7799]: input_userauth_request: invalid user oracle [preauth] Jan 18 17:51:59 host sshd[7799]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:51:59 host sshd[7799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.90.157.108 Jan 18 17:52:01 host sshd[7799]: Failed password for invalid user oracle from 149.90.157.108 port 44633 ssh2 Jan 18 17:52:01 host sshd[7799]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:52:03 host sshd[7799]: Failed password for invalid user oracle from 149.90.157.108 port 44633 ssh2 Jan 18 17:52:04 host sshd[7799]: pam_unix(sshd:auth): check pass; user unknown Jan 18 17:52:06 host sshd[7799]: Failed password for invalid user oracle from 149.90.157.108 port 44633 ssh2 Jan 18 17:52:07 host sshd[7799]: Connection reset by 149.90.157.108 port 44633 [preauth] Jan 18 17:52:07 host sshd[7799]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.90.157.108 Jan 18 18:06:10 host sshd[9788]: User root from 201.130.128.222 not allowed because not listed in AllowUsers Jan 18 18:06:10 host sshd[9788]: input_userauth_request: invalid user root [preauth] Jan 18 18:06:10 host unix_chkpwd[9792]: password check failed for user (root) Jan 18 18:06:10 host sshd[9788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.130.128.222 user=root Jan 18 18:06:10 host sshd[9788]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 18:06:12 host sshd[9788]: Failed password for invalid user root from 201.130.128.222 port 42408 ssh2 Jan 18 18:06:13 host sshd[9788]: Connection closed by 201.130.128.222 port 42408 [preauth] Jan 18 18:12:39 host sshd[10633]: Invalid user vpn from 93.125.114.51 port 57828 Jan 18 18:12:39 host sshd[10633]: input_userauth_request: invalid user vpn [preauth] Jan 18 18:12:39 host sshd[10633]: pam_unix(sshd:auth): check pass; user unknown Jan 18 18:12:39 host sshd[10633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.125.114.51 Jan 18 18:12:41 host sshd[10633]: Failed password for invalid user vpn from 93.125.114.51 port 57828 ssh2 Jan 18 18:12:42 host sshd[10633]: Received disconnect from 93.125.114.51 port 57828:11: Bye Bye [preauth] Jan 18 18:12:42 host sshd[10633]: Disconnected from 93.125.114.51 port 57828 [preauth] Jan 18 18:14:27 host sshd[10956]: Invalid user master from 27.254.149.199 port 58050 Jan 18 18:14:27 host sshd[10956]: input_userauth_request: invalid user master [preauth] Jan 18 18:14:27 host sshd[10956]: pam_unix(sshd:auth): check pass; user unknown Jan 18 18:14:27 host sshd[10956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.149.199 Jan 18 18:14:29 host sshd[10956]: Failed password for invalid user master from 27.254.149.199 port 58050 ssh2 Jan 18 18:14:29 host sshd[10956]: Received disconnect from 27.254.149.199 port 58050:11: Bye Bye [preauth] Jan 18 18:14:29 host sshd[10956]: Disconnected from 27.254.149.199 port 58050 [preauth] Jan 18 18:14:46 host sshd[10995]: Invalid user gitlab-runner from 121.139.83.37 port 53304 Jan 18 18:14:46 host sshd[10995]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 18 18:14:46 host sshd[10995]: pam_unix(sshd:auth): check pass; user unknown Jan 18 18:14:46 host sshd[10995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.139.83.37 Jan 18 18:14:48 host sshd[10995]: Failed password for invalid user gitlab-runner from 121.139.83.37 port 53304 ssh2 Jan 18 18:14:49 host sshd[10995]: pam_unix(sshd:auth): check pass; user unknown Jan 18 18:14:50 host sshd[10995]: Failed password for invalid user gitlab-runner from 121.139.83.37 port 53304 ssh2 Jan 18 18:14:52 host sshd[10995]: pam_unix(sshd:auth): check pass; user unknown Jan 18 18:14:54 host sshd[10995]: Failed password for invalid user gitlab-runner from 121.139.83.37 port 53304 ssh2 Jan 18 18:14:56 host sshd[10995]: Failed password for invalid user gitlab-runner from 121.139.83.37 port 53304 ssh2 Jan 18 18:14:57 host sshd[10995]: Connection closed by 121.139.83.37 port 53304 [preauth] Jan 18 18:14:57 host sshd[10995]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.139.83.37 Jan 18 18:15:34 host sshd[11135]: Invalid user uno85 from 93.125.114.51 port 60396 Jan 18 18:15:34 host sshd[11135]: input_userauth_request: invalid user uno85 [preauth] Jan 18 18:15:34 host sshd[11135]: pam_unix(sshd:auth): check pass; user unknown Jan 18 18:15:34 host sshd[11135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.125.114.51 Jan 18 18:15:36 host sshd[11135]: Failed password for invalid user uno85 from 93.125.114.51 port 60396 ssh2 Jan 18 18:15:36 host sshd[11135]: Received disconnect from 93.125.114.51 port 60396:11: Bye Bye [preauth] Jan 18 18:15:36 host sshd[11135]: Disconnected from 93.125.114.51 port 60396 [preauth] Jan 18 18:16:17 host sshd[11199]: Invalid user developer from 27.254.149.199 port 55724 Jan 18 18:16:17 host sshd[11199]: input_userauth_request: invalid user developer [preauth] Jan 18 18:16:17 host sshd[11199]: pam_unix(sshd:auth): check pass; user unknown Jan 18 18:16:17 host sshd[11199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.149.199 Jan 18 18:16:20 host sshd[11199]: Failed password for invalid user developer from 27.254.149.199 port 55724 ssh2 Jan 18 18:16:20 host sshd[11199]: Received disconnect from 27.254.149.199 port 55724:11: Bye Bye [preauth] Jan 18 18:16:20 host sshd[11199]: Disconnected from 27.254.149.199 port 55724 [preauth] Jan 18 18:16:51 host sshd[11258]: User root from 93.125.114.51 not allowed because not listed in AllowUsers Jan 18 18:16:51 host sshd[11258]: input_userauth_request: invalid user root [preauth] Jan 18 18:16:51 host unix_chkpwd[11260]: password check failed for user (root) Jan 18 18:16:51 host sshd[11258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.125.114.51 user=root Jan 18 18:16:51 host sshd[11258]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 18:16:53 host sshd[11258]: Failed password for invalid user root from 93.125.114.51 port 51506 ssh2 Jan 18 18:16:53 host sshd[11258]: Received disconnect from 93.125.114.51 port 51506:11: Bye Bye [preauth] Jan 18 18:16:53 host sshd[11258]: Disconnected from 93.125.114.51 port 51506 [preauth] Jan 18 18:17:44 host sshd[11418]: Invalid user system from 27.254.149.199 port 50448 Jan 18 18:17:44 host sshd[11418]: input_userauth_request: invalid user system [preauth] Jan 18 18:17:44 host sshd[11418]: pam_unix(sshd:auth): check pass; user unknown Jan 18 18:17:44 host sshd[11418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.149.199 Jan 18 18:17:47 host sshd[11418]: Failed password for invalid user system from 27.254.149.199 port 50448 ssh2 Jan 18 18:19:03 host sshd[11680]: Invalid user ubnt from 50.79.164.74 port 44740 Jan 18 18:19:03 host sshd[11680]: input_userauth_request: invalid user ubnt [preauth] Jan 18 18:19:03 host sshd[11680]: pam_unix(sshd:auth): check pass; user unknown Jan 18 18:19:03 host sshd[11680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.79.164.74 Jan 18 18:19:05 host sshd[11680]: Failed password for invalid user ubnt from 50.79.164.74 port 44740 ssh2 Jan 18 18:19:06 host sshd[11680]: pam_unix(sshd:auth): check pass; user unknown Jan 18 18:19:08 host sshd[11680]: Failed password for invalid user ubnt from 50.79.164.74 port 44740 ssh2 Jan 18 18:19:09 host sshd[11680]: Failed password for invalid user ubnt from 50.79.164.74 port 44740 ssh2 Jan 18 18:19:09 host sshd[11680]: pam_unix(sshd:auth): check pass; user unknown Jan 18 18:19:11 host sshd[11680]: Failed password for invalid user ubnt from 50.79.164.74 port 44740 ssh2 Jan 18 18:19:12 host sshd[11680]: pam_unix(sshd:auth): check pass; user unknown Jan 18 18:19:13 host sshd[11680]: Failed password for invalid user ubnt from 50.79.164.74 port 44740 ssh2 Jan 18 18:19:14 host sshd[11680]: pam_unix(sshd:auth): check pass; user unknown Jan 18 18:19:15 host sshd[11680]: Failed password for invalid user ubnt from 50.79.164.74 port 44740 ssh2 Jan 18 18:19:15 host sshd[11680]: error: maximum authentication attempts exceeded for invalid user ubnt from 50.79.164.74 port 44740 ssh2 [preauth] Jan 18 18:19:15 host sshd[11680]: Disconnecting: Too many authentication failures [preauth] Jan 18 18:19:15 host sshd[11680]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.79.164.74 Jan 18 18:19:15 host sshd[11680]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 18 18:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 18:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 18:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=ugotscom user-8=keralaholi user-9=wwwresourcehunte user-10=wwwrmswll user-11=wwwpmcresource user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=pmcresources user-16=remysagr user-17=disposeat user-18=wwwkmaorg user-19=wwwkapin user-20=woodpeck user-21=kottayamcalldriv user-22=phmetals user-23=palco123 user-24=gifterman user-25=wwwnexidigital user-26=mrsclean user-27=wwwevmhonda user-28=bonifacegroup user-29=straightcurve user-30=wwwletsstalkfood feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 18:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 18:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 18:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J8hyn27gGOrxbviJ.~ Jan 18 18:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J8hyn27gGOrxbviJ.~' Jan 18 18:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J8hyn27gGOrxbviJ.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 18:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 18:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 18:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 18:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 18:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 18:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 18:22:10 host sshd[12295]: Connection closed by 45.79.181.94 port 35430 [preauth] Jan 18 18:22:12 host sshd[12299]: Connection closed by 45.79.181.94 port 35444 [preauth] Jan 18 18:22:13 host sshd[12303]: Connection closed by 45.79.181.94 port 35450 [preauth] Jan 18 18:24:48 host sshd[12705]: User root from 81.201.156.55 not allowed because not listed in AllowUsers Jan 18 18:24:48 host sshd[12705]: input_userauth_request: invalid user root [preauth] Jan 18 18:24:48 host unix_chkpwd[12709]: password check failed for user (root) Jan 18 18:24:48 host sshd[12705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.201.156.55 user=root Jan 18 18:24:48 host sshd[12705]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 18:24:51 host sshd[12705]: Failed password for invalid user root from 81.201.156.55 port 60418 ssh2 Jan 18 18:24:51 host sshd[12705]: Connection closed by 81.201.156.55 port 60418 [preauth] Jan 18 18:31:20 host sshd[13548]: Invalid user admin from 218.147.239.137 port 61580 Jan 18 18:31:20 host sshd[13548]: input_userauth_request: invalid user admin [preauth] Jan 18 18:31:20 host sshd[13548]: pam_unix(sshd:auth): check pass; user unknown Jan 18 18:31:20 host sshd[13548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.147.239.137 Jan 18 18:31:22 host sshd[13548]: Failed password for invalid user admin from 218.147.239.137 port 61580 ssh2 Jan 18 18:31:24 host sshd[13548]: Failed password for invalid user admin from 218.147.239.137 port 61580 ssh2 Jan 18 18:31:24 host sshd[13548]: Connection reset by 218.147.239.137 port 61580 [preauth] Jan 18 18:41:02 host sshd[14873]: Invalid user admin from 106.249.128.120 port 62440 Jan 18 18:41:02 host sshd[14873]: input_userauth_request: invalid user admin [preauth] Jan 18 18:41:02 host sshd[14873]: pam_unix(sshd:auth): check pass; user unknown Jan 18 18:41:02 host sshd[14873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.249.128.120 Jan 18 18:41:04 host sshd[14873]: Failed password for invalid user admin from 106.249.128.120 port 62440 ssh2 Jan 18 18:41:04 host sshd[14873]: Failed password for invalid user admin from 106.249.128.120 port 62440 ssh2 Jan 18 18:41:05 host sshd[14873]: Connection reset by 106.249.128.120 port 62440 [preauth] Jan 18 18:43:27 host sshd[15199]: Invalid user user from 129.126.185.159 port 52206 Jan 18 18:43:27 host sshd[15199]: input_userauth_request: invalid user user [preauth] Jan 18 18:43:27 host sshd[15199]: pam_unix(sshd:auth): check pass; user unknown Jan 18 18:43:27 host sshd[15199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.126.185.159 Jan 18 18:43:30 host sshd[15199]: Failed password for invalid user user from 129.126.185.159 port 52206 ssh2 Jan 18 18:43:30 host sshd[15199]: Connection closed by 129.126.185.159 port 52206 [preauth] Jan 18 18:56:19 host sshd[17220]: Invalid user admin from 125.229.90.59 port 54017 Jan 18 18:56:19 host sshd[17220]: input_userauth_request: invalid user admin [preauth] Jan 18 18:56:19 host sshd[17220]: pam_unix(sshd:auth): check pass; user unknown Jan 18 18:56:19 host sshd[17220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.90.59 Jan 18 18:56:22 host sshd[17220]: Failed password for invalid user admin from 125.229.90.59 port 54017 ssh2 Jan 18 18:56:22 host sshd[17220]: Connection reset by 125.229.90.59 port 54017 [preauth] Jan 18 19:01:47 host sshd[18175]: Invalid user admin from 45.29.147.45 port 37893 Jan 18 19:01:47 host sshd[18175]: input_userauth_request: invalid user admin [preauth] Jan 18 19:01:47 host sshd[18175]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:01:47 host sshd[18175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.29.147.45 Jan 18 19:01:50 host sshd[18175]: Failed password for invalid user admin from 45.29.147.45 port 37893 ssh2 Jan 18 19:01:50 host sshd[18175]: Connection closed by 45.29.147.45 port 37893 [preauth] Jan 18 19:06:08 host sshd[18644]: Invalid user oracle from 186.132.21.142 port 44594 Jan 18 19:06:08 host sshd[18644]: input_userauth_request: invalid user oracle [preauth] Jan 18 19:06:08 host sshd[18644]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:06:08 host sshd[18644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.132.21.142 Jan 18 19:06:10 host sshd[18644]: Failed password for invalid user oracle from 186.132.21.142 port 44594 ssh2 Jan 18 19:06:11 host sshd[18644]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:06:13 host sshd[18644]: Failed password for invalid user oracle from 186.132.21.142 port 44594 ssh2 Jan 18 19:06:16 host sshd[18644]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:06:18 host sshd[18644]: Failed password for invalid user oracle from 186.132.21.142 port 44594 ssh2 Jan 18 19:06:18 host sshd[18644]: Failed password for invalid user oracle from 186.132.21.142 port 44594 ssh2 Jan 18 19:06:19 host sshd[18644]: Connection reset by 186.132.21.142 port 44594 [preauth] Jan 18 19:06:19 host sshd[18644]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.132.21.142 Jan 18 19:10:30 host sshd[19389]: Invalid user admin from 49.213.172.52 port 56855 Jan 18 19:10:30 host sshd[19389]: input_userauth_request: invalid user admin [preauth] Jan 18 19:10:30 host sshd[19389]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:10:30 host sshd[19389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.213.172.52 Jan 18 19:10:32 host sshd[19389]: Failed password for invalid user admin from 49.213.172.52 port 56855 ssh2 Jan 18 19:10:33 host sshd[19389]: Failed password for invalid user admin from 49.213.172.52 port 56855 ssh2 Jan 18 19:10:35 host sshd[19389]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:10:37 host sshd[19389]: Failed password for invalid user admin from 49.213.172.52 port 56855 ssh2 Jan 18 19:10:38 host sshd[19389]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:10:40 host sshd[19389]: Failed password for invalid user admin from 49.213.172.52 port 56855 ssh2 Jan 18 19:10:40 host sshd[19389]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:10:42 host sshd[19389]: Failed password for invalid user admin from 49.213.172.52 port 56855 ssh2 Jan 18 19:15:13 host sshd[20095]: Invalid user support from 59.126.163.166 port 48488 Jan 18 19:15:13 host sshd[20095]: input_userauth_request: invalid user support [preauth] Jan 18 19:15:13 host sshd[20095]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:15:13 host sshd[20095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.163.166 Jan 18 19:15:14 host sshd[20095]: Failed password for invalid user support from 59.126.163.166 port 48488 ssh2 Jan 18 19:15:15 host sshd[20095]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:15:17 host sshd[20095]: Failed password for invalid user support from 59.126.163.166 port 48488 ssh2 Jan 18 19:15:18 host sshd[20095]: Connection reset by 59.126.163.166 port 48488 [preauth] Jan 18 19:15:18 host sshd[20095]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.163.166 Jan 18 19:19:45 host sshd[20714]: Invalid user ubnt from 187.93.191.162 port 37079 Jan 18 19:19:45 host sshd[20714]: input_userauth_request: invalid user ubnt [preauth] Jan 18 19:19:46 host sshd[20714]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:19:46 host sshd[20714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.93.191.162 Jan 18 19:19:48 host sshd[20714]: Failed password for invalid user ubnt from 187.93.191.162 port 37079 ssh2 Jan 18 19:19:49 host sshd[20714]: Connection closed by 187.93.191.162 port 37079 [preauth] Jan 18 19:20:55 host sshd[20866]: Invalid user ga from 194.110.203.109 port 55068 Jan 18 19:20:55 host sshd[20866]: input_userauth_request: invalid user ga [preauth] Jan 18 19:20:55 host sshd[20866]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:20:55 host sshd[20866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 19:20:58 host sshd[20866]: Failed password for invalid user ga from 194.110.203.109 port 55068 ssh2 Jan 18 19:21:01 host sshd[20866]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:04 host sshd[20866]: Failed password for invalid user ga from 194.110.203.109 port 55068 ssh2 Jan 18 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=wwwrmswll user-5=keralaholi user-6=wwwresourcehunte user-7=wwwkaretakers user-8=cochintaxi user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=straightcurve user-15=wwwletsstalkfood user-16=kottayamcalldriv user-17=phmetals user-18=gifterman user-19=palco123 user-20=wwwnexidigital user-21=mrsclean user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=woodpeck user-26=wwwkapin user-27=wwwtestugo user-28=shalinijames user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 19:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 19:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 19:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-O9bK3gCvjJ8tRwsV.~ Jan 18 19:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-O9bK3gCvjJ8tRwsV.~' Jan 18 19:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-O9bK3gCvjJ8tRwsV.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 19:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 19:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 19:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 19:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 19:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 19:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 19:21:07 host sshd[20866]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:21:10 host sshd[20866]: Failed password for invalid user ga from 194.110.203.109 port 55068 ssh2 Jan 18 19:21:13 host sshd[20866]: Connection closed by 194.110.203.109 port 55068 [preauth] Jan 18 19:21:13 host sshd[20866]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 19:28:26 host sshd[22283]: Invalid user informix from 205.185.113.129 port 41112 Jan 18 19:28:26 host sshd[22283]: input_userauth_request: invalid user informix [preauth] Jan 18 19:28:26 host sshd[22283]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:28:26 host sshd[22283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 18 19:28:28 host sshd[22283]: Failed password for invalid user informix from 205.185.113.129 port 41112 ssh2 Jan 18 19:28:28 host sshd[22283]: Connection closed by 205.185.113.129 port 41112 [preauth] Jan 18 19:28:38 host sshd[22335]: User root from 1.34.122.186 not allowed because not listed in AllowUsers Jan 18 19:28:38 host sshd[22335]: input_userauth_request: invalid user root [preauth] Jan 18 19:28:38 host unix_chkpwd[22340]: password check failed for user (root) Jan 18 19:28:38 host sshd[22335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.122.186 user=root Jan 18 19:28:38 host sshd[22335]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 19:28:40 host sshd[22335]: Failed password for invalid user root from 1.34.122.186 port 35733 ssh2 Jan 18 19:28:40 host sshd[22335]: Connection reset by 1.34.122.186 port 35733 [preauth] Jan 18 19:30:24 host sshd[22683]: Invalid user zyfwp from 220.132.194.158 port 48550 Jan 18 19:30:24 host sshd[22683]: input_userauth_request: invalid user zyfwp [preauth] Jan 18 19:30:24 host sshd[22683]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:30:24 host sshd[22683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.194.158 Jan 18 19:30:25 host sshd[22683]: Failed password for invalid user zyfwp from 220.132.194.158 port 48550 ssh2 Jan 18 19:30:26 host sshd[22683]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:30:28 host sshd[22683]: Failed password for invalid user zyfwp from 220.132.194.158 port 48550 ssh2 Jan 18 19:30:28 host sshd[22683]: Connection reset by 220.132.194.158 port 48550 [preauth] Jan 18 19:30:28 host sshd[22683]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.194.158 Jan 18 19:35:35 host sshd[23539]: User root from 14.231.220.135 not allowed because not listed in AllowUsers Jan 18 19:35:35 host sshd[23539]: input_userauth_request: invalid user root [preauth] Jan 18 19:35:37 host sshd[23539]: Failed none for invalid user root from 14.231.220.135 port 53627 ssh2 Jan 18 19:35:41 host sshd[23539]: Connection closed by 14.231.220.135 port 53627 [preauth] Jan 18 19:38:36 host sshd[24110]: Did not receive identification string from 58.72.18.130 port 37440 Jan 18 19:39:35 host sshd[24389]: Invalid user admin from 31.41.244.124 port 10344 Jan 18 19:39:35 host sshd[24389]: input_userauth_request: invalid user admin [preauth] Jan 18 19:39:36 host sshd[24389]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:39:36 host sshd[24389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 18 19:39:37 host sshd[24389]: Failed password for invalid user admin from 31.41.244.124 port 10344 ssh2 Jan 18 19:39:37 host sshd[24389]: Received disconnect from 31.41.244.124 port 10344:11: Client disconnecting normally [preauth] Jan 18 19:39:37 host sshd[24389]: Disconnected from 31.41.244.124 port 10344 [preauth] Jan 18 19:39:38 host sshd[24398]: Invalid user system from 31.41.244.124 port 13380 Jan 18 19:39:38 host sshd[24398]: input_userauth_request: invalid user system [preauth] Jan 18 19:39:38 host sshd[24398]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:39:38 host sshd[24398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 18 19:39:41 host sshd[24398]: Failed password for invalid user system from 31.41.244.124 port 13380 ssh2 Jan 18 19:39:41 host sshd[24398]: Received disconnect from 31.41.244.124 port 13380:11: Client disconnecting normally [preauth] Jan 18 19:39:41 host sshd[24398]: Disconnected from 31.41.244.124 port 13380 [preauth] Jan 18 19:39:42 host sshd[24404]: Invalid user admin from 31.41.244.124 port 17540 Jan 18 19:39:42 host sshd[24404]: input_userauth_request: invalid user admin [preauth] Jan 18 19:39:42 host sshd[24404]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:39:42 host sshd[24404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 18 19:39:44 host sshd[24404]: Failed password for invalid user admin from 31.41.244.124 port 17540 ssh2 Jan 18 19:41:11 host sshd[24717]: Invalid user azureuser from 91.122.197.235 port 44882 Jan 18 19:41:11 host sshd[24717]: input_userauth_request: invalid user azureuser [preauth] Jan 18 19:41:11 host sshd[24717]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:41:11 host sshd[24717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.122.197.235 Jan 18 19:41:13 host sshd[24717]: Failed password for invalid user azureuser from 91.122.197.235 port 44882 ssh2 Jan 18 19:41:13 host sshd[24717]: Received disconnect from 91.122.197.235 port 44882:11: Bye Bye [preauth] Jan 18 19:41:13 host sshd[24717]: Disconnected from 91.122.197.235 port 44882 [preauth] Jan 18 19:41:27 host sshd[24772]: Invalid user sales1 from 35.219.62.194 port 44468 Jan 18 19:41:27 host sshd[24772]: input_userauth_request: invalid user sales1 [preauth] Jan 18 19:41:27 host sshd[24772]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:41:27 host sshd[24772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.219.62.194 Jan 18 19:41:29 host sshd[24772]: Failed password for invalid user sales1 from 35.219.62.194 port 44468 ssh2 Jan 18 19:41:29 host sshd[24772]: Received disconnect from 35.219.62.194 port 44468:11: Bye Bye [preauth] Jan 18 19:41:29 host sshd[24772]: Disconnected from 35.219.62.194 port 44468 [preauth] Jan 18 19:41:57 host sshd[24872]: User root from 206.81.4.81 not allowed because not listed in AllowUsers Jan 18 19:41:57 host sshd[24872]: input_userauth_request: invalid user root [preauth] Jan 18 19:41:57 host unix_chkpwd[24877]: password check failed for user (root) Jan 18 19:41:57 host sshd[24872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.4.81 user=root Jan 18 19:41:57 host sshd[24872]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 19:41:59 host sshd[24872]: Failed password for invalid user root from 206.81.4.81 port 38260 ssh2 Jan 18 19:41:59 host sshd[24872]: Received disconnect from 206.81.4.81 port 38260:11: Bye Bye [preauth] Jan 18 19:41:59 host sshd[24872]: Disconnected from 206.81.4.81 port 38260 [preauth] Jan 18 19:44:27 host sshd[25348]: User root from 103.70.39.194 not allowed because not listed in AllowUsers Jan 18 19:44:27 host sshd[25348]: input_userauth_request: invalid user root [preauth] Jan 18 19:44:27 host unix_chkpwd[25353]: password check failed for user (root) Jan 18 19:44:27 host sshd[25348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.70.39.194 user=root Jan 18 19:44:27 host sshd[25348]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 19:44:29 host sshd[25348]: Failed password for invalid user root from 103.70.39.194 port 47694 ssh2 Jan 18 19:44:29 host sshd[25348]: Received disconnect from 103.70.39.194 port 47694:11: Bye Bye [preauth] Jan 18 19:44:29 host sshd[25348]: Disconnected from 103.70.39.194 port 47694 [preauth] Jan 18 19:44:44 host sshd[25405]: User root from 175.126.146.170 not allowed because not listed in AllowUsers Jan 18 19:44:44 host sshd[25405]: input_userauth_request: invalid user root [preauth] Jan 18 19:44:44 host unix_chkpwd[25408]: password check failed for user (root) Jan 18 19:44:44 host sshd[25405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.146.170 user=root Jan 18 19:44:44 host sshd[25405]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 19:44:46 host sshd[25405]: Failed password for invalid user root from 175.126.146.170 port 54736 ssh2 Jan 18 19:44:46 host sshd[25405]: Received disconnect from 175.126.146.170 port 54736:11: Bye Bye [preauth] Jan 18 19:44:46 host sshd[25405]: Disconnected from 175.126.146.170 port 54736 [preauth] Jan 18 19:45:29 host sshd[25580]: User root from 137.184.35.122 not allowed because not listed in AllowUsers Jan 18 19:45:29 host sshd[25580]: input_userauth_request: invalid user root [preauth] Jan 18 19:45:29 host unix_chkpwd[25589]: password check failed for user (root) Jan 18 19:45:29 host sshd[25580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.35.122 user=root Jan 18 19:45:29 host sshd[25580]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 19:45:31 host sshd[25580]: Failed password for invalid user root from 137.184.35.122 port 34800 ssh2 Jan 18 19:45:31 host sshd[25580]: Received disconnect from 137.184.35.122 port 34800:11: Bye Bye [preauth] Jan 18 19:45:31 host sshd[25580]: Disconnected from 137.184.35.122 port 34800 [preauth] Jan 18 19:45:47 host sshd[25665]: User root from 91.122.197.235 not allowed because not listed in AllowUsers Jan 18 19:45:47 host sshd[25665]: input_userauth_request: invalid user root [preauth] Jan 18 19:45:47 host unix_chkpwd[25670]: password check failed for user (root) Jan 18 19:45:47 host sshd[25665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.122.197.235 user=root Jan 18 19:45:47 host sshd[25665]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 19:45:50 host sshd[25665]: Failed password for invalid user root from 91.122.197.235 port 55620 ssh2 Jan 18 19:45:50 host sshd[25665]: Received disconnect from 91.122.197.235 port 55620:11: Bye Bye [preauth] Jan 18 19:45:50 host sshd[25665]: Disconnected from 91.122.197.235 port 55620 [preauth] Jan 18 19:46:38 host sshd[25930]: Invalid user airflow from 206.81.4.81 port 56712 Jan 18 19:46:38 host sshd[25930]: input_userauth_request: invalid user airflow [preauth] Jan 18 19:46:38 host sshd[25930]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:46:38 host sshd[25930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.4.81 Jan 18 19:46:40 host sshd[25930]: Failed password for invalid user airflow from 206.81.4.81 port 56712 ssh2 Jan 18 19:46:40 host sshd[25930]: Received disconnect from 206.81.4.81 port 56712:11: Bye Bye [preauth] Jan 18 19:46:40 host sshd[25930]: Disconnected from 206.81.4.81 port 56712 [preauth] Jan 18 19:46:55 host sshd[26027]: Invalid user afa from 35.219.62.194 port 37724 Jan 18 19:46:55 host sshd[26027]: input_userauth_request: invalid user afa [preauth] Jan 18 19:46:55 host sshd[26027]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:46:55 host sshd[26027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.219.62.194 Jan 18 19:46:57 host sshd[26027]: Failed password for invalid user afa from 35.219.62.194 port 37724 ssh2 Jan 18 19:46:57 host sshd[26027]: Received disconnect from 35.219.62.194 port 37724:11: Bye Bye [preauth] Jan 18 19:46:57 host sshd[26027]: Disconnected from 35.219.62.194 port 37724 [preauth] Jan 18 19:47:14 host sshd[26100]: User root from 103.70.39.194 not allowed because not listed in AllowUsers Jan 18 19:47:14 host sshd[26100]: input_userauth_request: invalid user root [preauth] Jan 18 19:47:14 host unix_chkpwd[26105]: password check failed for user (root) Jan 18 19:47:14 host sshd[26100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.70.39.194 user=root Jan 18 19:47:14 host sshd[26100]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 19:47:16 host sshd[26106]: User root from 58.148.19.154 not allowed because not listed in AllowUsers Jan 18 19:47:16 host sshd[26106]: input_userauth_request: invalid user root [preauth] Jan 18 19:47:16 host unix_chkpwd[26114]: password check failed for user (root) Jan 18 19:47:16 host sshd[26106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.148.19.154 user=root Jan 18 19:47:16 host sshd[26106]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 19:47:16 host sshd[26100]: Failed password for invalid user root from 103.70.39.194 port 56646 ssh2 Jan 18 19:47:17 host sshd[26100]: Received disconnect from 103.70.39.194 port 56646:11: Bye Bye [preauth] Jan 18 19:47:17 host sshd[26100]: Disconnected from 103.70.39.194 port 56646 [preauth] Jan 18 19:47:18 host sshd[26106]: Failed password for invalid user root from 58.148.19.154 port 48951 ssh2 Jan 18 19:47:19 host unix_chkpwd[26142]: password check failed for user (root) Jan 18 19:47:19 host sshd[26106]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 19:47:21 host sshd[26106]: Failed password for invalid user root from 58.148.19.154 port 48951 ssh2 Jan 18 19:47:21 host unix_chkpwd[26168]: password check failed for user (root) Jan 18 19:47:21 host sshd[26106]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 19:47:24 host sshd[26106]: Failed password for invalid user root from 58.148.19.154 port 48951 ssh2 Jan 18 19:47:24 host unix_chkpwd[26174]: password check failed for user (root) Jan 18 19:47:24 host sshd[26106]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 19:47:26 host sshd[26106]: Failed password for invalid user root from 58.148.19.154 port 48951 ssh2 Jan 18 19:47:26 host unix_chkpwd[26180]: password check failed for user (root) Jan 18 19:47:26 host sshd[26106]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 19:47:29 host sshd[26106]: Failed password for invalid user root from 58.148.19.154 port 48951 ssh2 Jan 18 19:47:31 host sshd[26239]: User root from 137.184.35.122 not allowed because not listed in AllowUsers Jan 18 19:47:31 host sshd[26239]: input_userauth_request: invalid user root [preauth] Jan 18 19:47:31 host unix_chkpwd[26245]: password check failed for user (root) Jan 18 19:47:31 host sshd[26239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.35.122 user=root Jan 18 19:47:31 host sshd[26239]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 19:47:33 host sshd[26239]: Failed password for invalid user root from 137.184.35.122 port 58010 ssh2 Jan 18 19:47:33 host sshd[26239]: Received disconnect from 137.184.35.122 port 58010:11: Bye Bye [preauth] Jan 18 19:47:33 host sshd[26239]: Disconnected from 137.184.35.122 port 58010 [preauth] Jan 18 19:48:12 host sshd[26351]: User root from 35.219.62.194 not allowed because not listed in AllowUsers Jan 18 19:48:12 host sshd[26351]: input_userauth_request: invalid user root [preauth] Jan 18 19:48:12 host unix_chkpwd[26354]: password check failed for user (root) Jan 18 19:48:12 host sshd[26351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.219.62.194 user=root Jan 18 19:48:12 host sshd[26351]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 19:48:14 host sshd[26351]: Failed password for invalid user root from 35.219.62.194 port 60058 ssh2 Jan 18 19:49:38 host sshd[26699]: Invalid user gitlab-runner from 49.191.28.191 port 42469 Jan 18 19:49:38 host sshd[26699]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 18 19:49:38 host sshd[26699]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:49:38 host sshd[26699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.191.28.191 Jan 18 19:49:40 host sshd[26699]: Failed password for invalid user gitlab-runner from 49.191.28.191 port 42469 ssh2 Jan 18 19:49:42 host sshd[26699]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:49:44 host sshd[26699]: Failed password for invalid user gitlab-runner from 49.191.28.191 port 42469 ssh2 Jan 18 19:50:06 host sshd[26775]: Invalid user ftpuser from 175.126.146.170 port 53060 Jan 18 19:50:06 host sshd[26775]: input_userauth_request: invalid user ftpuser [preauth] Jan 18 19:50:06 host sshd[26775]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:50:06 host sshd[26775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.146.170 Jan 18 19:50:08 host sshd[26775]: Failed password for invalid user ftpuser from 175.126.146.170 port 53060 ssh2 Jan 18 19:50:08 host sshd[26775]: Received disconnect from 175.126.146.170 port 53060:11: Bye Bye [preauth] Jan 18 19:50:08 host sshd[26775]: Disconnected from 175.126.146.170 port 53060 [preauth] Jan 18 19:53:31 host sshd[27226]: Invalid user admin from 103.247.167.90 port 43320 Jan 18 19:53:31 host sshd[27226]: input_userauth_request: invalid user admin [preauth] Jan 18 19:53:32 host sshd[27226]: pam_unix(sshd:auth): check pass; user unknown Jan 18 19:53:32 host sshd[27226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.247.167.90 Jan 18 19:53:33 host sshd[27226]: Failed password for invalid user admin from 103.247.167.90 port 43320 ssh2 Jan 18 19:53:34 host sshd[27226]: Connection closed by 103.247.167.90 port 43320 [preauth] Jan 18 19:54:38 host sshd[27469]: Connection reset by 114.33.20.73 port 44472 [preauth] Jan 18 19:58:49 host sshd[27966]: Did not receive identification string from 206.189.23.129 port 61000 Jan 18 20:04:03 host sshd[28704]: ssh_dispatch_run_fatal: Connection from 69.112.204.55 port 40942: Connection corrupted [preauth] Jan 18 20:12:16 host sshd[29835]: User root from 189.56.217.183 not allowed because not listed in AllowUsers Jan 18 20:12:16 host sshd[29835]: input_userauth_request: invalid user root [preauth] Jan 18 20:12:17 host unix_chkpwd[29844]: password check failed for user (root) Jan 18 20:12:17 host sshd[29835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.56.217.183 user=root Jan 18 20:12:17 host sshd[29835]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 20:12:20 host sshd[29835]: Failed password for invalid user root from 189.56.217.183 port 54224 ssh2 Jan 18 20:12:21 host sshd[29835]: Connection closed by 189.56.217.183 port 54224 [preauth] Jan 18 20:14:57 host sshd[30148]: Invalid user admin from 49.213.226.183 port 41262 Jan 18 20:14:57 host sshd[30148]: input_userauth_request: invalid user admin [preauth] Jan 18 20:14:57 host sshd[30148]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:14:57 host sshd[30148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.213.226.183 Jan 18 20:14:59 host sshd[30148]: Failed password for invalid user admin from 49.213.226.183 port 41262 ssh2 Jan 18 20:15:01 host sshd[30148]: Failed password for invalid user admin from 49.213.226.183 port 41262 ssh2 Jan 18 20:15:01 host sshd[30148]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:15:03 host sshd[30148]: Failed password for invalid user admin from 49.213.226.183 port 41262 ssh2 Jan 18 20:15:03 host sshd[30148]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:15:05 host sshd[30148]: Failed password for invalid user admin from 49.213.226.183 port 41262 ssh2 Jan 18 20:15:06 host sshd[30148]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:15:08 host sshd[30148]: Failed password for invalid user admin from 49.213.226.183 port 41262 ssh2 Jan 18 20:15:08 host sshd[30148]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:15:10 host sshd[30148]: Failed password for invalid user admin from 49.213.226.183 port 41262 ssh2 Jan 18 20:15:10 host sshd[30148]: error: maximum authentication attempts exceeded for invalid user admin from 49.213.226.183 port 41262 ssh2 [preauth] Jan 18 20:15:10 host sshd[30148]: Disconnecting: Too many authentication failures [preauth] Jan 18 20:15:10 host sshd[30148]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.213.226.183 Jan 18 20:15:10 host sshd[30148]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 18 20:20:46 host sshd[30974]: Invalid user admin from 125.229.130.156 port 43519 Jan 18 20:20:46 host sshd[30974]: input_userauth_request: invalid user admin [preauth] Jan 18 20:20:46 host sshd[30974]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:20:46 host sshd[30974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.130.156 Jan 18 20:20:49 host sshd[30974]: Failed password for invalid user admin from 125.229.130.156 port 43519 ssh2 Jan 18 20:20:49 host sshd[30974]: Failed password for invalid user admin from 125.229.130.156 port 43519 ssh2 Jan 18 20:20:50 host sshd[30974]: Connection reset by 125.229.130.156 port 43519 [preauth] Jan 18 20:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=palco123 user-4=gifterman user-5=phmetals user-6=kottayamcalldriv user-7=straightcurve user-8=wwwletsstalkfood user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=woodpeck user-16=wwwkapin user-17=remysagr user-18=disposeat user-19=wwwkmaorg user-20=keralaholi user-21=wwwresourcehunte user-22=wwwrmswll user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 20:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-id6cRep6syTJgLuX.~ Jan 18 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-id6cRep6syTJgLuX.~' Jan 18 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-id6cRep6syTJgLuX.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 20:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 20:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 20:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 20:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 20:21:59 host sshd[31429]: Invalid user ONTUSER from 220.86.118.225 port 39665 Jan 18 20:21:59 host sshd[31429]: input_userauth_request: invalid user ONTUSER [preauth] Jan 18 20:21:59 host sshd[31429]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:21:59 host sshd[31429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.86.118.225 Jan 18 20:22:01 host sshd[31429]: Failed password for invalid user ONTUSER from 220.86.118.225 port 39665 ssh2 Jan 18 20:22:02 host sshd[31429]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:22:04 host sshd[31429]: Failed password for invalid user ONTUSER from 220.86.118.225 port 39665 ssh2 Jan 18 20:22:04 host sshd[31429]: Failed password for invalid user ONTUSER from 220.86.118.225 port 39665 ssh2 Jan 18 20:22:04 host sshd[31429]: Connection closed by 220.86.118.225 port 39665 [preauth] Jan 18 20:22:04 host sshd[31429]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.86.118.225 Jan 18 20:30:18 host sshd[32492]: Invalid user 1234 from 177.84.49.155 port 56710 Jan 18 20:30:18 host sshd[32492]: input_userauth_request: invalid user 1234 [preauth] Jan 18 20:30:18 host sshd[32492]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:30:18 host sshd[32492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.84.49.155 Jan 18 20:30:21 host sshd[32492]: Failed password for invalid user 1234 from 177.84.49.155 port 56710 ssh2 Jan 18 20:30:21 host sshd[32492]: Connection closed by 177.84.49.155 port 56710 [preauth] Jan 18 20:34:22 host sshd[573]: User sshd from 194.169.175.102 not allowed because not listed in AllowUsers Jan 18 20:34:22 host sshd[573]: input_userauth_request: invalid user sshd [preauth] Jan 18 20:34:22 host unix_chkpwd[577]: password check failed for user (sshd) Jan 18 20:34:22 host sshd[573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=sshd Jan 18 20:34:22 host sshd[573]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sshd" Jan 18 20:34:23 host sshd[573]: Failed password for invalid user sshd from 194.169.175.102 port 52777 ssh2 Jan 18 20:34:24 host sshd[573]: Received disconnect from 194.169.175.102 port 52777:11: Client disconnecting normally [preauth] Jan 18 20:34:24 host sshd[573]: Disconnected from 194.169.175.102 port 52777 [preauth] Jan 18 20:44:14 host sshd[1791]: Invalid user oracle from 125.140.222.113 port 60332 Jan 18 20:44:14 host sshd[1791]: input_userauth_request: invalid user oracle [preauth] Jan 18 20:44:14 host sshd[1791]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:44:14 host sshd[1791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.140.222.113 Jan 18 20:44:15 host sshd[1791]: Failed password for invalid user oracle from 125.140.222.113 port 60332 ssh2 Jan 18 20:44:16 host sshd[1791]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:44:18 host sshd[1791]: Failed password for invalid user oracle from 125.140.222.113 port 60332 ssh2 Jan 18 20:44:18 host sshd[1791]: Connection reset by 125.140.222.113 port 60332 [preauth] Jan 18 20:44:18 host sshd[1791]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.140.222.113 Jan 18 20:45:12 host sshd[2018]: Invalid user admin from 114.33.38.40 port 58546 Jan 18 20:45:12 host sshd[2018]: input_userauth_request: invalid user admin [preauth] Jan 18 20:45:12 host sshd[2018]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:45:12 host sshd[2018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.38.40 Jan 18 20:45:14 host sshd[2018]: Failed password for invalid user admin from 114.33.38.40 port 58546 ssh2 Jan 18 20:45:15 host sshd[2018]: Failed password for invalid user admin from 114.33.38.40 port 58546 ssh2 Jan 18 20:45:16 host sshd[2018]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:45:17 host sshd[2018]: Failed password for invalid user admin from 114.33.38.40 port 58546 ssh2 Jan 18 20:45:18 host sshd[2018]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:45:20 host sshd[2018]: Failed password for invalid user admin from 114.33.38.40 port 58546 ssh2 Jan 18 20:45:21 host sshd[2018]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:45:24 host sshd[2018]: Failed password for invalid user admin from 114.33.38.40 port 58546 ssh2 Jan 18 20:45:24 host sshd[2018]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:45:26 host sshd[2018]: Failed password for invalid user admin from 114.33.38.40 port 58546 ssh2 Jan 18 20:45:26 host sshd[2018]: error: maximum authentication attempts exceeded for invalid user admin from 114.33.38.40 port 58546 ssh2 [preauth] Jan 18 20:45:26 host sshd[2018]: Disconnecting: Too many authentication failures [preauth] Jan 18 20:45:26 host sshd[2018]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.38.40 Jan 18 20:45:26 host sshd[2018]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 18 20:48:30 host sshd[2452]: Invalid user admin from 118.98.90.2 port 60029 Jan 18 20:48:30 host sshd[2452]: input_userauth_request: invalid user admin [preauth] Jan 18 20:48:30 host sshd[2452]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:48:30 host sshd[2452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.98.90.2 Jan 18 20:48:32 host sshd[2452]: Failed password for invalid user admin from 118.98.90.2 port 60029 ssh2 Jan 18 20:48:32 host sshd[2452]: Connection closed by 118.98.90.2 port 60029 [preauth] Jan 18 20:50:11 host sshd[2785]: Invalid user admin from 119.196.240.71 port 62377 Jan 18 20:50:11 host sshd[2785]: input_userauth_request: invalid user admin [preauth] Jan 18 20:50:11 host sshd[2785]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:50:11 host sshd[2785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.196.240.71 Jan 18 20:50:14 host sshd[2785]: Failed password for invalid user admin from 119.196.240.71 port 62377 ssh2 Jan 18 20:50:14 host sshd[2785]: Connection reset by 119.196.240.71 port 62377 [preauth] Jan 18 20:54:21 host sshd[3215]: Invalid user support from 218.147.120.208 port 63708 Jan 18 20:54:21 host sshd[3215]: input_userauth_request: invalid user support [preauth] Jan 18 20:54:21 host sshd[3215]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:54:21 host sshd[3215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.147.120.208 Jan 18 20:54:23 host sshd[3215]: Failed password for invalid user support from 218.147.120.208 port 63708 ssh2 Jan 18 20:54:24 host sshd[3215]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:54:25 host sshd[3215]: Failed password for invalid user support from 218.147.120.208 port 63708 ssh2 Jan 18 20:54:26 host sshd[3215]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:54:28 host sshd[3215]: Failed password for invalid user support from 218.147.120.208 port 63708 ssh2 Jan 18 20:54:28 host sshd[3215]: Connection reset by 218.147.120.208 port 63708 [preauth] Jan 18 20:54:28 host sshd[3215]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.147.120.208 Jan 18 20:56:50 host sshd[3605]: Invalid user telnet from 60.250.139.147 port 56842 Jan 18 20:56:50 host sshd[3605]: input_userauth_request: invalid user telnet [preauth] Jan 18 20:56:50 host sshd[3605]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:56:50 host sshd[3605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.139.147 Jan 18 20:56:53 host sshd[3605]: Failed password for invalid user telnet from 60.250.139.147 port 56842 ssh2 Jan 18 20:56:53 host sshd[3605]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:56:56 host sshd[3605]: Failed password for invalid user telnet from 60.250.139.147 port 56842 ssh2 Jan 18 20:56:57 host sshd[3605]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:56:59 host sshd[3605]: Failed password for invalid user telnet from 60.250.139.147 port 56842 ssh2 Jan 18 20:57:00 host sshd[3605]: Failed password for invalid user telnet from 60.250.139.147 port 56842 ssh2 Jan 18 20:57:00 host sshd[3605]: pam_unix(sshd:auth): check pass; user unknown Jan 18 20:57:02 host sshd[3605]: Failed password for invalid user telnet from 60.250.139.147 port 56842 ssh2 Jan 18 21:00:53 host sshd[4104]: User root from 173.22.101.62 not allowed because not listed in AllowUsers Jan 18 21:00:53 host sshd[4104]: input_userauth_request: invalid user root [preauth] Jan 18 21:00:53 host unix_chkpwd[4119]: password check failed for user (root) Jan 18 21:00:53 host sshd[4104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.22.101.62 user=root Jan 18 21:00:53 host sshd[4104]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 21:00:55 host sshd[4104]: Failed password for invalid user root from 173.22.101.62 port 36494 ssh2 Jan 18 21:00:56 host unix_chkpwd[4130]: password check failed for user (root) Jan 18 21:00:56 host sshd[4104]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 21:00:58 host sshd[4104]: Failed password for invalid user root from 173.22.101.62 port 36494 ssh2 Jan 18 21:00:59 host unix_chkpwd[4133]: password check failed for user (root) Jan 18 21:00:59 host sshd[4104]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 21:01:01 host sshd[4104]: Failed password for invalid user root from 173.22.101.62 port 36494 ssh2 Jan 18 21:01:01 host unix_chkpwd[4159]: password check failed for user (root) Jan 18 21:01:01 host sshd[4104]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 21:01:03 host sshd[4104]: Failed password for invalid user root from 173.22.101.62 port 36494 ssh2 Jan 18 21:01:04 host unix_chkpwd[4164]: password check failed for user (root) Jan 18 21:01:04 host sshd[4104]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 21:01:06 host sshd[4104]: Failed password for invalid user root from 173.22.101.62 port 36494 ssh2 Jan 18 21:06:31 host sshd[5021]: Bad protocol version identification '\376\b\001adminSSH-2.0-PuTTY_Release_0.77' from 69.117.245.81 port 57629 Jan 18 21:07:50 host sshd[5153]: Invalid user oracle from 112.162.138.228 port 63195 Jan 18 21:07:50 host sshd[5153]: input_userauth_request: invalid user oracle [preauth] Jan 18 21:07:50 host sshd[5153]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:07:50 host sshd[5153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.162.138.228 Jan 18 21:07:52 host sshd[5153]: Failed password for invalid user oracle from 112.162.138.228 port 63195 ssh2 Jan 18 21:07:54 host sshd[5153]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:07:56 host sshd[5153]: Failed password for invalid user oracle from 112.162.138.228 port 63195 ssh2 Jan 18 21:07:58 host sshd[5153]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:08:01 host sshd[5153]: Failed password for invalid user oracle from 112.162.138.228 port 63195 ssh2 Jan 18 21:08:02 host sshd[5153]: Failed password for invalid user oracle from 112.162.138.228 port 63195 ssh2 Jan 18 21:08:04 host sshd[5153]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:08:06 host sshd[5153]: Failed password for invalid user oracle from 112.162.138.228 port 63195 ssh2 Jan 18 21:09:38 host sshd[5398]: Invalid user gb from 194.110.203.109 port 35884 Jan 18 21:09:38 host sshd[5398]: input_userauth_request: invalid user gb [preauth] Jan 18 21:09:38 host sshd[5398]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:09:38 host sshd[5398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 21:09:40 host sshd[5398]: Failed password for invalid user gb from 194.110.203.109 port 35884 ssh2 Jan 18 21:09:43 host sshd[5398]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:09:45 host sshd[5398]: Failed password for invalid user gb from 194.110.203.109 port 35884 ssh2 Jan 18 21:09:49 host sshd[5398]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:09:50 host sshd[5398]: Failed password for invalid user gb from 194.110.203.109 port 35884 ssh2 Jan 18 21:09:53 host sshd[5398]: Connection closed by 194.110.203.109 port 35884 [preauth] Jan 18 21:09:53 host sshd[5398]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 21:12:48 host sshd[5795]: Invalid user pi from 121.150.235.113 port 61763 Jan 18 21:12:48 host sshd[5795]: input_userauth_request: invalid user pi [preauth] Jan 18 21:12:48 host sshd[5795]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:12:48 host sshd[5795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.150.235.113 Jan 18 21:12:50 host sshd[5795]: Failed password for invalid user pi from 121.150.235.113 port 61763 ssh2 Jan 18 21:12:51 host sshd[5795]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:12:53 host sshd[5795]: Failed password for invalid user pi from 121.150.235.113 port 61763 ssh2 Jan 18 21:12:54 host sshd[5795]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:12:56 host sshd[5795]: Failed password for invalid user pi from 121.150.235.113 port 61763 ssh2 Jan 18 21:12:56 host sshd[5795]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:12:58 host sshd[5795]: Failed password for invalid user pi from 121.150.235.113 port 61763 ssh2 Jan 18 21:12:59 host sshd[5795]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:13:01 host sshd[5795]: Failed password for invalid user pi from 121.150.235.113 port 61763 ssh2 Jan 18 21:13:01 host sshd[5795]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:13:03 host sshd[5795]: Failed password for invalid user pi from 121.150.235.113 port 61763 ssh2 Jan 18 21:13:03 host sshd[5795]: error: maximum authentication attempts exceeded for invalid user pi from 121.150.235.113 port 61763 ssh2 [preauth] Jan 18 21:13:03 host sshd[5795]: Disconnecting: Too many authentication failures [preauth] Jan 18 21:13:03 host sshd[5795]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.150.235.113 Jan 18 21:13:03 host sshd[5795]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 18 21:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=keralaholi user-4=wwwresourcehunte user-5=wwwrmswll user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwletsstalkfood user-15=straightcurve user-16=palco123 user-17=gifterman user-18=phmetals user-19=kottayamcalldriv user-20=wwwnexidigital user-21=mrsclean user-22=remysagr user-23=disposeat user-24=wwwkmaorg user-25=wwwkapin user-26=woodpeck user-27=vfmassets user-28=shalinijames user-29=wwwtestugo user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 21:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-V0wuUBJ34p56ggHd.~ Jan 18 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-V0wuUBJ34p56ggHd.~' Jan 18 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-V0wuUBJ34p56ggHd.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 21:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 21:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 21:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 21:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 21:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 21:21:10 host sshd[7150]: User root from 118.46.27.148 not allowed because not listed in AllowUsers Jan 18 21:21:10 host sshd[7150]: input_userauth_request: invalid user root [preauth] Jan 18 21:21:10 host unix_chkpwd[7173]: password check failed for user (root) Jan 18 21:21:10 host sshd[7150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.46.27.148 user=root Jan 18 21:21:10 host sshd[7150]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 21:21:12 host sshd[7150]: Failed password for invalid user root from 118.46.27.148 port 62252 ssh2 Jan 18 21:21:13 host unix_chkpwd[7195]: password check failed for user (root) Jan 18 21:21:13 host sshd[7150]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 21:21:15 host sshd[7150]: Failed password for invalid user root from 118.46.27.148 port 62252 ssh2 Jan 18 21:21:16 host unix_chkpwd[7225]: password check failed for user (root) Jan 18 21:21:16 host sshd[7150]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 21:21:18 host sshd[7150]: Failed password for invalid user root from 118.46.27.148 port 62252 ssh2 Jan 18 21:21:18 host unix_chkpwd[7249]: password check failed for user (root) Jan 18 21:21:18 host sshd[7150]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 21:21:21 host sshd[7150]: Failed password for invalid user root from 118.46.27.148 port 62252 ssh2 Jan 18 21:21:22 host unix_chkpwd[7280]: password check failed for user (root) Jan 18 21:21:22 host sshd[7150]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 21:21:24 host sshd[7150]: Failed password for invalid user root from 118.46.27.148 port 62252 ssh2 Jan 18 21:21:33 host sshd[7324]: User root from 87.27.38.143 not allowed because not listed in AllowUsers Jan 18 21:21:33 host sshd[7324]: input_userauth_request: invalid user root [preauth] Jan 18 21:21:33 host unix_chkpwd[7327]: password check failed for user (root) Jan 18 21:21:33 host sshd[7324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.27.38.143 user=root Jan 18 21:21:33 host sshd[7324]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 21:21:35 host sshd[7324]: Failed password for invalid user root from 87.27.38.143 port 41958 ssh2 Jan 18 21:21:36 host unix_chkpwd[7331]: password check failed for user (root) Jan 18 21:21:36 host sshd[7324]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 21:21:38 host sshd[7324]: Failed password for invalid user root from 87.27.38.143 port 41958 ssh2 Jan 18 21:21:38 host unix_chkpwd[7334]: password check failed for user (root) Jan 18 21:21:38 host sshd[7324]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 21:21:40 host sshd[7324]: Failed password for invalid user root from 87.27.38.143 port 41958 ssh2 Jan 18 21:21:41 host sshd[7324]: Connection reset by 87.27.38.143 port 41958 [preauth] Jan 18 21:21:41 host sshd[7324]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.27.38.143 user=root Jan 18 21:42:07 host sshd[9966]: Invalid user guest from 61.131.137.72 port 56580 Jan 18 21:42:07 host sshd[9966]: input_userauth_request: invalid user guest [preauth] Jan 18 21:42:08 host sshd[9966]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:42:08 host sshd[9966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.131.137.72 Jan 18 21:42:10 host sshd[9966]: Failed password for invalid user guest from 61.131.137.72 port 56580 ssh2 Jan 18 21:42:10 host sshd[9966]: Connection closed by 61.131.137.72 port 56580 [preauth] Jan 18 21:43:06 host sshd[10101]: Did not receive identification string from 117.50.160.88 port 35044 Jan 18 21:43:34 host sshd[10159]: Invalid user dev from 117.50.160.88 port 35242 Jan 18 21:43:34 host sshd[10159]: input_userauth_request: invalid user dev [preauth] Jan 18 21:43:34 host sshd[10159]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:43:34 host sshd[10159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.160.88 Jan 18 21:43:36 host sshd[10159]: Failed password for invalid user dev from 117.50.160.88 port 35242 ssh2 Jan 18 21:43:36 host sshd[10159]: Connection closed by 117.50.160.88 port 35242 [preauth] Jan 18 21:43:36 host sshd[10125]: Invalid user steam from 117.50.160.88 port 35314 Jan 18 21:43:36 host sshd[10125]: input_userauth_request: invalid user steam [preauth] Jan 18 21:43:37 host sshd[10125]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:43:37 host sshd[10125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.160.88 Jan 18 21:43:38 host sshd[10125]: Failed password for invalid user steam from 117.50.160.88 port 35314 ssh2 Jan 18 21:43:38 host sshd[10128]: Invalid user admin from 117.50.160.88 port 35254 Jan 18 21:43:38 host sshd[10128]: input_userauth_request: invalid user admin [preauth] Jan 18 21:43:38 host sshd[10130]: Invalid user vagrant from 117.50.160.88 port 35292 Jan 18 21:43:38 host sshd[10130]: input_userauth_request: invalid user vagrant [preauth] Jan 18 21:43:39 host sshd[10128]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:43:39 host sshd[10128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.160.88 Jan 18 21:43:39 host sshd[10130]: pam_unix(sshd:auth): check pass; user unknown Jan 18 21:43:39 host sshd[10130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.160.88 Jan 18 21:43:39 host sshd[10125]: Connection closed by 117.50.160.88 port 35314 [preauth] Jan 18 21:43:41 host sshd[10128]: Failed password for invalid user admin from 117.50.160.88 port 35254 ssh2 Jan 18 21:43:42 host sshd[10130]: Failed password for invalid user vagrant from 117.50.160.88 port 35292 ssh2 Jan 18 21:43:42 host sshd[10128]: Connection closed by 117.50.160.88 port 35254 [preauth] Jan 18 21:43:42 host sshd[10130]: Connection closed by 117.50.160.88 port 35292 [preauth] Jan 18 21:54:08 host sshd[11906]: User root from 95.168.48.245 not allowed because not listed in AllowUsers Jan 18 21:54:08 host sshd[11906]: input_userauth_request: invalid user root [preauth] Jan 18 21:54:08 host unix_chkpwd[11911]: password check failed for user (root) Jan 18 21:54:08 host sshd[11906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.168.48.245 user=root Jan 18 21:54:08 host sshd[11906]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 21:54:10 host sshd[11906]: Failed password for invalid user root from 95.168.48.245 port 35553 ssh2 Jan 18 21:54:10 host unix_chkpwd[11914]: password check failed for user (root) Jan 18 21:54:10 host sshd[11906]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 21:54:13 host sshd[11906]: Failed password for invalid user root from 95.168.48.245 port 35553 ssh2 Jan 18 21:54:14 host unix_chkpwd[11918]: password check failed for user (root) Jan 18 21:54:14 host sshd[11906]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 21:54:16 host sshd[11906]: Failed password for invalid user root from 95.168.48.245 port 35553 ssh2 Jan 18 21:54:17 host unix_chkpwd[11921]: password check failed for user (root) Jan 18 21:54:17 host sshd[11906]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 21:54:20 host sshd[11906]: Failed password for invalid user root from 95.168.48.245 port 35553 ssh2 Jan 18 22:00:18 host sshd[12829]: Invalid user squid from 76.177.163.35 port 50188 Jan 18 22:00:18 host sshd[12829]: input_userauth_request: invalid user squid [preauth] Jan 18 22:00:19 host sshd[12829]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:00:19 host sshd[12829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.177.163.35 Jan 18 22:00:21 host sshd[12829]: Failed password for invalid user squid from 76.177.163.35 port 50188 ssh2 Jan 18 22:00:22 host sshd[12829]: Connection closed by 76.177.163.35 port 50188 [preauth] Jan 18 22:02:09 host sshd[13064]: User root from 121.178.180.231 not allowed because not listed in AllowUsers Jan 18 22:02:09 host sshd[13064]: input_userauth_request: invalid user root [preauth] Jan 18 22:02:09 host unix_chkpwd[13069]: password check failed for user (root) Jan 18 22:02:09 host sshd[13064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.178.180.231 user=root Jan 18 22:02:09 host sshd[13064]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 22:02:10 host sshd[13064]: Failed password for invalid user root from 121.178.180.231 port 62794 ssh2 Jan 18 22:02:11 host unix_chkpwd[13078]: password check failed for user (root) Jan 18 22:02:11 host sshd[13064]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 22:02:13 host sshd[13064]: Failed password for invalid user root from 121.178.180.231 port 62794 ssh2 Jan 18 22:02:14 host sshd[13064]: Connection reset by 121.178.180.231 port 62794 [preauth] Jan 18 22:02:14 host sshd[13064]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.178.180.231 user=root Jan 18 22:18:00 host sshd[15259]: Invalid user admin from 190.3.63.97 port 52956 Jan 18 22:18:00 host sshd[15259]: input_userauth_request: invalid user admin [preauth] Jan 18 22:18:00 host sshd[15259]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:18:00 host sshd[15259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.3.63.97 Jan 18 22:18:02 host sshd[15259]: Failed password for invalid user admin from 190.3.63.97 port 52956 ssh2 Jan 18 22:18:03 host sshd[15259]: Failed password for invalid user admin from 190.3.63.97 port 52956 ssh2 Jan 18 22:18:04 host sshd[15259]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:18:06 host sshd[15259]: Failed password for invalid user admin from 190.3.63.97 port 52956 ssh2 Jan 18 22:18:08 host sshd[15259]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:18:10 host sshd[15259]: Failed password for invalid user admin from 190.3.63.97 port 52956 ssh2 Jan 18 22:18:10 host sshd[15259]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:18:12 host sshd[15259]: Failed password for invalid user admin from 190.3.63.97 port 52956 ssh2 Jan 18 22:18:13 host sshd[15259]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:18:15 host sshd[15259]: Failed password for invalid user admin from 190.3.63.97 port 52956 ssh2 Jan 18 22:18:15 host sshd[15259]: error: maximum authentication attempts exceeded for invalid user admin from 190.3.63.97 port 52956 ssh2 [preauth] Jan 18 22:18:15 host sshd[15259]: Disconnecting: Too many authentication failures [preauth] Jan 18 22:18:15 host sshd[15259]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.3.63.97 Jan 18 22:18:15 host sshd[15259]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 18 22:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=shalinijames user-3=wwwtestugo user-4=vfmassets user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=remysagr user-9=wwwkmaorg user-10=wwwnexidigital user-11=mrsclean user-12=phmetals user-13=kottayamcalldriv user-14=palco123 user-15=gifterman user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=wwwkaretakers user-24=cochintaxi user-25=ugotscom user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 22:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6IAIxv4l2gEeWLLR.~ Jan 18 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6IAIxv4l2gEeWLLR.~' Jan 18 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6IAIxv4l2gEeWLLR.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 22:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 22:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 22:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 22:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 22:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 22:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 22:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 22:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 22:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 22:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 22:25:31 host sshd[16593]: Invalid user jeffery from 107.189.30.59 port 58776 Jan 18 22:25:31 host sshd[16593]: input_userauth_request: invalid user jeffery [preauth] Jan 18 22:25:31 host sshd[16593]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:25:31 host sshd[16593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 18 22:25:32 host sshd[16593]: Failed password for invalid user jeffery from 107.189.30.59 port 58776 ssh2 Jan 18 22:25:33 host sshd[16593]: Connection closed by 107.189.30.59 port 58776 [preauth] Jan 18 22:36:22 host sshd[18077]: Connection reset by 220.134.84.152 port 38907 [preauth] Jan 18 22:36:23 host sshd[18080]: User root from 220.134.84.152 not allowed because not listed in AllowUsers Jan 18 22:36:23 host sshd[18080]: input_userauth_request: invalid user root [preauth] Jan 18 22:36:23 host unix_chkpwd[18084]: password check failed for user (root) Jan 18 22:36:23 host sshd[18080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.84.152 user=root Jan 18 22:36:23 host sshd[18080]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 22:36:25 host sshd[18080]: Failed password for invalid user root from 220.134.84.152 port 38918 ssh2 Jan 18 22:36:25 host unix_chkpwd[18087]: password check failed for user (root) Jan 18 22:36:25 host sshd[18080]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 22:36:28 host sshd[18080]: Failed password for invalid user root from 220.134.84.152 port 38918 ssh2 Jan 18 22:36:28 host unix_chkpwd[18111]: password check failed for user (root) Jan 18 22:36:28 host sshd[18080]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 22:36:30 host sshd[18112]: User ftp from 27.121.83.12 not allowed because not listed in AllowUsers Jan 18 22:36:30 host sshd[18112]: input_userauth_request: invalid user ftp [preauth] Jan 18 22:36:30 host sshd[18080]: Failed password for invalid user root from 220.134.84.152 port 38918 ssh2 Jan 18 22:36:30 host unix_chkpwd[18117]: password check failed for user (ftp) Jan 18 22:36:30 host sshd[18112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.121.83.12 user=ftp Jan 18 22:36:30 host sshd[18112]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 18 22:36:31 host unix_chkpwd[18118]: password check failed for user (root) Jan 18 22:36:31 host sshd[18080]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 22:36:33 host sshd[18112]: Failed password for invalid user ftp from 27.121.83.12 port 55441 ssh2 Jan 18 22:36:33 host sshd[18112]: Connection closed by 27.121.83.12 port 55441 [preauth] Jan 18 22:36:33 host sshd[18080]: Failed password for invalid user root from 220.134.84.152 port 38918 ssh2 Jan 18 22:36:35 host unix_chkpwd[18141]: password check failed for user (root) Jan 18 22:36:35 host sshd[18080]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 22:36:37 host sshd[18080]: Failed password for invalid user root from 220.134.84.152 port 38918 ssh2 Jan 18 22:41:40 host sshd[18829]: Invalid user bigipuser3 from 125.229.130.72 port 51226 Jan 18 22:41:40 host sshd[18829]: input_userauth_request: invalid user bigipuser3 [preauth] Jan 18 22:41:40 host sshd[18829]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:41:40 host sshd[18829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.130.72 Jan 18 22:41:41 host sshd[18829]: Failed password for invalid user bigipuser3 from 125.229.130.72 port 51226 ssh2 Jan 18 22:41:42 host sshd[18829]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:41:44 host sshd[18829]: Failed password for invalid user bigipuser3 from 125.229.130.72 port 51226 ssh2 Jan 18 22:41:45 host sshd[18829]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:41:46 host sshd[18829]: Failed password for invalid user bigipuser3 from 125.229.130.72 port 51226 ssh2 Jan 18 22:41:49 host sshd[18829]: Failed password for invalid user bigipuser3 from 125.229.130.72 port 51226 ssh2 Jan 18 22:41:49 host sshd[18829]: Connection reset by 125.229.130.72 port 51226 [preauth] Jan 18 22:41:49 host sshd[18829]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.130.72 Jan 18 22:43:40 host sshd[19054]: Invalid user user from 220.134.196.96 port 42217 Jan 18 22:43:40 host sshd[19054]: input_userauth_request: invalid user user [preauth] Jan 18 22:43:40 host sshd[19054]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:43:40 host sshd[19054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.196.96 Jan 18 22:43:42 host sshd[19054]: Failed password for invalid user user from 220.134.196.96 port 42217 ssh2 Jan 18 22:43:43 host sshd[19054]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:43:45 host sshd[19054]: Failed password for invalid user user from 220.134.196.96 port 42217 ssh2 Jan 18 22:43:46 host sshd[19054]: Connection reset by 220.134.196.96 port 42217 [preauth] Jan 18 22:43:46 host sshd[19054]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.196.96 Jan 18 22:49:12 host sshd[19836]: Invalid user sFTPUser from 72.209.29.177 port 39971 Jan 18 22:49:12 host sshd[19836]: input_userauth_request: invalid user sFTPUser [preauth] Jan 18 22:49:12 host sshd[19836]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:49:12 host sshd[19836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.209.29.177 Jan 18 22:49:15 host sshd[19836]: Failed password for invalid user sFTPUser from 72.209.29.177 port 39971 ssh2 Jan 18 22:49:18 host sshd[19841]: Invalid user sFTPUser from 72.209.29.177 port 40005 Jan 18 22:49:18 host sshd[19841]: input_userauth_request: invalid user sFTPUser [preauth] Jan 18 22:49:18 host sshd[19841]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:49:18 host sshd[19841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.209.29.177 Jan 18 22:49:18 host sshd[19836]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:49:20 host sshd[19841]: Failed password for invalid user sFTPUser from 72.209.29.177 port 40005 ssh2 Jan 18 22:49:20 host sshd[19836]: Failed password for invalid user sFTPUser from 72.209.29.177 port 39971 ssh2 Jan 18 22:49:21 host sshd[19841]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:49:21 host sshd[19836]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:49:23 host sshd[19841]: Failed password for invalid user sFTPUser from 72.209.29.177 port 40005 ssh2 Jan 18 22:49:23 host sshd[19836]: Failed password for invalid user sFTPUser from 72.209.29.177 port 39971 ssh2 Jan 18 22:49:23 host sshd[19841]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:49:23 host sshd[19836]: Failed password for invalid user sFTPUser from 72.209.29.177 port 39971 ssh2 Jan 18 22:49:25 host sshd[19836]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:49:25 host sshd[19841]: Failed password for invalid user sFTPUser from 72.209.29.177 port 40005 ssh2 Jan 18 22:49:27 host sshd[19836]: Failed password for invalid user sFTPUser from 72.209.29.177 port 39971 ssh2 Jan 18 22:53:52 host sshd[20659]: User root from 114.33.164.157 not allowed because not listed in AllowUsers Jan 18 22:53:52 host sshd[20659]: input_userauth_request: invalid user root [preauth] Jan 18 22:53:52 host unix_chkpwd[20665]: password check failed for user (root) Jan 18 22:53:52 host sshd[20659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.164.157 user=root Jan 18 22:53:52 host sshd[20659]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 22:53:54 host sshd[20659]: Failed password for invalid user root from 114.33.164.157 port 49281 ssh2 Jan 18 22:53:55 host sshd[20659]: Connection reset by 114.33.164.157 port 49281 [preauth] Jan 18 22:54:56 host sshd[20796]: Invalid user gc from 194.110.203.109 port 50806 Jan 18 22:54:56 host sshd[20796]: input_userauth_request: invalid user gc [preauth] Jan 18 22:54:56 host sshd[20796]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:54:56 host sshd[20796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 22:54:58 host sshd[20796]: Failed password for invalid user gc from 194.110.203.109 port 50806 ssh2 Jan 18 22:55:01 host sshd[20796]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:55:03 host sshd[20796]: Failed password for invalid user gc from 194.110.203.109 port 50806 ssh2 Jan 18 22:55:06 host sshd[20796]: pam_unix(sshd:auth): check pass; user unknown Jan 18 22:55:08 host sshd[20796]: Failed password for invalid user gc from 194.110.203.109 port 50806 ssh2 Jan 18 22:55:11 host sshd[20796]: Connection closed by 194.110.203.109 port 50806 [preauth] Jan 18 22:55:11 host sshd[20796]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 18 23:12:02 host sshd[23168]: User root from 220.133.162.246 not allowed because not listed in AllowUsers Jan 18 23:12:02 host sshd[23168]: input_userauth_request: invalid user root [preauth] Jan 18 23:12:03 host unix_chkpwd[23189]: password check failed for user (root) Jan 18 23:12:03 host sshd[23168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.162.246 user=root Jan 18 23:12:03 host sshd[23168]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:12:04 host sshd[23168]: Failed password for invalid user root from 220.133.162.246 port 59272 ssh2 Jan 18 23:12:05 host unix_chkpwd[23192]: password check failed for user (root) Jan 18 23:12:05 host sshd[23168]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:12:07 host sshd[23168]: Failed password for invalid user root from 220.133.162.246 port 59272 ssh2 Jan 18 23:12:08 host unix_chkpwd[23196]: password check failed for user (root) Jan 18 23:12:08 host sshd[23168]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:12:09 host sshd[23168]: Failed password for invalid user root from 220.133.162.246 port 59272 ssh2 Jan 18 23:12:10 host sshd[23168]: Connection reset by 220.133.162.246 port 59272 [preauth] Jan 18 23:12:10 host sshd[23168]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.162.246 user=root Jan 18 23:12:58 host sshd[23305]: Invalid user admin from 156.38.18.25 port 40668 Jan 18 23:12:58 host sshd[23305]: input_userauth_request: invalid user admin [preauth] Jan 18 23:12:59 host sshd[23305]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:12:59 host sshd[23305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.38.18.25 Jan 18 23:13:01 host sshd[23305]: Failed password for invalid user admin from 156.38.18.25 port 40668 ssh2 Jan 18 23:13:01 host sshd[23305]: Connection closed by 156.38.18.25 port 40668 [preauth] Jan 18 23:16:39 host sshd[23720]: Invalid user security from 205.185.113.129 port 55804 Jan 18 23:16:39 host sshd[23720]: input_userauth_request: invalid user security [preauth] Jan 18 23:16:39 host sshd[23720]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:16:39 host sshd[23720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 18 23:16:40 host sshd[23720]: Failed password for invalid user security from 205.185.113.129 port 55804 ssh2 Jan 18 23:16:40 host sshd[23720]: Connection closed by 205.185.113.129 port 55804 [preauth] Jan 18 23:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 18 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=remysagr user-3=wwwkmaorg user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=shalinijames user-8=wwwtestugo user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=palco123 user-15=gifterman user-16=phmetals user-17=kottayamcalldriv user-18=mrsclean user-19=wwwnexidigital user-20=wwwkaretakers user-21=cochintaxi user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 18 23:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 18 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vUDkhXQoklJRYKrl.~ Jan 18 23:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vUDkhXQoklJRYKrl.~' Jan 18 23:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vUDkhXQoklJRYKrl.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 18 23:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 18 23:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:05 host sshd[24384]: Invalid user postgres from 209.141.55.27 port 39066 Jan 18 23:21:05 host sshd[24384]: input_userauth_request: invalid user postgres [preauth] Jan 18 23:21:05 host sshd[24384]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:21:05 host sshd[24384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 Jan 18 23:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 18 23:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 18 23:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 18 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 18 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 18 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 18 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 18 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:21:07 host sshd[24384]: Failed password for invalid user postgres from 209.141.55.27 port 39066 ssh2 Jan 18 23:21:07 host sshd[24384]: Received disconnect from 209.141.55.27 port 39066:11: Normal Shutdown, Thank you for playing [preauth] Jan 18 23:21:07 host sshd[24384]: Disconnected from 209.141.55.27 port 39066 [preauth] Jan 18 23:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 18 23:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 18 23:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 18 23:26:11 host sshd[25229]: Did not receive identification string from 143.110.183.245 port 61000 Jan 18 23:31:03 host sshd[25890]: Invalid user test from 49.73.6.159 port 35698 Jan 18 23:31:03 host sshd[25890]: input_userauth_request: invalid user test [preauth] Jan 18 23:31:04 host sshd[25890]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:31:04 host sshd[25890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.73.6.159 Jan 18 23:31:05 host sshd[25890]: Failed password for invalid user test from 49.73.6.159 port 35698 ssh2 Jan 18 23:31:06 host sshd[25890]: Connection closed by 49.73.6.159 port 35698 [preauth] Jan 18 23:35:14 host sshd[26408]: Connection reset by 125.228.177.177 port 54492 [preauth] Jan 18 23:36:17 host sshd[26620]: User root from 178.198.61.21 not allowed because not listed in AllowUsers Jan 18 23:36:17 host sshd[26620]: input_userauth_request: invalid user root [preauth] Jan 18 23:36:17 host unix_chkpwd[26624]: password check failed for user (root) Jan 18 23:36:17 host sshd[26620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.198.61.21 user=root Jan 18 23:36:17 host sshd[26620]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:36:19 host sshd[26620]: Failed password for invalid user root from 178.198.61.21 port 43444 ssh2 Jan 18 23:36:20 host unix_chkpwd[26628]: password check failed for user (root) Jan 18 23:36:20 host sshd[26620]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:36:22 host sshd[26620]: Failed password for invalid user root from 178.198.61.21 port 43444 ssh2 Jan 18 23:39:53 host sshd[27025]: Invalid user dockeradmin from 118.32.203.33 port 47216 Jan 18 23:39:53 host sshd[27025]: input_userauth_request: invalid user dockeradmin [preauth] Jan 18 23:39:53 host sshd[27025]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:39:53 host sshd[27025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.32.203.33 Jan 18 23:39:55 host sshd[27025]: Failed password for invalid user dockeradmin from 118.32.203.33 port 47216 ssh2 Jan 18 23:39:56 host sshd[27025]: Received disconnect from 118.32.203.33 port 47216:11: Bye Bye [preauth] Jan 18 23:39:56 host sshd[27025]: Disconnected from 118.32.203.33 port 47216 [preauth] Jan 18 23:40:27 host sshd[27091]: Invalid user webadmin from 143.198.222.239 port 57534 Jan 18 23:40:27 host sshd[27091]: input_userauth_request: invalid user webadmin [preauth] Jan 18 23:40:27 host sshd[27091]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:40:27 host sshd[27091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.222.239 Jan 18 23:40:29 host sshd[27091]: Failed password for invalid user webadmin from 143.198.222.239 port 57534 ssh2 Jan 18 23:40:29 host sshd[27091]: Received disconnect from 143.198.222.239 port 57534:11: Bye Bye [preauth] Jan 18 23:40:29 host sshd[27091]: Disconnected from 143.198.222.239 port 57534 [preauth] Jan 18 23:40:40 host sshd[27125]: User root from 170.244.245.201 not allowed because not listed in AllowUsers Jan 18 23:40:40 host sshd[27125]: input_userauth_request: invalid user root [preauth] Jan 18 23:40:40 host unix_chkpwd[27129]: password check failed for user (root) Jan 18 23:40:40 host sshd[27125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.244.245.201 user=root Jan 18 23:40:40 host sshd[27125]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:40:42 host sshd[27125]: Failed password for invalid user root from 170.244.245.201 port 56607 ssh2 Jan 18 23:40:42 host sshd[27125]: Received disconnect from 170.244.245.201 port 56607:11: Bye Bye [preauth] Jan 18 23:40:42 host sshd[27125]: Disconnected from 170.244.245.201 port 56607 [preauth] Jan 18 23:41:35 host sshd[27336]: User root from 222.228.88.86 not allowed because not listed in AllowUsers Jan 18 23:41:35 host sshd[27336]: input_userauth_request: invalid user root [preauth] Jan 18 23:41:35 host unix_chkpwd[27341]: password check failed for user (root) Jan 18 23:41:35 host sshd[27336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.228.88.86 user=root Jan 18 23:41:35 host sshd[27336]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:41:37 host sshd[27336]: Failed password for invalid user root from 222.228.88.86 port 35663 ssh2 Jan 18 23:41:38 host unix_chkpwd[27347]: password check failed for user (root) Jan 18 23:41:38 host sshd[27336]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:41:40 host sshd[27336]: Failed password for invalid user root from 222.228.88.86 port 35663 ssh2 Jan 18 23:41:40 host unix_chkpwd[27352]: password check failed for user (root) Jan 18 23:41:40 host sshd[27336]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:41:42 host sshd[27336]: Failed password for invalid user root from 222.228.88.86 port 35663 ssh2 Jan 18 23:41:43 host unix_chkpwd[27356]: password check failed for user (root) Jan 18 23:41:43 host sshd[27336]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:41:45 host sshd[27336]: Failed password for invalid user root from 222.228.88.86 port 35663 ssh2 Jan 18 23:41:46 host unix_chkpwd[27360]: password check failed for user (root) Jan 18 23:41:46 host sshd[27336]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:41:48 host sshd[27336]: Failed password for invalid user root from 222.228.88.86 port 35663 ssh2 Jan 18 23:41:59 host sshd[27412]: Invalid user ftpuser from 217.218.56.142 port 37213 Jan 18 23:41:59 host sshd[27412]: input_userauth_request: invalid user ftpuser [preauth] Jan 18 23:41:59 host sshd[27412]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:41:59 host sshd[27412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.218.56.142 Jan 18 23:42:01 host sshd[27412]: Failed password for invalid user ftpuser from 217.218.56.142 port 37213 ssh2 Jan 18 23:42:02 host sshd[27412]: Received disconnect from 217.218.56.142 port 37213:11: Bye Bye [preauth] Jan 18 23:42:02 host sshd[27412]: Disconnected from 217.218.56.142 port 37213 [preauth] Jan 18 23:42:12 host sshd[27453]: Invalid user mark from 170.64.156.206 port 46802 Jan 18 23:42:12 host sshd[27453]: input_userauth_request: invalid user mark [preauth] Jan 18 23:42:12 host sshd[27453]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:42:12 host sshd[27453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.156.206 Jan 18 23:42:15 host sshd[27453]: Failed password for invalid user mark from 170.64.156.206 port 46802 ssh2 Jan 18 23:42:15 host sshd[27453]: Received disconnect from 170.64.156.206 port 46802:11: Bye Bye [preauth] Jan 18 23:42:15 host sshd[27453]: Disconnected from 170.64.156.206 port 46802 [preauth] Jan 18 23:42:47 host sshd[27521]: Invalid user nginx from 189.60.140.75 port 47129 Jan 18 23:42:47 host sshd[27521]: input_userauth_request: invalid user nginx [preauth] Jan 18 23:42:47 host sshd[27521]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:42:47 host sshd[27521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.60.140.75 Jan 18 23:42:50 host sshd[27521]: Failed password for invalid user nginx from 189.60.140.75 port 47129 ssh2 Jan 18 23:42:50 host sshd[27521]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:42:52 host sshd[27521]: Failed password for invalid user nginx from 189.60.140.75 port 47129 ssh2 Jan 18 23:42:53 host sshd[27521]: Connection reset by 189.60.140.75 port 47129 [preauth] Jan 18 23:42:53 host sshd[27521]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.60.140.75 Jan 18 23:44:00 host sshd[27682]: Invalid user ftpuser from 181.176.145.114 port 50410 Jan 18 23:44:00 host sshd[27682]: input_userauth_request: invalid user ftpuser [preauth] Jan 18 23:44:00 host sshd[27682]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:44:00 host sshd[27682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.176.145.114 Jan 18 23:44:02 host sshd[27682]: Failed password for invalid user ftpuser from 181.176.145.114 port 50410 ssh2 Jan 18 23:44:03 host sshd[27682]: Received disconnect from 181.176.145.114 port 50410:11: Bye Bye [preauth] Jan 18 23:44:03 host sshd[27682]: Disconnected from 181.176.145.114 port 50410 [preauth] Jan 18 23:44:03 host sshd[27705]: Invalid user webadmin from 43.131.27.221 port 42682 Jan 18 23:44:03 host sshd[27705]: input_userauth_request: invalid user webadmin [preauth] Jan 18 23:44:03 host sshd[27705]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:44:03 host sshd[27705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.27.221 Jan 18 23:44:05 host sshd[27705]: Failed password for invalid user webadmin from 43.131.27.221 port 42682 ssh2 Jan 18 23:44:05 host sshd[27705]: Received disconnect from 43.131.27.221 port 42682:11: Bye Bye [preauth] Jan 18 23:44:05 host sshd[27705]: Disconnected from 43.131.27.221 port 42682 [preauth] Jan 18 23:45:49 host sshd[27952]: Invalid user developer from 143.198.222.239 port 39890 Jan 18 23:45:49 host sshd[27952]: input_userauth_request: invalid user developer [preauth] Jan 18 23:45:49 host sshd[27952]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:45:49 host sshd[27952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.222.239 Jan 18 23:45:50 host sshd[27952]: Failed password for invalid user developer from 143.198.222.239 port 39890 ssh2 Jan 18 23:45:50 host sshd[27952]: Received disconnect from 143.198.222.239 port 39890:11: Bye Bye [preauth] Jan 18 23:45:50 host sshd[27952]: Disconnected from 143.198.222.239 port 39890 [preauth] Jan 18 23:46:22 host sshd[28021]: User root from 118.32.203.33 not allowed because not listed in AllowUsers Jan 18 23:46:22 host sshd[28021]: input_userauth_request: invalid user root [preauth] Jan 18 23:46:22 host unix_chkpwd[28025]: password check failed for user (root) Jan 18 23:46:22 host sshd[28021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.32.203.33 user=root Jan 18 23:46:22 host sshd[28021]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:46:24 host sshd[28021]: Failed password for invalid user root from 118.32.203.33 port 47546 ssh2 Jan 18 23:46:24 host sshd[28021]: Received disconnect from 118.32.203.33 port 47546:11: Bye Bye [preauth] Jan 18 23:46:24 host sshd[28021]: Disconnected from 118.32.203.33 port 47546 [preauth] Jan 18 23:46:43 host sshd[28210]: Invalid user ubuntu from 181.176.145.114 port 39470 Jan 18 23:46:43 host sshd[28210]: input_userauth_request: invalid user ubuntu [preauth] Jan 18 23:46:43 host sshd[28210]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:46:43 host sshd[28210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.176.145.114 Jan 18 23:46:45 host sshd[28214]: Invalid user sammy from 170.244.245.201 port 44624 Jan 18 23:46:45 host sshd[28214]: input_userauth_request: invalid user sammy [preauth] Jan 18 23:46:45 host sshd[28214]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:46:45 host sshd[28214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.244.245.201 Jan 18 23:46:45 host sshd[28210]: Failed password for invalid user ubuntu from 181.176.145.114 port 39470 ssh2 Jan 18 23:46:45 host sshd[28210]: Received disconnect from 181.176.145.114 port 39470:11: Bye Bye [preauth] Jan 18 23:46:45 host sshd[28210]: Disconnected from 181.176.145.114 port 39470 [preauth] Jan 18 23:46:46 host sshd[28214]: Failed password for invalid user sammy from 170.244.245.201 port 44624 ssh2 Jan 18 23:46:47 host sshd[28214]: Received disconnect from 170.244.245.201 port 44624:11: Bye Bye [preauth] Jan 18 23:46:47 host sshd[28214]: Disconnected from 170.244.245.201 port 44624 [preauth] Jan 18 23:46:48 host sshd[28227]: Invalid user testing from 217.218.56.142 port 27856 Jan 18 23:46:48 host sshd[28227]: input_userauth_request: invalid user testing [preauth] Jan 18 23:46:48 host sshd[28227]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:46:48 host sshd[28227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.218.56.142 Jan 18 23:46:50 host sshd[28227]: Failed password for invalid user testing from 217.218.56.142 port 27856 ssh2 Jan 18 23:46:50 host sshd[28227]: Received disconnect from 217.218.56.142 port 27856:11: Bye Bye [preauth] Jan 18 23:46:50 host sshd[28227]: Disconnected from 217.218.56.142 port 27856 [preauth] Jan 18 23:46:51 host sshd[28258]: Invalid user elemental from 43.131.27.221 port 48468 Jan 18 23:46:51 host sshd[28258]: input_userauth_request: invalid user elemental [preauth] Jan 18 23:46:51 host sshd[28258]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:46:51 host sshd[28258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.27.221 Jan 18 23:46:53 host sshd[28258]: Failed password for invalid user elemental from 43.131.27.221 port 48468 ssh2 Jan 18 23:46:53 host sshd[28258]: Received disconnect from 43.131.27.221 port 48468:11: Bye Bye [preauth] Jan 18 23:46:53 host sshd[28258]: Disconnected from 43.131.27.221 port 48468 [preauth] Jan 18 23:47:06 host sshd[28302]: Invalid user grid from 170.64.156.206 port 36470 Jan 18 23:47:06 host sshd[28302]: input_userauth_request: invalid user grid [preauth] Jan 18 23:47:06 host sshd[28302]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:47:06 host sshd[28302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.156.206 Jan 18 23:47:09 host sshd[28302]: Failed password for invalid user grid from 170.64.156.206 port 36470 ssh2 Jan 18 23:47:09 host sshd[28302]: Received disconnect from 170.64.156.206 port 36470:11: Bye Bye [preauth] Jan 18 23:47:09 host sshd[28302]: Disconnected from 170.64.156.206 port 36470 [preauth] Jan 18 23:47:11 host sshd[28310]: User root from 143.198.222.239 not allowed because not listed in AllowUsers Jan 18 23:47:11 host sshd[28310]: input_userauth_request: invalid user root [preauth] Jan 18 23:47:11 host unix_chkpwd[28312]: password check failed for user (root) Jan 18 23:47:11 host sshd[28310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.222.239 user=root Jan 18 23:47:11 host sshd[28310]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:47:13 host sshd[28310]: Failed password for invalid user root from 143.198.222.239 port 35206 ssh2 Jan 18 23:47:39 host sshd[28411]: User root from 195.226.194.142 not allowed because not listed in AllowUsers Jan 18 23:47:39 host sshd[28411]: input_userauth_request: invalid user root [preauth] Jan 18 23:47:39 host unix_chkpwd[28414]: password check failed for user (root) Jan 18 23:47:39 host sshd[28411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 user=root Jan 18 23:47:39 host sshd[28411]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:47:41 host sshd[28411]: Failed password for invalid user root from 195.226.194.142 port 59562 ssh2 Jan 18 23:47:41 host sshd[28411]: Received disconnect from 195.226.194.142 port 59562:11: Bye Bye [preauth] Jan 18 23:47:41 host sshd[28411]: Disconnected from 195.226.194.142 port 59562 [preauth] Jan 18 23:47:56 host sshd[28439]: Invalid user media from 43.131.27.221 port 42496 Jan 18 23:47:56 host sshd[28439]: input_userauth_request: invalid user media [preauth] Jan 18 23:47:56 host sshd[28439]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:47:56 host sshd[28439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.131.27.221 Jan 18 23:47:58 host sshd[28439]: Failed password for invalid user media from 43.131.27.221 port 42496 ssh2 Jan 18 23:48:04 host sshd[28497]: Invalid user admin from 217.218.56.142 port 51638 Jan 18 23:48:04 host sshd[28497]: input_userauth_request: invalid user admin [preauth] Jan 18 23:48:04 host sshd[28497]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:48:04 host sshd[28497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.218.56.142 Jan 18 23:48:06 host sshd[28502]: Invalid user system from 181.176.145.114 port 57242 Jan 18 23:48:06 host sshd[28502]: input_userauth_request: invalid user system [preauth] Jan 18 23:48:06 host sshd[28502]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:48:06 host sshd[28502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.176.145.114 Jan 18 23:48:06 host sshd[28497]: Failed password for invalid user admin from 217.218.56.142 port 51638 ssh2 Jan 18 23:48:06 host sshd[28497]: Received disconnect from 217.218.56.142 port 51638:11: Bye Bye [preauth] Jan 18 23:48:06 host sshd[28497]: Disconnected from 217.218.56.142 port 51638 [preauth] Jan 18 23:48:08 host sshd[28502]: Failed password for invalid user system from 181.176.145.114 port 57242 ssh2 Jan 18 23:48:29 host sshd[28619]: Invalid user zjw from 170.64.156.206 port 59692 Jan 18 23:48:29 host sshd[28619]: input_userauth_request: invalid user zjw [preauth] Jan 18 23:48:29 host sshd[28619]: pam_unix(sshd:auth): check pass; user unknown Jan 18 23:48:29 host sshd[28619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.156.206 Jan 18 23:48:31 host sshd[28619]: Failed password for invalid user zjw from 170.64.156.206 port 59692 ssh2 Jan 18 23:48:32 host sshd[28619]: Received disconnect from 170.64.156.206 port 59692:11: Bye Bye [preauth] Jan 18 23:48:32 host sshd[28619]: Disconnected from 170.64.156.206 port 59692 [preauth] Jan 18 23:49:04 host sshd[28697]: Connection closed by 103.94.96.140 port 56834 [preauth] Jan 18 23:56:19 host sshd[29722]: User root from 219.85.229.21 not allowed because not listed in AllowUsers Jan 18 23:56:19 host sshd[29722]: input_userauth_request: invalid user root [preauth] Jan 18 23:56:19 host unix_chkpwd[29725]: password check failed for user (root) Jan 18 23:56:19 host sshd[29722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.85.229.21 user=root Jan 18 23:56:19 host sshd[29722]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:56:21 host sshd[29722]: Failed password for invalid user root from 219.85.229.21 port 58944 ssh2 Jan 18 23:56:22 host unix_chkpwd[29728]: password check failed for user (root) Jan 18 23:56:22 host sshd[29722]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:56:23 host sshd[29722]: Failed password for invalid user root from 219.85.229.21 port 58944 ssh2 Jan 18 23:56:24 host unix_chkpwd[29731]: password check failed for user (root) Jan 18 23:56:24 host sshd[29722]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:56:26 host sshd[29722]: Failed password for invalid user root from 219.85.229.21 port 58944 ssh2 Jan 18 23:56:27 host unix_chkpwd[29739]: password check failed for user (root) Jan 18 23:56:27 host sshd[29722]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 18 23:56:30 host sshd[29722]: Failed password for invalid user root from 219.85.229.21 port 58944 ssh2 Jan 19 00:00:29 host sshd[30398]: Bad protocol version identification '\026\003\001\001 \001' from 164.52.25.253 port 39131 Jan 19 00:00:29 host sshd[30400]: Bad protocol version identification '\026\003\001' from 164.52.25.253 port 42516 Jan 19 00:00:30 host sshd[30401]: Bad protocol version identification '\026\003\001' from 164.52.25.253 port 56760 Jan 19 00:00:30 host sshd[30402]: Bad protocol version identification '\026\003\001' from 164.52.25.253 port 59398 Jan 19 00:00:34 host sshd[30403]: Connection reset by 164.52.25.253 port 53668 [preauth] Jan 19 00:00:35 host sshd[30406]: Invalid user nginx from 153.222.227.102 port 38080 Jan 19 00:00:35 host sshd[30406]: input_userauth_request: invalid user nginx [preauth] Jan 19 00:00:35 host sshd[30406]: pam_unix(sshd:auth): check pass; user unknown Jan 19 00:00:35 host sshd[30406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.222.227.102 Jan 19 00:00:35 host sshd[30410]: Invalid user admin from 153.222.227.102 port 38052 Jan 19 00:00:35 host sshd[30410]: input_userauth_request: invalid user admin [preauth] Jan 19 00:00:35 host sshd[30410]: pam_unix(sshd:auth): check pass; user unknown Jan 19 00:00:35 host sshd[30410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.222.227.102 Jan 19 00:00:37 host sshd[30406]: Failed password for invalid user nginx from 153.222.227.102 port 38080 ssh2 Jan 19 00:00:37 host sshd[30406]: pam_unix(sshd:auth): check pass; user unknown Jan 19 00:00:37 host sshd[30410]: Failed password for invalid user admin from 153.222.227.102 port 38052 ssh2 Jan 19 00:00:38 host sshd[30410]: Failed password for invalid user admin from 153.222.227.102 port 38052 ssh2 Jan 19 00:00:38 host sshd[30410]: pam_unix(sshd:auth): check pass; user unknown Jan 19 00:00:39 host sshd[30406]: Failed password for invalid user nginx from 153.222.227.102 port 38080 ssh2 Jan 19 00:00:40 host sshd[30410]: Failed password for invalid user admin from 153.222.227.102 port 38052 ssh2 Jan 19 00:02:16 host sshd[30649]: Invalid user admin from 62.233.50.248 port 33813 Jan 19 00:02:16 host sshd[30649]: input_userauth_request: invalid user admin [preauth] Jan 19 00:02:16 host sshd[30649]: pam_unix(sshd:auth): check pass; user unknown Jan 19 00:02:16 host sshd[30649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 19 00:02:17 host sshd[30649]: Failed password for invalid user admin from 62.233.50.248 port 33813 ssh2 Jan 19 00:02:18 host sshd[30649]: Received disconnect from 62.233.50.248 port 33813:11: Client disconnecting normally [preauth] Jan 19 00:02:18 host sshd[30649]: Disconnected from 62.233.50.248 port 33813 [preauth] Jan 19 00:02:19 host sshd[30657]: User ftp from 62.233.50.248 not allowed because not listed in AllowUsers Jan 19 00:02:19 host sshd[30657]: input_userauth_request: invalid user ftp [preauth] Jan 19 00:02:19 host unix_chkpwd[30668]: password check failed for user (ftp) Jan 19 00:02:19 host sshd[30657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 user=ftp Jan 19 00:02:19 host sshd[30657]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 19 00:02:21 host sshd[30657]: Failed password for invalid user ftp from 62.233.50.248 port 37847 ssh2 Jan 19 00:02:22 host sshd[30657]: Received disconnect from 62.233.50.248 port 37847:11: Client disconnecting normally [preauth] Jan 19 00:02:22 host sshd[30657]: Disconnected from 62.233.50.248 port 37847 [preauth] Jan 19 00:02:23 host sshd[30697]: Invalid user user1 from 62.233.50.248 port 41949 Jan 19 00:02:23 host sshd[30697]: input_userauth_request: invalid user user1 [preauth] Jan 19 00:02:23 host sshd[30697]: pam_unix(sshd:auth): check pass; user unknown Jan 19 00:02:23 host sshd[30697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 19 00:02:25 host sshd[30697]: Failed password for invalid user user1 from 62.233.50.248 port 41949 ssh2 Jan 19 00:05:20 host sshd[31168]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Jan 19 00:05:20 host sshd[31168]: input_userauth_request: invalid user root [preauth] Jan 19 00:05:20 host unix_chkpwd[31170]: password check failed for user (root) Jan 19 00:05:20 host sshd[31168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Jan 19 00:05:20 host sshd[31168]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 00:05:22 host sshd[31168]: Failed password for invalid user root from 106.10.122.53 port 42904 ssh2 Jan 19 00:05:22 host sshd[31168]: Connection closed by 106.10.122.53 port 42904 [preauth] Jan 19 00:07:26 host sshd[31381]: Invalid user username from 58.242.25.218 port 41273 Jan 19 00:07:26 host sshd[31381]: input_userauth_request: invalid user username [preauth] Jan 19 00:07:27 host sshd[31381]: pam_unix(sshd:auth): check pass; user unknown Jan 19 00:07:27 host sshd[31381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.242.25.218 Jan 19 00:07:29 host sshd[31381]: Failed password for invalid user username from 58.242.25.218 port 41273 ssh2 Jan 19 00:07:29 host sshd[31381]: Connection closed by 58.242.25.218 port 41273 [preauth] Jan 19 00:08:47 host sshd[31538]: Invalid user support from 218.35.169.102 port 47756 Jan 19 00:08:47 host sshd[31538]: input_userauth_request: invalid user support [preauth] Jan 19 00:08:47 host sshd[31538]: pam_unix(sshd:auth): check pass; user unknown Jan 19 00:08:47 host sshd[31538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.35.169.102 Jan 19 00:08:49 host sshd[31538]: Failed password for invalid user support from 218.35.169.102 port 47756 ssh2 Jan 19 00:08:49 host sshd[31538]: pam_unix(sshd:auth): check pass; user unknown Jan 19 00:08:52 host sshd[31538]: Failed password for invalid user support from 218.35.169.102 port 47756 ssh2 Jan 19 00:08:52 host sshd[31538]: Connection reset by 218.35.169.102 port 47756 [preauth] Jan 19 00:08:52 host sshd[31538]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.35.169.102 Jan 19 00:12:30 host sshd[32068]: Invalid user postgres from 59.126.164.3 port 36576 Jan 19 00:12:30 host sshd[32068]: input_userauth_request: invalid user postgres [preauth] Jan 19 00:12:30 host sshd[32068]: pam_unix(sshd:auth): check pass; user unknown Jan 19 00:12:30 host sshd[32068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.164.3 Jan 19 00:12:32 host sshd[32068]: Failed password for invalid user postgres from 59.126.164.3 port 36576 ssh2 Jan 19 00:12:33 host sshd[32068]: pam_unix(sshd:auth): check pass; user unknown Jan 19 00:12:35 host sshd[32068]: Failed password for invalid user postgres from 59.126.164.3 port 36576 ssh2 Jan 19 00:12:35 host sshd[32068]: Connection reset by 59.126.164.3 port 36576 [preauth] Jan 19 00:12:35 host sshd[32068]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.164.3 Jan 19 00:14:44 host sshd[32508]: User root from 102.68.141.170 not allowed because not listed in AllowUsers Jan 19 00:14:44 host sshd[32508]: input_userauth_request: invalid user root [preauth] Jan 19 00:14:44 host unix_chkpwd[32512]: password check failed for user (root) Jan 19 00:14:44 host sshd[32508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.68.141.170 user=root Jan 19 00:14:44 host sshd[32508]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 00:14:46 host sshd[32508]: Failed password for invalid user root from 102.68.141.170 port 45654 ssh2 Jan 19 00:14:47 host sshd[32508]: Connection closed by 102.68.141.170 port 45654 [preauth] Jan 19 00:16:34 host sshd[1066]: Invalid user ec2-user from 125.229.146.44 port 37067 Jan 19 00:16:34 host sshd[1066]: input_userauth_request: invalid user ec2-user [preauth] Jan 19 00:16:34 host sshd[1066]: pam_unix(sshd:auth): check pass; user unknown Jan 19 00:16:34 host sshd[1066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.146.44 Jan 19 00:16:36 host sshd[1066]: Failed password for invalid user ec2-user from 125.229.146.44 port 37067 ssh2 Jan 19 00:16:36 host sshd[1066]: pam_unix(sshd:auth): check pass; user unknown Jan 19 00:16:38 host sshd[1066]: Failed password for invalid user ec2-user from 125.229.146.44 port 37067 ssh2 Jan 19 00:16:39 host sshd[1066]: Connection reset by 125.229.146.44 port 37067 [preauth] Jan 19 00:16:39 host sshd[1066]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.146.44 Jan 19 00:21:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 00:21:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 00:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 00:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=ugotscom user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=straightcurve user-13=wwwletsstalkfood user-14=bonifacegroup user-15=wwwevmhonda user-16=mrsclean user-17=wwwnexidigital user-18=gifterman user-19=palco123 user-20=phmetals user-21=kottayamcalldriv user-22=wwwkapin user-23=woodpeck user-24=disposeat user-25=wwwkmaorg user-26=remysagr user-27=pmcresources user-28=vfmassets user-29=wwwtestugo user-30=shalinijames feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 00:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 00:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 00:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8wCWJtzELYlwxOIc.~ Jan 19 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8wCWJtzELYlwxOIc.~' Jan 19 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-8wCWJtzELYlwxOIc.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 00:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 00:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 00:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 00:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 00:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 00:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 00:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 00:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 00:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 00:22:46 host sshd[2540]: Connection reset by 121.165.22.237 port 61319 [preauth] Jan 19 00:25:37 host sshd[2932]: User root from 124.170.64.213 not allowed because not listed in AllowUsers Jan 19 00:25:37 host sshd[2932]: input_userauth_request: invalid user root [preauth] Jan 19 00:25:37 host unix_chkpwd[2937]: password check failed for user (root) Jan 19 00:25:37 host sshd[2932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.170.64.213 user=root Jan 19 00:25:37 host sshd[2932]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 00:25:39 host sshd[2932]: Failed password for invalid user root from 124.170.64.213 port 48442 ssh2 Jan 19 00:25:40 host sshd[2932]: Connection closed by 124.170.64.213 port 48442 [preauth] Jan 19 00:26:17 host sshd[2999]: User root from 93.46.120.42 not allowed because not listed in AllowUsers Jan 19 00:26:17 host sshd[2999]: input_userauth_request: invalid user root [preauth] Jan 19 00:26:17 host unix_chkpwd[3013]: password check failed for user (root) Jan 19 00:26:17 host sshd[2999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.46.120.42 user=root Jan 19 00:26:17 host sshd[2999]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 00:26:19 host sshd[2999]: Failed password for invalid user root from 93.46.120.42 port 42708 ssh2 Jan 19 00:26:20 host sshd[2999]: Connection reset by 93.46.120.42 port 42708 [preauth] Jan 19 00:26:27 host sshd[3022]: Connection closed by 172.104.11.34 port 64960 [preauth] Jan 19 00:26:28 host sshd[3046]: Connection closed by 172.104.11.34 port 64964 [preauth] Jan 19 00:26:30 host sshd[3050]: Connection closed by 172.104.11.34 port 64974 [preauth] Jan 19 00:33:30 host sshd[4150]: User root from 92.46.108.20 not allowed because not listed in AllowUsers Jan 19 00:33:30 host sshd[4150]: input_userauth_request: invalid user root [preauth] Jan 19 00:33:31 host unix_chkpwd[4185]: password check failed for user (root) Jan 19 00:33:31 host sshd[4150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 user=root Jan 19 00:33:31 host sshd[4150]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 00:33:34 host sshd[4150]: Failed password for invalid user root from 92.46.108.20 port 60276 ssh2 Jan 19 00:33:35 host sshd[4150]: Connection closed by 92.46.108.20 port 60276 [preauth] Jan 19 00:40:46 host sshd[5204]: Invalid user gd from 194.110.203.109 port 45294 Jan 19 00:40:46 host sshd[5204]: input_userauth_request: invalid user gd [preauth] Jan 19 00:40:46 host sshd[5204]: pam_unix(sshd:auth): check pass; user unknown Jan 19 00:40:46 host sshd[5204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 00:40:48 host sshd[5204]: Failed password for invalid user gd from 194.110.203.109 port 45294 ssh2 Jan 19 00:40:51 host sshd[5204]: pam_unix(sshd:auth): check pass; user unknown Jan 19 00:40:53 host sshd[5204]: Failed password for invalid user gd from 194.110.203.109 port 45294 ssh2 Jan 19 00:40:56 host sshd[5204]: pam_unix(sshd:auth): check pass; user unknown Jan 19 00:40:58 host sshd[5204]: Failed password for invalid user gd from 194.110.203.109 port 45294 ssh2 Jan 19 00:41:01 host sshd[5204]: Connection closed by 194.110.203.109 port 45294 [preauth] Jan 19 00:41:01 host sshd[5204]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 00:43:57 host sshd[5704]: Invalid user ubnt from 23.164.114.167 port 33922 Jan 19 00:43:57 host sshd[5704]: input_userauth_request: invalid user ubnt [preauth] Jan 19 00:43:57 host sshd[5704]: pam_unix(sshd:auth): check pass; user unknown Jan 19 00:43:57 host sshd[5704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.164.114.167 Jan 19 00:43:59 host sshd[5704]: Failed password for invalid user ubnt from 23.164.114.167 port 33922 ssh2 Jan 19 00:43:59 host sshd[5704]: Connection closed by 23.164.114.167 port 33922 [preauth] Jan 19 01:02:20 host sshd[8274]: Invalid user admin from 83.248.60.139 port 40354 Jan 19 01:02:20 host sshd[8274]: input_userauth_request: invalid user admin [preauth] Jan 19 01:02:20 host sshd[8274]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:02:20 host sshd[8274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.248.60.139 Jan 19 01:02:22 host sshd[8274]: Failed password for invalid user admin from 83.248.60.139 port 40354 ssh2 Jan 19 01:02:22 host sshd[8274]: Connection closed by 83.248.60.139 port 40354 [preauth] Jan 19 01:06:14 host sshd[8873]: User root from 162.218.126.136 not allowed because not listed in AllowUsers Jan 19 01:06:14 host sshd[8873]: input_userauth_request: invalid user root [preauth] Jan 19 01:06:15 host unix_chkpwd[8877]: password check failed for user (root) Jan 19 01:06:15 host sshd[8873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 user=root Jan 19 01:06:15 host sshd[8873]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 01:06:16 host sshd[8873]: Failed password for invalid user root from 162.218.126.136 port 56112 ssh2 Jan 19 01:06:16 host sshd[8873]: Connection closed by 162.218.126.136 port 56112 [preauth] Jan 19 01:17:14 host sshd[10414]: Invalid user francis from 195.226.194.142 port 39342 Jan 19 01:17:14 host sshd[10414]: input_userauth_request: invalid user francis [preauth] Jan 19 01:17:15 host sshd[10414]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:17:15 host sshd[10414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 19 01:17:17 host sshd[10414]: Failed password for invalid user francis from 195.226.194.142 port 39342 ssh2 Jan 19 01:17:17 host sshd[10414]: Received disconnect from 195.226.194.142 port 39342:11: Bye Bye [preauth] Jan 19 01:17:17 host sshd[10414]: Disconnected from 195.226.194.142 port 39342 [preauth] Jan 19 01:20:50 host sshd[10936]: Invalid user default from 202.139.192.69 port 58542 Jan 19 01:20:50 host sshd[10936]: input_userauth_request: invalid user default [preauth] Jan 19 01:20:51 host sshd[10936]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:20:51 host sshd[10936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.139.192.69 Jan 19 01:20:52 host sshd[10936]: Failed password for invalid user default from 202.139.192.69 port 58542 ssh2 Jan 19 01:20:52 host sshd[10936]: Connection closed by 202.139.192.69 port 58542 [preauth] Jan 19 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 01:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 01:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=wwwletsstalkfood user-4=straightcurve user-5=kottayamcalldriv user-6=phmetals user-7=gifterman user-8=palco123 user-9=mrsclean user-10=wwwnexidigital user-11=disposeat user-12=remysagr user-13=wwwkmaorg user-14=woodpeck user-15=wwwkapin user-16=wwwtestugo user-17=shalinijames user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=wwwrmswll user-24=wwwresourcehunte user-25=keralaholi user-26=wwwkaretakers user-27=cochintaxi user-28=dartsimp user-29=a2zgroup user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 01:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 01:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EC3BNNEHbhG1xRIm.~ Jan 19 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EC3BNNEHbhG1xRIm.~' Jan 19 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-EC3BNNEHbhG1xRIm.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 01:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 01:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 01:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 01:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 01:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 01:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 01:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 01:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 01:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 01:30:09 host sshd[12480]: Invalid user admin123 from 159.223.197.166 port 56756 Jan 19 01:30:09 host sshd[12480]: input_userauth_request: invalid user admin123 [preauth] Jan 19 01:30:09 host sshd[12480]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:30:09 host sshd[12480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.197.166 Jan 19 01:30:11 host sshd[12480]: Failed password for invalid user admin123 from 159.223.197.166 port 56756 ssh2 Jan 19 01:30:11 host sshd[12480]: Received disconnect from 159.223.197.166 port 56756:11: Bye Bye [preauth] Jan 19 01:30:11 host sshd[12480]: Disconnected from 159.223.197.166 port 56756 [preauth] Jan 19 01:32:15 host sshd[12876]: Invalid user elasticsearch from 43.133.229.111 port 39482 Jan 19 01:32:15 host sshd[12876]: input_userauth_request: invalid user elasticsearch [preauth] Jan 19 01:32:15 host sshd[12876]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:32:15 host sshd[12876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.133.229.111 Jan 19 01:32:16 host sshd[12876]: Failed password for invalid user elasticsearch from 43.133.229.111 port 39482 ssh2 Jan 19 01:32:17 host sshd[12876]: Received disconnect from 43.133.229.111 port 39482:11: Bye Bye [preauth] Jan 19 01:32:17 host sshd[12876]: Disconnected from 43.133.229.111 port 39482 [preauth] Jan 19 01:32:36 host sshd[12936]: Invalid user ranger from 159.65.63.94 port 47990 Jan 19 01:32:36 host sshd[12936]: input_userauth_request: invalid user ranger [preauth] Jan 19 01:32:36 host sshd[12936]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:32:36 host sshd[12936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.63.94 Jan 19 01:32:38 host sshd[12936]: Failed password for invalid user ranger from 159.65.63.94 port 47990 ssh2 Jan 19 01:32:38 host sshd[12936]: Received disconnect from 159.65.63.94 port 47990:11: Bye Bye [preauth] Jan 19 01:32:38 host sshd[12936]: Disconnected from 159.65.63.94 port 47990 [preauth] Jan 19 01:32:48 host sshd[12966]: Invalid user factorio from 92.222.10.235 port 42176 Jan 19 01:32:48 host sshd[12966]: input_userauth_request: invalid user factorio [preauth] Jan 19 01:32:48 host sshd[12966]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:32:48 host sshd[12966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.10.235 Jan 19 01:32:50 host sshd[12966]: Failed password for invalid user factorio from 92.222.10.235 port 42176 ssh2 Jan 19 01:32:50 host sshd[12966]: Received disconnect from 92.222.10.235 port 42176:11: Bye Bye [preauth] Jan 19 01:32:50 host sshd[12966]: Disconnected from 92.222.10.235 port 42176 [preauth] Jan 19 01:34:20 host sshd[13195]: Invalid user ravi from 185.245.96.82 port 58948 Jan 19 01:34:20 host sshd[13195]: input_userauth_request: invalid user ravi [preauth] Jan 19 01:34:20 host sshd[13195]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:34:20 host sshd[13195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.245.96.82 Jan 19 01:34:22 host sshd[13195]: Failed password for invalid user ravi from 185.245.96.82 port 58948 ssh2 Jan 19 01:34:23 host sshd[13195]: Received disconnect from 185.245.96.82 port 58948:11: Bye Bye [preauth] Jan 19 01:34:23 host sshd[13195]: Disconnected from 185.245.96.82 port 58948 [preauth] Jan 19 01:35:27 host sshd[13435]: Invalid user debian from 45.55.65.93 port 36684 Jan 19 01:35:27 host sshd[13435]: input_userauth_request: invalid user debian [preauth] Jan 19 01:35:27 host sshd[13435]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:35:27 host sshd[13435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.65.93 Jan 19 01:35:29 host sshd[13435]: Failed password for invalid user debian from 45.55.65.93 port 36684 ssh2 Jan 19 01:35:29 host sshd[13435]: Received disconnect from 45.55.65.93 port 36684:11: Bye Bye [preauth] Jan 19 01:35:29 host sshd[13435]: Disconnected from 45.55.65.93 port 36684 [preauth] Jan 19 01:35:58 host sshd[13522]: User centos from 159.223.197.166 not allowed because not listed in AllowUsers Jan 19 01:35:58 host sshd[13522]: input_userauth_request: invalid user centos [preauth] Jan 19 01:35:58 host unix_chkpwd[13526]: password check failed for user (centos) Jan 19 01:35:58 host sshd[13522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.197.166 user=centos Jan 19 01:36:00 host sshd[13522]: Failed password for invalid user centos from 159.223.197.166 port 35942 ssh2 Jan 19 01:36:01 host sshd[13522]: Received disconnect from 159.223.197.166 port 35942:11: Bye Bye [preauth] Jan 19 01:36:01 host sshd[13522]: Disconnected from 159.223.197.166 port 35942 [preauth] Jan 19 01:36:09 host sshd[13588]: Invalid user factorio from 159.65.63.94 port 34842 Jan 19 01:36:09 host sshd[13588]: input_userauth_request: invalid user factorio [preauth] Jan 19 01:36:09 host sshd[13588]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:36:09 host sshd[13588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.63.94 Jan 19 01:36:12 host sshd[13588]: Failed password for invalid user factorio from 159.65.63.94 port 34842 ssh2 Jan 19 01:36:12 host sshd[13588]: Received disconnect from 159.65.63.94 port 34842:11: Bye Bye [preauth] Jan 19 01:36:12 host sshd[13588]: Disconnected from 159.65.63.94 port 34842 [preauth] Jan 19 01:36:13 host sshd[13597]: Invalid user sammy from 92.222.10.235 port 56122 Jan 19 01:36:13 host sshd[13597]: input_userauth_request: invalid user sammy [preauth] Jan 19 01:36:13 host sshd[13597]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:36:13 host sshd[13597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.10.235 Jan 19 01:36:16 host sshd[13597]: Failed password for invalid user sammy from 92.222.10.235 port 56122 ssh2 Jan 19 01:36:16 host sshd[13597]: Received disconnect from 92.222.10.235 port 56122:11: Bye Bye [preauth] Jan 19 01:36:16 host sshd[13597]: Disconnected from 92.222.10.235 port 56122 [preauth] Jan 19 01:36:41 host sshd[13663]: Invalid user celery from 43.133.229.111 port 50352 Jan 19 01:36:41 host sshd[13663]: input_userauth_request: invalid user celery [preauth] Jan 19 01:36:41 host sshd[13663]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:36:41 host sshd[13663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.133.229.111 Jan 19 01:36:43 host sshd[13663]: Failed password for invalid user celery from 43.133.229.111 port 50352 ssh2 Jan 19 01:36:43 host sshd[13663]: Received disconnect from 43.133.229.111 port 50352:11: Bye Bye [preauth] Jan 19 01:36:43 host sshd[13663]: Disconnected from 43.133.229.111 port 50352 [preauth] Jan 19 01:37:19 host sshd[13853]: User root from 45.55.65.93 not allowed because not listed in AllowUsers Jan 19 01:37:19 host sshd[13853]: input_userauth_request: invalid user root [preauth] Jan 19 01:37:19 host unix_chkpwd[13861]: password check failed for user (root) Jan 19 01:37:19 host sshd[13853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.65.93 user=root Jan 19 01:37:19 host sshd[13853]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 01:37:19 host sshd[13856]: User root from 159.65.63.94 not allowed because not listed in AllowUsers Jan 19 01:37:19 host sshd[13856]: input_userauth_request: invalid user root [preauth] Jan 19 01:37:19 host unix_chkpwd[13862]: password check failed for user (root) Jan 19 01:37:19 host sshd[13856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.63.94 user=root Jan 19 01:37:19 host sshd[13856]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 01:37:19 host sshd[13859]: Invalid user asterisk from 185.245.96.82 port 57346 Jan 19 01:37:19 host sshd[13859]: input_userauth_request: invalid user asterisk [preauth] Jan 19 01:37:19 host sshd[13859]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:37:19 host sshd[13859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.245.96.82 Jan 19 01:37:22 host sshd[13853]: Failed password for invalid user root from 45.55.65.93 port 43882 ssh2 Jan 19 01:37:22 host sshd[13856]: Failed password for invalid user root from 159.65.63.94 port 41046 ssh2 Jan 19 01:37:22 host sshd[13859]: Failed password for invalid user asterisk from 185.245.96.82 port 57346 ssh2 Jan 19 01:37:22 host sshd[13853]: Received disconnect from 45.55.65.93 port 43882:11: Bye Bye [preauth] Jan 19 01:37:22 host sshd[13853]: Disconnected from 45.55.65.93 port 43882 [preauth] Jan 19 01:37:22 host sshd[13856]: Received disconnect from 159.65.63.94 port 41046:11: Bye Bye [preauth] Jan 19 01:37:22 host sshd[13856]: Disconnected from 159.65.63.94 port 41046 [preauth] Jan 19 01:37:22 host sshd[13859]: Received disconnect from 185.245.96.82 port 57346:11: Bye Bye [preauth] Jan 19 01:37:22 host sshd[13859]: Disconnected from 185.245.96.82 port 57346 [preauth] Jan 19 01:37:22 host sshd[13867]: Invalid user debian from 92.222.10.235 port 54472 Jan 19 01:37:22 host sshd[13867]: input_userauth_request: invalid user debian [preauth] Jan 19 01:37:22 host sshd[13867]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:37:22 host sshd[13867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.10.235 Jan 19 01:37:24 host sshd[13867]: Failed password for invalid user debian from 92.222.10.235 port 54472 ssh2 Jan 19 01:37:25 host sshd[13867]: Received disconnect from 92.222.10.235 port 54472:11: Bye Bye [preauth] Jan 19 01:37:25 host sshd[13867]: Disconnected from 92.222.10.235 port 54472 [preauth] Jan 19 01:38:07 host sshd[14067]: User root from 43.133.229.111 not allowed because not listed in AllowUsers Jan 19 01:38:07 host sshd[14067]: input_userauth_request: invalid user root [preauth] Jan 19 01:38:07 host unix_chkpwd[14071]: password check failed for user (root) Jan 19 01:38:07 host sshd[14067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.133.229.111 user=root Jan 19 01:38:07 host sshd[14067]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 01:38:09 host sshd[14067]: Failed password for invalid user root from 43.133.229.111 port 58720 ssh2 Jan 19 01:38:25 host sshd[14151]: Invalid user es from 185.245.96.82 port 52242 Jan 19 01:38:25 host sshd[14151]: input_userauth_request: invalid user es [preauth] Jan 19 01:38:25 host sshd[14151]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:38:25 host sshd[14151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.245.96.82 Jan 19 01:38:27 host sshd[14151]: Failed password for invalid user es from 185.245.96.82 port 52242 ssh2 Jan 19 01:38:27 host sshd[14151]: Received disconnect from 185.245.96.82 port 52242:11: Bye Bye [preauth] Jan 19 01:38:27 host sshd[14151]: Disconnected from 185.245.96.82 port 52242 [preauth] Jan 19 01:39:08 host sshd[14299]: User root from 107.143.137.5 not allowed because not listed in AllowUsers Jan 19 01:39:08 host sshd[14299]: input_userauth_request: invalid user root [preauth] Jan 19 01:39:08 host unix_chkpwd[14308]: password check failed for user (root) Jan 19 01:39:08 host sshd[14299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.143.137.5 user=root Jan 19 01:39:08 host sshd[14299]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 01:39:11 host sshd[14299]: Failed password for invalid user root from 107.143.137.5 port 48065 ssh2 Jan 19 01:39:11 host sshd[14299]: Connection closed by 107.143.137.5 port 48065 [preauth] Jan 19 01:39:51 host sshd[14411]: Invalid user user01 from 51.195.122.210 port 38308 Jan 19 01:39:51 host sshd[14411]: input_userauth_request: invalid user user01 [preauth] Jan 19 01:39:51 host sshd[14411]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:39:51 host sshd[14411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.195.122.210 Jan 19 01:39:53 host sshd[14411]: Failed password for invalid user user01 from 51.195.122.210 port 38308 ssh2 Jan 19 01:39:54 host sshd[14411]: Received disconnect from 51.195.122.210 port 38308:11: Bye Bye [preauth] Jan 19 01:39:54 host sshd[14411]: Disconnected from 51.195.122.210 port 38308 [preauth] Jan 19 01:43:01 host sshd[15024]: Received disconnect from 51.195.122.210 port 51804:11: Bye Bye [preauth] Jan 19 01:43:01 host sshd[15024]: Disconnected from 51.195.122.210 port 51804 [preauth] Jan 19 01:45:47 host sshd[15593]: Invalid user ansadmin from 51.195.122.210 port 42252 Jan 19 01:45:47 host sshd[15593]: input_userauth_request: invalid user ansadmin [preauth] Jan 19 01:45:47 host sshd[15593]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:45:47 host sshd[15593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.195.122.210 Jan 19 01:45:48 host sshd[15593]: Failed password for invalid user ansadmin from 51.195.122.210 port 42252 ssh2 Jan 19 01:45:48 host sshd[15593]: Received disconnect from 51.195.122.210 port 42252:11: Bye Bye [preauth] Jan 19 01:45:48 host sshd[15593]: Disconnected from 51.195.122.210 port 42252 [preauth] Jan 19 01:48:35 host sshd[16346]: Connection closed by 51.195.122.210 port 42056 [preauth] Jan 19 01:51:24 host sshd[16784]: Invalid user factorio from 51.195.122.210 port 48828 Jan 19 01:51:24 host sshd[16784]: input_userauth_request: invalid user factorio [preauth] Jan 19 01:51:24 host sshd[16784]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:51:24 host sshd[16784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.195.122.210 Jan 19 01:51:26 host sshd[16784]: Failed password for invalid user factorio from 51.195.122.210 port 48828 ssh2 Jan 19 01:51:27 host sshd[16784]: Received disconnect from 51.195.122.210 port 48828:11: Bye Bye [preauth] Jan 19 01:51:27 host sshd[16784]: Disconnected from 51.195.122.210 port 48828 [preauth] Jan 19 01:58:47 host sshd[18043]: Invalid user steam from 114.34.129.188 port 33186 Jan 19 01:58:47 host sshd[18043]: input_userauth_request: invalid user steam [preauth] Jan 19 01:58:47 host sshd[18043]: pam_unix(sshd:auth): check pass; user unknown Jan 19 01:58:47 host sshd[18043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.129.188 Jan 19 01:58:49 host sshd[18043]: Failed password for invalid user steam from 114.34.129.188 port 33186 ssh2 Jan 19 01:58:50 host sshd[18043]: Connection reset by 114.34.129.188 port 33186 [preauth] Jan 19 02:00:51 host sshd[18322]: Invalid user http from 185.246.130.20 port 48461 Jan 19 02:00:51 host sshd[18322]: input_userauth_request: invalid user http [preauth] Jan 19 02:00:51 host sshd[18322]: Failed none for invalid user http from 185.246.130.20 port 48461 ssh2 Jan 19 02:00:52 host sshd[18322]: Disconnecting: Change of username or service not allowed: (http,ssh-connection) -> (factory,ssh-connection) [preauth] Jan 19 02:00:55 host sshd[18337]: Invalid user factory from 185.246.130.20 port 17081 Jan 19 02:00:55 host sshd[18337]: input_userauth_request: invalid user factory [preauth] Jan 19 02:00:55 host sshd[18337]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:00:55 host sshd[18337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.130.20 Jan 19 02:00:58 host sshd[18337]: Failed password for invalid user factory from 185.246.130.20 port 17081 ssh2 Jan 19 02:00:58 host sshd[18337]: Disconnecting: Change of username or service not allowed: (factory,ssh-connection) -> (3comcso,ssh-connection) [preauth] Jan 19 02:01:01 host sshd[18348]: Invalid user 3comcso from 185.246.130.20 port 16869 Jan 19 02:01:01 host sshd[18348]: input_userauth_request: invalid user 3comcso [preauth] Jan 19 02:01:02 host sshd[18348]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:01:02 host sshd[18348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.130.20 Jan 19 02:01:04 host sshd[18348]: Failed password for invalid user 3comcso from 185.246.130.20 port 16869 ssh2 Jan 19 02:01:05 host sshd[18348]: Disconnecting: Change of username or service not allowed: (3comcso,ssh-connection) -> (,ssh-connection) [preauth] Jan 19 02:01:07 host sshd[18384]: Bad protocol version identification 'SSH-2.0_CoreLab-1.0' from 185.246.130.20 port 1739 Jan 19 02:02:09 host sshd[18524]: Invalid user oracle from 211.223.150.169 port 62613 Jan 19 02:02:09 host sshd[18524]: input_userauth_request: invalid user oracle [preauth] Jan 19 02:02:09 host sshd[18524]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:02:09 host sshd[18524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.223.150.169 Jan 19 02:02:12 host sshd[18524]: Failed password for invalid user oracle from 211.223.150.169 port 62613 ssh2 Jan 19 02:02:12 host sshd[18524]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:02:14 host sshd[18524]: Failed password for invalid user oracle from 211.223.150.169 port 62613 ssh2 Jan 19 02:02:14 host sshd[18524]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:02:17 host sshd[18524]: Failed password for invalid user oracle from 211.223.150.169 port 62613 ssh2 Jan 19 02:02:18 host sshd[18524]: Failed password for invalid user oracle from 211.223.150.169 port 62613 ssh2 Jan 19 02:02:18 host sshd[18524]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:02:20 host sshd[18524]: Failed password for invalid user oracle from 211.223.150.169 port 62613 ssh2 Jan 19 02:03:28 host sshd[18694]: Invalid user admin from 59.120.231.41 port 58210 Jan 19 02:03:28 host sshd[18694]: input_userauth_request: invalid user admin [preauth] Jan 19 02:03:28 host sshd[18694]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:03:28 host sshd[18694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.231.41 Jan 19 02:03:30 host sshd[18694]: Failed password for invalid user admin from 59.120.231.41 port 58210 ssh2 Jan 19 02:03:30 host sshd[18694]: Failed password for invalid user admin from 59.120.231.41 port 58210 ssh2 Jan 19 02:03:31 host sshd[18694]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:03:33 host sshd[18694]: Failed password for invalid user admin from 59.120.231.41 port 58210 ssh2 Jan 19 02:03:33 host sshd[18699]: Invalid user postgres from 125.227.205.53 port 58887 Jan 19 02:03:33 host sshd[18699]: input_userauth_request: invalid user postgres [preauth] Jan 19 02:03:33 host sshd[18699]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:03:33 host sshd[18699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.227.205.53 Jan 19 02:03:33 host sshd[18694]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:03:35 host sshd[18699]: Failed password for invalid user postgres from 125.227.205.53 port 58887 ssh2 Jan 19 02:03:35 host sshd[18694]: Failed password for invalid user admin from 59.120.231.41 port 58210 ssh2 Jan 19 02:03:35 host sshd[18694]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:03:36 host sshd[18699]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:03:38 host sshd[18694]: Failed password for invalid user admin from 59.120.231.41 port 58210 ssh2 Jan 19 02:03:38 host sshd[18699]: Failed password for invalid user postgres from 125.227.205.53 port 58887 ssh2 Jan 19 02:03:38 host sshd[18694]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:03:38 host sshd[18699]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:03:41 host sshd[18694]: Failed password for invalid user admin from 59.120.231.41 port 58210 ssh2 Jan 19 02:03:41 host sshd[18694]: error: maximum authentication attempts exceeded for invalid user admin from 59.120.231.41 port 58210 ssh2 [preauth] Jan 19 02:03:41 host sshd[18694]: Disconnecting: Too many authentication failures [preauth] Jan 19 02:03:41 host sshd[18694]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.231.41 Jan 19 02:03:41 host sshd[18694]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 19 02:03:41 host sshd[18699]: Failed password for invalid user postgres from 125.227.205.53 port 58887 ssh2 Jan 19 02:03:42 host sshd[18699]: Failed password for invalid user postgres from 125.227.205.53 port 58887 ssh2 Jan 19 02:03:42 host sshd[18699]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:03:44 host sshd[18699]: Failed password for invalid user postgres from 125.227.205.53 port 58887 ssh2 Jan 19 02:06:24 host sshd[19203]: User root from 121.148.215.114 not allowed because not listed in AllowUsers Jan 19 02:06:24 host sshd[19203]: input_userauth_request: invalid user root [preauth] Jan 19 02:06:24 host unix_chkpwd[19207]: password check failed for user (root) Jan 19 02:06:24 host sshd[19203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.148.215.114 user=root Jan 19 02:06:24 host sshd[19203]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 02:06:26 host sshd[19203]: Failed password for invalid user root from 121.148.215.114 port 61574 ssh2 Jan 19 02:06:26 host sshd[19203]: Connection reset by 121.148.215.114 port 61574 [preauth] Jan 19 02:10:01 host sshd[19715]: User root from 41.197.31.178 not allowed because not listed in AllowUsers Jan 19 02:10:01 host sshd[19715]: input_userauth_request: invalid user root [preauth] Jan 19 02:10:01 host unix_chkpwd[19742]: password check failed for user (root) Jan 19 02:10:01 host sshd[19715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.197.31.178 user=root Jan 19 02:10:01 host sshd[19715]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 02:10:04 host sshd[19715]: Failed password for invalid user root from 41.197.31.178 port 59784 ssh2 Jan 19 02:10:04 host sshd[19715]: Connection closed by 41.197.31.178 port 59784 [preauth] Jan 19 02:13:14 host sshd[20126]: Connection closed by 192.241.231.9 port 51896 [preauth] Jan 19 02:16:11 host sshd[20569]: Invalid user admin from 223.22.233.95 port 49507 Jan 19 02:16:11 host sshd[20569]: input_userauth_request: invalid user admin [preauth] Jan 19 02:16:11 host sshd[20569]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:16:11 host sshd[20569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.22.233.95 Jan 19 02:16:13 host sshd[20569]: Failed password for invalid user admin from 223.22.233.95 port 49507 ssh2 Jan 19 02:16:14 host sshd[20569]: Connection closed by 223.22.233.95 port 49507 [preauth] Jan 19 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 02:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 02:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=gifterman user-17=palco123 user-18=phmetals user-19=kottayamcalldriv user-20=wwwnexidigital user-21=mrsclean user-22=wwwkmaorg user-23=disposeat user-24=remysagr user-25=wwwkapin user-26=woodpeck user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 02:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 02:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 02:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-km7f5964Jizrnc3X.~ Jan 19 02:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-km7f5964Jizrnc3X.~' Jan 19 02:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-km7f5964Jizrnc3X.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 02:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 02:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 02:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 02:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 02:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 02:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 02:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 02:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 02:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 02:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:22:40 host sshd[21615]: Invalid user ge from 194.110.203.109 port 51742 Jan 19 02:22:40 host sshd[21615]: input_userauth_request: invalid user ge [preauth] Jan 19 02:22:40 host sshd[21615]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:22:40 host sshd[21615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 02:22:41 host sshd[21615]: Failed password for invalid user ge from 194.110.203.109 port 51742 ssh2 Jan 19 02:22:45 host sshd[21615]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:22:47 host sshd[21615]: Failed password for invalid user ge from 194.110.203.109 port 51742 ssh2 Jan 19 02:22:50 host sshd[21615]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:22:52 host sshd[21615]: Failed password for invalid user ge from 194.110.203.109 port 51742 ssh2 Jan 19 02:22:55 host sshd[21615]: Connection closed by 194.110.203.109 port 51742 [preauth] Jan 19 02:22:55 host sshd[21615]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 02:27:19 host sshd[22234]: Invalid user gitlab-runner from 112.186.241.34 port 46917 Jan 19 02:27:19 host sshd[22234]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 19 02:27:19 host sshd[22234]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:27:19 host sshd[22234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.241.34 Jan 19 02:27:21 host sshd[22234]: Failed password for invalid user gitlab-runner from 112.186.241.34 port 46917 ssh2 Jan 19 02:27:22 host sshd[22234]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:27:24 host sshd[22234]: Failed password for invalid user gitlab-runner from 112.186.241.34 port 46917 ssh2 Jan 19 02:27:25 host sshd[22234]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:27:27 host sshd[22234]: Failed password for invalid user gitlab-runner from 112.186.241.34 port 46917 ssh2 Jan 19 02:27:28 host sshd[22234]: Failed password for invalid user gitlab-runner from 112.186.241.34 port 46917 ssh2 Jan 19 02:27:28 host sshd[22234]: Connection closed by 112.186.241.34 port 46917 [preauth] Jan 19 02:27:28 host sshd[22234]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.241.34 Jan 19 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=remysagr user-4=disposeat user-5=wwwkmaorg user-6=pmcresources user-7=shalinijames user-8=wwwtestugo user-9=vfmassets user-10=wwwletsstalkfood user-11=straightcurve user-12=wwwevmhonda user-13=bonifacegroup user-14=mrsclean user-15=wwwnexidigital user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=wwwkaretakers user-21=cochintaxi user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=ugotscom user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 02:29:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Jan 19 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 19 02:29:10 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 19 02:29:10 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 19 02:29:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Jan 19 02:29:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Jan 19 02:29:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Jan 19 02:29:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 19 02:29:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 19 02:29:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 19 02:29:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Jan 19 02:29:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:25 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Jan 19 02:29:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Jan 19 02:29:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Jan 19 02:29:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:27 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Jan 19 02:29:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:27 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Jan 19 02:29:41 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:41 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Jan 19 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Jan 19 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Jan 19 02:29:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:47 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 19 02:29:47 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 19 02:29:47 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 19 02:29:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Jan 19 02:29:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:47 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 02:29:47 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 02:29:47 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 02:29:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 19 02:29:47 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 19 02:29:47 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 19 02:29:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Jan 19 02:29:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:47 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 19 02:29:56 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 19 02:29:56 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 19 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Jan 19 02:29:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Jan 19 02:29:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Jan 19 02:29:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:29:57 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:30:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Jan 19 02:30:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:30:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:30:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Jan 19 02:30:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:30:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:30:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 19 02:30:25 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 19 02:30:26 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 19 02:30:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Jan 19 02:30:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:30:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Jan 19 02:30:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:30:27 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:30:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Jan 19 02:30:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:30:27 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:30:33 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Jan 19 02:30:33 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:30:33 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:30:52 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 19 02:30:52 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 19 02:30:52 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 19 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Jan 19 02:30:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:30:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 19 02:31:19 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 19 02:31:19 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 19 02:31:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Jan 19 02:31:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:31:36 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Jan 19 02:31:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:31:40 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Jan 19 02:31:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:31:40 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Jan 19 02:31:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:31:40 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 19 02:31:40 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 02:31:40 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 02:31:41 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Jan 19 02:31:41 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:31:41 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:31:49 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 19 02:31:49 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 02:31:49 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 02:32:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Jan 19 02:32:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:32:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:32:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 19 02:32:27 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 02:32:27 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 02:32:32 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Jan 19 02:32:32 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:32:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:32:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Jan 19 02:32:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:32:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:32:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Jan 19 02:32:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:32:36 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Jan 19 02:32:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:32:36 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 19 02:32:36 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 19 02:32:36 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 19 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Jan 19 02:32:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:32:36 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:32:36 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Jan 19 02:32:36 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:32:36 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 19 02:33:28 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 19 02:33:28 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 19 02:33:28 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Jan 19 02:33:28 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:33:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:33:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Jan 19 02:33:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:33:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:33:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Jan 19 02:33:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:33:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:33:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Jan 19 02:33:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:33:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:33:48 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Jan 19 02:33:48 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:33:48 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:34:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwkapin WpToolkitNotification send_admin_suspicious_instance_notification 'suspicious_instance_text=The following WordPress installations are quarantined:<br/>' 'suspicious_instance_details_info=Website "Resource Hunters" (http://resourcehunters.com): WP Toolkit was not able to finish running an operation on this site in 60 seconds, so the operation was terminated. This could mean that your WordPress installation might be infected with malware. Check the wp-config.php file of the installation for potential malware code or run an anti-virus scan. If you cannot find any traces of malware, try running the operation again later.' --output=json Jan 19 02:34:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:34:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:34:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Jan 19 02:34:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:34:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:34:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Jan 19 02:34:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:34:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:34:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 19 02:34:55 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 19 02:34:55 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 19 02:34:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Jan 19 02:34:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:34:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:34:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwkapin WpToolkitNotification send_admin_auto_updates_notification 'available_updates_text=<br/><br/>Updates are available for the following items:<br/><br/>' 'available_updates_list=1. Plugin "W3 Total Cache" on Let'"'"'s Stalk Food (http://www.letsstalkfood.com). Installed version: 0.15.1. Available version: 2.2.12.<br/><br/>2. Plugin "W3 Total Cache" on Today'"'"'s Traveller (http://testugo.in/tt). Installed version: 0.14.1. Available version: 2.2.12.<br/><br/>3. Plugin "W3 Total Cache" on Today'"'"'s Traveller (http://testugo.in/tt). Installed version: 0.14.1. Available version: 2.2.12.<br/><br/>4. Plugin "Advanced Custom Fields" on Panlys (https://www.panlys.com). Installed version: 5.9.5. Available version: 6.0.7.<br/><br/>' installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not Jan 19 02:34:55 host sudo: wp-toolkit : (command continued) installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 Jan 19 02:34:55 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password Jan 19 02:34:55 host sudo: wp-toolkit : (command continued) information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012[error]FailedToExecuteWpCliCommand: exit status Jan 19 02:34:55 host sudo: wp-toolkit : (command continued) 1[/error]#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: [error]FailedToExecuteWpCliCommand: chdir /home/woodpeck/public_html/wp: no such file or directory[/error]#012<br/><br/>6. Website "/home/wwwresourcehunte/public_html" (http://resourcehunters.com): Failed to reset cache for the instance #18: WP Toolkit was not able to finish running an operation on this site in 60 seconds, so the operation was terminated. This could mean that your WordPress installation might be infected with malware. Check the wp-config.php file of the installation for potential malware code or run an anti-virus scan. If you cannot find any traces of malware, try running the operation again later.<br/><br/>' --output=json Jan 19 02:34:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:34:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 19 02:35:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 19 02:35:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 19 02:35:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 19 02:35:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 19 02:35:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 19 02:35:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:35:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:35:24 host sshd[25977]: Invalid user engineer from 102.216.33.159 port 45871 Jan 19 02:35:24 host sshd[25977]: input_userauth_request: invalid user engineer [preauth] Jan 19 02:35:25 host sshd[25977]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:35:25 host sshd[25977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.216.33.159 Jan 19 02:35:27 host sshd[25977]: Failed password for invalid user engineer from 102.216.33.159 port 45871 ssh2 Jan 19 02:35:28 host sshd[25977]: Connection closed by 102.216.33.159 port 45871 [preauth] Jan 19 02:44:22 host sshd[27119]: User root from 112.186.151.169 not allowed because not listed in AllowUsers Jan 19 02:44:22 host sshd[27119]: input_userauth_request: invalid user root [preauth] Jan 19 02:44:22 host unix_chkpwd[27123]: password check failed for user (root) Jan 19 02:44:22 host sshd[27119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.151.169 user=root Jan 19 02:44:22 host sshd[27119]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 02:44:24 host sshd[27119]: Failed password for invalid user root from 112.186.151.169 port 60128 ssh2 Jan 19 02:44:25 host unix_chkpwd[27129]: password check failed for user (root) Jan 19 02:44:25 host sshd[27119]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 02:44:27 host sshd[27119]: Failed password for invalid user root from 112.186.151.169 port 60128 ssh2 Jan 19 02:44:28 host unix_chkpwd[27153]: password check failed for user (root) Jan 19 02:44:28 host sshd[27119]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 02:44:30 host sshd[27119]: Failed password for invalid user root from 112.186.151.169 port 60128 ssh2 Jan 19 02:44:30 host unix_chkpwd[27157]: password check failed for user (root) Jan 19 02:44:30 host sshd[27119]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 02:44:33 host sshd[27119]: Failed password for invalid user root from 112.186.151.169 port 60128 ssh2 Jan 19 02:44:33 host unix_chkpwd[27160]: password check failed for user (root) Jan 19 02:44:33 host sshd[27119]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 02:44:35 host sshd[27119]: Failed password for invalid user root from 112.186.151.169 port 60128 ssh2 Jan 19 02:44:35 host unix_chkpwd[27170]: password check failed for user (root) Jan 19 02:44:35 host sshd[27119]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 02:44:37 host sshd[27119]: Failed password for invalid user root from 112.186.151.169 port 60128 ssh2 Jan 19 02:44:37 host sshd[27119]: error: maximum authentication attempts exceeded for invalid user root from 112.186.151.169 port 60128 ssh2 [preauth] Jan 19 02:44:37 host sshd[27119]: Disconnecting: Too many authentication failures [preauth] Jan 19 02:44:37 host sshd[27119]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.151.169 user=root Jan 19 02:44:37 host sshd[27119]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 19 02:46:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 02:46:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:46:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:46:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 02:46:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:46:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:46:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 02:46:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:46:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:46:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 02:46:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:46:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:46:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 02:46:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:46:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:46:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 02:46:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:46:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:46:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 02:46:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 02:46:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 02:46:39 host sshd[27646]: Connection closed by 162.142.125.210 port 50602 [preauth] Jan 19 02:51:24 host sshd[28401]: Invalid user dmdba from 195.70.93.131 port 44173 Jan 19 02:51:24 host sshd[28401]: input_userauth_request: invalid user dmdba [preauth] Jan 19 02:51:24 host sshd[28401]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:51:24 host sshd[28401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.70.93.131 Jan 19 02:51:26 host sshd[28401]: Failed password for invalid user dmdba from 195.70.93.131 port 44173 ssh2 Jan 19 02:51:27 host sshd[28401]: Failed password for invalid user dmdba from 195.70.93.131 port 44173 ssh2 Jan 19 02:51:28 host sshd[28401]: Connection closed by 195.70.93.131 port 44173 [preauth] Jan 19 02:54:40 host sshd[28799]: Invalid user admin from 113.160.15.163 port 43434 Jan 19 02:54:40 host sshd[28799]: input_userauth_request: invalid user admin [preauth] Jan 19 02:54:44 host sshd[28799]: pam_unix(sshd:auth): check pass; user unknown Jan 19 02:54:44 host sshd[28799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.160.15.163 Jan 19 02:54:46 host sshd[28799]: Failed password for invalid user admin from 113.160.15.163 port 43434 ssh2 Jan 19 02:54:48 host sshd[28799]: Connection closed by 113.160.15.163 port 43434 [preauth] Jan 19 02:55:52 host sshd[29063]: Connection reset by 59.126.150.10 port 40337 [preauth] Jan 19 03:13:04 host sshd[31388]: Invalid user admin from 185.121.0.4 port 17288 Jan 19 03:13:04 host sshd[31388]: input_userauth_request: invalid user admin [preauth] Jan 19 03:13:04 host sshd[31388]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:13:04 host sshd[31388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.121.0.4 Jan 19 03:13:07 host sshd[31388]: Failed password for invalid user admin from 185.121.0.4 port 17288 ssh2 Jan 19 03:13:08 host sshd[31388]: Connection closed by 185.121.0.4 port 17288 [preauth] Jan 19 03:13:42 host sshd[31475]: Invalid user vadmin from 121.159.226.42 port 61697 Jan 19 03:13:42 host sshd[31475]: input_userauth_request: invalid user vadmin [preauth] Jan 19 03:13:42 host sshd[31475]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:13:42 host sshd[31475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.159.226.42 Jan 19 03:13:44 host sshd[31475]: Failed password for invalid user vadmin from 121.159.226.42 port 61697 ssh2 Jan 19 03:13:45 host sshd[31475]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:13:46 host sshd[31475]: Failed password for invalid user vadmin from 121.159.226.42 port 61697 ssh2 Jan 19 03:17:34 host sshd[32150]: Invalid user travis from 107.189.30.59 port 45236 Jan 19 03:17:34 host sshd[32150]: input_userauth_request: invalid user travis [preauth] Jan 19 03:17:34 host sshd[32150]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:17:34 host sshd[32150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 19 03:17:36 host sshd[32150]: Failed password for invalid user travis from 107.189.30.59 port 45236 ssh2 Jan 19 03:17:37 host sshd[32150]: Connection closed by 107.189.30.59 port 45236 [preauth] Jan 19 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 03:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 03:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=shalinijames user-4=wwwtestugo user-5=woodpeck user-6=wwwkapin user-7=remysagr user-8=disposeat user-9=wwwkmaorg user-10=mrsclean user-11=wwwnexidigital user-12=palco123 user-13=gifterman user-14=phmetals user-15=kottayamcalldriv user-16=straightcurve user-17=wwwletsstalkfood user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=keralaholi user-26=wwwresourcehunte user-27=wwwrmswll user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 03:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 03:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 03:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CdNagV7QyNT7dBDo.~ Jan 19 03:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CdNagV7QyNT7dBDo.~' Jan 19 03:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CdNagV7QyNT7dBDo.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 03:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 03:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 03:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 03:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 03:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 03:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 03:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 03:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 03:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 03:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 03:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 03:28:50 host sshd[1834]: User root from 125.228.182.137 not allowed because not listed in AllowUsers Jan 19 03:28:50 host sshd[1834]: input_userauth_request: invalid user root [preauth] Jan 19 03:28:50 host unix_chkpwd[1847]: password check failed for user (root) Jan 19 03:28:50 host sshd[1834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.182.137 user=root Jan 19 03:28:50 host sshd[1834]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 03:28:52 host sshd[1834]: Failed password for invalid user root from 125.228.182.137 port 39773 ssh2 Jan 19 03:28:54 host unix_chkpwd[1873]: password check failed for user (root) Jan 19 03:28:54 host sshd[1834]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 03:28:56 host sshd[1834]: Failed password for invalid user root from 125.228.182.137 port 39773 ssh2 Jan 19 03:28:56 host unix_chkpwd[1882]: password check failed for user (root) Jan 19 03:28:56 host sshd[1834]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 03:28:59 host sshd[1834]: Failed password for invalid user root from 125.228.182.137 port 39773 ssh2 Jan 19 03:28:59 host unix_chkpwd[1889]: password check failed for user (root) Jan 19 03:28:59 host sshd[1834]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 03:29:01 host sshd[1834]: Failed password for invalid user root from 125.228.182.137 port 39773 ssh2 Jan 19 03:31:59 host sshd[2626]: User root from 116.199.248.81 not allowed because not listed in AllowUsers Jan 19 03:31:59 host sshd[2626]: input_userauth_request: invalid user root [preauth] Jan 19 03:31:59 host unix_chkpwd[2632]: password check failed for user (root) Jan 19 03:31:59 host sshd[2626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.199.248.81 user=root Jan 19 03:31:59 host sshd[2626]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 03:32:01 host sshd[2626]: Failed password for invalid user root from 116.199.248.81 port 57406 ssh2 Jan 19 03:32:02 host sshd[2626]: Connection closed by 116.199.248.81 port 57406 [preauth] Jan 19 03:41:16 host sshd[4259]: Invalid user redis from 182.75.139.26 port 37446 Jan 19 03:41:16 host sshd[4259]: input_userauth_request: invalid user redis [preauth] Jan 19 03:41:16 host sshd[4259]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:41:16 host sshd[4259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.139.26 Jan 19 03:41:18 host sshd[4259]: Failed password for invalid user redis from 182.75.139.26 port 37446 ssh2 Jan 19 03:41:18 host sshd[4259]: Received disconnect from 182.75.139.26 port 37446:11: Bye Bye [preauth] Jan 19 03:41:18 host sshd[4259]: Disconnected from 182.75.139.26 port 37446 [preauth] Jan 19 03:42:05 host sshd[4342]: Invalid user deploy from 178.128.171.48 port 34920 Jan 19 03:42:05 host sshd[4342]: input_userauth_request: invalid user deploy [preauth] Jan 19 03:42:05 host sshd[4342]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:42:05 host sshd[4342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.171.48 Jan 19 03:42:07 host sshd[4342]: Failed password for invalid user deploy from 178.128.171.48 port 34920 ssh2 Jan 19 03:42:07 host sshd[4342]: Received disconnect from 178.128.171.48 port 34920:11: Bye Bye [preauth] Jan 19 03:42:07 host sshd[4342]: Disconnected from 178.128.171.48 port 34920 [preauth] Jan 19 03:43:12 host sshd[4483]: Invalid user frappe from 187.95.144.110 port 36706 Jan 19 03:43:12 host sshd[4483]: input_userauth_request: invalid user frappe [preauth] Jan 19 03:43:12 host sshd[4483]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:43:12 host sshd[4483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.95.144.110 Jan 19 03:43:14 host sshd[4483]: Failed password for invalid user frappe from 187.95.144.110 port 36706 ssh2 Jan 19 03:43:15 host sshd[4483]: Received disconnect from 187.95.144.110 port 36706:11: Bye Bye [preauth] Jan 19 03:43:15 host sshd[4483]: Disconnected from 187.95.144.110 port 36706 [preauth] Jan 19 03:43:17 host sshd[4500]: Invalid user bodega from 85.62.218.82 port 60176 Jan 19 03:43:17 host sshd[4500]: input_userauth_request: invalid user bodega [preauth] Jan 19 03:43:17 host sshd[4500]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:43:17 host sshd[4500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.62.218.82 Jan 19 03:43:19 host sshd[4500]: Failed password for invalid user bodega from 85.62.218.82 port 60176 ssh2 Jan 19 03:43:19 host sshd[4500]: Received disconnect from 85.62.218.82 port 60176:11: Bye Bye [preauth] Jan 19 03:43:19 host sshd[4500]: Disconnected from 85.62.218.82 port 60176 [preauth] Jan 19 03:43:39 host sshd[4559]: Invalid user deployer from 35.175.148.93 port 54180 Jan 19 03:43:39 host sshd[4559]: input_userauth_request: invalid user deployer [preauth] Jan 19 03:43:39 host sshd[4559]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:43:39 host sshd[4559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.175.148.93 Jan 19 03:43:41 host sshd[4559]: Failed password for invalid user deployer from 35.175.148.93 port 54180 ssh2 Jan 19 03:43:41 host sshd[4559]: Received disconnect from 35.175.148.93 port 54180:11: Bye Bye [preauth] Jan 19 03:43:41 host sshd[4559]: Disconnected from 35.175.148.93 port 54180 [preauth] Jan 19 03:43:44 host sshd[4567]: Invalid user ftpuser from 143.110.168.248 port 59862 Jan 19 03:43:44 host sshd[4567]: input_userauth_request: invalid user ftpuser [preauth] Jan 19 03:43:44 host sshd[4567]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:43:44 host sshd[4567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.168.248 Jan 19 03:43:47 host sshd[4567]: Failed password for invalid user ftpuser from 143.110.168.248 port 59862 ssh2 Jan 19 03:43:47 host sshd[4567]: Received disconnect from 143.110.168.248 port 59862:11: Bye Bye [preauth] Jan 19 03:43:47 host sshd[4567]: Disconnected from 143.110.168.248 port 59862 [preauth] Jan 19 03:44:18 host sshd[4626]: Invalid user vbox from 134.122.23.33 port 33920 Jan 19 03:44:18 host sshd[4626]: input_userauth_request: invalid user vbox [preauth] Jan 19 03:44:18 host sshd[4626]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:44:18 host sshd[4626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.23.33 Jan 19 03:44:20 host sshd[4626]: Failed password for invalid user vbox from 134.122.23.33 port 33920 ssh2 Jan 19 03:44:21 host sshd[4626]: Received disconnect from 134.122.23.33 port 33920:11: Bye Bye [preauth] Jan 19 03:44:21 host sshd[4626]: Disconnected from 134.122.23.33 port 33920 [preauth] Jan 19 03:45:00 host sshd[4713]: Invalid user postgres from 161.35.117.192 port 35248 Jan 19 03:45:00 host sshd[4713]: input_userauth_request: invalid user postgres [preauth] Jan 19 03:45:00 host sshd[4713]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:45:00 host sshd[4713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.117.192 Jan 19 03:45:02 host sshd[4713]: Failed password for invalid user postgres from 161.35.117.192 port 35248 ssh2 Jan 19 03:45:02 host sshd[4713]: Received disconnect from 161.35.117.192 port 35248:11: Bye Bye [preauth] Jan 19 03:45:02 host sshd[4713]: Disconnected from 161.35.117.192 port 35248 [preauth] Jan 19 03:45:12 host sshd[4770]: Invalid user redis from 51.77.245.237 port 55918 Jan 19 03:45:12 host sshd[4770]: input_userauth_request: invalid user redis [preauth] Jan 19 03:45:12 host sshd[4770]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:45:12 host sshd[4770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.245.237 Jan 19 03:45:13 host sshd[4773]: Invalid user deploy from 167.172.159.73 port 40698 Jan 19 03:45:13 host sshd[4773]: input_userauth_request: invalid user deploy [preauth] Jan 19 03:45:13 host sshd[4773]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:45:13 host sshd[4773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.159.73 Jan 19 03:45:14 host sshd[4770]: Failed password for invalid user redis from 51.77.245.237 port 55918 ssh2 Jan 19 03:45:15 host sshd[4770]: Received disconnect from 51.77.245.237 port 55918:11: Bye Bye [preauth] Jan 19 03:45:15 host sshd[4770]: Disconnected from 51.77.245.237 port 55918 [preauth] Jan 19 03:45:15 host sshd[4773]: Failed password for invalid user deploy from 167.172.159.73 port 40698 ssh2 Jan 19 03:45:15 host sshd[4773]: Received disconnect from 167.172.159.73 port 40698:11: Bye Bye [preauth] Jan 19 03:45:15 host sshd[4773]: Disconnected from 167.172.159.73 port 40698 [preauth] Jan 19 03:45:24 host sshd[4788]: Invalid user postgres from 107.172.201.220 port 36438 Jan 19 03:45:24 host sshd[4788]: input_userauth_request: invalid user postgres [preauth] Jan 19 03:45:24 host sshd[4788]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:45:24 host sshd[4788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.201.220 Jan 19 03:45:26 host sshd[4788]: Failed password for invalid user postgres from 107.172.201.220 port 36438 ssh2 Jan 19 03:45:27 host sshd[4788]: Received disconnect from 107.172.201.220 port 36438:11: Bye Bye [preauth] Jan 19 03:45:27 host sshd[4788]: Disconnected from 107.172.201.220 port 36438 [preauth] Jan 19 03:45:40 host sshd[4922]: Invalid user app from 178.128.150.124 port 43788 Jan 19 03:45:40 host sshd[4922]: input_userauth_request: invalid user app [preauth] Jan 19 03:45:40 host sshd[4922]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:45:40 host sshd[4922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.150.124 Jan 19 03:45:42 host sshd[4922]: Failed password for invalid user app from 178.128.150.124 port 43788 ssh2 Jan 19 03:45:42 host sshd[4922]: Received disconnect from 178.128.150.124 port 43788:11: Bye Bye [preauth] Jan 19 03:45:42 host sshd[4922]: Disconnected from 178.128.150.124 port 43788 [preauth] Jan 19 03:46:57 host sshd[5079]: Invalid user oracle from 137.184.95.238 port 52058 Jan 19 03:46:57 host sshd[5079]: input_userauth_request: invalid user oracle [preauth] Jan 19 03:46:57 host sshd[5079]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:46:57 host sshd[5079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.95.238 Jan 19 03:47:00 host sshd[5079]: Failed password for invalid user oracle from 137.184.95.238 port 52058 ssh2 Jan 19 03:47:00 host sshd[5079]: Received disconnect from 137.184.95.238 port 52058:11: Bye Bye [preauth] Jan 19 03:47:00 host sshd[5079]: Disconnected from 137.184.95.238 port 52058 [preauth] Jan 19 03:47:06 host sshd[5117]: Invalid user elasticsearch from 186.209.62.109 port 41199 Jan 19 03:47:06 host sshd[5117]: input_userauth_request: invalid user elasticsearch [preauth] Jan 19 03:47:06 host sshd[5117]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:47:06 host sshd[5117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.209.62.109 Jan 19 03:47:06 host sshd[5124]: Invalid user jack from 182.75.139.26 port 38804 Jan 19 03:47:06 host sshd[5124]: input_userauth_request: invalid user jack [preauth] Jan 19 03:47:06 host sshd[5124]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:47:06 host sshd[5124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.139.26 Jan 19 03:47:08 host sshd[5117]: Failed password for invalid user elasticsearch from 186.209.62.109 port 41199 ssh2 Jan 19 03:47:08 host sshd[5124]: Failed password for invalid user jack from 182.75.139.26 port 38804 ssh2 Jan 19 03:47:08 host sshd[5124]: Received disconnect from 182.75.139.26 port 38804:11: Bye Bye [preauth] Jan 19 03:47:08 host sshd[5124]: Disconnected from 182.75.139.26 port 38804 [preauth] Jan 19 03:47:08 host sshd[5117]: Received disconnect from 186.209.62.109 port 41199:11: Bye Bye [preauth] Jan 19 03:47:08 host sshd[5117]: Disconnected from 186.209.62.109 port 41199 [preauth] Jan 19 03:47:17 host sshd[5159]: Invalid user samba from 85.62.218.82 port 44376 Jan 19 03:47:17 host sshd[5159]: input_userauth_request: invalid user samba [preauth] Jan 19 03:47:17 host sshd[5159]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:47:17 host sshd[5159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.62.218.82 Jan 19 03:47:18 host sshd[5159]: Failed password for invalid user samba from 85.62.218.82 port 44376 ssh2 Jan 19 03:47:19 host sshd[5159]: Received disconnect from 85.62.218.82 port 44376:11: Bye Bye [preauth] Jan 19 03:47:19 host sshd[5159]: Disconnected from 85.62.218.82 port 44376 [preauth] Jan 19 03:47:20 host sshd[5167]: Invalid user techuser from 122.154.48.30 port 54652 Jan 19 03:47:20 host sshd[5167]: input_userauth_request: invalid user techuser [preauth] Jan 19 03:47:20 host sshd[5167]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:47:20 host sshd[5167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.48.30 Jan 19 03:47:22 host sshd[5167]: Failed password for invalid user techuser from 122.154.48.30 port 54652 ssh2 Jan 19 03:47:22 host sshd[5167]: Received disconnect from 122.154.48.30 port 54652:11: Bye Bye [preauth] Jan 19 03:47:22 host sshd[5167]: Disconnected from 122.154.48.30 port 54652 [preauth] Jan 19 03:47:23 host sshd[5173]: Invalid user vagrant from 161.35.117.192 port 54474 Jan 19 03:47:23 host sshd[5173]: input_userauth_request: invalid user vagrant [preauth] Jan 19 03:47:23 host sshd[5173]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:47:23 host sshd[5173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.117.192 Jan 19 03:47:25 host sshd[5173]: Failed password for invalid user vagrant from 161.35.117.192 port 54474 ssh2 Jan 19 03:47:25 host sshd[5173]: Received disconnect from 161.35.117.192 port 54474:11: Bye Bye [preauth] Jan 19 03:47:25 host sshd[5173]: Disconnected from 161.35.117.192 port 54474 [preauth] Jan 19 03:47:40 host sshd[5231]: User root from 38.54.30.231 not allowed because not listed in AllowUsers Jan 19 03:47:40 host sshd[5231]: input_userauth_request: invalid user root [preauth] Jan 19 03:47:40 host unix_chkpwd[5233]: password check failed for user (root) Jan 19 03:47:40 host sshd[5231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.54.30.231 user=root Jan 19 03:47:40 host sshd[5231]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 03:47:42 host sshd[5231]: Failed password for invalid user root from 38.54.30.231 port 34518 ssh2 Jan 19 03:47:43 host sshd[5231]: Received disconnect from 38.54.30.231 port 34518:11: Bye Bye [preauth] Jan 19 03:47:43 host sshd[5231]: Disconnected from 38.54.30.231 port 34518 [preauth] Jan 19 03:47:44 host sshd[5240]: Invalid user magento from 164.92.233.93 port 35628 Jan 19 03:47:44 host sshd[5240]: input_userauth_request: invalid user magento [preauth] Jan 19 03:47:44 host sshd[5240]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:47:44 host sshd[5240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.233.93 Jan 19 03:47:46 host sshd[5240]: Failed password for invalid user magento from 164.92.233.93 port 35628 ssh2 Jan 19 03:47:47 host sshd[5240]: Received disconnect from 164.92.233.93 port 35628:11: Bye Bye [preauth] Jan 19 03:47:47 host sshd[5240]: Disconnected from 164.92.233.93 port 35628 [preauth] Jan 19 03:47:49 host sshd[5249]: User root from 51.77.245.237 not allowed because not listed in AllowUsers Jan 19 03:47:49 host sshd[5249]: input_userauth_request: invalid user root [preauth] Jan 19 03:47:49 host unix_chkpwd[5252]: password check failed for user (root) Jan 19 03:47:49 host sshd[5249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.245.237 user=root Jan 19 03:47:49 host sshd[5249]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 03:47:51 host sshd[5249]: Failed password for invalid user root from 51.77.245.237 port 36060 ssh2 Jan 19 03:47:51 host sshd[5249]: Received disconnect from 51.77.245.237 port 36060:11: Bye Bye [preauth] Jan 19 03:47:51 host sshd[5249]: Disconnected from 51.77.245.237 port 36060 [preauth] Jan 19 03:48:00 host sshd[5297]: User root from 198.50.235.42 not allowed because not listed in AllowUsers Jan 19 03:48:00 host sshd[5297]: input_userauth_request: invalid user root [preauth] Jan 19 03:48:00 host unix_chkpwd[5300]: password check failed for user (root) Jan 19 03:48:00 host sshd[5297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.235.42 user=root Jan 19 03:48:00 host sshd[5297]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 03:48:02 host sshd[5297]: Failed password for invalid user root from 198.50.235.42 port 60341 ssh2 Jan 19 03:48:02 host sshd[5297]: Received disconnect from 198.50.235.42 port 60341:11: Bye Bye [preauth] Jan 19 03:48:02 host sshd[5297]: Disconnected from 198.50.235.42 port 60341 [preauth] Jan 19 03:48:18 host sshd[5353]: Invalid user kafka from 85.62.218.82 port 48958 Jan 19 03:48:18 host sshd[5353]: input_userauth_request: invalid user kafka [preauth] Jan 19 03:48:18 host sshd[5353]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:48:18 host sshd[5353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.62.218.82 Jan 19 03:48:19 host sshd[5353]: Failed password for invalid user kafka from 85.62.218.82 port 48958 ssh2 Jan 19 03:48:20 host sshd[5353]: Received disconnect from 85.62.218.82 port 48958:11: Bye Bye [preauth] Jan 19 03:48:20 host sshd[5353]: Disconnected from 85.62.218.82 port 48958 [preauth] Jan 19 03:48:27 host sshd[5397]: Invalid user redis from 161.35.117.192 port 32938 Jan 19 03:48:27 host sshd[5397]: input_userauth_request: invalid user redis [preauth] Jan 19 03:48:27 host sshd[5397]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:48:27 host sshd[5397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.117.192 Jan 19 03:48:27 host sshd[5424]: User root from 182.75.139.26 not allowed because not listed in AllowUsers Jan 19 03:48:27 host sshd[5424]: input_userauth_request: invalid user root [preauth] Jan 19 03:48:27 host unix_chkpwd[5427]: password check failed for user (root) Jan 19 03:48:27 host sshd[5424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.139.26 user=root Jan 19 03:48:27 host sshd[5424]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 03:48:29 host sshd[5397]: Failed password for invalid user redis from 161.35.117.192 port 32938 ssh2 Jan 19 03:48:29 host sshd[5424]: Failed password for invalid user root from 182.75.139.26 port 37458 ssh2 Jan 19 03:48:29 host sshd[5424]: Received disconnect from 182.75.139.26 port 37458:11: Bye Bye [preauth] Jan 19 03:48:29 host sshd[5424]: Disconnected from 182.75.139.26 port 37458 [preauth] Jan 19 03:48:29 host sshd[5397]: Received disconnect from 161.35.117.192 port 32938:11: Bye Bye [preauth] Jan 19 03:48:29 host sshd[5397]: Disconnected from 161.35.117.192 port 32938 [preauth] Jan 19 03:48:33 host sshd[5447]: Invalid user vagrant from 134.122.23.33 port 54042 Jan 19 03:48:33 host sshd[5447]: input_userauth_request: invalid user vagrant [preauth] Jan 19 03:48:33 host sshd[5447]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:48:33 host sshd[5447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.23.33 Jan 19 03:48:35 host sshd[5447]: Failed password for invalid user vagrant from 134.122.23.33 port 54042 ssh2 Jan 19 03:48:35 host sshd[5447]: Received disconnect from 134.122.23.33 port 54042:11: Bye Bye [preauth] Jan 19 03:48:35 host sshd[5447]: Disconnected from 134.122.23.33 port 54042 [preauth] Jan 19 03:48:37 host sshd[5507]: Invalid user postgres from 187.95.144.110 port 50050 Jan 19 03:48:37 host sshd[5507]: input_userauth_request: invalid user postgres [preauth] Jan 19 03:48:37 host sshd[5507]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:48:37 host sshd[5507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.95.144.110 Jan 19 03:48:39 host sshd[5507]: Failed password for invalid user postgres from 187.95.144.110 port 50050 ssh2 Jan 19 03:48:40 host sshd[5507]: Received disconnect from 187.95.144.110 port 50050:11: Bye Bye [preauth] Jan 19 03:48:40 host sshd[5507]: Disconnected from 187.95.144.110 port 50050 [preauth] Jan 19 03:48:42 host sshd[5520]: Invalid user elasticsearch from 178.128.171.48 port 45002 Jan 19 03:48:42 host sshd[5520]: input_userauth_request: invalid user elasticsearch [preauth] Jan 19 03:48:42 host sshd[5520]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:48:42 host sshd[5520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.171.48 Jan 19 03:48:44 host sshd[5520]: Failed password for invalid user elasticsearch from 178.128.171.48 port 45002 ssh2 Jan 19 03:48:44 host sshd[5520]: Received disconnect from 178.128.171.48 port 45002:11: Bye Bye [preauth] Jan 19 03:48:44 host sshd[5520]: Disconnected from 178.128.171.48 port 45002 [preauth] Jan 19 03:49:02 host sshd[5571]: Invalid user arkserver from 107.172.201.220 port 39958 Jan 19 03:49:02 host sshd[5571]: input_userauth_request: invalid user arkserver [preauth] Jan 19 03:49:02 host sshd[5571]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:49:02 host sshd[5571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.201.220 Jan 19 03:49:04 host sshd[5571]: Failed password for invalid user arkserver from 107.172.201.220 port 39958 ssh2 Jan 19 03:49:04 host sshd[5571]: Received disconnect from 107.172.201.220 port 39958:11: Bye Bye [preauth] Jan 19 03:49:04 host sshd[5571]: Disconnected from 107.172.201.220 port 39958 [preauth] Jan 19 03:49:16 host sshd[5625]: Invalid user system from 35.175.148.93 port 60936 Jan 19 03:49:16 host sshd[5625]: input_userauth_request: invalid user system [preauth] Jan 19 03:49:16 host sshd[5625]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:49:16 host sshd[5625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.175.148.93 Jan 19 03:49:19 host sshd[5625]: Failed password for invalid user system from 35.175.148.93 port 60936 ssh2 Jan 19 03:49:19 host sshd[5625]: Received disconnect from 35.175.148.93 port 60936:11: Bye Bye [preauth] Jan 19 03:49:19 host sshd[5625]: Disconnected from 35.175.148.93 port 60936 [preauth] Jan 19 03:49:21 host sshd[5635]: Invalid user elemental from 137.184.95.238 port 44158 Jan 19 03:49:21 host sshd[5635]: input_userauth_request: invalid user elemental [preauth] Jan 19 03:49:21 host sshd[5635]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:49:21 host sshd[5635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.95.238 Jan 19 03:49:23 host sshd[5639]: Invalid user oracle from 198.50.235.42 port 46355 Jan 19 03:49:23 host sshd[5639]: input_userauth_request: invalid user oracle [preauth] Jan 19 03:49:23 host sshd[5639]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:49:23 host sshd[5639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.50.235.42 Jan 19 03:49:24 host sshd[5635]: Failed password for invalid user elemental from 137.184.95.238 port 44158 ssh2 Jan 19 03:49:24 host sshd[5635]: Received disconnect from 137.184.95.238 port 44158:11: Bye Bye [preauth] Jan 19 03:49:24 host sshd[5635]: Disconnected from 137.184.95.238 port 44158 [preauth] Jan 19 03:49:25 host sshd[5639]: Failed password for invalid user oracle from 198.50.235.42 port 46355 ssh2 Jan 19 03:49:26 host sshd[5639]: Received disconnect from 198.50.235.42 port 46355:11: Bye Bye [preauth] Jan 19 03:49:26 host sshd[5639]: Disconnected from 198.50.235.42 port 46355 [preauth] Jan 19 03:49:36 host sshd[5716]: Invalid user abc from 38.54.30.231 port 34842 Jan 19 03:49:36 host sshd[5716]: input_userauth_request: invalid user abc [preauth] Jan 19 03:49:36 host sshd[5716]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:49:36 host sshd[5716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.54.30.231 Jan 19 03:49:37 host sshd[5718]: Invalid user a from 186.209.62.109 port 58136 Jan 19 03:49:37 host sshd[5718]: input_userauth_request: invalid user a [preauth] Jan 19 03:49:37 host sshd[5718]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:49:37 host sshd[5718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.209.62.109 Jan 19 03:49:38 host sshd[5716]: Failed password for invalid user abc from 38.54.30.231 port 34842 ssh2 Jan 19 03:49:38 host sshd[5716]: Received disconnect from 38.54.30.231 port 34842:11: Bye Bye [preauth] Jan 19 03:49:38 host sshd[5716]: Disconnected from 38.54.30.231 port 34842 [preauth] Jan 19 03:49:39 host sshd[5718]: Failed password for invalid user a from 186.209.62.109 port 58136 ssh2 Jan 19 03:49:39 host sshd[5718]: Received disconnect from 186.209.62.109 port 58136:11: Bye Bye [preauth] Jan 19 03:49:39 host sshd[5718]: Disconnected from 186.209.62.109 port 58136 [preauth] Jan 19 03:49:42 host sshd[5725]: User root from 143.110.168.248 not allowed because not listed in AllowUsers Jan 19 03:49:42 host sshd[5725]: input_userauth_request: invalid user root [preauth] Jan 19 03:49:42 host unix_chkpwd[5760]: password check failed for user (root) Jan 19 03:49:42 host sshd[5725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.168.248 user=root Jan 19 03:49:43 host sshd[5725]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 03:49:45 host sshd[5725]: Failed password for invalid user root from 143.110.168.248 port 36012 ssh2 Jan 19 03:49:45 host sshd[5725]: Received disconnect from 143.110.168.248 port 36012:11: Bye Bye [preauth] Jan 19 03:49:45 host sshd[5725]: Disconnected from 143.110.168.248 port 36012 [preauth] Jan 19 03:49:45 host sshd[5763]: Invalid user test from 167.172.159.73 port 46368 Jan 19 03:49:45 host sshd[5763]: input_userauth_request: invalid user test [preauth] Jan 19 03:49:45 host sshd[5763]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:49:45 host sshd[5763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.159.73 Jan 19 03:49:46 host sshd[5766]: Invalid user test from 178.128.171.48 port 40628 Jan 19 03:49:46 host sshd[5766]: input_userauth_request: invalid user test [preauth] Jan 19 03:49:46 host sshd[5766]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:49:46 host sshd[5766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.171.48 Jan 19 03:49:47 host sshd[5763]: Failed password for invalid user test from 167.172.159.73 port 46368 ssh2 Jan 19 03:49:47 host sshd[5772]: Invalid user node from 178.128.150.124 port 41420 Jan 19 03:49:47 host sshd[5772]: input_userauth_request: invalid user node [preauth] Jan 19 03:49:47 host sshd[5772]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:49:47 host sshd[5772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.150.124 Jan 19 03:49:48 host sshd[5763]: Received disconnect from 167.172.159.73 port 46368:11: Bye Bye [preauth] Jan 19 03:49:48 host sshd[5763]: Disconnected from 167.172.159.73 port 46368 [preauth] Jan 19 03:49:48 host sshd[5766]: Failed password for invalid user test from 178.128.171.48 port 40628 ssh2 Jan 19 03:49:49 host sshd[5772]: Failed password for invalid user node from 178.128.150.124 port 41420 ssh2 Jan 19 03:49:50 host sshd[5772]: Received disconnect from 178.128.150.124 port 41420:11: Bye Bye [preauth] Jan 19 03:49:50 host sshd[5772]: Disconnected from 178.128.150.124 port 41420 [preauth] Jan 19 03:49:54 host sshd[5850]: Invalid user builder from 134.122.23.33 port 52882 Jan 19 03:49:54 host sshd[5850]: input_userauth_request: invalid user builder [preauth] Jan 19 03:49:54 host sshd[5850]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:49:54 host sshd[5850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.23.33 Jan 19 03:49:56 host sshd[5855]: Invalid user deploy from 187.95.144.110 port 37010 Jan 19 03:49:56 host sshd[5855]: input_userauth_request: invalid user deploy [preauth] Jan 19 03:49:56 host sshd[5855]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:49:56 host sshd[5855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.95.144.110 Jan 19 03:49:57 host sshd[5850]: Failed password for invalid user builder from 134.122.23.33 port 52882 ssh2 Jan 19 03:49:57 host sshd[5850]: Received disconnect from 134.122.23.33 port 52882:11: Bye Bye [preauth] Jan 19 03:49:57 host sshd[5850]: Disconnected from 134.122.23.33 port 52882 [preauth] Jan 19 03:49:59 host sshd[5855]: Failed password for invalid user deploy from 187.95.144.110 port 37010 ssh2 Jan 19 03:50:09 host sshd[5977]: User root from 164.92.233.93 not allowed because not listed in AllowUsers Jan 19 03:50:09 host sshd[5977]: input_userauth_request: invalid user root [preauth] Jan 19 03:50:09 host unix_chkpwd[5980]: password check failed for user (root) Jan 19 03:50:09 host sshd[5977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.233.93 user=root Jan 19 03:50:09 host sshd[5977]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 03:50:11 host sshd[5982]: User root from 107.172.201.220 not allowed because not listed in AllowUsers Jan 19 03:50:11 host sshd[5982]: input_userauth_request: invalid user root [preauth] Jan 19 03:50:11 host unix_chkpwd[5986]: password check failed for user (root) Jan 19 03:50:11 host sshd[5982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.201.220 user=root Jan 19 03:50:11 host sshd[5982]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 03:50:11 host sshd[5977]: Failed password for invalid user root from 164.92.233.93 port 38416 ssh2 Jan 19 03:50:11 host sshd[5977]: Received disconnect from 164.92.233.93 port 38416:11: Bye Bye [preauth] Jan 19 03:50:11 host sshd[5977]: Disconnected from 164.92.233.93 port 38416 [preauth] Jan 19 03:50:12 host sshd[5982]: Failed password for invalid user root from 107.172.201.220 port 41432 ssh2 Jan 19 03:50:22 host sshd[6077]: Invalid user vagrant from 122.154.48.30 port 59972 Jan 19 03:50:22 host sshd[6077]: input_userauth_request: invalid user vagrant [preauth] Jan 19 03:50:22 host sshd[6077]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:50:22 host sshd[6077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.48.30 Jan 19 03:50:25 host sshd[6077]: Failed password for invalid user vagrant from 122.154.48.30 port 59972 ssh2 Jan 19 03:50:25 host sshd[6077]: Received disconnect from 122.154.48.30 port 59972:11: Bye Bye [preauth] Jan 19 03:50:25 host sshd[6077]: Disconnected from 122.154.48.30 port 59972 [preauth] Jan 19 03:50:33 host sshd[6121]: Invalid user ansible from 137.184.95.238 port 60394 Jan 19 03:50:33 host sshd[6121]: input_userauth_request: invalid user ansible [preauth] Jan 19 03:50:33 host sshd[6121]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:50:33 host sshd[6121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.95.238 Jan 19 03:50:35 host sshd[6121]: Failed password for invalid user ansible from 137.184.95.238 port 60394 ssh2 Jan 19 03:50:36 host sshd[6121]: Received disconnect from 137.184.95.238 port 60394:11: Bye Bye [preauth] Jan 19 03:50:36 host sshd[6121]: Disconnected from 137.184.95.238 port 60394 [preauth] Jan 19 03:50:48 host sshd[6276]: User root from 167.172.159.73 not allowed because not listed in AllowUsers Jan 19 03:50:48 host sshd[6276]: input_userauth_request: invalid user root [preauth] Jan 19 03:50:48 host unix_chkpwd[6281]: password check failed for user (root) Jan 19 03:50:48 host sshd[6276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.159.73 user=root Jan 19 03:50:48 host sshd[6276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 03:50:50 host sshd[6282]: Invalid user debian from 178.128.150.124 port 56614 Jan 19 03:50:50 host sshd[6282]: input_userauth_request: invalid user debian [preauth] Jan 19 03:50:50 host sshd[6282]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:50:50 host sshd[6282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.150.124 Jan 19 03:50:50 host sshd[6276]: Failed password for invalid user root from 167.172.159.73 port 38354 ssh2 Jan 19 03:50:50 host sshd[6276]: Received disconnect from 167.172.159.73 port 38354:11: Bye Bye [preauth] Jan 19 03:50:50 host sshd[6276]: Disconnected from 167.172.159.73 port 38354 [preauth] Jan 19 03:50:51 host sshd[6282]: Failed password for invalid user debian from 178.128.150.124 port 56614 ssh2 Jan 19 03:50:52 host sshd[6282]: Received disconnect from 178.128.150.124 port 56614:11: Bye Bye [preauth] Jan 19 03:50:52 host sshd[6282]: Disconnected from 178.128.150.124 port 56614 [preauth] Jan 19 03:51:04 host sshd[6378]: Invalid user controlm from 186.209.62.109 port 43426 Jan 19 03:51:04 host sshd[6378]: input_userauth_request: invalid user controlm [preauth] Jan 19 03:51:04 host sshd[6378]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:51:04 host sshd[6378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.209.62.109 Jan 19 03:51:06 host sshd[6378]: Failed password for invalid user controlm from 186.209.62.109 port 43426 ssh2 Jan 19 03:51:07 host sshd[6378]: Received disconnect from 186.209.62.109 port 43426:11: Bye Bye [preauth] Jan 19 03:51:07 host sshd[6378]: Disconnected from 186.209.62.109 port 43426 [preauth] Jan 19 03:51:44 host sshd[6507]: Invalid user gpadmin from 122.154.48.30 port 54462 Jan 19 03:51:44 host sshd[6507]: input_userauth_request: invalid user gpadmin [preauth] Jan 19 03:51:44 host sshd[6507]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:51:44 host sshd[6507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.48.30 Jan 19 03:51:46 host sshd[6507]: Failed password for invalid user gpadmin from 122.154.48.30 port 54462 ssh2 Jan 19 03:51:46 host sshd[6507]: Received disconnect from 122.154.48.30 port 54462:11: Bye Bye [preauth] Jan 19 03:51:46 host sshd[6507]: Disconnected from 122.154.48.30 port 54462 [preauth] Jan 19 03:52:26 host sshd[6616]: Invalid user frappe from 35.175.148.93 port 48910 Jan 19 03:52:26 host sshd[6616]: input_userauth_request: invalid user frappe [preauth] Jan 19 03:52:26 host sshd[6616]: pam_unix(sshd:auth): check pass; user unknown Jan 19 03:52:26 host sshd[6616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.175.148.93 Jan 19 03:52:28 host sshd[6616]: Failed password for invalid user frappe from 35.175.148.93 port 48910 ssh2 Jan 19 04:11:59 host sshd[9803]: Invalid user gf from 194.110.203.109 port 46348 Jan 19 04:11:59 host sshd[9803]: input_userauth_request: invalid user gf [preauth] Jan 19 04:11:59 host sshd[9803]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:11:59 host sshd[9803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 04:12:00 host sshd[9803]: Failed password for invalid user gf from 194.110.203.109 port 46348 ssh2 Jan 19 04:12:03 host sshd[9803]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:12:05 host sshd[9803]: Failed password for invalid user gf from 194.110.203.109 port 46348 ssh2 Jan 19 04:12:08 host sshd[9803]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:12:10 host sshd[9803]: Failed password for invalid user gf from 194.110.203.109 port 46348 ssh2 Jan 19 04:12:13 host sshd[9803]: Connection closed by 194.110.203.109 port 46348 [preauth] Jan 19 04:12:13 host sshd[9803]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 04:13:04 host sshd[10052]: Invalid user ec2-user from 172.8.254.188 port 56022 Jan 19 04:13:04 host sshd[10052]: input_userauth_request: invalid user ec2-user [preauth] Jan 19 04:13:04 host sshd[10052]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:13:04 host sshd[10052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.8.254.188 Jan 19 04:13:05 host sshd[10052]: Failed password for invalid user ec2-user from 172.8.254.188 port 56022 ssh2 Jan 19 04:13:06 host sshd[10052]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:13:08 host sshd[10052]: Failed password for invalid user ec2-user from 172.8.254.188 port 56022 ssh2 Jan 19 04:13:09 host sshd[10052]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:13:11 host sshd[10052]: Failed password for invalid user ec2-user from 172.8.254.188 port 56022 ssh2 Jan 19 04:13:12 host sshd[10052]: Failed password for invalid user ec2-user from 172.8.254.188 port 56022 ssh2 Jan 19 04:13:13 host sshd[10052]: Connection reset by 172.8.254.188 port 56022 [preauth] Jan 19 04:13:13 host sshd[10052]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.8.254.188 Jan 19 04:16:35 host sshd[10586]: Did not receive identification string from 178.88.161.82 port 51894 Jan 19 04:16:36 host sshd[10587]: Invalid user halo from 178.88.161.82 port 52098 Jan 19 04:16:36 host sshd[10587]: input_userauth_request: invalid user halo [preauth] Jan 19 04:16:36 host sshd[10588]: Invalid user bot from 178.88.161.82 port 51906 Jan 19 04:16:36 host sshd[10588]: input_userauth_request: invalid user bot [preauth] Jan 19 04:16:36 host sshd[10589]: Invalid user student from 178.88.161.82 port 51978 Jan 19 04:16:36 host sshd[10589]: input_userauth_request: invalid user student [preauth] Jan 19 04:16:36 host sshd[10593]: Invalid user postgres from 178.88.161.82 port 52102 Jan 19 04:16:36 host sshd[10593]: input_userauth_request: invalid user postgres [preauth] Jan 19 04:16:36 host sshd[10602]: User root from 178.88.161.82 not allowed because not listed in AllowUsers Jan 19 04:16:36 host sshd[10602]: input_userauth_request: invalid user root [preauth] Jan 19 04:16:36 host sshd[10595]: User root from 178.88.161.82 not allowed because not listed in AllowUsers Jan 19 04:16:36 host sshd[10595]: input_userauth_request: invalid user root [preauth] Jan 19 04:16:36 host sshd[10592]: Invalid user ftpuser from 178.88.161.82 port 51964 Jan 19 04:16:36 host sshd[10592]: input_userauth_request: invalid user ftpuser [preauth] Jan 19 04:16:36 host sshd[10596]: Invalid user pi from 178.88.161.82 port 52282 Jan 19 04:16:36 host sshd[10596]: input_userauth_request: invalid user pi [preauth] Jan 19 04:16:36 host sshd[10590]: Invalid user ubuntu from 178.88.161.82 port 52094 Jan 19 04:16:36 host sshd[10590]: input_userauth_request: invalid user ubuntu [preauth] Jan 19 04:16:36 host sshd[10598]: Invalid user postgres from 178.88.161.82 port 52216 Jan 19 04:16:36 host sshd[10598]: input_userauth_request: invalid user postgres [preauth] Jan 19 04:16:36 host sshd[10594]: Invalid user pi from 178.88.161.82 port 52260 Jan 19 04:16:36 host sshd[10594]: input_userauth_request: invalid user pi [preauth] Jan 19 04:16:36 host sshd[10597]: Invalid user devops from 178.88.161.82 port 52294 Jan 19 04:16:36 host sshd[10597]: input_userauth_request: invalid user devops [preauth] Jan 19 04:16:36 host sshd[10611]: Invalid user oracle from 178.88.161.82 port 52236 Jan 19 04:16:36 host sshd[10611]: input_userauth_request: invalid user oracle [preauth] Jan 19 04:16:36 host sshd[10605]: Invalid user ubuntu from 178.88.161.82 port 51938 Jan 19 04:16:36 host sshd[10605]: input_userauth_request: invalid user ubuntu [preauth] Jan 19 04:16:36 host sshd[10606]: User root from 178.88.161.82 not allowed because not listed in AllowUsers Jan 19 04:16:36 host sshd[10606]: input_userauth_request: invalid user root [preauth] Jan 19 04:16:36 host sshd[10614]: Invalid user test from 178.88.161.82 port 52224 Jan 19 04:16:36 host sshd[10614]: input_userauth_request: invalid user test [preauth] Jan 19 04:16:36 host sshd[10607]: Invalid user dev from 178.88.161.82 port 52080 Jan 19 04:16:36 host sshd[10616]: Invalid user testuser from 178.88.161.82 port 51944 Jan 19 04:16:36 host sshd[10616]: input_userauth_request: invalid user testuser [preauth] Jan 19 04:16:36 host sshd[10607]: input_userauth_request: invalid user dev [preauth] Jan 19 04:16:37 host sshd[10608]: Invalid user oracle from 178.88.161.82 port 51960 Jan 19 04:16:37 host sshd[10608]: input_userauth_request: invalid user oracle [preauth] Jan 19 04:16:37 host sshd[10601]: Invalid user halo from 178.88.161.82 port 51992 Jan 19 04:16:37 host sshd[10601]: input_userauth_request: invalid user halo [preauth] Jan 19 04:16:37 host sshd[10591]: User root from 178.88.161.82 not allowed because not listed in AllowUsers Jan 19 04:16:37 host sshd[10591]: input_userauth_request: invalid user root [preauth] Jan 19 04:16:37 host sshd[10612]: Invalid user es from 178.88.161.82 port 52194 Jan 19 04:16:37 host sshd[10612]: input_userauth_request: invalid user es [preauth] Jan 19 04:16:37 host sshd[10603]: Invalid user ftpuser from 178.88.161.82 port 52070 Jan 19 04:16:37 host sshd[10600]: Invalid user ubuntu from 178.88.161.82 port 52142 Jan 19 04:16:37 host sshd[10599]: Invalid user admin from 178.88.161.82 port 52032 Jan 19 04:16:37 host sshd[10604]: Invalid user oracle from 178.88.161.82 port 52150 Jan 19 04:16:37 host sshd[10599]: input_userauth_request: invalid user admin [preauth] Jan 19 04:16:37 host sshd[10603]: input_userauth_request: invalid user ftpuser [preauth] Jan 19 04:16:37 host sshd[10600]: input_userauth_request: invalid user ubuntu [preauth] Jan 19 04:16:37 host sshd[10618]: User root from 178.88.161.82 not allowed because not listed in AllowUsers Jan 19 04:16:37 host sshd[10615]: Invalid user test from 178.88.161.82 port 52046 Jan 19 04:16:37 host sshd[10618]: input_userauth_request: invalid user root [preauth] Jan 19 04:16:37 host sshd[10604]: input_userauth_request: invalid user oracle [preauth] Jan 19 04:16:37 host sshd[10615]: input_userauth_request: invalid user test [preauth] Jan 19 04:16:37 host sshd[10587]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10613]: Invalid user admin from 178.88.161.82 port 52008 Jan 19 04:16:37 host sshd[10587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10613]: input_userauth_request: invalid user admin [preauth] Jan 19 04:16:37 host sshd[10589]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10588]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10619]: User root from 178.88.161.82 not allowed because not listed in AllowUsers Jan 19 04:16:37 host sshd[10619]: input_userauth_request: invalid user root [preauth] Jan 19 04:16:37 host sshd[10617]: Invalid user ftpuser from 178.88.161.82 port 52020 Jan 19 04:16:37 host sshd[10617]: input_userauth_request: invalid user ftpuser [preauth] Jan 19 04:16:37 host sshd[10593]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10592]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10596]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10590]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10598]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host unix_chkpwd[10650]: password check failed for user (root) Jan 19 04:16:37 host sshd[10602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 user=root Jan 19 04:16:37 host sshd[10602]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 04:16:37 host unix_chkpwd[10651]: password check failed for user (root) Jan 19 04:16:37 host sshd[10595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 user=root Jan 19 04:16:37 host sshd[10595]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 04:16:37 host sshd[10594]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10597]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10599]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10603]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10615]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10600]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10604]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10611]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10613]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10605]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10601]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10614]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10612]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10608]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10616]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host sshd[10607]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host unix_chkpwd[10652]: password check failed for user (root) Jan 19 04:16:37 host sshd[10618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 user=root Jan 19 04:16:37 host sshd[10618]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 04:16:37 host unix_chkpwd[10654]: password check failed for user (root) Jan 19 04:16:37 host sshd[10606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 user=root Jan 19 04:16:37 host sshd[10606]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 04:16:37 host sshd[10617]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:16:37 host sshd[10617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 Jan 19 04:16:37 host unix_chkpwd[10653]: password check failed for user (root) Jan 19 04:16:37 host sshd[10591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 user=root Jan 19 04:16:37 host sshd[10591]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 04:16:37 host unix_chkpwd[10655]: password check failed for user (root) Jan 19 04:16:37 host sshd[10619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.88.161.82 user=root Jan 19 04:16:37 host sshd[10619]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 04:16:39 host sshd[10587]: Failed password for invalid user halo from 178.88.161.82 port 52098 ssh2 Jan 19 04:16:39 host sshd[10589]: Failed password for invalid user student from 178.88.161.82 port 51978 ssh2 Jan 19 04:16:39 host sshd[10588]: Failed password for invalid user bot from 178.88.161.82 port 51906 ssh2 Jan 19 04:16:39 host sshd[10593]: Failed password for invalid user postgres from 178.88.161.82 port 52102 ssh2 Jan 19 04:16:39 host sshd[10592]: Failed password for invalid user ftpuser from 178.88.161.82 port 51964 ssh2 Jan 19 04:16:39 host sshd[10596]: Failed password for invalid user pi from 178.88.161.82 port 52282 ssh2 Jan 19 04:16:39 host sshd[10590]: Failed password for invalid user ubuntu from 178.88.161.82 port 52094 ssh2 Jan 19 04:16:39 host sshd[10598]: Failed password for invalid user postgres from 178.88.161.82 port 52216 ssh2 Jan 19 04:16:39 host sshd[10602]: Failed password for invalid user root from 178.88.161.82 port 51928 ssh2 Jan 19 04:16:39 host sshd[10595]: Failed password for invalid user root from 178.88.161.82 port 52180 ssh2 Jan 19 04:16:39 host sshd[10594]: Failed password for invalid user pi from 178.88.161.82 port 52260 ssh2 Jan 19 04:16:39 host sshd[10603]: Failed password for invalid user ftpuser from 178.88.161.82 port 52070 ssh2 Jan 19 04:16:39 host sshd[10597]: Failed password for invalid user devops from 178.88.161.82 port 52294 ssh2 Jan 19 04:16:39 host sshd[10599]: Failed password for invalid user admin from 178.88.161.82 port 52032 ssh2 Jan 19 04:16:39 host sshd[10615]: Failed password for invalid user test from 178.88.161.82 port 52046 ssh2 Jan 19 04:16:39 host sshd[10600]: Failed password for invalid user ubuntu from 178.88.161.82 port 52142 ssh2 Jan 19 04:16:39 host sshd[10604]: Failed password for invalid user oracle from 178.88.161.82 port 52150 ssh2 Jan 19 04:16:39 host sshd[10611]: Failed password for invalid user oracle from 178.88.161.82 port 52236 ssh2 Jan 19 04:16:39 host sshd[10613]: Failed password for invalid user admin from 178.88.161.82 port 52008 ssh2 Jan 19 04:16:39 host sshd[10601]: Failed password for invalid user halo from 178.88.161.82 port 51992 ssh2 Jan 19 04:16:39 host sshd[10605]: Failed password for invalid user ubuntu from 178.88.161.82 port 51938 ssh2 Jan 19 04:16:39 host sshd[10614]: Failed password for invalid user test from 178.88.161.82 port 52224 ssh2 Jan 19 04:16:39 host sshd[10616]: Failed password for invalid user testuser from 178.88.161.82 port 51944 ssh2 Jan 19 04:16:39 host sshd[10612]: Failed password for invalid user es from 178.88.161.82 port 52194 ssh2 Jan 19 04:16:39 host sshd[10608]: Failed password for invalid user oracle from 178.88.161.82 port 51960 ssh2 Jan 19 04:16:39 host sshd[10607]: Failed password for invalid user dev from 178.88.161.82 port 52080 ssh2 Jan 19 04:16:39 host sshd[10618]: Failed password for invalid user root from 178.88.161.82 port 52272 ssh2 Jan 19 04:16:39 host sshd[10606]: Failed password for invalid user root from 178.88.161.82 port 52128 ssh2 Jan 19 04:16:39 host sshd[10617]: Failed password for invalid user ftpuser from 178.88.161.82 port 52020 ssh2 Jan 19 04:16:39 host sshd[10591]: Failed password for invalid user root from 178.88.161.82 port 52156 ssh2 Jan 19 04:16:39 host sshd[10619]: Failed password for invalid user root from 178.88.161.82 port 52052 ssh2 Jan 19 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 04:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 04:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=wwwrmswll user-4=wwwresourcehunte user-5=keralaholi user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=wwwletsstalkfood user-13=straightcurve user-14=wwwevmhonda user-15=bonifacegroup user-16=wwwnexidigital user-17=mrsclean user-18=kottayamcalldriv user-19=phmetals user-20=gifterman user-21=palco123 user-22=woodpeck user-23=wwwkapin user-24=disposeat user-25=remysagr user-26=wwwkmaorg user-27=pmcresources user-28=wwwtestugo user-29=shalinijames user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 04:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 04:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 04:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3oILw9cMrqdAP4Xe.~ Jan 19 04:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3oILw9cMrqdAP4Xe.~' Jan 19 04:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3oILw9cMrqdAP4Xe.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 04:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 04:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 04:21:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 04:21:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 04:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 04:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 04:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 04:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 04:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:21:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 04:21:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 04:21:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 04:23:14 host sshd[12113]: Invalid user support from 222.97.126.70 port 63460 Jan 19 04:23:14 host sshd[12113]: input_userauth_request: invalid user support [preauth] Jan 19 04:23:14 host sshd[12113]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:23:14 host sshd[12113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.97.126.70 Jan 19 04:23:17 host sshd[12113]: Failed password for invalid user support from 222.97.126.70 port 63460 ssh2 Jan 19 04:23:17 host sshd[12113]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:23:19 host sshd[12113]: Failed password for invalid user support from 222.97.126.70 port 63460 ssh2 Jan 19 04:23:20 host sshd[12131]: Invalid user support from 5.75.156.5 port 50606 Jan 19 04:23:20 host sshd[12131]: input_userauth_request: invalid user support [preauth] Jan 19 04:23:20 host sshd[12131]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:23:20 host sshd[12131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.75.156.5 Jan 19 04:23:22 host sshd[12131]: Failed password for invalid user support from 5.75.156.5 port 50606 ssh2 Jan 19 04:23:22 host sshd[12131]: Received disconnect from 5.75.156.5 port 50606:11: Bye Bye [preauth] Jan 19 04:23:22 host sshd[12131]: Disconnected from 5.75.156.5 port 50606 [preauth] Jan 19 04:23:31 host sshd[12274]: Invalid user acs from 46.101.132.159 port 35036 Jan 19 04:23:31 host sshd[12274]: input_userauth_request: invalid user acs [preauth] Jan 19 04:23:31 host sshd[12274]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:23:31 host sshd[12274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.132.159 Jan 19 04:23:32 host sshd[12274]: Failed password for invalid user acs from 46.101.132.159 port 35036 ssh2 Jan 19 04:23:33 host sshd[12274]: Received disconnect from 46.101.132.159 port 35036:11: Bye Bye [preauth] Jan 19 04:23:33 host sshd[12274]: Disconnected from 46.101.132.159 port 35036 [preauth] Jan 19 04:24:48 host sshd[12466]: User root from 188.250.172.49 not allowed because not listed in AllowUsers Jan 19 04:24:48 host sshd[12466]: input_userauth_request: invalid user root [preauth] Jan 19 04:24:48 host unix_chkpwd[12470]: password check failed for user (root) Jan 19 04:24:48 host sshd[12466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.250.172.49 user=root Jan 19 04:24:48 host sshd[12466]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 04:24:50 host sshd[12466]: Failed password for invalid user root from 188.250.172.49 port 49313 ssh2 Jan 19 04:24:50 host sshd[12466]: Received disconnect from 188.250.172.49 port 49313:11: Bye Bye [preauth] Jan 19 04:24:50 host sshd[12466]: Disconnected from 188.250.172.49 port 49313 [preauth] Jan 19 04:25:35 host sshd[12619]: User root from 193.110.100.228 not allowed because not listed in AllowUsers Jan 19 04:25:35 host sshd[12619]: input_userauth_request: invalid user root [preauth] Jan 19 04:25:35 host unix_chkpwd[12624]: password check failed for user (root) Jan 19 04:25:35 host sshd[12619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.110.100.228 user=root Jan 19 04:25:35 host sshd[12619]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 04:25:37 host sshd[12619]: Failed password for invalid user root from 193.110.100.228 port 23273 ssh2 Jan 19 04:25:37 host sshd[12619]: Received disconnect from 193.110.100.228 port 23273:11: Bye Bye [preauth] Jan 19 04:25:37 host sshd[12619]: Disconnected from 193.110.100.228 port 23273 [preauth] Jan 19 04:25:50 host sshd[12645]: Invalid user vbox from 207.154.205.115 port 37768 Jan 19 04:25:50 host sshd[12645]: input_userauth_request: invalid user vbox [preauth] Jan 19 04:25:50 host sshd[12645]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:25:50 host sshd[12645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.205.115 Jan 19 04:25:52 host sshd[12645]: Failed password for invalid user vbox from 207.154.205.115 port 37768 ssh2 Jan 19 04:25:52 host sshd[12645]: Received disconnect from 207.154.205.115 port 37768:11: Bye Bye [preauth] Jan 19 04:25:52 host sshd[12645]: Disconnected from 207.154.205.115 port 37768 [preauth] Jan 19 04:27:33 host sshd[12950]: Invalid user hb from 161.35.24.244 port 37260 Jan 19 04:27:33 host sshd[12950]: input_userauth_request: invalid user hb [preauth] Jan 19 04:27:33 host sshd[12950]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:27:33 host sshd[12950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.24.244 Jan 19 04:27:35 host sshd[12950]: Failed password for invalid user hb from 161.35.24.244 port 37260 ssh2 Jan 19 04:27:35 host sshd[12950]: Received disconnect from 161.35.24.244 port 37260:11: Bye Bye [preauth] Jan 19 04:27:35 host sshd[12950]: Disconnected from 161.35.24.244 port 37260 [preauth] Jan 19 04:27:47 host sshd[12961]: Connection closed by 167.172.148.206 port 34066 [preauth] Jan 19 04:28:56 host sshd[13143]: Received disconnect from 36.154.50.211 port 53154:11: Bye Bye [preauth] Jan 19 04:28:56 host sshd[13143]: Disconnected from 36.154.50.211 port 53154 [preauth] Jan 19 04:29:03 host sshd[13201]: User root from 161.35.217.94 not allowed because not listed in AllowUsers Jan 19 04:29:03 host sshd[13201]: input_userauth_request: invalid user root [preauth] Jan 19 04:29:03 host unix_chkpwd[13206]: password check failed for user (root) Jan 19 04:29:03 host sshd[13201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.217.94 user=root Jan 19 04:29:03 host sshd[13201]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 04:29:05 host sshd[13201]: Failed password for invalid user root from 161.35.217.94 port 47750 ssh2 Jan 19 04:29:06 host sshd[13201]: Received disconnect from 161.35.217.94 port 47750:11: Bye Bye [preauth] Jan 19 04:29:06 host sshd[13201]: Disconnected from 161.35.217.94 port 47750 [preauth] Jan 19 04:29:25 host sshd[13248]: Invalid user ntc from 5.75.156.5 port 50848 Jan 19 04:29:25 host sshd[13248]: input_userauth_request: invalid user ntc [preauth] Jan 19 04:29:25 host sshd[13248]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:29:25 host sshd[13248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.75.156.5 Jan 19 04:29:27 host sshd[13248]: Failed password for invalid user ntc from 5.75.156.5 port 50848 ssh2 Jan 19 04:29:27 host sshd[13248]: Received disconnect from 5.75.156.5 port 50848:11: Bye Bye [preauth] Jan 19 04:29:27 host sshd[13248]: Disconnected from 5.75.156.5 port 50848 [preauth] Jan 19 04:29:33 host sshd[13278]: Invalid user sales1 from 193.110.100.228 port 13524 Jan 19 04:29:33 host sshd[13278]: input_userauth_request: invalid user sales1 [preauth] Jan 19 04:29:33 host sshd[13278]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:29:33 host sshd[13278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.110.100.228 Jan 19 04:29:34 host sshd[13281]: Invalid user test1 from 188.250.172.49 port 58073 Jan 19 04:29:34 host sshd[13281]: input_userauth_request: invalid user test1 [preauth] Jan 19 04:29:34 host sshd[13281]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:29:34 host sshd[13281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.250.172.49 Jan 19 04:29:35 host sshd[13278]: Failed password for invalid user sales1 from 193.110.100.228 port 13524 ssh2 Jan 19 04:29:35 host sshd[13278]: Received disconnect from 193.110.100.228 port 13524:11: Bye Bye [preauth] Jan 19 04:29:35 host sshd[13278]: Disconnected from 193.110.100.228 port 13524 [preauth] Jan 19 04:29:36 host sshd[13281]: Failed password for invalid user test1 from 188.250.172.49 port 58073 ssh2 Jan 19 04:29:36 host sshd[13281]: Received disconnect from 188.250.172.49 port 58073:11: Bye Bye [preauth] Jan 19 04:29:36 host sshd[13281]: Disconnected from 188.250.172.49 port 58073 [preauth] Jan 19 04:29:43 host sshd[13416]: Invalid user bitwarden from 207.154.205.115 port 55840 Jan 19 04:29:43 host sshd[13416]: input_userauth_request: invalid user bitwarden [preauth] Jan 19 04:29:43 host sshd[13416]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:29:43 host sshd[13416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.205.115 Jan 19 04:29:45 host sshd[13416]: Failed password for invalid user bitwarden from 207.154.205.115 port 55840 ssh2 Jan 19 04:29:46 host sshd[13416]: Received disconnect from 207.154.205.115 port 55840:11: Bye Bye [preauth] Jan 19 04:29:46 host sshd[13416]: Disconnected from 207.154.205.115 port 55840 [preauth] Jan 19 04:29:52 host sshd[13483]: User root from 161.35.24.244 not allowed because not listed in AllowUsers Jan 19 04:29:52 host sshd[13483]: input_userauth_request: invalid user root [preauth] Jan 19 04:29:52 host unix_chkpwd[13486]: password check failed for user (root) Jan 19 04:29:52 host sshd[13483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.24.244 user=root Jan 19 04:29:52 host sshd[13483]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 04:29:55 host sshd[13483]: Failed password for invalid user root from 161.35.24.244 port 43640 ssh2 Jan 19 04:29:55 host sshd[13483]: Received disconnect from 161.35.24.244 port 43640:11: Bye Bye [preauth] Jan 19 04:29:55 host sshd[13483]: Disconnected from 161.35.24.244 port 43640 [preauth] Jan 19 04:30:30 host sshd[13654]: User tomcat from 5.75.156.5 not allowed because not listed in AllowUsers Jan 19 04:30:30 host sshd[13654]: input_userauth_request: invalid user tomcat [preauth] Jan 19 04:30:30 host unix_chkpwd[13659]: password check failed for user (tomcat) Jan 19 04:30:30 host sshd[13654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.75.156.5 user=tomcat Jan 19 04:30:30 host sshd[13654]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "tomcat" Jan 19 04:30:32 host sshd[13654]: Failed password for invalid user tomcat from 5.75.156.5 port 57938 ssh2 Jan 19 04:30:32 host sshd[13654]: Received disconnect from 5.75.156.5 port 57938:11: Bye Bye [preauth] Jan 19 04:30:32 host sshd[13654]: Disconnected from 5.75.156.5 port 57938 [preauth] Jan 19 04:30:44 host sshd[13710]: Invalid user sam from 161.35.217.94 port 42414 Jan 19 04:30:44 host sshd[13710]: input_userauth_request: invalid user sam [preauth] Jan 19 04:30:44 host sshd[13710]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:30:44 host sshd[13710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.217.94 Jan 19 04:30:46 host sshd[13710]: Failed password for invalid user sam from 161.35.217.94 port 42414 ssh2 Jan 19 04:30:46 host sshd[13710]: Received disconnect from 161.35.217.94 port 42414:11: Bye Bye [preauth] Jan 19 04:30:46 host sshd[13710]: Disconnected from 161.35.217.94 port 42414 [preauth] Jan 19 04:30:56 host sshd[13756]: Invalid user elastic from 207.154.205.115 port 39250 Jan 19 04:30:56 host sshd[13756]: input_userauth_request: invalid user elastic [preauth] Jan 19 04:30:56 host sshd[13756]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:30:56 host sshd[13756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.205.115 Jan 19 04:30:58 host sshd[13756]: Failed password for invalid user elastic from 207.154.205.115 port 39250 ssh2 Jan 19 04:30:58 host sshd[13756]: Received disconnect from 207.154.205.115 port 39250:11: Bye Bye [preauth] Jan 19 04:30:58 host sshd[13756]: Disconnected from 207.154.205.115 port 39250 [preauth] Jan 19 04:31:52 host sshd[13953]: Invalid user user2 from 36.154.50.211 port 53078 Jan 19 04:31:52 host sshd[13953]: input_userauth_request: invalid user user2 [preauth] Jan 19 04:31:52 host sshd[13953]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:31:52 host sshd[13953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.154.50.211 Jan 19 04:31:54 host sshd[13953]: Failed password for invalid user user2 from 36.154.50.211 port 53078 ssh2 Jan 19 04:32:00 host sshd[13953]: Received disconnect from 36.154.50.211 port 53078:11: Bye Bye [preauth] Jan 19 04:32:00 host sshd[13953]: Disconnected from 36.154.50.211 port 53078 [preauth] Jan 19 04:33:25 host sshd[14216]: Connection closed by 36.154.50.211 port 64105 [preauth] Jan 19 04:35:23 host sshd[14627]: Connection closed by 36.154.50.211 port 59598 [preauth] Jan 19 04:36:58 host sshd[14861]: Connection closed by 36.154.50.211 port 55089 [preauth] Jan 19 04:38:32 host sshd[15062]: Connection closed by 36.154.50.211 port 50579 [preauth] Jan 19 04:40:04 host sshd[15409]: Connection closed by 36.154.50.211 port 61605 [preauth] Jan 19 04:41:35 host sshd[15626]: Connection closed by 36.154.50.211 port 57096 [preauth] Jan 19 04:43:05 host sshd[15839]: Connection closed by 36.154.50.211 port 52587 [preauth] Jan 19 04:43:31 host sshd[15907]: Invalid user sFTPUser from 184.56.213.179 port 40983 Jan 19 04:43:31 host sshd[15907]: input_userauth_request: invalid user sFTPUser [preauth] Jan 19 04:43:31 host sshd[15907]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:43:31 host sshd[15907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.56.213.179 Jan 19 04:43:34 host sshd[15907]: Failed password for invalid user sFTPUser from 184.56.213.179 port 40983 ssh2 Jan 19 04:43:34 host sshd[15907]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:43:36 host sshd[15907]: Failed password for invalid user sFTPUser from 184.56.213.179 port 40983 ssh2 Jan 19 04:43:36 host sshd[15907]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:43:38 host sshd[15907]: Failed password for invalid user sFTPUser from 184.56.213.179 port 40983 ssh2 Jan 19 04:43:39 host sshd[15907]: Failed password for invalid user sFTPUser from 184.56.213.179 port 40983 ssh2 Jan 19 04:43:40 host sshd[15907]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:43:41 host sshd[15907]: Failed password for invalid user sFTPUser from 184.56.213.179 port 40983 ssh2 Jan 19 04:43:42 host sshd[15907]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:43:44 host sshd[15907]: Failed password for invalid user sFTPUser from 184.56.213.179 port 40983 ssh2 Jan 19 04:43:44 host sshd[15907]: error: maximum authentication attempts exceeded for invalid user sFTPUser from 184.56.213.179 port 40983 ssh2 [preauth] Jan 19 04:43:44 host sshd[15907]: Disconnecting: Too many authentication failures [preauth] Jan 19 04:43:44 host sshd[15907]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.56.213.179 Jan 19 04:43:44 host sshd[15907]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 19 04:44:43 host sshd[16076]: Connection closed by 36.154.50.211 port 63612 [preauth] Jan 19 04:46:14 host sshd[16389]: Connection closed by 36.154.50.211 port 59103 [preauth] Jan 19 04:46:46 host sshd[16464]: Invalid user vadmin from 201.171.45.136 port 33309 Jan 19 04:46:46 host sshd[16464]: input_userauth_request: invalid user vadmin [preauth] Jan 19 04:46:46 host sshd[16464]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:46:46 host sshd[16464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.171.45.136 Jan 19 04:46:48 host sshd[16464]: Failed password for invalid user vadmin from 201.171.45.136 port 33309 ssh2 Jan 19 04:46:49 host sshd[16464]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:46:51 host sshd[16464]: Failed password for invalid user vadmin from 201.171.45.136 port 33309 ssh2 Jan 19 04:46:52 host sshd[16464]: Failed password for invalid user vadmin from 201.171.45.136 port 33309 ssh2 Jan 19 04:46:52 host sshd[16464]: Connection closed by 201.171.45.136 port 33309 [preauth] Jan 19 04:46:52 host sshd[16464]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.171.45.136 Jan 19 04:47:47 host sshd[16605]: User root from 36.154.50.211 not allowed because not listed in AllowUsers Jan 19 04:47:47 host sshd[16605]: input_userauth_request: invalid user root [preauth] Jan 19 04:47:47 host unix_chkpwd[16620]: password check failed for user (root) Jan 19 04:47:47 host sshd[16605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.154.50.211 user=root Jan 19 04:47:47 host sshd[16605]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 04:47:49 host sshd[16605]: Failed password for invalid user root from 36.154.50.211 port 54594 ssh2 Jan 19 04:48:15 host sshd[16705]: Invalid user albert from 64.227.35.112 port 48694 Jan 19 04:48:15 host sshd[16705]: input_userauth_request: invalid user albert [preauth] Jan 19 04:48:15 host sshd[16705]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:48:15 host sshd[16705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.35.112 Jan 19 04:48:17 host sshd[16705]: Failed password for invalid user albert from 64.227.35.112 port 48694 ssh2 Jan 19 04:48:17 host sshd[16705]: Received disconnect from 64.227.35.112 port 48694:11: Bye Bye [preauth] Jan 19 04:48:17 host sshd[16705]: Disconnected from 64.227.35.112 port 48694 [preauth] Jan 19 04:49:05 host sshd[16818]: User root from 43.157.26.169 not allowed because not listed in AllowUsers Jan 19 04:49:05 host sshd[16818]: input_userauth_request: invalid user root [preauth] Jan 19 04:49:05 host unix_chkpwd[16824]: password check failed for user (root) Jan 19 04:49:05 host sshd[16818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.26.169 user=root Jan 19 04:49:05 host sshd[16818]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 04:49:07 host sshd[16818]: Failed password for invalid user root from 43.157.26.169 port 40084 ssh2 Jan 19 04:49:07 host sshd[16818]: Received disconnect from 43.157.26.169 port 40084:11: Bye Bye [preauth] Jan 19 04:49:07 host sshd[16818]: Disconnected from 43.157.26.169 port 40084 [preauth] Jan 19 04:50:12 host sshd[17012]: Invalid user elastic from 223.197.188.206 port 50084 Jan 19 04:50:12 host sshd[17012]: input_userauth_request: invalid user elastic [preauth] Jan 19 04:50:12 host sshd[17012]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:50:12 host sshd[17012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.188.206 Jan 19 04:50:14 host sshd[17012]: Failed password for invalid user elastic from 223.197.188.206 port 50084 ssh2 Jan 19 04:50:14 host sshd[17012]: Received disconnect from 223.197.188.206 port 50084:11: Bye Bye [preauth] Jan 19 04:50:14 host sshd[17012]: Disconnected from 223.197.188.206 port 50084 [preauth] Jan 19 04:50:20 host sshd[17033]: Invalid user zabbix from 123.142.3.142 port 44206 Jan 19 04:50:20 host sshd[17033]: input_userauth_request: invalid user zabbix [preauth] Jan 19 04:50:20 host sshd[17033]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:50:20 host sshd[17033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.142.3.142 Jan 19 04:50:22 host sshd[17033]: Failed password for invalid user zabbix from 123.142.3.142 port 44206 ssh2 Jan 19 04:50:22 host sshd[17033]: Received disconnect from 123.142.3.142 port 44206:11: Bye Bye [preauth] Jan 19 04:50:22 host sshd[17033]: Disconnected from 123.142.3.142 port 44206 [preauth] Jan 19 04:50:23 host sshd[17044]: Invalid user postgres from 182.214.206.239 port 63807 Jan 19 04:50:23 host sshd[17044]: input_userauth_request: invalid user postgres [preauth] Jan 19 04:50:23 host sshd[17044]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:50:23 host sshd[17044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.214.206.239 Jan 19 04:50:25 host sshd[17044]: Failed password for invalid user postgres from 182.214.206.239 port 63807 ssh2 Jan 19 04:50:26 host sshd[17044]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:50:28 host sshd[17044]: Failed password for invalid user postgres from 182.214.206.239 port 63807 ssh2 Jan 19 04:50:28 host sshd[17044]: Connection reset by 182.214.206.239 port 63807 [preauth] Jan 19 04:50:28 host sshd[17044]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.214.206.239 Jan 19 04:50:30 host sshd[17077]: Invalid user cperoot from 195.226.194.142 port 25206 Jan 19 04:50:30 host sshd[17077]: input_userauth_request: invalid user cperoot [preauth] Jan 19 04:50:30 host sshd[17077]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:50:30 host sshd[17077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 19 04:50:31 host sshd[17077]: Failed password for invalid user cperoot from 195.226.194.142 port 25206 ssh2 Jan 19 04:50:31 host sshd[17077]: Received disconnect from 195.226.194.142 port 25206:11: Bye Bye [preauth] Jan 19 04:50:31 host sshd[17077]: Disconnected from 195.226.194.142 port 25206 [preauth] Jan 19 04:50:56 host sshd[17118]: Invalid user slave from 186.139.230.98 port 41161 Jan 19 04:50:56 host sshd[17118]: input_userauth_request: invalid user slave [preauth] Jan 19 04:50:56 host sshd[17118]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:50:56 host sshd[17118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.139.230.98 Jan 19 04:50:58 host sshd[17118]: Failed password for invalid user slave from 186.139.230.98 port 41161 ssh2 Jan 19 04:50:59 host sshd[17118]: Received disconnect from 186.139.230.98 port 41161:11: Bye Bye [preauth] Jan 19 04:50:59 host sshd[17118]: Disconnected from 186.139.230.98 port 41161 [preauth] Jan 19 04:53:32 host sshd[17624]: Invalid user wordpress from 64.227.35.112 port 47330 Jan 19 04:53:32 host sshd[17624]: input_userauth_request: invalid user wordpress [preauth] Jan 19 04:53:32 host sshd[17624]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:53:32 host sshd[17624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.35.112 Jan 19 04:53:33 host sshd[17628]: Invalid user steam from 95.85.125.107 port 36868 Jan 19 04:53:33 host sshd[17628]: input_userauth_request: invalid user steam [preauth] Jan 19 04:53:33 host sshd[17628]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:53:33 host sshd[17628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.85.125.107 Jan 19 04:53:34 host sshd[17624]: Failed password for invalid user wordpress from 64.227.35.112 port 47330 ssh2 Jan 19 04:53:34 host sshd[17624]: Received disconnect from 64.227.35.112 port 47330:11: Bye Bye [preauth] Jan 19 04:53:34 host sshd[17624]: Disconnected from 64.227.35.112 port 47330 [preauth] Jan 19 04:53:35 host sshd[17628]: Failed password for invalid user steam from 95.85.125.107 port 36868 ssh2 Jan 19 04:53:35 host sshd[17628]: Received disconnect from 95.85.125.107 port 36868:11: Bye Bye [preauth] Jan 19 04:53:35 host sshd[17628]: Disconnected from 95.85.125.107 port 36868 [preauth] Jan 19 04:54:25 host sshd[17743]: Invalid user kafka from 186.139.230.98 port 36448 Jan 19 04:54:25 host sshd[17743]: input_userauth_request: invalid user kafka [preauth] Jan 19 04:54:25 host sshd[17743]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:54:25 host sshd[17743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.139.230.98 Jan 19 04:54:27 host sshd[17743]: Failed password for invalid user kafka from 186.139.230.98 port 36448 ssh2 Jan 19 04:54:27 host sshd[17743]: Received disconnect from 186.139.230.98 port 36448:11: Bye Bye [preauth] Jan 19 04:54:27 host sshd[17743]: Disconnected from 186.139.230.98 port 36448 [preauth] Jan 19 04:54:33 host sshd[17787]: Invalid user apache from 43.157.26.169 port 35266 Jan 19 04:54:33 host sshd[17787]: input_userauth_request: invalid user apache [preauth] Jan 19 04:54:33 host sshd[17787]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:54:33 host sshd[17787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.26.169 Jan 19 04:54:36 host sshd[17787]: Failed password for invalid user apache from 43.157.26.169 port 35266 ssh2 Jan 19 04:54:36 host sshd[17787]: Received disconnect from 43.157.26.169 port 35266:11: Bye Bye [preauth] Jan 19 04:54:36 host sshd[17787]: Disconnected from 43.157.26.169 port 35266 [preauth] Jan 19 04:54:41 host sshd[17823]: Invalid user ftpuser from 64.227.35.112 port 45612 Jan 19 04:54:41 host sshd[17823]: input_userauth_request: invalid user ftpuser [preauth] Jan 19 04:54:41 host sshd[17823]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:54:41 host sshd[17823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.35.112 Jan 19 04:54:42 host sshd[17840]: Invalid user sftpuser from 223.197.188.206 port 37620 Jan 19 04:54:42 host sshd[17840]: input_userauth_request: invalid user sftpuser [preauth] Jan 19 04:54:42 host sshd[17840]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:54:42 host sshd[17840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.188.206 Jan 19 04:54:44 host sshd[17823]: Failed password for invalid user ftpuser from 64.227.35.112 port 45612 ssh2 Jan 19 04:54:44 host sshd[17823]: Received disconnect from 64.227.35.112 port 45612:11: Bye Bye [preauth] Jan 19 04:54:44 host sshd[17823]: Disconnected from 64.227.35.112 port 45612 [preauth] Jan 19 04:54:44 host sshd[17840]: Failed password for invalid user sftpuser from 223.197.188.206 port 37620 ssh2 Jan 19 04:54:44 host sshd[17840]: Received disconnect from 223.197.188.206 port 37620:11: Bye Bye [preauth] Jan 19 04:54:44 host sshd[17840]: Disconnected from 223.197.188.206 port 37620 [preauth] Jan 19 04:54:47 host sshd[17882]: User root from 123.142.3.142 not allowed because not listed in AllowUsers Jan 19 04:54:47 host sshd[17882]: input_userauth_request: invalid user root [preauth] Jan 19 04:54:47 host unix_chkpwd[17888]: password check failed for user (root) Jan 19 04:54:47 host sshd[17882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.142.3.142 user=root Jan 19 04:54:47 host sshd[17882]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 04:54:48 host sshd[17882]: Failed password for invalid user root from 123.142.3.142 port 60492 ssh2 Jan 19 04:54:49 host sshd[17882]: Received disconnect from 123.142.3.142 port 60492:11: Bye Bye [preauth] Jan 19 04:54:49 host sshd[17882]: Disconnected from 123.142.3.142 port 60492 [preauth] Jan 19 04:55:49 host sshd[18103]: Invalid user vadmin from 114.33.114.205 port 45879 Jan 19 04:55:49 host sshd[18103]: input_userauth_request: invalid user vadmin [preauth] Jan 19 04:55:49 host sshd[18103]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:55:49 host sshd[18103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.114.205 Jan 19 04:55:51 host sshd[18103]: Failed password for invalid user vadmin from 114.33.114.205 port 45879 ssh2 Jan 19 04:55:52 host sshd[18103]: pam_unix(sshd:auth): check pass; user unknown Jan 19 04:55:53 host sshd[18115]: User root from 223.197.188.206 not allowed because not listed in AllowUsers Jan 19 04:55:53 host sshd[18115]: input_userauth_request: invalid user root [preauth] Jan 19 04:55:53 host unix_chkpwd[18118]: password check failed for user (root) Jan 19 04:55:53 host sshd[18115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.197.188.206 user=root Jan 19 04:55:53 host sshd[18115]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 04:55:53 host sshd[18103]: Failed password for invalid user vadmin from 114.33.114.205 port 45879 ssh2 Jan 19 04:55:54 host sshd[18103]: Failed password for invalid user vadmin from 114.33.114.205 port 45879 ssh2 Jan 19 04:55:54 host sshd[18103]: Connection closed by 114.33.114.205 port 45879 [preauth] Jan 19 04:55:54 host sshd[18103]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.114.205 Jan 19 04:55:55 host sshd[18115]: Failed password for invalid user root from 223.197.188.206 port 59784 ssh2 Jan 19 04:55:55 host sshd[18115]: Received disconnect from 223.197.188.206 port 59784:11: Bye Bye [preauth] Jan 19 04:55:55 host sshd[18115]: Disconnected from 223.197.188.206 port 59784 [preauth] Jan 19 04:55:55 host sshd[18119]: User mysql from 186.139.230.98 not allowed because not listed in AllowUsers Jan 19 04:55:55 host sshd[18119]: input_userauth_request: invalid user mysql [preauth] Jan 19 04:55:55 host unix_chkpwd[18153]: password check failed for user (mysql) Jan 19 04:55:55 host sshd[18119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.139.230.98 user=mysql Jan 19 04:55:55 host sshd[18119]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 19 04:55:57 host sshd[18119]: Failed password for invalid user mysql from 186.139.230.98 port 35543 ssh2 Jan 19 04:55:57 host sshd[18119]: Received disconnect from 186.139.230.98 port 35543:11: Bye Bye [preauth] Jan 19 04:55:57 host sshd[18119]: Disconnected from 186.139.230.98 port 35543 [preauth] Jan 19 05:08:02 host sshd[20007]: Connection closed by 192.241.213.57 port 35990 [preauth] Jan 19 05:11:15 host sshd[20515]: Invalid user david from 181.23.68.64 port 51241 Jan 19 05:11:15 host sshd[20515]: input_userauth_request: invalid user david [preauth] Jan 19 05:11:15 host sshd[20515]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:11:15 host sshd[20515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.23.68.64 Jan 19 05:11:17 host sshd[20515]: Failed password for invalid user david from 181.23.68.64 port 51241 ssh2 Jan 19 05:11:17 host sshd[20515]: Received disconnect from 181.23.68.64 port 51241:11: Bye Bye [preauth] Jan 19 05:11:17 host sshd[20515]: Disconnected from 181.23.68.64 port 51241 [preauth] Jan 19 05:13:25 host sshd[20786]: Invalid user admin from 115.76.246.140 port 46163 Jan 19 05:13:25 host sshd[20786]: input_userauth_request: invalid user admin [preauth] Jan 19 05:13:25 host sshd[20786]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:13:25 host sshd[20786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.76.246.140 Jan 19 05:13:27 host sshd[20786]: Failed password for invalid user admin from 115.76.246.140 port 46163 ssh2 Jan 19 05:13:27 host sshd[20786]: Failed password for invalid user admin from 115.76.246.140 port 46163 ssh2 Jan 19 05:13:29 host sshd[20786]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:13:30 host sshd[20786]: Failed password for invalid user admin from 115.76.246.140 port 46163 ssh2 Jan 19 05:13:31 host sshd[20786]: Connection reset by 115.76.246.140 port 46163 [preauth] Jan 19 05:13:31 host sshd[20786]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.76.246.140 Jan 19 05:20:40 host sshd[21932]: Invalid user master from 195.226.194.142 port 52634 Jan 19 05:20:40 host sshd[21932]: input_userauth_request: invalid user master [preauth] Jan 19 05:20:41 host sshd[21932]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:20:41 host sshd[21932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 19 05:20:42 host sshd[21932]: Failed password for invalid user master from 195.226.194.142 port 52634 ssh2 Jan 19 05:20:43 host sshd[21932]: Received disconnect from 195.226.194.142 port 52634:11: Bye Bye [preauth] Jan 19 05:20:43 host sshd[21932]: Disconnected from 195.226.194.142 port 52634 [preauth] Jan 19 05:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 05:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 05:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=gifterman user-4=palco123 user-5=kottayamcalldriv user-6=phmetals user-7=wwwletsstalkfood user-8=straightcurve user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=wwwkapin user-16=woodpeck user-17=disposeat user-18=wwwkmaorg user-19=remysagr user-20=wwwrmswll user-21=wwwresourcehunte user-22=keralaholi user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 05:21:10 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 19 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 19 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 19 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 19 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 19 05:21:10 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 19 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 19 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 19 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 19 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 19 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 19 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Jan 19 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user gifterman Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user phmetals Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user straightcurve Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user pmcresources Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user vfmassets Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user disposeat Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Jan 19 05:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Jan 19 05:21:12 host sudo: pam_unix(sudo:session): session closed for user remysagr Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-sc881BVK4PvxhlAN.wp-toolkit-identifier Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-sc881BVK4PvxhlAN.wp-toolkit-identifier Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user travelboniface Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user dartsimp Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-EPrvlZpkUalRSC6a.wp-toolkit-identifier Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-EPrvlZpkUalRSC6a.wp-toolkit-identifier Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 05:21:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-doC548S7FA0aYpOH.~ Jan 19 05:21:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-doC548S7FA0aYpOH.~' Jan 19 05:21:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-doC548S7FA0aYpOH.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 05:21:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 05:21:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 05:21:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 05:21:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 05:21:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:20 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:20 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 05:21:20 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:21:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 05:21:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 05:21:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 05:24:14 host sshd[23042]: Connection reset by 119.196.240.71 port 63998 [preauth] Jan 19 05:30:44 host sshd[24087]: Invalid user dlxuser from 114.33.143.27 port 37905 Jan 19 05:30:44 host sshd[24087]: input_userauth_request: invalid user dlxuser [preauth] Jan 19 05:30:44 host sshd[24087]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:30:44 host sshd[24087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.143.27 Jan 19 05:30:46 host sshd[24087]: Failed password for invalid user dlxuser from 114.33.143.27 port 37905 ssh2 Jan 19 05:30:47 host sshd[24087]: Connection reset by 114.33.143.27 port 37905 [preauth] Jan 19 05:50:21 host sshd[27085]: Invalid user media from 195.226.194.142 port 48172 Jan 19 05:50:21 host sshd[27085]: input_userauth_request: invalid user media [preauth] Jan 19 05:50:21 host sshd[27085]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:50:21 host sshd[27085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 19 05:50:23 host sshd[27085]: Failed password for invalid user media from 195.226.194.142 port 48172 ssh2 Jan 19 05:50:33 host sshd[27160]: Invalid user trojanuser from 64.227.122.198 port 51850 Jan 19 05:50:33 host sshd[27160]: input_userauth_request: invalid user trojanuser [preauth] Jan 19 05:50:33 host sshd[27160]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:50:33 host sshd[27160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.122.198 Jan 19 05:50:35 host sshd[27160]: Failed password for invalid user trojanuser from 64.227.122.198 port 51850 ssh2 Jan 19 05:50:35 host sshd[27160]: Received disconnect from 64.227.122.198 port 51850:11: Bye Bye [preauth] Jan 19 05:50:35 host sshd[27160]: Disconnected from 64.227.122.198 port 51850 [preauth] Jan 19 05:52:22 host sshd[27564]: Invalid user sftpuser from 89.97.180.241 port 55153 Jan 19 05:52:22 host sshd[27564]: input_userauth_request: invalid user sftpuser [preauth] Jan 19 05:52:22 host sshd[27564]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:52:22 host sshd[27564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.97.180.241 Jan 19 05:52:25 host sshd[27564]: Failed password for invalid user sftpuser from 89.97.180.241 port 55153 ssh2 Jan 19 05:52:25 host sshd[27564]: Received disconnect from 89.97.180.241 port 55153:11: Bye Bye [preauth] Jan 19 05:52:25 host sshd[27564]: Disconnected from 89.97.180.241 port 55153 [preauth] Jan 19 05:52:28 host sshd[27599]: Invalid user elemental from 101.32.76.9 port 40204 Jan 19 05:52:28 host sshd[27599]: input_userauth_request: invalid user elemental [preauth] Jan 19 05:52:28 host sshd[27599]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:52:28 host sshd[27599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.76.9 Jan 19 05:52:30 host sshd[27599]: Failed password for invalid user elemental from 101.32.76.9 port 40204 ssh2 Jan 19 05:52:30 host sshd[27599]: Received disconnect from 101.32.76.9 port 40204:11: Bye Bye [preauth] Jan 19 05:52:30 host sshd[27599]: Disconnected from 101.32.76.9 port 40204 [preauth] Jan 19 05:52:38 host sshd[27619]: Invalid user cat from 38.65.156.234 port 57928 Jan 19 05:52:38 host sshd[27619]: input_userauth_request: invalid user cat [preauth] Jan 19 05:52:38 host sshd[27619]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:52:38 host sshd[27619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.65.156.234 Jan 19 05:52:39 host sshd[27619]: Failed password for invalid user cat from 38.65.156.234 port 57928 ssh2 Jan 19 05:52:40 host sshd[27619]: Received disconnect from 38.65.156.234 port 57928:11: Bye Bye [preauth] Jan 19 05:52:40 host sshd[27619]: Disconnected from 38.65.156.234 port 57928 [preauth] Jan 19 05:52:50 host sshd[27652]: Invalid user informix from 43.156.39.31 port 58900 Jan 19 05:52:50 host sshd[27652]: input_userauth_request: invalid user informix [preauth] Jan 19 05:52:50 host sshd[27652]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:52:50 host sshd[27652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.39.31 Jan 19 05:52:52 host sshd[27652]: Failed password for invalid user informix from 43.156.39.31 port 58900 ssh2 Jan 19 05:52:52 host sshd[27652]: Received disconnect from 43.156.39.31 port 58900:11: Bye Bye [preauth] Jan 19 05:52:52 host sshd[27652]: Disconnected from 43.156.39.31 port 58900 [preauth] Jan 19 05:53:03 host sshd[27670]: User root from 190.129.60.125 not allowed because not listed in AllowUsers Jan 19 05:53:03 host sshd[27670]: input_userauth_request: invalid user root [preauth] Jan 19 05:53:03 host unix_chkpwd[27683]: password check failed for user (root) Jan 19 05:53:03 host sshd[27670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.129.60.125 user=root Jan 19 05:53:03 host sshd[27670]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 05:53:05 host sshd[27670]: Failed password for invalid user root from 190.129.60.125 port 45680 ssh2 Jan 19 05:53:06 host sshd[27670]: Received disconnect from 190.129.60.125 port 45680:11: Bye Bye [preauth] Jan 19 05:53:06 host sshd[27670]: Disconnected from 190.129.60.125 port 45680 [preauth] Jan 19 05:53:24 host sshd[27734]: Invalid user afa from 188.166.217.179 port 45174 Jan 19 05:53:24 host sshd[27734]: input_userauth_request: invalid user afa [preauth] Jan 19 05:53:24 host sshd[27734]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:53:24 host sshd[27734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.217.179 Jan 19 05:53:26 host sshd[27734]: Failed password for invalid user afa from 188.166.217.179 port 45174 ssh2 Jan 19 05:53:26 host sshd[27734]: Received disconnect from 188.166.217.179 port 45174:11: Bye Bye [preauth] Jan 19 05:53:26 host sshd[27734]: Disconnected from 188.166.217.179 port 45174 [preauth] Jan 19 05:53:36 host sshd[27778]: Invalid user ntc from 207.249.96.168 port 38732 Jan 19 05:53:36 host sshd[27778]: input_userauth_request: invalid user ntc [preauth] Jan 19 05:53:36 host sshd[27778]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:53:36 host sshd[27778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.249.96.168 Jan 19 05:53:38 host sshd[27778]: Failed password for invalid user ntc from 207.249.96.168 port 38732 ssh2 Jan 19 05:53:38 host sshd[27778]: Received disconnect from 207.249.96.168 port 38732:11: Bye Bye [preauth] Jan 19 05:53:38 host sshd[27778]: Disconnected from 207.249.96.168 port 38732 [preauth] Jan 19 05:53:41 host sshd[27793]: Did not receive identification string from 104.168.83.36 port 49154 Jan 19 05:53:42 host sshd[27794]: User mysql from 104.168.83.36 not allowed because not listed in AllowUsers Jan 19 05:53:42 host sshd[27795]: Invalid user user from 104.168.83.36 port 49526 Jan 19 05:53:42 host sshd[27794]: input_userauth_request: invalid user mysql [preauth] Jan 19 05:53:42 host sshd[27795]: input_userauth_request: invalid user user [preauth] Jan 19 05:53:42 host sshd[27795]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:53:42 host sshd[27795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.83.36 Jan 19 05:53:43 host unix_chkpwd[27800]: password check failed for user (mysql) Jan 19 05:53:43 host sshd[27794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.83.36 user=mysql Jan 19 05:53:43 host sshd[27794]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 19 05:53:45 host sshd[27795]: Failed password for invalid user user from 104.168.83.36 port 49526 ssh2 Jan 19 05:53:45 host sshd[27794]: Failed password for invalid user mysql from 104.168.83.36 port 49524 ssh2 Jan 19 05:53:45 host sshd[27795]: Connection closed by 104.168.83.36 port 49526 [preauth] Jan 19 05:53:45 host sshd[27794]: Connection closed by 104.168.83.36 port 49524 [preauth] Jan 19 05:53:45 host sshd[27805]: Invalid user deploy from 202.125.94.212 port 34530 Jan 19 05:53:45 host sshd[27805]: input_userauth_request: invalid user deploy [preauth] Jan 19 05:53:45 host sshd[27805]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:53:45 host sshd[27805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.125.94.212 Jan 19 05:53:48 host sshd[27805]: Failed password for invalid user deploy from 202.125.94.212 port 34530 ssh2 Jan 19 05:53:48 host sshd[27805]: Received disconnect from 202.125.94.212 port 34530:11: Bye Bye [preauth] Jan 19 05:53:48 host sshd[27805]: Disconnected from 202.125.94.212 port 34530 [preauth] Jan 19 05:54:41 host sshd[28017]: Invalid user afa from 128.199.227.45 port 53508 Jan 19 05:54:41 host sshd[28017]: input_userauth_request: invalid user afa [preauth] Jan 19 05:54:41 host sshd[28017]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:54:41 host sshd[28017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.227.45 Jan 19 05:54:43 host sshd[28017]: Failed password for invalid user afa from 128.199.227.45 port 53508 ssh2 Jan 19 05:54:43 host sshd[28017]: Received disconnect from 128.199.227.45 port 53508:11: Bye Bye [preauth] Jan 19 05:54:43 host sshd[28017]: Disconnected from 128.199.227.45 port 53508 [preauth] Jan 19 05:55:27 host sshd[28181]: Invalid user dev from 164.92.156.120 port 49444 Jan 19 05:55:27 host sshd[28181]: input_userauth_request: invalid user dev [preauth] Jan 19 05:55:27 host sshd[28181]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:55:27 host sshd[28181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.156.120 Jan 19 05:55:29 host sshd[28181]: Failed password for invalid user dev from 164.92.156.120 port 49444 ssh2 Jan 19 05:55:29 host sshd[28181]: Received disconnect from 164.92.156.120 port 49444:11: Bye Bye [preauth] Jan 19 05:55:29 host sshd[28181]: Disconnected from 164.92.156.120 port 49444 [preauth] Jan 19 05:56:01 host sshd[28275]: Invalid user sftpuser from 87.103.15.162 port 55934 Jan 19 05:56:01 host sshd[28275]: input_userauth_request: invalid user sftpuser [preauth] Jan 19 05:56:01 host sshd[28275]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:56:01 host sshd[28275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.103.15.162 Jan 19 05:56:03 host sshd[28275]: Failed password for invalid user sftpuser from 87.103.15.162 port 55934 ssh2 Jan 19 05:56:03 host sshd[28275]: Received disconnect from 87.103.15.162 port 55934:11: Bye Bye [preauth] Jan 19 05:56:03 host sshd[28275]: Disconnected from 87.103.15.162 port 55934 [preauth] Jan 19 05:56:15 host sshd[28315]: User root from 64.227.122.198 not allowed because not listed in AllowUsers Jan 19 05:56:15 host sshd[28315]: input_userauth_request: invalid user root [preauth] Jan 19 05:56:15 host unix_chkpwd[28320]: password check failed for user (root) Jan 19 05:56:15 host sshd[28315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.122.198 user=root Jan 19 05:56:15 host sshd[28315]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 05:56:17 host sshd[28315]: Failed password for invalid user root from 64.227.122.198 port 34960 ssh2 Jan 19 05:56:17 host sshd[28315]: Received disconnect from 64.227.122.198 port 34960:11: Bye Bye [preauth] Jan 19 05:56:17 host sshd[28315]: Disconnected from 64.227.122.198 port 34960 [preauth] Jan 19 05:56:36 host sshd[28526]: User root from 89.97.180.241 not allowed because not listed in AllowUsers Jan 19 05:56:36 host sshd[28526]: input_userauth_request: invalid user root [preauth] Jan 19 05:56:36 host unix_chkpwd[28531]: password check failed for user (root) Jan 19 05:56:36 host sshd[28526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.97.180.241 user=root Jan 19 05:56:36 host sshd[28526]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 05:56:37 host sshd[28526]: Failed password for invalid user root from 89.97.180.241 port 46784 ssh2 Jan 19 05:56:38 host sshd[28526]: Received disconnect from 89.97.180.241 port 46784:11: Bye Bye [preauth] Jan 19 05:56:38 host sshd[28526]: Disconnected from 89.97.180.241 port 46784 [preauth] Jan 19 05:56:49 host sshd[28585]: Invalid user admin123 from 43.156.39.31 port 47284 Jan 19 05:56:49 host sshd[28585]: input_userauth_request: invalid user admin123 [preauth] Jan 19 05:56:49 host sshd[28585]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:56:49 host sshd[28585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.39.31 Jan 19 05:56:51 host sshd[28585]: Failed password for invalid user admin123 from 43.156.39.31 port 47284 ssh2 Jan 19 05:56:51 host sshd[28585]: Received disconnect from 43.156.39.31 port 47284:11: Bye Bye [preauth] Jan 19 05:56:51 host sshd[28585]: Disconnected from 43.156.39.31 port 47284 [preauth] Jan 19 05:57:08 host sshd[28650]: User root from 202.125.94.212 not allowed because not listed in AllowUsers Jan 19 05:57:08 host sshd[28650]: input_userauth_request: invalid user root [preauth] Jan 19 05:57:08 host unix_chkpwd[28653]: password check failed for user (root) Jan 19 05:57:08 host sshd[28650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.125.94.212 user=root Jan 19 05:57:08 host sshd[28650]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 05:57:11 host sshd[28650]: Failed password for invalid user root from 202.125.94.212 port 54652 ssh2 Jan 19 05:57:11 host sshd[28650]: Received disconnect from 202.125.94.212 port 54652:11: Bye Bye [preauth] Jan 19 05:57:11 host sshd[28650]: Disconnected from 202.125.94.212 port 54652 [preauth] Jan 19 05:57:11 host sshd[28661]: Invalid user trojanuser from 128.199.227.45 port 58538 Jan 19 05:57:11 host sshd[28661]: input_userauth_request: invalid user trojanuser [preauth] Jan 19 05:57:11 host sshd[28661]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:57:11 host sshd[28661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.227.45 Jan 19 05:57:14 host sshd[28661]: Failed password for invalid user trojanuser from 128.199.227.45 port 58538 ssh2 Jan 19 05:57:14 host sshd[28661]: Received disconnect from 128.199.227.45 port 58538:11: Bye Bye [preauth] Jan 19 05:57:14 host sshd[28661]: Disconnected from 128.199.227.45 port 58538 [preauth] Jan 19 05:57:14 host sshd[28696]: Invalid user temp from 144.34.173.67 port 42528 Jan 19 05:57:14 host sshd[28696]: input_userauth_request: invalid user temp [preauth] Jan 19 05:57:14 host sshd[28696]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:57:14 host sshd[28696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.173.67 Jan 19 05:57:16 host sshd[28696]: Failed password for invalid user temp from 144.34.173.67 port 42528 ssh2 Jan 19 05:57:17 host sshd[28696]: Received disconnect from 144.34.173.67 port 42528:11: Bye Bye [preauth] Jan 19 05:57:17 host sshd[28696]: Disconnected from 144.34.173.67 port 42528 [preauth] Jan 19 05:57:17 host sshd[28712]: Invalid user cat from 188.166.217.179 port 39322 Jan 19 05:57:17 host sshd[28712]: input_userauth_request: invalid user cat [preauth] Jan 19 05:57:17 host sshd[28712]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:57:17 host sshd[28712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.217.179 Jan 19 05:57:20 host sshd[28712]: Failed password for invalid user cat from 188.166.217.179 port 39322 ssh2 Jan 19 05:57:20 host sshd[28712]: Received disconnect from 188.166.217.179 port 39322:11: Bye Bye [preauth] Jan 19 05:57:20 host sshd[28712]: Disconnected from 188.166.217.179 port 39322 [preauth] Jan 19 05:57:24 host sshd[28646]: Connection closed by 101.32.76.9 port 59324 [preauth] Jan 19 05:57:28 host sshd[28754]: User root from 117.18.13.119 not allowed because not listed in AllowUsers Jan 19 05:57:28 host sshd[28754]: input_userauth_request: invalid user root [preauth] Jan 19 05:57:28 host unix_chkpwd[28758]: password check failed for user (root) Jan 19 05:57:28 host sshd[28754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.18.13.119 user=root Jan 19 05:57:28 host sshd[28754]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 05:57:31 host sshd[28754]: Failed password for invalid user root from 117.18.13.119 port 57706 ssh2 Jan 19 05:57:31 host sshd[28754]: Received disconnect from 117.18.13.119 port 57706:11: Bye Bye [preauth] Jan 19 05:57:31 host sshd[28754]: Disconnected from 117.18.13.119 port 57706 [preauth] Jan 19 05:57:37 host sshd[28774]: Invalid user temp from 87.103.15.162 port 37454 Jan 19 05:57:37 host sshd[28774]: input_userauth_request: invalid user temp [preauth] Jan 19 05:57:37 host sshd[28774]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:57:37 host sshd[28774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.103.15.162 Jan 19 05:57:39 host sshd[28774]: Failed password for invalid user temp from 87.103.15.162 port 37454 ssh2 Jan 19 05:57:39 host sshd[28779]: User root from 207.249.96.168 not allowed because not listed in AllowUsers Jan 19 05:57:39 host sshd[28779]: input_userauth_request: invalid user root [preauth] Jan 19 05:57:39 host unix_chkpwd[28784]: password check failed for user (root) Jan 19 05:57:39 host sshd[28779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.249.96.168 user=root Jan 19 05:57:39 host sshd[28779]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 05:57:39 host sshd[28774]: Received disconnect from 87.103.15.162 port 37454:11: Bye Bye [preauth] Jan 19 05:57:39 host sshd[28774]: Disconnected from 87.103.15.162 port 37454 [preauth] Jan 19 05:57:42 host sshd[28779]: Failed password for invalid user root from 207.249.96.168 port 51398 ssh2 Jan 19 05:57:42 host sshd[28779]: Received disconnect from 207.249.96.168 port 51398:11: Bye Bye [preauth] Jan 19 05:57:42 host sshd[28779]: Disconnected from 207.249.96.168 port 51398 [preauth] Jan 19 05:57:44 host sshd[28805]: User root from 164.92.156.120 not allowed because not listed in AllowUsers Jan 19 05:57:44 host sshd[28805]: input_userauth_request: invalid user root [preauth] Jan 19 05:57:44 host unix_chkpwd[28828]: password check failed for user (root) Jan 19 05:57:44 host sshd[28805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.156.120 user=root Jan 19 05:57:44 host sshd[28805]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 05:57:46 host sshd[28805]: Failed password for invalid user root from 164.92.156.120 port 51304 ssh2 Jan 19 05:57:46 host sshd[28805]: Received disconnect from 164.92.156.120 port 51304:11: Bye Bye [preauth] Jan 19 05:57:46 host sshd[28805]: Disconnected from 164.92.156.120 port 51304 [preauth] Jan 19 05:58:02 host sshd[28896]: User root from 190.129.60.125 not allowed because not listed in AllowUsers Jan 19 05:58:02 host sshd[28896]: input_userauth_request: invalid user root [preauth] Jan 19 05:58:02 host unix_chkpwd[28915]: password check failed for user (root) Jan 19 05:58:02 host sshd[28896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.129.60.125 user=root Jan 19 05:58:02 host sshd[28896]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 05:58:04 host sshd[28896]: Failed password for invalid user root from 190.129.60.125 port 36654 ssh2 Jan 19 05:58:05 host sshd[28896]: Received disconnect from 190.129.60.125 port 36654:11: Bye Bye [preauth] Jan 19 05:58:05 host sshd[28896]: Disconnected from 190.129.60.125 port 36654 [preauth] Jan 19 05:58:09 host sshd[28960]: Invalid user plex from 43.156.39.31 port 45800 Jan 19 05:58:09 host sshd[28960]: input_userauth_request: invalid user plex [preauth] Jan 19 05:58:09 host sshd[28960]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:58:09 host sshd[28960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.39.31 Jan 19 05:58:11 host sshd[28960]: Failed password for invalid user plex from 43.156.39.31 port 45800 ssh2 Jan 19 05:58:11 host sshd[28960]: Received disconnect from 43.156.39.31 port 45800:11: Bye Bye [preauth] Jan 19 05:58:11 host sshd[28960]: Disconnected from 43.156.39.31 port 45800 [preauth] Jan 19 05:58:32 host sshd[29065]: Invalid user techuser from 128.199.227.45 port 41860 Jan 19 05:58:32 host sshd[29065]: input_userauth_request: invalid user techuser [preauth] Jan 19 05:58:32 host sshd[29065]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:58:32 host sshd[29065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.227.45 Jan 19 05:58:33 host sshd[29065]: Failed password for invalid user techuser from 128.199.227.45 port 41860 ssh2 Jan 19 05:58:33 host sshd[29065]: Received disconnect from 128.199.227.45 port 41860:11: Bye Bye [preauth] Jan 19 05:58:33 host sshd[29065]: Disconnected from 128.199.227.45 port 41860 [preauth] Jan 19 05:58:37 host sshd[29073]: Invalid user user01 from 38.65.156.234 port 56734 Jan 19 05:58:37 host sshd[29073]: input_userauth_request: invalid user user01 [preauth] Jan 19 05:58:37 host sshd[29073]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:58:37 host sshd[29073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.65.156.234 Jan 19 05:58:39 host sshd[29111]: Invalid user django from 188.166.217.179 port 34034 Jan 19 05:58:39 host sshd[29111]: input_userauth_request: invalid user django [preauth] Jan 19 05:58:39 host sshd[29111]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:58:39 host sshd[29111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.217.179 Jan 19 05:58:40 host sshd[29073]: Failed password for invalid user user01 from 38.65.156.234 port 56734 ssh2 Jan 19 05:58:40 host sshd[29073]: Received disconnect from 38.65.156.234 port 56734:11: Bye Bye [preauth] Jan 19 05:58:40 host sshd[29073]: Disconnected from 38.65.156.234 port 56734 [preauth] Jan 19 05:58:41 host sshd[29111]: Failed password for invalid user django from 188.166.217.179 port 34034 ssh2 Jan 19 05:58:41 host sshd[29111]: Received disconnect from 188.166.217.179 port 34034:11: Bye Bye [preauth] Jan 19 05:58:41 host sshd[29111]: Disconnected from 188.166.217.179 port 34034 [preauth] Jan 19 05:58:52 host sshd[29174]: Invalid user frappe from 117.18.13.119 port 51284 Jan 19 05:58:52 host sshd[29174]: input_userauth_request: invalid user frappe [preauth] Jan 19 05:58:52 host sshd[29174]: pam_unix(sshd:auth): check pass; user unknown Jan 19 05:58:52 host sshd[29174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.18.13.119 Jan 19 05:58:53 host sshd[29178]: User root from 87.103.15.162 not allowed because not listed in AllowUsers Jan 19 05:58:53 host sshd[29178]: input_userauth_request: invalid user root [preauth] Jan 19 05:58:53 host unix_chkpwd[29181]: password check failed for user (root) Jan 19 05:58:53 host sshd[29178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.103.15.162 user=root Jan 19 05:58:53 host sshd[29178]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 05:58:54 host sshd[29174]: Failed password for invalid user frappe from 117.18.13.119 port 51284 ssh2 Jan 19 05:58:54 host sshd[29174]: Received disconnect from 117.18.13.119 port 51284:11: Bye Bye [preauth] Jan 19 05:58:54 host sshd[29174]: Disconnected from 117.18.13.119 port 51284 [preauth] Jan 19 05:58:55 host sshd[29178]: Failed password for invalid user root from 87.103.15.162 port 33412 ssh2 Jan 19 05:58:55 host sshd[29178]: Received disconnect from 87.103.15.162 port 33412:11: Bye Bye [preauth] Jan 19 05:58:55 host sshd[29178]: Disconnected from 87.103.15.162 port 33412 [preauth] Jan 19 06:00:08 host sshd[29481]: User root from 38.65.156.234 not allowed because not listed in AllowUsers Jan 19 06:00:08 host sshd[29481]: input_userauth_request: invalid user root [preauth] Jan 19 06:00:08 host unix_chkpwd[29487]: password check failed for user (root) Jan 19 06:00:08 host sshd[29481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.65.156.234 user=root Jan 19 06:00:08 host sshd[29481]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 06:00:10 host sshd[29481]: Failed password for invalid user root from 38.65.156.234 port 39927 ssh2 Jan 19 06:00:10 host sshd[29481]: Received disconnect from 38.65.156.234 port 39927:11: Bye Bye [preauth] Jan 19 06:00:10 host sshd[29481]: Disconnected from 38.65.156.234 port 39927 [preauth] Jan 19 06:00:34 host sshd[29483]: Connection closed by 101.32.76.9 port 58532 [preauth] Jan 19 06:00:42 host sshd[29620]: Invalid user trojanuser from 144.34.173.67 port 55434 Jan 19 06:00:42 host sshd[29620]: input_userauth_request: invalid user trojanuser [preauth] Jan 19 06:00:42 host sshd[29620]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:00:42 host sshd[29620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.173.67 Jan 19 06:00:44 host sshd[29620]: Failed password for invalid user trojanuser from 144.34.173.67 port 55434 ssh2 Jan 19 06:00:44 host sshd[29620]: Received disconnect from 144.34.173.67 port 55434:11: Bye Bye [preauth] Jan 19 06:00:44 host sshd[29620]: Disconnected from 144.34.173.67 port 55434 [preauth] Jan 19 06:01:58 host sshd[29857]: User root from 144.34.173.67 not allowed because not listed in AllowUsers Jan 19 06:01:58 host sshd[29857]: input_userauth_request: invalid user root [preauth] Jan 19 06:01:58 host unix_chkpwd[29864]: password check failed for user (root) Jan 19 06:01:58 host sshd[29857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.173.67 user=root Jan 19 06:01:58 host sshd[29857]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 06:02:00 host sshd[29857]: Failed password for invalid user root from 144.34.173.67 port 53922 ssh2 Jan 19 06:02:01 host sshd[29857]: Received disconnect from 144.34.173.67 port 53922:11: Bye Bye [preauth] Jan 19 06:02:01 host sshd[29857]: Disconnected from 144.34.173.67 port 53922 [preauth] Jan 19 06:03:33 host sshd[30302]: Did not receive identification string from 46.101.97.107 port 61000 Jan 19 06:04:32 host sshd[30496]: Invalid user gg from 194.110.203.109 port 57244 Jan 19 06:04:32 host sshd[30496]: input_userauth_request: invalid user gg [preauth] Jan 19 06:04:32 host sshd[30496]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:04:32 host sshd[30496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 06:04:34 host sshd[30496]: Failed password for invalid user gg from 194.110.203.109 port 57244 ssh2 Jan 19 06:04:38 host sshd[30496]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:04:40 host sshd[30496]: Failed password for invalid user gg from 194.110.203.109 port 57244 ssh2 Jan 19 06:04:43 host sshd[30496]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:04:46 host sshd[30496]: Failed password for invalid user gg from 194.110.203.109 port 57244 ssh2 Jan 19 06:04:49 host sshd[30496]: Connection closed by 194.110.203.109 port 57244 [preauth] Jan 19 06:04:49 host sshd[30496]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 06:05:59 host sshd[30879]: Invalid user frappe from 101.32.76.9 port 56940 Jan 19 06:05:59 host sshd[30879]: input_userauth_request: invalid user frappe [preauth] Jan 19 06:05:59 host sshd[30879]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:05:59 host sshd[30879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.76.9 Jan 19 06:06:02 host sshd[30879]: Failed password for invalid user frappe from 101.32.76.9 port 56940 ssh2 Jan 19 06:06:02 host sshd[30879]: Received disconnect from 101.32.76.9 port 56940:11: Bye Bye [preauth] Jan 19 06:06:02 host sshd[30879]: Disconnected from 101.32.76.9 port 56940 [preauth] Jan 19 06:09:13 host sshd[31506]: Connection closed by 101.32.76.9 port 56148 [preauth] Jan 19 06:11:15 host sshd[31878]: Invalid user ONTUSER from 125.228.27.75 port 44446 Jan 19 06:11:15 host sshd[31878]: input_userauth_request: invalid user ONTUSER [preauth] Jan 19 06:11:15 host sshd[31878]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:11:15 host sshd[31878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.27.75 Jan 19 06:11:18 host sshd[31878]: Failed password for invalid user ONTUSER from 125.228.27.75 port 44446 ssh2 Jan 19 06:11:18 host sshd[31878]: Connection reset by 125.228.27.75 port 44446 [preauth] Jan 19 06:12:05 host sshd[31985]: User root from 101.32.76.9 not allowed because not listed in AllowUsers Jan 19 06:12:05 host sshd[31985]: input_userauth_request: invalid user root [preauth] Jan 19 06:12:05 host unix_chkpwd[32003]: password check failed for user (root) Jan 19 06:12:05 host sshd[31985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.32.76.9 user=root Jan 19 06:12:05 host sshd[31985]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 06:12:07 host sshd[31985]: Failed password for invalid user root from 101.32.76.9 port 55356 ssh2 Jan 19 06:12:07 host sshd[31985]: Received disconnect from 101.32.76.9 port 55356:11: Bye Bye [preauth] Jan 19 06:12:07 host sshd[31985]: Disconnected from 101.32.76.9 port 55356 [preauth] Jan 19 06:15:40 host sshd[32745]: Connection closed by 174.138.61.44 port 38906 [preauth] Jan 19 06:20:37 host sshd[1365]: Invalid user test from 195.226.194.242 port 61732 Jan 19 06:20:37 host sshd[1365]: input_userauth_request: invalid user test [preauth] Jan 19 06:20:37 host sshd[1365]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:20:37 host sshd[1365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 19 06:20:39 host sshd[1365]: Failed password for invalid user test from 195.226.194.242 port 61732 ssh2 Jan 19 06:20:39 host sshd[1365]: Received disconnect from 195.226.194.242 port 61732:11: Bye Bye [preauth] Jan 19 06:20:39 host sshd[1365]: Disconnected from 195.226.194.242 port 61732 [preauth] Jan 19 06:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 06:21:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:21 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:21 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 06:21:21 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=shalinijames user-3=wwwtestugo user-4=vfmassets user-5=wwwkapin user-6=woodpeck user-7=disposeat user-8=wwwkmaorg user-9=remysagr user-10=mrsclean user-11=wwwnexidigital user-12=phmetals user-13=kottayamcalldriv user-14=palco123 user-15=gifterman user-16=wwwletsstalkfood user-17=straightcurve user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=ugotscom user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 06:21:22 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 06:21:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 06:21:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UsCBlHgJMnp3VjCf.~ Jan 19 06:21:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UsCBlHgJMnp3VjCf.~' Jan 19 06:21:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-UsCBlHgJMnp3VjCf.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 06:21:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 06:21:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 06:21:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 06:21:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 06:21:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 06:21:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 06:21:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 06:21:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 06:21:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:21:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 06:21:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 06:21:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 06:25:10 host sshd[2357]: Did not receive identification string from 192.155.90.220 port 57764 Jan 19 06:25:11 host sshd[2367]: Did not receive identification string from 192.155.90.220 port 57776 Jan 19 06:25:12 host sshd[2369]: Did not receive identification string from 192.155.90.220 port 15042 Jan 19 06:28:29 host sshd[2892]: Invalid user uno85 from 113.160.244.144 port 52932 Jan 19 06:28:29 host sshd[2892]: input_userauth_request: invalid user uno85 [preauth] Jan 19 06:28:29 host sshd[2892]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:28:29 host sshd[2892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.160.244.144 Jan 19 06:28:31 host sshd[2892]: Failed password for invalid user uno85 from 113.160.244.144 port 52932 ssh2 Jan 19 06:28:31 host sshd[2892]: Received disconnect from 113.160.244.144 port 52932:11: Bye Bye [preauth] Jan 19 06:28:31 host sshd[2892]: Disconnected from 113.160.244.144 port 52932 [preauth] Jan 19 06:28:33 host sshd[2901]: Invalid user nexus from 5.255.106.239 port 25594 Jan 19 06:28:33 host sshd[2901]: input_userauth_request: invalid user nexus [preauth] Jan 19 06:28:33 host sshd[2901]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:28:33 host sshd[2901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.255.106.239 Jan 19 06:28:35 host sshd[2901]: Failed password for invalid user nexus from 5.255.106.239 port 25594 ssh2 Jan 19 06:28:35 host sshd[2901]: Received disconnect from 5.255.106.239 port 25594:11: Bye Bye [preauth] Jan 19 06:28:35 host sshd[2901]: Disconnected from 5.255.106.239 port 25594 [preauth] Jan 19 06:28:57 host sshd[2947]: Invalid user jboss from 184.69.160.230 port 39426 Jan 19 06:28:57 host sshd[2947]: input_userauth_request: invalid user jboss [preauth] Jan 19 06:28:57 host sshd[2947]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:28:57 host sshd[2947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.69.160.230 Jan 19 06:28:59 host sshd[2947]: Failed password for invalid user jboss from 184.69.160.230 port 39426 ssh2 Jan 19 06:28:59 host sshd[2947]: Received disconnect from 184.69.160.230 port 39426:11: Bye Bye [preauth] Jan 19 06:28:59 host sshd[2947]: Disconnected from 184.69.160.230 port 39426 [preauth] Jan 19 06:30:18 host sshd[3243]: User root from 51.79.65.236 not allowed because not listed in AllowUsers Jan 19 06:30:18 host sshd[3243]: input_userauth_request: invalid user root [preauth] Jan 19 06:30:18 host unix_chkpwd[3246]: password check failed for user (root) Jan 19 06:30:18 host sshd[3243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.65.236 user=root Jan 19 06:30:18 host sshd[3243]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 06:30:19 host sshd[3243]: Failed password for invalid user root from 51.79.65.236 port 45010 ssh2 Jan 19 06:30:20 host sshd[3243]: Received disconnect from 51.79.65.236 port 45010:11: Bye Bye [preauth] Jan 19 06:30:20 host sshd[3243]: Disconnected from 51.79.65.236 port 45010 [preauth] Jan 19 06:33:10 host sshd[3601]: Invalid user oracle from 103.172.205.114 port 46782 Jan 19 06:33:10 host sshd[3601]: input_userauth_request: invalid user oracle [preauth] Jan 19 06:33:10 host sshd[3601]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:33:10 host sshd[3601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.172.205.114 Jan 19 06:33:12 host sshd[3601]: Failed password for invalid user oracle from 103.172.205.114 port 46782 ssh2 Jan 19 06:33:13 host sshd[3601]: Received disconnect from 103.172.205.114 port 46782:11: Bye Bye [preauth] Jan 19 06:33:13 host sshd[3601]: Disconnected from 103.172.205.114 port 46782 [preauth] Jan 19 06:33:47 host sshd[3695]: Invalid user erpnext from 5.255.106.239 port 3172 Jan 19 06:33:47 host sshd[3695]: input_userauth_request: invalid user erpnext [preauth] Jan 19 06:33:47 host sshd[3695]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:33:47 host sshd[3695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.255.106.239 Jan 19 06:33:49 host sshd[3695]: Failed password for invalid user erpnext from 5.255.106.239 port 3172 ssh2 Jan 19 06:33:49 host sshd[3695]: Received disconnect from 5.255.106.239 port 3172:11: Bye Bye [preauth] Jan 19 06:33:49 host sshd[3695]: Disconnected from 5.255.106.239 port 3172 [preauth] Jan 19 06:33:49 host sshd[3698]: User root from 184.69.160.230 not allowed because not listed in AllowUsers Jan 19 06:33:49 host sshd[3698]: input_userauth_request: invalid user root [preauth] Jan 19 06:33:49 host unix_chkpwd[3707]: password check failed for user (root) Jan 19 06:33:49 host sshd[3698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=184.69.160.230 user=root Jan 19 06:33:49 host sshd[3698]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 06:33:51 host sshd[3698]: Failed password for invalid user root from 184.69.160.230 port 35374 ssh2 Jan 19 06:33:51 host sshd[3698]: Received disconnect from 184.69.160.230 port 35374:11: Bye Bye [preauth] Jan 19 06:33:51 host sshd[3698]: Disconnected from 184.69.160.230 port 35374 [preauth] Jan 19 06:33:56 host sshd[3747]: Invalid user jack from 128.199.177.90 port 59868 Jan 19 06:33:56 host sshd[3747]: input_userauth_request: invalid user jack [preauth] Jan 19 06:33:56 host sshd[3747]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:33:56 host sshd[3747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.177.90 Jan 19 06:33:58 host sshd[3747]: Failed password for invalid user jack from 128.199.177.90 port 59868 ssh2 Jan 19 06:33:58 host sshd[3747]: Received disconnect from 128.199.177.90 port 59868:11: Bye Bye [preauth] Jan 19 06:33:58 host sshd[3747]: Disconnected from 128.199.177.90 port 59868 [preauth] Jan 19 06:34:16 host sshd[3783]: Invalid user super from 182.213.35.86 port 37139 Jan 19 06:34:16 host sshd[3783]: input_userauth_request: invalid user super [preauth] Jan 19 06:34:16 host sshd[3783]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:34:16 host sshd[3783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.213.35.86 Jan 19 06:34:18 host sshd[3783]: Failed password for invalid user super from 182.213.35.86 port 37139 ssh2 Jan 19 06:34:19 host sshd[3783]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:34:21 host sshd[3783]: Failed password for invalid user super from 182.213.35.86 port 37139 ssh2 Jan 19 06:34:22 host sshd[3783]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:34:25 host sshd[3783]: Failed password for invalid user super from 182.213.35.86 port 37139 ssh2 Jan 19 06:34:25 host sshd[3783]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:34:27 host sshd[3783]: Failed password for invalid user super from 182.213.35.86 port 37139 ssh2 Jan 19 06:34:28 host sshd[3783]: Failed password for invalid user super from 182.213.35.86 port 37139 ssh2 Jan 19 06:34:28 host sshd[3783]: Connection closed by 182.213.35.86 port 37139 [preauth] Jan 19 06:34:28 host sshd[3783]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.213.35.86 Jan 19 06:34:28 host sshd[3783]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 19 06:34:52 host sshd[3998]: User root from 5.255.106.239 not allowed because not listed in AllowUsers Jan 19 06:34:52 host sshd[3998]: input_userauth_request: invalid user root [preauth] Jan 19 06:34:52 host unix_chkpwd[4000]: password check failed for user (root) Jan 19 06:34:52 host sshd[3998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.255.106.239 user=root Jan 19 06:34:52 host sshd[3998]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 06:34:54 host sshd[3998]: Failed password for invalid user root from 5.255.106.239 port 12846 ssh2 Jan 19 06:34:54 host sshd[3998]: Received disconnect from 5.255.106.239 port 12846:11: Bye Bye [preauth] Jan 19 06:34:54 host sshd[3998]: Disconnected from 5.255.106.239 port 12846 [preauth] Jan 19 06:35:16 host sshd[4094]: User root from 165.22.101.75 not allowed because not listed in AllowUsers Jan 19 06:35:16 host sshd[4094]: input_userauth_request: invalid user root [preauth] Jan 19 06:35:16 host unix_chkpwd[4096]: password check failed for user (root) Jan 19 06:35:16 host sshd[4094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.101.75 user=root Jan 19 06:35:16 host sshd[4094]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 06:35:18 host sshd[4094]: Failed password for invalid user root from 165.22.101.75 port 38618 ssh2 Jan 19 06:35:18 host sshd[4094]: Received disconnect from 165.22.101.75 port 38618:11: Bye Bye [preauth] Jan 19 06:35:18 host sshd[4094]: Disconnected from 165.22.101.75 port 38618 [preauth] Jan 19 06:35:22 host sshd[4115]: Invalid user informix from 103.172.205.114 port 34252 Jan 19 06:35:22 host sshd[4115]: input_userauth_request: invalid user informix [preauth] Jan 19 06:35:22 host sshd[4115]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:35:22 host sshd[4115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.172.205.114 Jan 19 06:35:24 host sshd[4115]: Failed password for invalid user informix from 103.172.205.114 port 34252 ssh2 Jan 19 06:35:24 host sshd[4115]: Received disconnect from 103.172.205.114 port 34252:11: Bye Bye [preauth] Jan 19 06:35:24 host sshd[4115]: Disconnected from 103.172.205.114 port 34252 [preauth] Jan 19 06:35:40 host sshd[4159]: Invalid user nexus from 51.79.65.236 port 42478 Jan 19 06:35:40 host sshd[4159]: input_userauth_request: invalid user nexus [preauth] Jan 19 06:35:40 host sshd[4159]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:35:40 host sshd[4159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.65.236 Jan 19 06:35:42 host sshd[4159]: Failed password for invalid user nexus from 51.79.65.236 port 42478 ssh2 Jan 19 06:35:43 host sshd[4159]: Received disconnect from 51.79.65.236 port 42478:11: Bye Bye [preauth] Jan 19 06:35:43 host sshd[4159]: Disconnected from 51.79.65.236 port 42478 [preauth] Jan 19 06:35:47 host sshd[4202]: Invalid user oracle from 113.160.244.144 port 51646 Jan 19 06:35:47 host sshd[4202]: input_userauth_request: invalid user oracle [preauth] Jan 19 06:35:47 host sshd[4202]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:35:47 host sshd[4202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.160.244.144 Jan 19 06:35:49 host sshd[4202]: Failed password for invalid user oracle from 113.160.244.144 port 51646 ssh2 Jan 19 06:35:49 host sshd[4202]: Received disconnect from 113.160.244.144 port 51646:11: Bye Bye [preauth] Jan 19 06:35:49 host sshd[4202]: Disconnected from 113.160.244.144 port 51646 [preauth] Jan 19 06:36:08 host sshd[4240]: Invalid user dmdba from 128.199.177.90 port 35268 Jan 19 06:36:08 host sshd[4240]: input_userauth_request: invalid user dmdba [preauth] Jan 19 06:36:08 host sshd[4240]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:36:08 host sshd[4240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.177.90 Jan 19 06:36:10 host sshd[4240]: Failed password for invalid user dmdba from 128.199.177.90 port 35268 ssh2 Jan 19 06:36:10 host sshd[4240]: Received disconnect from 128.199.177.90 port 35268:11: Bye Bye [preauth] Jan 19 06:36:10 host sshd[4240]: Disconnected from 128.199.177.90 port 35268 [preauth] Jan 19 06:36:50 host sshd[4324]: Invalid user jack from 103.172.205.114 port 51510 Jan 19 06:36:50 host sshd[4324]: input_userauth_request: invalid user jack [preauth] Jan 19 06:36:50 host sshd[4324]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:36:50 host sshd[4324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.172.205.114 Jan 19 06:36:52 host sshd[4324]: Failed password for invalid user jack from 103.172.205.114 port 51510 ssh2 Jan 19 06:36:52 host sshd[4324]: Received disconnect from 103.172.205.114 port 51510:11: Bye Bye [preauth] Jan 19 06:36:52 host sshd[4324]: Disconnected from 103.172.205.114 port 51510 [preauth] Jan 19 06:37:23 host sshd[4441]: User root from 113.160.244.144 not allowed because not listed in AllowUsers Jan 19 06:37:23 host sshd[4441]: input_userauth_request: invalid user root [preauth] Jan 19 06:37:23 host unix_chkpwd[4445]: password check failed for user (root) Jan 19 06:37:23 host sshd[4441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.160.244.144 user=root Jan 19 06:37:23 host sshd[4441]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 06:37:26 host sshd[4441]: Failed password for invalid user root from 113.160.244.144 port 45553 ssh2 Jan 19 06:37:38 host sshd[4521]: Invalid user ravi from 128.199.177.90 port 49732 Jan 19 06:37:38 host sshd[4521]: input_userauth_request: invalid user ravi [preauth] Jan 19 06:37:38 host sshd[4521]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:37:38 host sshd[4521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.177.90 Jan 19 06:37:40 host sshd[4521]: Failed password for invalid user ravi from 128.199.177.90 port 49732 ssh2 Jan 19 06:37:50 host sshd[4613]: Invalid user dmdba from 165.22.101.75 port 59488 Jan 19 06:37:50 host sshd[4613]: input_userauth_request: invalid user dmdba [preauth] Jan 19 06:37:50 host sshd[4613]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:37:50 host sshd[4613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.101.75 Jan 19 06:37:52 host sshd[4613]: Failed password for invalid user dmdba from 165.22.101.75 port 59488 ssh2 Jan 19 06:37:52 host sshd[4613]: Received disconnect from 165.22.101.75 port 59488:11: Bye Bye [preauth] Jan 19 06:37:52 host sshd[4613]: Disconnected from 165.22.101.75 port 59488 [preauth] Jan 19 06:52:34 host sshd[7543]: Invalid user 02 from 195.226.194.242 port 51852 Jan 19 06:52:34 host sshd[7543]: input_userauth_request: invalid user 02 [preauth] Jan 19 06:52:34 host sshd[7543]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:52:34 host sshd[7543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 19 06:52:36 host sshd[7543]: Failed password for invalid user 02 from 195.226.194.242 port 51852 ssh2 Jan 19 06:52:36 host sshd[7543]: Received disconnect from 195.226.194.242 port 51852:11: Bye Bye [preauth] Jan 19 06:52:36 host sshd[7543]: Disconnected from 195.226.194.242 port 51852 [preauth] Jan 19 06:52:56 host sshd[7584]: Invalid user pi from 94.14.128.125 port 43480 Jan 19 06:52:56 host sshd[7584]: input_userauth_request: invalid user pi [preauth] Jan 19 06:52:56 host sshd[7583]: Invalid user pi from 94.14.128.125 port 43476 Jan 19 06:52:56 host sshd[7583]: input_userauth_request: invalid user pi [preauth] Jan 19 06:52:56 host sshd[7584]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:52:56 host sshd[7584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.14.128.125 Jan 19 06:52:56 host sshd[7583]: pam_unix(sshd:auth): check pass; user unknown Jan 19 06:52:56 host sshd[7583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.14.128.125 Jan 19 06:52:58 host sshd[7584]: Failed password for invalid user pi from 94.14.128.125 port 43480 ssh2 Jan 19 06:52:58 host sshd[7583]: Failed password for invalid user pi from 94.14.128.125 port 43476 ssh2 Jan 19 06:52:59 host sshd[7584]: Connection closed by 94.14.128.125 port 43480 [preauth] Jan 19 06:52:59 host sshd[7583]: Connection closed by 94.14.128.125 port 43476 [preauth] Jan 19 07:09:54 host sshd[10532]: Invalid user vadmin from 119.203.5.77 port 62621 Jan 19 07:09:54 host sshd[10532]: input_userauth_request: invalid user vadmin [preauth] Jan 19 07:09:54 host sshd[10532]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:09:54 host sshd[10532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.203.5.77 Jan 19 07:09:55 host sshd[10532]: Failed password for invalid user vadmin from 119.203.5.77 port 62621 ssh2 Jan 19 07:09:56 host sshd[10532]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:09:57 host sshd[10532]: Failed password for invalid user vadmin from 119.203.5.77 port 62621 ssh2 Jan 19 07:09:58 host sshd[10532]: Failed password for invalid user vadmin from 119.203.5.77 port 62621 ssh2 Jan 19 07:09:58 host sshd[10532]: Connection closed by 119.203.5.77 port 62621 [preauth] Jan 19 07:09:58 host sshd[10532]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.203.5.77 Jan 19 07:12:29 host sshd[10954]: Connection reset by 59.126.149.76 port 35717 [preauth] Jan 19 07:13:19 host sshd[11085]: Invalid user lexar from 205.185.113.129 port 56956 Jan 19 07:13:19 host sshd[11085]: input_userauth_request: invalid user lexar [preauth] Jan 19 07:13:19 host sshd[11085]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:13:19 host sshd[11085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 19 07:13:21 host sshd[11085]: Failed password for invalid user lexar from 205.185.113.129 port 56956 ssh2 Jan 19 07:13:22 host sshd[11085]: Connection closed by 205.185.113.129 port 56956 [preauth] Jan 19 07:13:30 host sshd[11132]: Invalid user kali from 165.227.202.89 port 38660 Jan 19 07:13:30 host sshd[11132]: input_userauth_request: invalid user kali [preauth] Jan 19 07:13:30 host sshd[11132]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:13:30 host sshd[11132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.202.89 Jan 19 07:13:32 host sshd[11132]: Failed password for invalid user kali from 165.227.202.89 port 38660 ssh2 Jan 19 07:13:32 host sshd[11132]: Received disconnect from 165.227.202.89 port 38660:11: Bye Bye [preauth] Jan 19 07:13:32 host sshd[11132]: Disconnected from 165.227.202.89 port 38660 [preauth] Jan 19 07:13:57 host sshd[11194]: Invalid user alex from 118.212.146.42 port 36264 Jan 19 07:13:57 host sshd[11194]: input_userauth_request: invalid user alex [preauth] Jan 19 07:13:57 host sshd[11194]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:13:57 host sshd[11194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.212.146.42 Jan 19 07:14:00 host sshd[11194]: Failed password for invalid user alex from 118.212.146.42 port 36264 ssh2 Jan 19 07:14:00 host sshd[11194]: Received disconnect from 118.212.146.42 port 36264:11: Bye Bye [preauth] Jan 19 07:14:00 host sshd[11194]: Disconnected from 118.212.146.42 port 36264 [preauth] Jan 19 07:14:36 host sshd[11280]: Did not receive identification string from 43.246.208.2 port 43368 Jan 19 07:15:48 host sshd[11428]: Invalid user es from 110.35.173.2 port 22750 Jan 19 07:15:48 host sshd[11428]: input_userauth_request: invalid user es [preauth] Jan 19 07:15:48 host sshd[11428]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:15:48 host sshd[11428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.2 Jan 19 07:15:50 host sshd[11428]: Failed password for invalid user es from 110.35.173.2 port 22750 ssh2 Jan 19 07:15:50 host sshd[11428]: Received disconnect from 110.35.173.2 port 22750:11: Bye Bye [preauth] Jan 19 07:15:50 host sshd[11428]: Disconnected from 110.35.173.2 port 22750 [preauth] Jan 19 07:16:36 host sshd[11526]: Invalid user ntc from 207.154.229.107 port 56308 Jan 19 07:16:36 host sshd[11526]: input_userauth_request: invalid user ntc [preauth] Jan 19 07:16:36 host sshd[11526]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:16:36 host sshd[11526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.229.107 Jan 19 07:16:38 host sshd[11526]: Failed password for invalid user ntc from 207.154.229.107 port 56308 ssh2 Jan 19 07:16:38 host sshd[11526]: Received disconnect from 207.154.229.107 port 56308:11: Bye Bye [preauth] Jan 19 07:16:38 host sshd[11526]: Disconnected from 207.154.229.107 port 56308 [preauth] Jan 19 07:16:44 host sshd[11539]: Invalid user builder from 41.223.99.89 port 37852 Jan 19 07:16:44 host sshd[11539]: input_userauth_request: invalid user builder [preauth] Jan 19 07:16:44 host sshd[11539]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:16:44 host sshd[11539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.223.99.89 Jan 19 07:16:46 host sshd[11539]: Failed password for invalid user builder from 41.223.99.89 port 37852 ssh2 Jan 19 07:16:46 host sshd[11539]: Received disconnect from 41.223.99.89 port 37852:11: Bye Bye [preauth] Jan 19 07:16:46 host sshd[11539]: Disconnected from 41.223.99.89 port 37852 [preauth] Jan 19 07:17:02 host sshd[11595]: Invalid user minikube from 123.30.187.208 port 42278 Jan 19 07:17:02 host sshd[11595]: input_userauth_request: invalid user minikube [preauth] Jan 19 07:17:02 host sshd[11595]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:17:02 host sshd[11595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.187.208 Jan 19 07:17:04 host sshd[11595]: Failed password for invalid user minikube from 123.30.187.208 port 42278 ssh2 Jan 19 07:17:04 host sshd[11595]: Received disconnect from 123.30.187.208 port 42278:11: Bye Bye [preauth] Jan 19 07:17:04 host sshd[11595]: Disconnected from 123.30.187.208 port 42278 [preauth] Jan 19 07:17:09 host sshd[11725]: Invalid user builder from 40.84.217.8 port 33056 Jan 19 07:17:09 host sshd[11725]: input_userauth_request: invalid user builder [preauth] Jan 19 07:17:09 host sshd[11725]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:17:09 host sshd[11725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.84.217.8 Jan 19 07:17:11 host sshd[11725]: Failed password for invalid user builder from 40.84.217.8 port 33056 ssh2 Jan 19 07:17:11 host sshd[11725]: Received disconnect from 40.84.217.8 port 33056:11: Bye Bye [preauth] Jan 19 07:17:11 host sshd[11725]: Disconnected from 40.84.217.8 port 33056 [preauth] Jan 19 07:17:23 host sshd[11756]: Invalid user halo from 203.23.199.88 port 19685 Jan 19 07:17:23 host sshd[11756]: input_userauth_request: invalid user halo [preauth] Jan 19 07:17:23 host sshd[11756]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:17:23 host sshd[11756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.23.199.88 Jan 19 07:17:25 host sshd[11756]: Failed password for invalid user halo from 203.23.199.88 port 19685 ssh2 Jan 19 07:17:26 host sshd[11756]: Received disconnect from 203.23.199.88 port 19685:11: Bye Bye [preauth] Jan 19 07:17:26 host sshd[11756]: Disconnected from 203.23.199.88 port 19685 [preauth] Jan 19 07:17:37 host sshd[11794]: User root from 58.27.134.52 not allowed because not listed in AllowUsers Jan 19 07:17:37 host sshd[11794]: input_userauth_request: invalid user root [preauth] Jan 19 07:17:37 host unix_chkpwd[11797]: password check failed for user (root) Jan 19 07:17:37 host sshd[11794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.27.134.52 user=root Jan 19 07:17:37 host sshd[11794]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 07:17:39 host sshd[11794]: Failed password for invalid user root from 58.27.134.52 port 52192 ssh2 Jan 19 07:17:39 host sshd[11794]: Received disconnect from 58.27.134.52 port 52192:11: Bye Bye [preauth] Jan 19 07:17:39 host sshd[11794]: Disconnected from 58.27.134.52 port 52192 [preauth] Jan 19 07:18:56 host sshd[11921]: Invalid user manager from 165.227.202.89 port 33216 Jan 19 07:18:56 host sshd[11921]: input_userauth_request: invalid user manager [preauth] Jan 19 07:18:56 host sshd[11921]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:18:56 host sshd[11921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.202.89 Jan 19 07:18:58 host sshd[11921]: Failed password for invalid user manager from 165.227.202.89 port 33216 ssh2 Jan 19 07:18:58 host sshd[11921]: Received disconnect from 165.227.202.89 port 33216:11: Bye Bye [preauth] Jan 19 07:18:58 host sshd[11921]: Disconnected from 165.227.202.89 port 33216 [preauth] Jan 19 07:20:00 host sshd[12043]: Invalid user kira from 165.227.202.89 port 53096 Jan 19 07:20:00 host sshd[12043]: input_userauth_request: invalid user kira [preauth] Jan 19 07:20:00 host sshd[12043]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:20:00 host sshd[12043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.202.89 Jan 19 07:20:02 host sshd[12043]: Failed password for invalid user kira from 165.227.202.89 port 53096 ssh2 Jan 19 07:20:17 host sshd[12123]: Invalid user ali from 207.154.229.107 port 39246 Jan 19 07:20:17 host sshd[12123]: input_userauth_request: invalid user ali [preauth] Jan 19 07:20:17 host sshd[12123]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:20:17 host sshd[12123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.229.107 Jan 19 07:20:19 host sshd[12123]: Failed password for invalid user ali from 207.154.229.107 port 39246 ssh2 Jan 19 07:20:19 host sshd[12123]: Received disconnect from 207.154.229.107 port 39246:11: Bye Bye [preauth] Jan 19 07:20:19 host sshd[12123]: Disconnected from 207.154.229.107 port 39246 [preauth] Jan 19 07:20:32 host sshd[12182]: User root from 41.223.99.89 not allowed because not listed in AllowUsers Jan 19 07:20:32 host sshd[12182]: input_userauth_request: invalid user root [preauth] Jan 19 07:20:32 host unix_chkpwd[12184]: password check failed for user (root) Jan 19 07:20:32 host sshd[12182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.223.99.89 user=root Jan 19 07:20:32 host sshd[12182]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 07:20:34 host sshd[12182]: Failed password for invalid user root from 41.223.99.89 port 49036 ssh2 Jan 19 07:20:34 host sshd[12182]: Received disconnect from 41.223.99.89 port 49036:11: Bye Bye [preauth] Jan 19 07:20:34 host sshd[12182]: Disconnected from 41.223.99.89 port 49036 [preauth] Jan 19 07:20:35 host sshd[12191]: Invalid user student from 203.23.199.88 port 39255 Jan 19 07:20:35 host sshd[12191]: input_userauth_request: invalid user student [preauth] Jan 19 07:20:35 host sshd[12191]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:20:35 host sshd[12191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.23.199.88 Jan 19 07:20:38 host sshd[12191]: Failed password for invalid user student from 203.23.199.88 port 39255 ssh2 Jan 19 07:20:38 host sshd[12191]: Received disconnect from 203.23.199.88 port 39255:11: Bye Bye [preauth] Jan 19 07:20:38 host sshd[12191]: Disconnected from 203.23.199.88 port 39255 [preauth] Jan 19 07:20:44 host sshd[12235]: User root from 123.30.187.208 not allowed because not listed in AllowUsers Jan 19 07:20:44 host sshd[12235]: input_userauth_request: invalid user root [preauth] Jan 19 07:20:44 host unix_chkpwd[12237]: password check failed for user (root) Jan 19 07:20:44 host sshd[12235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.187.208 user=root Jan 19 07:20:44 host sshd[12235]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 07:20:46 host sshd[12235]: Failed password for invalid user root from 123.30.187.208 port 55654 ssh2 Jan 19 07:20:46 host sshd[12235]: Received disconnect from 123.30.187.208 port 55654:11: Bye Bye [preauth] Jan 19 07:20:46 host sshd[12235]: Disconnected from 123.30.187.208 port 55654 [preauth] Jan 19 07:20:47 host sshd[12240]: Invalid user prueba from 110.35.173.2 port 12456 Jan 19 07:20:47 host sshd[12240]: input_userauth_request: invalid user prueba [preauth] Jan 19 07:20:47 host sshd[12240]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:20:47 host sshd[12240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.2 Jan 19 07:20:49 host sshd[12240]: Failed password for invalid user prueba from 110.35.173.2 port 12456 ssh2 Jan 19 07:20:50 host sshd[12240]: Received disconnect from 110.35.173.2 port 12456:11: Bye Bye [preauth] Jan 19 07:20:50 host sshd[12240]: Disconnected from 110.35.173.2 port 12456 [preauth] Jan 19 07:20:58 host sshd[12284]: Invalid user zookeeper from 58.27.134.52 port 59698 Jan 19 07:20:58 host sshd[12284]: input_userauth_request: invalid user zookeeper [preauth] Jan 19 07:20:58 host sshd[12284]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:20:58 host sshd[12284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.27.134.52 Jan 19 07:21:00 host sshd[12284]: Failed password for invalid user zookeeper from 58.27.134.52 port 59698 ssh2 Jan 19 07:21:00 host sshd[12284]: Received disconnect from 58.27.134.52 port 59698:11: Bye Bye [preauth] Jan 19 07:21:00 host sshd[12284]: Disconnected from 58.27.134.52 port 59698 [preauth] Jan 19 07:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=wwwkapin user-5=woodpeck user-6=shalinijames user-7=wwwtestugo user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=straightcurve user-13=wwwletsstalkfood user-14=kottayamcalldriv user-15=phmetals user-16=palco123 user-17=gifterman user-18=mrsclean user-19=wwwnexidigital user-20=cochintaxi user-21=wwwkaretakers user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=wwwresourcehunte user-29=keralaholi user-30=wwwrmswll feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 07:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 07:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-FBw8H6ZtWl3lmU2C.~ Jan 19 07:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-FBw8H6ZtWl3lmU2C.~' Jan 19 07:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-FBw8H6ZtWl3lmU2C.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 07:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 07:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 07:21:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 07:21:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 07:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 07:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 07:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 07:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 07:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 07:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 07:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 07:21:17 host sshd[12477]: Invalid user john from 207.154.229.107 port 33272 Jan 19 07:21:17 host sshd[12477]: input_userauth_request: invalid user john [preauth] Jan 19 07:21:17 host sshd[12477]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:21:17 host sshd[12477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.229.107 Jan 19 07:21:19 host sshd[12477]: Failed password for invalid user john from 207.154.229.107 port 33272 ssh2 Jan 19 07:21:20 host sshd[12477]: Received disconnect from 207.154.229.107 port 33272:11: Bye Bye [preauth] Jan 19 07:21:20 host sshd[12477]: Disconnected from 207.154.229.107 port 33272 [preauth] Jan 19 07:21:23 host sshd[12562]: Invalid user maint from 40.84.217.8 port 46554 Jan 19 07:21:23 host sshd[12562]: input_userauth_request: invalid user maint [preauth] Jan 19 07:21:23 host sshd[12562]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:21:23 host sshd[12562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.84.217.8 Jan 19 07:21:25 host sshd[12562]: Failed password for invalid user maint from 40.84.217.8 port 46554 ssh2 Jan 19 07:21:25 host sshd[12562]: Received disconnect from 40.84.217.8 port 46554:11: Bye Bye [preauth] Jan 19 07:21:25 host sshd[12562]: Disconnected from 40.84.217.8 port 46554 [preauth] Jan 19 07:22:03 host sshd[12661]: User root from 203.23.199.88 not allowed because not listed in AllowUsers Jan 19 07:22:03 host sshd[12661]: input_userauth_request: invalid user root [preauth] Jan 19 07:22:03 host unix_chkpwd[12663]: password check failed for user (root) Jan 19 07:22:03 host sshd[12661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.23.199.88 user=root Jan 19 07:22:03 host sshd[12661]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 07:22:05 host sshd[12661]: Failed password for invalid user root from 203.23.199.88 port 53098 ssh2 Jan 19 07:22:05 host sshd[12661]: Received disconnect from 203.23.199.88 port 53098:11: Bye Bye [preauth] Jan 19 07:22:05 host sshd[12661]: Disconnected from 203.23.199.88 port 53098 [preauth] Jan 19 07:22:08 host sshd[12727]: Invalid user alex from 110.35.173.2 port 27394 Jan 19 07:22:08 host sshd[12727]: input_userauth_request: invalid user alex [preauth] Jan 19 07:22:08 host sshd[12727]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:22:08 host sshd[12727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.2 Jan 19 07:22:10 host sshd[12727]: Failed password for invalid user alex from 110.35.173.2 port 27394 ssh2 Jan 19 07:22:10 host sshd[12727]: Received disconnect from 110.35.173.2 port 27394:11: Bye Bye [preauth] Jan 19 07:22:10 host sshd[12727]: Disconnected from 110.35.173.2 port 27394 [preauth] Jan 19 07:22:34 host sshd[12894]: Invalid user ntc from 40.84.217.8 port 43810 Jan 19 07:22:34 host sshd[12894]: input_userauth_request: invalid user ntc [preauth] Jan 19 07:22:34 host sshd[12894]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:22:34 host sshd[12894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.84.217.8 Jan 19 07:22:35 host sshd[12894]: Failed password for invalid user ntc from 40.84.217.8 port 43810 ssh2 Jan 19 07:22:36 host sshd[12894]: Received disconnect from 40.84.217.8 port 43810:11: Bye Bye [preauth] Jan 19 07:22:36 host sshd[12894]: Disconnected from 40.84.217.8 port 43810 [preauth] Jan 19 07:26:37 host sshd[13280]: Connection closed by 118.212.146.42 port 49430 [preauth] Jan 19 07:27:15 host sshd[13657]: Invalid user mcserver from 118.212.146.42 port 43842 Jan 19 07:27:15 host sshd[13657]: input_userauth_request: invalid user mcserver [preauth] Jan 19 07:27:15 host sshd[13657]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:27:15 host sshd[13657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.212.146.42 Jan 19 07:27:16 host sshd[13657]: Failed password for invalid user mcserver from 118.212.146.42 port 43842 ssh2 Jan 19 07:27:17 host sshd[13657]: Received disconnect from 118.212.146.42 port 43842:11: Bye Bye [preauth] Jan 19 07:27:17 host sshd[13657]: Disconnected from 118.212.146.42 port 43842 [preauth] Jan 19 07:28:04 host sshd[13767]: Invalid user nexus from 118.212.146.42 port 55166 Jan 19 07:28:04 host sshd[13767]: input_userauth_request: invalid user nexus [preauth] Jan 19 07:28:04 host sshd[13767]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:28:04 host sshd[13767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.212.146.42 Jan 19 07:28:06 host sshd[13767]: Failed password for invalid user nexus from 118.212.146.42 port 55166 ssh2 Jan 19 07:38:36 host sshd[15467]: User root from 171.228.21.84 not allowed because not listed in AllowUsers Jan 19 07:38:36 host sshd[15467]: input_userauth_request: invalid user root [preauth] Jan 19 07:38:36 host unix_chkpwd[15474]: password check failed for user (root) Jan 19 07:38:36 host sshd[15467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.228.21.84 user=root Jan 19 07:38:36 host sshd[15467]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 07:38:38 host sshd[15467]: Failed password for invalid user root from 171.228.21.84 port 59625 ssh2 Jan 19 07:38:40 host unix_chkpwd[15480]: password check failed for user (root) Jan 19 07:38:40 host sshd[15467]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 07:38:42 host sshd[15467]: Failed password for invalid user root from 171.228.21.84 port 59625 ssh2 Jan 19 07:38:42 host sshd[15467]: Connection reset by 171.228.21.84 port 59625 [preauth] Jan 19 07:38:42 host sshd[15467]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.228.21.84 user=root Jan 19 07:50:23 host sshd[17953]: Invalid user informix from 104.244.74.6 port 48434 Jan 19 07:50:23 host sshd[17953]: input_userauth_request: invalid user informix [preauth] Jan 19 07:50:23 host sshd[17953]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:50:23 host sshd[17953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 19 07:50:24 host sshd[17953]: Failed password for invalid user informix from 104.244.74.6 port 48434 ssh2 Jan 19 07:50:25 host sshd[17953]: Connection closed by 104.244.74.6 port 48434 [preauth] Jan 19 07:50:56 host sshd[18023]: Invalid user informix from 104.244.74.6 port 39938 Jan 19 07:50:56 host sshd[18023]: input_userauth_request: invalid user informix [preauth] Jan 19 07:50:56 host sshd[18023]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:50:56 host sshd[18023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 19 07:50:58 host sshd[18023]: Failed password for invalid user informix from 104.244.74.6 port 39938 ssh2 Jan 19 07:50:58 host sshd[18023]: Connection closed by 104.244.74.6 port 39938 [preauth] Jan 19 07:55:46 host sshd[18743]: Invalid user gh from 194.110.203.109 port 54958 Jan 19 07:55:46 host sshd[18743]: input_userauth_request: invalid user gh [preauth] Jan 19 07:55:46 host sshd[18743]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:55:46 host sshd[18743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 07:55:48 host sshd[18743]: Failed password for invalid user gh from 194.110.203.109 port 54958 ssh2 Jan 19 07:55:51 host sshd[18743]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:55:53 host sshd[18743]: Failed password for invalid user gh from 194.110.203.109 port 54958 ssh2 Jan 19 07:55:56 host sshd[18743]: pam_unix(sshd:auth): check pass; user unknown Jan 19 07:55:58 host sshd[18743]: Failed password for invalid user gh from 194.110.203.109 port 54958 ssh2 Jan 19 07:56:01 host sshd[18743]: Connection closed by 194.110.203.109 port 54958 [preauth] Jan 19 07:56:01 host sshd[18743]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 08:05:19 host sshd[20215]: Invalid user user from 114.32.156.230 port 46048 Jan 19 08:05:19 host sshd[20215]: input_userauth_request: invalid user user [preauth] Jan 19 08:05:19 host sshd[20215]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:05:19 host sshd[20215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.156.230 Jan 19 08:05:20 host sshd[20215]: Failed password for invalid user user from 114.32.156.230 port 46048 ssh2 Jan 19 08:05:21 host sshd[20215]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:05:23 host sshd[20215]: Failed password for invalid user user from 114.32.156.230 port 46048 ssh2 Jan 19 08:05:24 host sshd[20215]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:05:26 host sshd[20215]: Failed password for invalid user user from 114.32.156.230 port 46048 ssh2 Jan 19 08:05:28 host sshd[20215]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:05:30 host sshd[20215]: Failed password for invalid user user from 114.32.156.230 port 46048 ssh2 Jan 19 08:05:32 host sshd[20215]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:05:34 host sshd[20215]: Failed password for invalid user user from 114.32.156.230 port 46048 ssh2 Jan 19 08:05:50 host sshd[20313]: User sshd from 194.169.175.102 not allowed because not listed in AllowUsers Jan 19 08:05:50 host sshd[20313]: input_userauth_request: invalid user sshd [preauth] Jan 19 08:05:50 host unix_chkpwd[20318]: password check failed for user (sshd) Jan 19 08:05:50 host sshd[20313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=sshd Jan 19 08:05:50 host sshd[20313]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sshd" Jan 19 08:05:52 host sshd[20313]: Failed password for invalid user sshd from 194.169.175.102 port 59718 ssh2 Jan 19 08:05:52 host sshd[20313]: Received disconnect from 194.169.175.102 port 59718:11: Client disconnecting normally [preauth] Jan 19 08:05:52 host sshd[20313]: Disconnected from 194.169.175.102 port 59718 [preauth] Jan 19 08:11:11 host sshd[21114]: User root from 60.53.93.60 not allowed because not listed in AllowUsers Jan 19 08:11:11 host sshd[21114]: input_userauth_request: invalid user root [preauth] Jan 19 08:11:11 host unix_chkpwd[21117]: password check failed for user (root) Jan 19 08:11:11 host sshd[21114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.53.93.60 user=root Jan 19 08:11:11 host sshd[21114]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:11:13 host sshd[21114]: Failed password for invalid user root from 60.53.93.60 port 50194 ssh2 Jan 19 08:11:14 host unix_chkpwd[21121]: password check failed for user (root) Jan 19 08:11:14 host sshd[21114]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:11:16 host sshd[21114]: Failed password for invalid user root from 60.53.93.60 port 50194 ssh2 Jan 19 08:11:16 host unix_chkpwd[21128]: password check failed for user (root) Jan 19 08:11:16 host sshd[21114]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:11:18 host sshd[21114]: Failed password for invalid user root from 60.53.93.60 port 50194 ssh2 Jan 19 08:11:19 host unix_chkpwd[21134]: password check failed for user (root) Jan 19 08:11:19 host sshd[21114]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:11:21 host sshd[21114]: Failed password for invalid user root from 60.53.93.60 port 50194 ssh2 Jan 19 08:11:21 host unix_chkpwd[21141]: password check failed for user (root) Jan 19 08:11:21 host sshd[21114]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:11:23 host sshd[21114]: Failed password for invalid user root from 60.53.93.60 port 50194 ssh2 Jan 19 08:16:09 host sshd[21858]: Invalid user informix from 104.244.74.6 port 39094 Jan 19 08:16:09 host sshd[21858]: input_userauth_request: invalid user informix [preauth] Jan 19 08:16:09 host sshd[21858]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:16:09 host sshd[21858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 19 08:16:12 host sshd[21858]: Failed password for invalid user informix from 104.244.74.6 port 39094 ssh2 Jan 19 08:16:12 host sshd[21858]: Connection closed by 104.244.74.6 port 39094 [preauth] Jan 19 08:16:17 host sshd[21895]: Invalid user jeff from 107.189.30.59 port 59928 Jan 19 08:16:17 host sshd[21895]: input_userauth_request: invalid user jeff [preauth] Jan 19 08:16:17 host sshd[21895]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:16:17 host sshd[21895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 19 08:16:19 host sshd[21895]: Failed password for invalid user jeff from 107.189.30.59 port 59928 ssh2 Jan 19 08:16:20 host sshd[21895]: Connection closed by 107.189.30.59 port 59928 [preauth] Jan 19 08:18:47 host sshd[22198]: Bad protocol version identification 'MGLNDD_167.71.234.10_22' from 104.131.128.17 port 48750 Jan 19 08:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 08:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 08:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 08:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 08:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 08:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 08:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 08:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 08:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 08:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=remysagr user-3=wwwkmaorg user-4=woodpeck user-5=wwwkapin user-6=vfmassets user-7=shalinijames user-8=wwwtestugo user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=palco123 user-15=gifterman user-16=phmetals user-17=kottayamcalldriv user-18=wwwnexidigital user-19=mrsclean user-20=wwwkaretakers user-21=cochintaxi user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 08:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4I9AymAPNeGfmcmm.~ Jan 19 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4I9AymAPNeGfmcmm.~' Jan 19 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-4I9AymAPNeGfmcmm.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 08:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 08:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 08:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 08:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 08:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 08:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 08:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 08:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 08:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 08:26:40 host sshd[23622]: Invalid user daniel from 148.206.53.236 port 39938 Jan 19 08:26:40 host sshd[23622]: input_userauth_request: invalid user daniel [preauth] Jan 19 08:26:40 host sshd[23622]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:26:40 host sshd[23622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.206.53.236 Jan 19 08:26:42 host sshd[23622]: Failed password for invalid user daniel from 148.206.53.236 port 39938 ssh2 Jan 19 08:26:43 host sshd[23622]: Received disconnect from 148.206.53.236 port 39938:11: Bye Bye [preauth] Jan 19 08:26:43 host sshd[23622]: Disconnected from 148.206.53.236 port 39938 [preauth] Jan 19 08:30:40 host sshd[24182]: Invalid user gns3 from 148.206.53.236 port 46203 Jan 19 08:30:40 host sshd[24182]: input_userauth_request: invalid user gns3 [preauth] Jan 19 08:30:40 host sshd[24182]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:30:40 host sshd[24182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.206.53.236 Jan 19 08:30:42 host sshd[24182]: Failed password for invalid user gns3 from 148.206.53.236 port 46203 ssh2 Jan 19 08:30:42 host sshd[24182]: Received disconnect from 148.206.53.236 port 46203:11: Bye Bye [preauth] Jan 19 08:30:42 host sshd[24182]: Disconnected from 148.206.53.236 port 46203 [preauth] Jan 19 08:31:55 host sshd[24451]: Invalid user smart from 148.206.53.236 port 42617 Jan 19 08:31:55 host sshd[24451]: input_userauth_request: invalid user smart [preauth] Jan 19 08:31:55 host sshd[24451]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:31:55 host sshd[24451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.206.53.236 Jan 19 08:31:58 host sshd[24451]: Failed password for invalid user smart from 148.206.53.236 port 42617 ssh2 Jan 19 08:31:58 host sshd[24451]: Received disconnect from 148.206.53.236 port 42617:11: Bye Bye [preauth] Jan 19 08:31:58 host sshd[24451]: Disconnected from 148.206.53.236 port 42617 [preauth] Jan 19 08:34:47 host sshd[24824]: User root from 59.126.51.49 not allowed because not listed in AllowUsers Jan 19 08:34:47 host sshd[24824]: input_userauth_request: invalid user root [preauth] Jan 19 08:34:47 host unix_chkpwd[24827]: password check failed for user (root) Jan 19 08:34:47 host sshd[24824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.51.49 user=root Jan 19 08:34:47 host sshd[24824]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:34:49 host sshd[24824]: Failed password for invalid user root from 59.126.51.49 port 53280 ssh2 Jan 19 08:34:50 host unix_chkpwd[24833]: password check failed for user (root) Jan 19 08:34:50 host sshd[24824]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:34:51 host sshd[24824]: Failed password for invalid user root from 59.126.51.49 port 53280 ssh2 Jan 19 08:34:52 host unix_chkpwd[24840]: password check failed for user (root) Jan 19 08:34:52 host sshd[24824]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:34:54 host sshd[24824]: Failed password for invalid user root from 59.126.51.49 port 53280 ssh2 Jan 19 08:34:55 host unix_chkpwd[24845]: password check failed for user (root) Jan 19 08:34:55 host sshd[24824]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:34:57 host sshd[24824]: Failed password for invalid user root from 59.126.51.49 port 53280 ssh2 Jan 19 08:34:58 host unix_chkpwd[24855]: password check failed for user (root) Jan 19 08:34:58 host sshd[24824]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:35:00 host sshd[24824]: Failed password for invalid user root from 59.126.51.49 port 53280 ssh2 Jan 19 08:35:18 host sshd[24954]: Did not receive identification string from 92.255.85.115 port 64007 Jan 19 08:38:13 host sshd[25457]: Invalid user ONTUSER from 222.105.97.76 port 40316 Jan 19 08:38:13 host sshd[25457]: input_userauth_request: invalid user ONTUSER [preauth] Jan 19 08:38:13 host sshd[25457]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:38:13 host sshd[25457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.105.97.76 Jan 19 08:38:15 host sshd[25457]: Failed password for invalid user ONTUSER from 222.105.97.76 port 40316 ssh2 Jan 19 08:38:15 host sshd[25457]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:38:17 host sshd[25457]: Failed password for invalid user ONTUSER from 222.105.97.76 port 40316 ssh2 Jan 19 08:38:17 host sshd[25457]: Failed password for invalid user ONTUSER from 222.105.97.76 port 40316 ssh2 Jan 19 08:38:17 host sshd[25457]: Connection closed by 222.105.97.76 port 40316 [preauth] Jan 19 08:38:17 host sshd[25457]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.105.97.76 Jan 19 08:38:41 host sshd[25523]: Did not receive identification string from 68.183.93.30 port 42772 Jan 19 08:39:09 host sshd[25590]: Invalid user sys from 68.183.93.30 port 58066 Jan 19 08:39:09 host sshd[25590]: input_userauth_request: invalid user sys [preauth] Jan 19 08:39:09 host sshd[25590]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:39:09 host sshd[25590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.93.30 Jan 19 08:39:11 host sshd[25590]: Failed password for invalid user sys from 68.183.93.30 port 58066 ssh2 Jan 19 08:39:11 host sshd[25590]: Connection closed by 68.183.93.30 port 58066 [preauth] Jan 19 08:39:46 host sshd[25734]: User root from 68.183.93.30 not allowed because not listed in AllowUsers Jan 19 08:39:46 host sshd[25734]: input_userauth_request: invalid user root [preauth] Jan 19 08:39:46 host unix_chkpwd[25737]: password check failed for user (root) Jan 19 08:39:46 host sshd[25734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.93.30 user=root Jan 19 08:39:46 host sshd[25734]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:39:48 host sshd[25734]: Failed password for invalid user root from 68.183.93.30 port 34726 ssh2 Jan 19 08:39:48 host sshd[25734]: Connection closed by 68.183.93.30 port 34726 [preauth] Jan 19 08:47:32 host sshd[27237]: Invalid user admin from 92.255.85.115 port 3943 Jan 19 08:47:32 host sshd[27237]: input_userauth_request: invalid user admin [preauth] Jan 19 08:47:32 host sshd[27237]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:32 host sshd[27237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 19 08:47:34 host sshd[27237]: Failed password for invalid user admin from 92.255.85.115 port 3943 ssh2 Jan 19 08:47:34 host sshd[27237]: Connection reset by 92.255.85.115 port 3943 [preauth] Jan 19 08:47:43 host sshd[27256]: Did not receive identification string from 203.76.241.10 port 59248 Jan 19 08:47:44 host sshd[27257]: Invalid user student from 203.76.241.10 port 40640 Jan 19 08:47:44 host sshd[27257]: input_userauth_request: invalid user student [preauth] Jan 19 08:47:44 host sshd[27258]: Invalid user ubuntu from 203.76.241.10 port 40609 Jan 19 08:47:44 host sshd[27258]: input_userauth_request: invalid user ubuntu [preauth] Jan 19 08:47:44 host sshd[27259]: Invalid user steam from 203.76.241.10 port 40582 Jan 19 08:47:44 host sshd[27259]: input_userauth_request: invalid user steam [preauth] Jan 19 08:47:44 host sshd[27261]: Invalid user steam from 203.76.241.10 port 40608 Jan 19 08:47:44 host sshd[27265]: Invalid user ubuntu from 203.76.241.10 port 40634 Jan 19 08:47:44 host sshd[27265]: input_userauth_request: invalid user ubuntu [preauth] Jan 19 08:47:44 host sshd[27261]: input_userauth_request: invalid user steam [preauth] Jan 19 08:47:44 host sshd[27262]: Invalid user dev from 203.76.241.10 port 40590 Jan 19 08:47:44 host sshd[27262]: input_userauth_request: invalid user dev [preauth] Jan 19 08:47:44 host sshd[27260]: Invalid user ubuntu from 203.76.241.10 port 40652 Jan 19 08:47:44 host sshd[27260]: input_userauth_request: invalid user ubuntu [preauth] Jan 19 08:47:44 host sshd[27263]: Invalid user student from 203.76.241.10 port 40626 Jan 19 08:47:44 host sshd[27263]: input_userauth_request: invalid user student [preauth] Jan 19 08:47:44 host sshd[27266]: Invalid user test from 203.76.241.10 port 40658 Jan 19 08:47:44 host sshd[27266]: input_userauth_request: invalid user test [preauth] Jan 19 08:47:44 host sshd[27269]: Invalid user admin from 203.76.241.10 port 40598 Jan 19 08:47:44 host sshd[27269]: input_userauth_request: invalid user admin [preauth] Jan 19 08:47:44 host sshd[27264]: Invalid user zjw from 203.76.241.10 port 40580 Jan 19 08:47:44 host sshd[27264]: input_userauth_request: invalid user zjw [preauth] Jan 19 08:47:44 host sshd[27270]: User root from 203.76.241.10 not allowed because not listed in AllowUsers Jan 19 08:47:44 host sshd[27270]: input_userauth_request: invalid user root [preauth] Jan 19 08:47:44 host sshd[27271]: Invalid user vagrant from 203.76.241.10 port 40588 Jan 19 08:47:44 host sshd[27271]: input_userauth_request: invalid user vagrant [preauth] Jan 19 08:47:44 host sshd[27277]: Invalid user tester from 203.76.241.10 port 40644 Jan 19 08:47:44 host sshd[27277]: input_userauth_request: invalid user tester [preauth] Jan 19 08:47:44 host sshd[27267]: Invalid user admin from 203.76.241.10 port 40612 Jan 19 08:47:44 host sshd[27267]: input_userauth_request: invalid user admin [preauth] Jan 19 08:47:44 host sshd[27284]: User root from 203.76.241.10 not allowed because not listed in AllowUsers Jan 19 08:47:44 host sshd[27284]: input_userauth_request: invalid user root [preauth] Jan 19 08:47:44 host sshd[27280]: Invalid user devops from 203.76.241.10 port 40614 Jan 19 08:47:44 host sshd[27280]: input_userauth_request: invalid user devops [preauth] Jan 19 08:47:44 host sshd[27285]: Invalid user esuser from 203.76.241.10 port 40606 Jan 19 08:47:44 host sshd[27285]: input_userauth_request: invalid user esuser [preauth] Jan 19 08:47:44 host sshd[27278]: Invalid user user from 203.76.241.10 port 40594 Jan 19 08:47:44 host sshd[27278]: input_userauth_request: invalid user user [preauth] Jan 19 08:47:44 host sshd[27283]: Invalid user test from 203.76.241.10 port 40656 Jan 19 08:47:44 host sshd[27283]: input_userauth_request: invalid user test [preauth] Jan 19 08:47:44 host sshd[27286]: Invalid user halo from 203.76.241.10 port 40602 Jan 19 08:47:44 host sshd[27282]: Invalid user admin from 203.76.241.10 port 40622 Jan 19 08:47:44 host sshd[27286]: input_userauth_request: invalid user halo [preauth] Jan 19 08:47:44 host sshd[27282]: input_userauth_request: invalid user admin [preauth] Jan 19 08:47:44 host sshd[27287]: User root from 203.76.241.10 not allowed because not listed in AllowUsers Jan 19 08:47:44 host sshd[27287]: input_userauth_request: invalid user root [preauth] Jan 19 08:47:44 host sshd[27288]: Invalid user steam from 203.76.241.10 port 40603 Jan 19 08:47:44 host sshd[27288]: input_userauth_request: invalid user steam [preauth] Jan 19 08:47:44 host sshd[27289]: Invalid user steam from 203.76.241.10 port 40620 Jan 19 08:47:44 host sshd[27289]: input_userauth_request: invalid user steam [preauth] Jan 19 08:47:44 host sshd[27281]: Invalid user user from 203.76.241.10 port 40618 Jan 19 08:47:44 host sshd[27290]: Invalid user user from 203.76.241.10 port 40638 Jan 19 08:47:44 host sshd[27281]: input_userauth_request: invalid user user [preauth] Jan 19 08:47:44 host sshd[27290]: input_userauth_request: invalid user user [preauth] Jan 19 08:47:44 host sshd[27293]: Invalid user admin from 203.76.241.10 port 40654 Jan 19 08:47:44 host sshd[27293]: input_userauth_request: invalid user admin [preauth] Jan 19 08:47:45 host sshd[27257]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27258]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27259]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27265]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27261]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27260]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27262]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27266]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27263]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27269]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27264]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27271]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host unix_chkpwd[27316]: password check failed for user (root) Jan 19 08:47:45 host sshd[27270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 user=root Jan 19 08:47:45 host sshd[27270]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:47:45 host sshd[27277]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27267]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27280]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27285]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27278]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27283]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host unix_chkpwd[27317]: password check failed for user (root) Jan 19 08:47:45 host sshd[27284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 user=root Jan 19 08:47:45 host sshd[27284]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:47:45 host sshd[27286]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27282]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27289]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27281]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27288]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host sshd[27290]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:45 host sshd[27290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:45 host unix_chkpwd[27318]: password check failed for user (root) Jan 19 08:47:45 host sshd[27287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 user=root Jan 19 08:47:45 host sshd[27287]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:47:47 host sshd[27293]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:47:47 host sshd[27293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.76.241.10 Jan 19 08:47:47 host sshd[27257]: Failed password for invalid user student from 203.76.241.10 port 40640 ssh2 Jan 19 08:47:47 host sshd[27258]: Failed password for invalid user ubuntu from 203.76.241.10 port 40609 ssh2 Jan 19 08:47:47 host sshd[27259]: Failed password for invalid user steam from 203.76.241.10 port 40582 ssh2 Jan 19 08:47:47 host sshd[27265]: Failed password for invalid user ubuntu from 203.76.241.10 port 40634 ssh2 Jan 19 08:47:47 host sshd[27261]: Failed password for invalid user steam from 203.76.241.10 port 40608 ssh2 Jan 19 08:47:47 host sshd[27260]: Failed password for invalid user ubuntu from 203.76.241.10 port 40652 ssh2 Jan 19 08:47:47 host sshd[27262]: Failed password for invalid user dev from 203.76.241.10 port 40590 ssh2 Jan 19 08:47:47 host sshd[27263]: Failed password for invalid user student from 203.76.241.10 port 40626 ssh2 Jan 19 08:47:47 host sshd[27266]: Failed password for invalid user test from 203.76.241.10 port 40658 ssh2 Jan 19 08:47:47 host sshd[27269]: Failed password for invalid user admin from 203.76.241.10 port 40598 ssh2 Jan 19 08:47:47 host sshd[27264]: Failed password for invalid user zjw from 203.76.241.10 port 40580 ssh2 Jan 19 08:47:47 host sshd[27271]: Failed password for invalid user vagrant from 203.76.241.10 port 40588 ssh2 Jan 19 08:47:47 host sshd[27270]: Failed password for invalid user root from 203.76.241.10 port 40636 ssh2 Jan 19 08:47:47 host sshd[27277]: Failed password for invalid user tester from 203.76.241.10 port 40644 ssh2 Jan 19 08:47:47 host sshd[27267]: Failed password for invalid user admin from 203.76.241.10 port 40612 ssh2 Jan 19 08:47:47 host sshd[27280]: Failed password for invalid user devops from 203.76.241.10 port 40614 ssh2 Jan 19 08:47:47 host sshd[27285]: Failed password for invalid user esuser from 203.76.241.10 port 40606 ssh2 Jan 19 08:47:47 host sshd[27278]: Failed password for invalid user user from 203.76.241.10 port 40594 ssh2 Jan 19 08:47:47 host sshd[27283]: Failed password for invalid user test from 203.76.241.10 port 40656 ssh2 Jan 19 08:47:47 host sshd[27284]: Failed password for invalid user root from 203.76.241.10 port 40648 ssh2 Jan 19 08:47:47 host sshd[27286]: Failed password for invalid user halo from 203.76.241.10 port 40602 ssh2 Jan 19 08:47:47 host sshd[27282]: Failed password for invalid user admin from 203.76.241.10 port 40622 ssh2 Jan 19 08:47:47 host sshd[27289]: Failed password for invalid user steam from 203.76.241.10 port 40620 ssh2 Jan 19 08:47:47 host sshd[27281]: Failed password for invalid user user from 203.76.241.10 port 40618 ssh2 Jan 19 08:47:47 host sshd[27288]: Failed password for invalid user steam from 203.76.241.10 port 40603 ssh2 Jan 19 08:47:47 host sshd[27290]: Failed password for invalid user user from 203.76.241.10 port 40638 ssh2 Jan 19 08:47:47 host sshd[27287]: Failed password for invalid user root from 203.76.241.10 port 40625 ssh2 Jan 19 08:47:47 host sshd[27257]: Connection closed by 203.76.241.10 port 40640 [preauth] Jan 19 08:47:47 host sshd[27258]: Connection closed by 203.76.241.10 port 40609 [preauth] Jan 19 08:47:47 host sshd[27259]: Connection closed by 203.76.241.10 port 40582 [preauth] Jan 19 08:47:47 host sshd[27261]: Connection closed by 203.76.241.10 port 40608 [preauth] Jan 19 08:47:47 host sshd[27260]: Connection closed by 203.76.241.10 port 40652 [preauth] Jan 19 08:47:47 host sshd[27265]: Connection closed by 203.76.241.10 port 40634 [preauth] Jan 19 08:47:47 host sshd[27262]: Connection closed by 203.76.241.10 port 40590 [preauth] Jan 19 08:47:47 host sshd[27266]: Connection closed by 203.76.241.10 port 40658 [preauth] Jan 19 08:47:47 host sshd[27263]: Connection closed by 203.76.241.10 port 40626 [preauth] Jan 19 08:47:47 host sshd[27269]: Connection closed by 203.76.241.10 port 40598 [preauth] Jan 19 08:47:47 host sshd[27264]: Connection closed by 203.76.241.10 port 40580 [preauth] Jan 19 08:47:47 host sshd[27270]: Connection closed by 203.76.241.10 port 40636 [preauth] Jan 19 08:47:47 host sshd[27271]: Connection closed by 203.76.241.10 port 40588 [preauth] Jan 19 08:47:47 host sshd[27277]: Connection closed by 203.76.241.10 port 40644 [preauth] Jan 19 08:47:47 host sshd[27267]: Connection closed by 203.76.241.10 port 40612 [preauth] Jan 19 08:47:47 host sshd[27280]: Connection closed by 203.76.241.10 port 40614 [preauth] Jan 19 08:47:47 host sshd[27285]: Connection closed by 203.76.241.10 port 40606 [preauth] Jan 19 08:47:47 host sshd[27278]: Connection closed by 203.76.241.10 port 40594 [preauth] Jan 19 08:47:48 host sshd[27283]: Connection closed by 203.76.241.10 port 40656 [preauth] Jan 19 08:47:48 host sshd[27284]: Connection closed by 203.76.241.10 port 40648 [preauth] Jan 19 08:47:48 host sshd[27282]: Connection closed by 203.76.241.10 port 40622 [preauth] Jan 19 08:47:48 host sshd[27286]: Connection closed by 203.76.241.10 port 40602 [preauth] Jan 19 08:47:48 host sshd[27289]: Connection closed by 203.76.241.10 port 40620 [preauth] Jan 19 08:47:48 host sshd[27281]: Connection closed by 203.76.241.10 port 40618 [preauth] Jan 19 08:47:48 host sshd[27288]: Connection closed by 203.76.241.10 port 40603 [preauth] Jan 19 08:47:48 host sshd[27290]: Connection closed by 203.76.241.10 port 40638 [preauth] Jan 19 08:47:48 host sshd[27287]: Connection closed by 203.76.241.10 port 40625 [preauth] Jan 19 08:47:49 host sshd[27293]: Failed password for invalid user admin from 203.76.241.10 port 40654 ssh2 Jan 19 08:47:49 host sshd[27293]: Connection closed by 203.76.241.10 port 40654 [preauth] Jan 19 08:51:47 host sshd[27997]: Invalid user admin from 195.226.194.242 port 15536 Jan 19 08:51:47 host sshd[27997]: input_userauth_request: invalid user admin [preauth] Jan 19 08:51:47 host sshd[27997]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:51:47 host sshd[27997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 19 08:51:50 host sshd[27997]: Failed password for invalid user admin from 195.226.194.242 port 15536 ssh2 Jan 19 08:51:50 host sshd[27997]: Received disconnect from 195.226.194.242 port 15536:11: Bye Bye [preauth] Jan 19 08:51:50 host sshd[27997]: Disconnected from 195.226.194.242 port 15536 [preauth] Jan 19 08:54:20 host sshd[28282]: Invalid user support from 92.255.85.115 port 7624 Jan 19 08:54:20 host sshd[28282]: input_userauth_request: invalid user support [preauth] Jan 19 08:54:20 host sshd[28282]: pam_unix(sshd:auth): check pass; user unknown Jan 19 08:54:20 host sshd[28282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 19 08:54:22 host sshd[28282]: Failed password for invalid user support from 92.255.85.115 port 7624 ssh2 Jan 19 08:54:22 host sshd[28282]: Connection reset by 92.255.85.115 port 7624 [preauth] Jan 19 08:54:43 host sshd[28373]: User root from 125.229.113.32 not allowed because not listed in AllowUsers Jan 19 08:54:43 host sshd[28373]: input_userauth_request: invalid user root [preauth] Jan 19 08:54:43 host unix_chkpwd[28381]: password check failed for user (root) Jan 19 08:54:43 host sshd[28373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.113.32 user=root Jan 19 08:54:43 host sshd[28373]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:54:45 host sshd[28373]: Failed password for invalid user root from 125.229.113.32 port 51132 ssh2 Jan 19 08:54:45 host unix_chkpwd[28385]: password check failed for user (root) Jan 19 08:54:45 host sshd[28373]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:54:47 host sshd[28373]: Failed password for invalid user root from 125.229.113.32 port 51132 ssh2 Jan 19 08:54:48 host unix_chkpwd[28388]: password check failed for user (root) Jan 19 08:54:48 host sshd[28373]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:54:51 host sshd[28373]: Failed password for invalid user root from 125.229.113.32 port 51132 ssh2 Jan 19 08:54:51 host unix_chkpwd[28394]: password check failed for user (root) Jan 19 08:54:51 host sshd[28373]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:54:53 host sshd[28373]: Failed password for invalid user root from 125.229.113.32 port 51132 ssh2 Jan 19 08:54:54 host unix_chkpwd[28405]: password check failed for user (root) Jan 19 08:54:54 host sshd[28373]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 08:54:56 host sshd[28373]: Failed password for invalid user root from 125.229.113.32 port 51132 ssh2 Jan 19 09:07:33 host sshd[31103]: Did not receive identification string from 206.189.23.129 port 61000 Jan 19 09:12:44 host sshd[32374]: Did not receive identification string from 87.236.176.243 port 32831 Jan 19 09:12:45 host sshd[32420]: Connection closed by 87.236.176.243 port 58999 [preauth] Jan 19 09:13:41 host sshd[32640]: Invalid user admin from 114.33.107.149 port 44492 Jan 19 09:13:41 host sshd[32640]: input_userauth_request: invalid user admin [preauth] Jan 19 09:13:41 host sshd[32640]: pam_unix(sshd:auth): check pass; user unknown Jan 19 09:13:41 host sshd[32640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.107.149 Jan 19 09:13:43 host sshd[32640]: Failed password for invalid user admin from 114.33.107.149 port 44492 ssh2 Jan 19 09:13:44 host sshd[32640]: Failed password for invalid user admin from 114.33.107.149 port 44492 ssh2 Jan 19 09:13:46 host sshd[32640]: pam_unix(sshd:auth): check pass; user unknown Jan 19 09:13:47 host sshd[32640]: Failed password for invalid user admin from 114.33.107.149 port 44492 ssh2 Jan 19 09:13:49 host sshd[32640]: pam_unix(sshd:auth): check pass; user unknown Jan 19 09:13:50 host sshd[32640]: Failed password for invalid user admin from 114.33.107.149 port 44492 ssh2 Jan 19 09:13:51 host sshd[32640]: pam_unix(sshd:auth): check pass; user unknown Jan 19 09:13:54 host sshd[32640]: Failed password for invalid user admin from 114.33.107.149 port 44492 ssh2 Jan 19 09:13:54 host sshd[32640]: Connection reset by 114.33.107.149 port 44492 [preauth] Jan 19 09:13:54 host sshd[32640]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.107.149 Jan 19 09:13:54 host sshd[32640]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 19 09:16:03 host sshd[733]: Invalid user sFTPUser from 117.2.230.119 port 49341 Jan 19 09:16:03 host sshd[733]: input_userauth_request: invalid user sFTPUser [preauth] Jan 19 09:16:03 host sshd[733]: pam_unix(sshd:auth): check pass; user unknown Jan 19 09:16:03 host sshd[733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.2.230.119 Jan 19 09:16:04 host sshd[733]: Failed password for invalid user sFTPUser from 117.2.230.119 port 49341 ssh2 Jan 19 09:17:37 host sshd[1012]: User root from 37.252.66.56 not allowed because not listed in AllowUsers Jan 19 09:17:37 host sshd[1012]: input_userauth_request: invalid user root [preauth] Jan 19 09:17:37 host unix_chkpwd[1017]: password check failed for user (root) Jan 19 09:17:37 host sshd[1012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.252.66.56 user=root Jan 19 09:17:37 host sshd[1012]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 09:17:39 host sshd[1012]: Failed password for invalid user root from 37.252.66.56 port 59711 ssh2 Jan 19 09:17:40 host unix_chkpwd[1026]: password check failed for user (root) Jan 19 09:17:40 host sshd[1012]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 09:17:42 host sshd[1012]: Failed password for invalid user root from 37.252.66.56 port 59711 ssh2 Jan 19 09:17:42 host unix_chkpwd[1030]: password check failed for user (root) Jan 19 09:17:42 host sshd[1012]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 09:17:43 host sshd[1012]: Failed password for invalid user root from 37.252.66.56 port 59711 ssh2 Jan 19 09:17:44 host sshd[1012]: Connection reset by 37.252.66.56 port 59711 [preauth] Jan 19 09:17:44 host sshd[1012]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.252.66.56 user=root Jan 19 09:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 09:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 09:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 09:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 09:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 09:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 09:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=keralaholi user-8=wwwresourcehunte user-9=wwwrmswll user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=pmcresources user-16=remysagr user-17=disposeat user-18=wwwkmaorg user-19=wwwkapin user-20=woodpeck user-21=palco123 user-22=gifterman user-23=kottayamcalldriv user-24=phmetals user-25=wwwnexidigital user-26=mrsclean user-27=bonifacegroup user-28=wwwevmhonda user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 09:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J2Cnulol3DbDNBlO.~ Jan 19 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J2Cnulol3DbDNBlO.~' Jan 19 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-J2Cnulol3DbDNBlO.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 09:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 09:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 09:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 09:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 09:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 09:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 09:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 09:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 09:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 09:27:49 host sshd[3120]: Invalid user ubuntu from 118.34.67.27 port 49485 Jan 19 09:27:49 host sshd[3120]: input_userauth_request: invalid user ubuntu [preauth] Jan 19 09:27:49 host sshd[3120]: pam_unix(sshd:auth): check pass; user unknown Jan 19 09:27:49 host sshd[3120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.67.27 Jan 19 09:27:51 host sshd[3120]: Failed password for invalid user ubuntu from 118.34.67.27 port 49485 ssh2 Jan 19 09:27:52 host sshd[3120]: pam_unix(sshd:auth): check pass; user unknown Jan 19 09:27:55 host sshd[3120]: Failed password for invalid user ubuntu from 118.34.67.27 port 49485 ssh2 Jan 19 09:27:56 host sshd[3120]: pam_unix(sshd:auth): check pass; user unknown Jan 19 09:27:58 host sshd[3120]: Failed password for invalid user ubuntu from 118.34.67.27 port 49485 ssh2 Jan 19 09:28:01 host sshd[3120]: Failed password for invalid user ubuntu from 118.34.67.27 port 49485 ssh2 Jan 19 09:40:50 host sshd[5696]: User root from 14.45.158.2 not allowed because not listed in AllowUsers Jan 19 09:40:50 host sshd[5696]: input_userauth_request: invalid user root [preauth] Jan 19 09:40:50 host unix_chkpwd[5705]: password check failed for user (root) Jan 19 09:40:50 host sshd[5696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.45.158.2 user=root Jan 19 09:40:50 host sshd[5696]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 09:40:52 host sshd[5696]: Failed password for invalid user root from 14.45.158.2 port 56813 ssh2 Jan 19 09:40:53 host unix_chkpwd[5708]: password check failed for user (root) Jan 19 09:40:53 host sshd[5696]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 09:40:55 host sshd[5696]: Failed password for invalid user root from 14.45.158.2 port 56813 ssh2 Jan 19 09:40:56 host unix_chkpwd[5715]: password check failed for user (root) Jan 19 09:40:56 host sshd[5696]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 09:40:59 host sshd[5696]: Failed password for invalid user root from 14.45.158.2 port 56813 ssh2 Jan 19 09:41:00 host unix_chkpwd[5721]: password check failed for user (root) Jan 19 09:41:00 host sshd[5696]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 09:41:02 host sshd[5696]: Failed password for invalid user root from 14.45.158.2 port 56813 ssh2 Jan 19 09:41:37 host sshd[5863]: Invalid user gi from 194.110.203.109 port 33576 Jan 19 09:41:37 host sshd[5863]: input_userauth_request: invalid user gi [preauth] Jan 19 09:41:37 host sshd[5863]: pam_unix(sshd:auth): check pass; user unknown Jan 19 09:41:37 host sshd[5863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 09:41:38 host sshd[5863]: Failed password for invalid user gi from 194.110.203.109 port 33576 ssh2 Jan 19 09:41:42 host sshd[5863]: pam_unix(sshd:auth): check pass; user unknown Jan 19 09:41:44 host sshd[5863]: Failed password for invalid user gi from 194.110.203.109 port 33576 ssh2 Jan 19 09:41:47 host sshd[5863]: pam_unix(sshd:auth): check pass; user unknown Jan 19 09:41:48 host sshd[5863]: Failed password for invalid user gi from 194.110.203.109 port 33576 ssh2 Jan 19 09:41:52 host sshd[5863]: Connection closed by 194.110.203.109 port 33576 [preauth] Jan 19 09:41:52 host sshd[5863]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 09:46:14 host sshd[6708]: User root from 59.25.150.78 not allowed because not listed in AllowUsers Jan 19 09:46:14 host sshd[6708]: input_userauth_request: invalid user root [preauth] Jan 19 09:46:14 host unix_chkpwd[6713]: password check failed for user (root) Jan 19 09:46:14 host sshd[6708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.150.78 user=root Jan 19 09:46:14 host sshd[6708]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 09:46:17 host sshd[6708]: Failed password for invalid user root from 59.25.150.78 port 60522 ssh2 Jan 19 09:46:18 host unix_chkpwd[6721]: password check failed for user (root) Jan 19 09:46:18 host sshd[6708]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 09:46:20 host sshd[6708]: Failed password for invalid user root from 59.25.150.78 port 60522 ssh2 Jan 19 09:46:20 host unix_chkpwd[6725]: password check failed for user (root) Jan 19 09:46:20 host sshd[6708]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 09:46:22 host sshd[6708]: Failed password for invalid user root from 59.25.150.78 port 60522 ssh2 Jan 19 09:46:23 host unix_chkpwd[6729]: password check failed for user (root) Jan 19 09:46:23 host sshd[6708]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 09:46:25 host sshd[6708]: Failed password for invalid user root from 59.25.150.78 port 60522 ssh2 Jan 19 09:52:40 host sshd[8036]: Did not receive identification string from 128.1.131.197 port 39778 Jan 19 09:52:55 host sshd[8037]: Connection closed by 128.1.131.197 port 39832 [preauth] Jan 19 09:54:19 host sshd[8263]: Invalid user bigipuser3 from 172.10.136.172 port 59525 Jan 19 09:54:19 host sshd[8263]: input_userauth_request: invalid user bigipuser3 [preauth] Jan 19 09:54:19 host sshd[8263]: pam_unix(sshd:auth): check pass; user unknown Jan 19 09:54:19 host sshd[8263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.10.136.172 Jan 19 09:54:21 host sshd[8263]: Failed password for invalid user bigipuser3 from 172.10.136.172 port 59525 ssh2 Jan 19 09:54:21 host sshd[8263]: pam_unix(sshd:auth): check pass; user unknown Jan 19 09:54:24 host sshd[8263]: Failed password for invalid user bigipuser3 from 172.10.136.172 port 59525 ssh2 Jan 19 09:54:25 host sshd[8263]: Connection reset by 172.10.136.172 port 59525 [preauth] Jan 19 09:54:25 host sshd[8263]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.10.136.172 Jan 19 10:02:39 host sshd[9892]: User root from 137.184.216.0 not allowed because not listed in AllowUsers Jan 19 10:02:39 host sshd[9892]: input_userauth_request: invalid user root [preauth] Jan 19 10:02:39 host unix_chkpwd[9896]: password check failed for user (root) Jan 19 10:02:39 host sshd[9892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.216.0 user=root Jan 19 10:02:39 host sshd[9892]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:02:41 host sshd[9892]: Failed password for invalid user root from 137.184.216.0 port 40380 ssh2 Jan 19 10:02:41 host sshd[9892]: Received disconnect from 137.184.216.0 port 40380:11: Bye Bye [preauth] Jan 19 10:02:41 host sshd[9892]: Disconnected from 137.184.216.0 port 40380 [preauth] Jan 19 10:02:47 host sshd[9909]: Invalid user elemental from 51.250.6.222 port 34226 Jan 19 10:02:47 host sshd[9909]: input_userauth_request: invalid user elemental [preauth] Jan 19 10:02:47 host sshd[9909]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:02:47 host sshd[9909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.6.222 Jan 19 10:02:49 host sshd[9909]: Failed password for invalid user elemental from 51.250.6.222 port 34226 ssh2 Jan 19 10:02:49 host sshd[9909]: Received disconnect from 51.250.6.222 port 34226:11: Bye Bye [preauth] Jan 19 10:02:49 host sshd[9909]: Disconnected from 51.250.6.222 port 34226 [preauth] Jan 19 10:03:01 host sshd[9940]: User root from 143.110.190.26 not allowed because not listed in AllowUsers Jan 19 10:03:01 host sshd[9940]: input_userauth_request: invalid user root [preauth] Jan 19 10:03:01 host unix_chkpwd[9949]: password check failed for user (root) Jan 19 10:03:01 host sshd[9940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.190.26 user=root Jan 19 10:03:01 host sshd[9940]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:03:02 host sshd[9940]: Failed password for invalid user root from 143.110.190.26 port 50098 ssh2 Jan 19 10:03:02 host sshd[9940]: Received disconnect from 143.110.190.26 port 50098:11: Bye Bye [preauth] Jan 19 10:03:02 host sshd[9940]: Disconnected from 143.110.190.26 port 50098 [preauth] Jan 19 10:03:24 host sshd[10001]: Invalid user media from 165.154.226.249 port 46552 Jan 19 10:03:24 host sshd[10001]: input_userauth_request: invalid user media [preauth] Jan 19 10:03:24 host sshd[10001]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:03:24 host sshd[10001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.226.249 Jan 19 10:03:26 host sshd[10001]: Failed password for invalid user media from 165.154.226.249 port 46552 ssh2 Jan 19 10:03:26 host sshd[10001]: Received disconnect from 165.154.226.249 port 46552:11: Bye Bye [preauth] Jan 19 10:03:26 host sshd[10001]: Disconnected from 165.154.226.249 port 46552 [preauth] Jan 19 10:05:10 host sshd[10367]: Invalid user teste from 182.176.94.191 port 50196 Jan 19 10:05:10 host sshd[10367]: input_userauth_request: invalid user teste [preauth] Jan 19 10:05:10 host sshd[10367]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:05:10 host sshd[10367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.176.94.191 Jan 19 10:05:12 host sshd[10367]: Failed password for invalid user teste from 182.176.94.191 port 50196 ssh2 Jan 19 10:05:12 host sshd[10367]: Received disconnect from 182.176.94.191 port 50196:11: Bye Bye [preauth] Jan 19 10:05:12 host sshd[10367]: Disconnected from 182.176.94.191 port 50196 [preauth] Jan 19 10:05:25 host sshd[10392]: Invalid user nginx from 121.149.58.243 port 34619 Jan 19 10:05:25 host sshd[10392]: input_userauth_request: invalid user nginx [preauth] Jan 19 10:05:25 host sshd[10392]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:05:25 host sshd[10392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.149.58.243 Jan 19 10:05:27 host sshd[10392]: Failed password for invalid user nginx from 121.149.58.243 port 34619 ssh2 Jan 19 10:05:28 host sshd[10392]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:05:30 host sshd[10392]: Failed password for invalid user nginx from 121.149.58.243 port 34619 ssh2 Jan 19 10:05:32 host sshd[10392]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:05:34 host sshd[10392]: Failed password for invalid user nginx from 121.149.58.243 port 34619 ssh2 Jan 19 10:05:35 host sshd[10392]: Failed password for invalid user nginx from 121.149.58.243 port 34619 ssh2 Jan 19 10:05:36 host sshd[10453]: Invalid user ansadmin from 122.168.125.226 port 41696 Jan 19 10:05:36 host sshd[10453]: input_userauth_request: invalid user ansadmin [preauth] Jan 19 10:05:36 host sshd[10453]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:05:36 host sshd[10453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.168.125.226 Jan 19 10:05:36 host sshd[10392]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:05:38 host sshd[10453]: Failed password for invalid user ansadmin from 122.168.125.226 port 41696 ssh2 Jan 19 10:05:38 host sshd[10453]: Received disconnect from 122.168.125.226 port 41696:11: Bye Bye [preauth] Jan 19 10:05:38 host sshd[10453]: Disconnected from 122.168.125.226 port 41696 [preauth] Jan 19 10:05:39 host sshd[10392]: Failed password for invalid user nginx from 121.149.58.243 port 34619 ssh2 Jan 19 10:08:11 host sshd[10866]: Invalid user ftptest from 137.184.216.0 port 41258 Jan 19 10:08:11 host sshd[10866]: input_userauth_request: invalid user ftptest [preauth] Jan 19 10:08:11 host sshd[10866]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:08:11 host sshd[10866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.216.0 Jan 19 10:08:13 host sshd[10866]: Failed password for invalid user ftptest from 137.184.216.0 port 41258 ssh2 Jan 19 10:08:13 host sshd[10866]: Received disconnect from 137.184.216.0 port 41258:11: Bye Bye [preauth] Jan 19 10:08:13 host sshd[10866]: Disconnected from 137.184.216.0 port 41258 [preauth] Jan 19 10:08:36 host sshd[10966]: Invalid user terraria from 182.176.94.191 port 56698 Jan 19 10:08:36 host sshd[10966]: input_userauth_request: invalid user terraria [preauth] Jan 19 10:08:36 host sshd[10966]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:08:36 host sshd[10966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.176.94.191 Jan 19 10:08:39 host sshd[10966]: Failed password for invalid user terraria from 182.176.94.191 port 56698 ssh2 Jan 19 10:08:39 host sshd[10966]: Received disconnect from 182.176.94.191 port 56698:11: Bye Bye [preauth] Jan 19 10:08:39 host sshd[10966]: Disconnected from 182.176.94.191 port 56698 [preauth] Jan 19 10:08:56 host sshd[10998]: Invalid user dockeradmin from 165.154.226.249 port 47414 Jan 19 10:08:56 host sshd[10998]: input_userauth_request: invalid user dockeradmin [preauth] Jan 19 10:08:56 host sshd[10998]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:08:56 host sshd[10998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.226.249 Jan 19 10:08:57 host sshd[10998]: Failed password for invalid user dockeradmin from 165.154.226.249 port 47414 ssh2 Jan 19 10:08:57 host sshd[10998]: Received disconnect from 165.154.226.249 port 47414:11: Bye Bye [preauth] Jan 19 10:08:57 host sshd[10998]: Disconnected from 165.154.226.249 port 47414 [preauth] Jan 19 10:09:02 host sshd[11027]: User root from 122.168.125.226 not allowed because not listed in AllowUsers Jan 19 10:09:02 host sshd[11027]: input_userauth_request: invalid user root [preauth] Jan 19 10:09:02 host unix_chkpwd[11030]: password check failed for user (root) Jan 19 10:09:02 host sshd[11027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.168.125.226 user=root Jan 19 10:09:02 host sshd[11027]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:09:04 host sshd[11027]: Failed password for invalid user root from 122.168.125.226 port 40026 ssh2 Jan 19 10:09:04 host sshd[11027]: Received disconnect from 122.168.125.226 port 40026:11: Bye Bye [preauth] Jan 19 10:09:04 host sshd[11027]: Disconnected from 122.168.125.226 port 40026 [preauth] Jan 19 10:09:35 host sshd[11163]: User root from 51.250.6.222 not allowed because not listed in AllowUsers Jan 19 10:09:35 host sshd[11163]: input_userauth_request: invalid user root [preauth] Jan 19 10:09:35 host unix_chkpwd[11167]: password check failed for user (root) Jan 19 10:09:35 host sshd[11163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.6.222 user=root Jan 19 10:09:35 host sshd[11163]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:09:37 host sshd[11163]: Failed password for invalid user root from 51.250.6.222 port 40408 ssh2 Jan 19 10:09:38 host sshd[11163]: Received disconnect from 51.250.6.222 port 40408:11: Bye Bye [preauth] Jan 19 10:09:38 host sshd[11163]: Disconnected from 51.250.6.222 port 40408 [preauth] Jan 19 10:09:41 host sshd[11176]: Invalid user ark from 143.110.190.26 port 51256 Jan 19 10:09:41 host sshd[11176]: input_userauth_request: invalid user ark [preauth] Jan 19 10:09:41 host sshd[11176]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:09:41 host sshd[11176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.190.26 Jan 19 10:09:43 host sshd[11176]: Failed password for invalid user ark from 143.110.190.26 port 51256 ssh2 Jan 19 10:09:43 host sshd[11176]: Received disconnect from 143.110.190.26 port 51256:11: Bye Bye [preauth] Jan 19 10:09:43 host sshd[11176]: Disconnected from 143.110.190.26 port 51256 [preauth] Jan 19 10:09:50 host sshd[11346]: User centos from 182.176.94.191 not allowed because not listed in AllowUsers Jan 19 10:09:50 host sshd[11346]: input_userauth_request: invalid user centos [preauth] Jan 19 10:09:50 host unix_chkpwd[11350]: password check failed for user (centos) Jan 19 10:09:50 host sshd[11346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.176.94.191 user=centos Jan 19 10:09:52 host sshd[11346]: Failed password for invalid user centos from 182.176.94.191 port 43622 ssh2 Jan 19 10:09:52 host sshd[11346]: Received disconnect from 182.176.94.191 port 43622:11: Bye Bye [preauth] Jan 19 10:09:52 host sshd[11346]: Disconnected from 182.176.94.191 port 43622 [preauth] Jan 19 10:09:59 host sshd[11389]: User root from 114.35.179.111 not allowed because not listed in AllowUsers Jan 19 10:09:59 host sshd[11389]: input_userauth_request: invalid user root [preauth] Jan 19 10:09:59 host unix_chkpwd[11398]: password check failed for user (root) Jan 19 10:09:59 host sshd[11389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.179.111 user=root Jan 19 10:09:59 host sshd[11389]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:10:01 host sshd[11389]: Failed password for invalid user root from 114.35.179.111 port 47673 ssh2 Jan 19 10:10:02 host unix_chkpwd[11426]: password check failed for user (root) Jan 19 10:10:02 host sshd[11389]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:10:03 host sshd[11389]: Failed password for invalid user root from 114.35.179.111 port 47673 ssh2 Jan 19 10:10:05 host unix_chkpwd[11439]: password check failed for user (root) Jan 19 10:10:05 host sshd[11389]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:10:07 host sshd[11389]: Failed password for invalid user root from 114.35.179.111 port 47673 ssh2 Jan 19 10:10:08 host unix_chkpwd[11476]: password check failed for user (root) Jan 19 10:10:08 host sshd[11389]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:10:10 host sshd[11389]: Failed password for invalid user root from 114.35.179.111 port 47673 ssh2 Jan 19 10:10:17 host sshd[11522]: Invalid user bitrix from 165.154.226.249 port 19506 Jan 19 10:10:17 host sshd[11522]: input_userauth_request: invalid user bitrix [preauth] Jan 19 10:10:17 host sshd[11522]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:10:17 host sshd[11522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.226.249 Jan 19 10:10:19 host sshd[11522]: Failed password for invalid user bitrix from 165.154.226.249 port 19506 ssh2 Jan 19 10:10:20 host sshd[11522]: Received disconnect from 165.154.226.249 port 19506:11: Bye Bye [preauth] Jan 19 10:10:20 host sshd[11522]: Disconnected from 165.154.226.249 port 19506 [preauth] Jan 19 10:10:56 host sshd[11640]: Invalid user panda from 129.154.210.113 port 43820 Jan 19 10:10:56 host sshd[11640]: input_userauth_request: invalid user panda [preauth] Jan 19 10:10:56 host sshd[11640]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:10:56 host sshd[11640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.154.210.113 Jan 19 10:10:58 host sshd[11640]: Failed password for invalid user panda from 129.154.210.113 port 43820 ssh2 Jan 19 10:10:58 host sshd[11640]: Received disconnect from 129.154.210.113 port 43820:11: Bye Bye [preauth] Jan 19 10:10:58 host sshd[11640]: Disconnected from 129.154.210.113 port 43820 [preauth] Jan 19 10:16:58 host sshd[12643]: User root from 203.251.92.99 not allowed because not listed in AllowUsers Jan 19 10:16:58 host sshd[12643]: input_userauth_request: invalid user root [preauth] Jan 19 10:16:58 host unix_chkpwd[12650]: password check failed for user (root) Jan 19 10:16:58 host sshd[12643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.251.92.99 user=root Jan 19 10:16:58 host sshd[12643]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:17:00 host sshd[12643]: Failed password for invalid user root from 203.251.92.99 port 63300 ssh2 Jan 19 10:17:01 host unix_chkpwd[12656]: password check failed for user (root) Jan 19 10:17:01 host sshd[12643]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:17:03 host sshd[12643]: Failed password for invalid user root from 203.251.92.99 port 63300 ssh2 Jan 19 10:17:04 host unix_chkpwd[12674]: password check failed for user (root) Jan 19 10:17:04 host sshd[12643]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:17:06 host sshd[12643]: Failed password for invalid user root from 203.251.92.99 port 63300 ssh2 Jan 19 10:17:07 host unix_chkpwd[12680]: password check failed for user (root) Jan 19 10:17:07 host sshd[12643]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:17:09 host sshd[12643]: Failed password for invalid user root from 203.251.92.99 port 63300 ssh2 Jan 19 10:19:26 host sshd[13030]: Invalid user user1 from 129.154.210.113 port 38582 Jan 19 10:19:26 host sshd[13030]: input_userauth_request: invalid user user1 [preauth] Jan 19 10:19:26 host sshd[13030]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:19:26 host sshd[13030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.154.210.113 Jan 19 10:19:27 host sshd[13030]: Failed password for invalid user user1 from 129.154.210.113 port 38582 ssh2 Jan 19 10:19:28 host sshd[13030]: Received disconnect from 129.154.210.113 port 38582:11: Bye Bye [preauth] Jan 19 10:19:28 host sshd[13030]: Disconnected from 129.154.210.113 port 38582 [preauth] Jan 19 10:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 10:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 10:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=bonifacegroup user-4=wwwevmhonda user-5=mrsclean user-6=wwwnexidigital user-7=gifterman user-8=palco123 user-9=phmetals user-10=kottayamcalldriv user-11=wwwkapin user-12=woodpeck user-13=disposeat user-14=remysagr user-15=wwwkmaorg user-16=pmcresources user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=wwwpmcresource user-21=wwwrmswll user-22=wwwresourcehunte user-23=keralaholi user-24=ugotscom user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 10:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 10:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CfvXc0Ag06cGcF3I.~ Jan 19 10:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CfvXc0Ag06cGcF3I.~' Jan 19 10:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CfvXc0Ag06cGcF3I.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 10:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 10:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 10:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 10:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 10:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 10:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 10:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 10:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 10:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 10:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 10:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 10:21:23 host sshd[13716]: Invalid user ali from 129.154.210.113 port 47112 Jan 19 10:21:23 host sshd[13716]: input_userauth_request: invalid user ali [preauth] Jan 19 10:21:23 host sshd[13716]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:21:23 host sshd[13716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.154.210.113 Jan 19 10:21:25 host sshd[13716]: Failed password for invalid user ali from 129.154.210.113 port 47112 ssh2 Jan 19 10:21:25 host sshd[13716]: Received disconnect from 129.154.210.113 port 47112:11: Bye Bye [preauth] Jan 19 10:21:25 host sshd[13716]: Disconnected from 129.154.210.113 port 47112 [preauth] Jan 19 10:23:40 host sshd[14100]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 19 10:23:40 host sshd[14100]: input_userauth_request: invalid user root [preauth] Jan 19 10:23:41 host unix_chkpwd[14104]: password check failed for user (root) Jan 19 10:23:41 host sshd[14100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 19 10:23:41 host sshd[14100]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:23:43 host sshd[14100]: Failed password for invalid user root from 195.226.194.242 port 28878 ssh2 Jan 19 10:23:43 host sshd[14100]: Received disconnect from 195.226.194.242 port 28878:11: Bye Bye [preauth] Jan 19 10:23:43 host sshd[14100]: Disconnected from 195.226.194.242 port 28878 [preauth] Jan 19 10:25:07 host sshd[14407]: Invalid user teamspeak from 45.224.235.24 port 58920 Jan 19 10:25:07 host sshd[14407]: input_userauth_request: invalid user teamspeak [preauth] Jan 19 10:25:07 host sshd[14407]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:25:07 host sshd[14407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.224.235.24 Jan 19 10:25:09 host sshd[14407]: Failed password for invalid user teamspeak from 45.224.235.24 port 58920 ssh2 Jan 19 10:25:09 host sshd[14407]: Received disconnect from 45.224.235.24 port 58920:11: Bye Bye [preauth] Jan 19 10:25:09 host sshd[14407]: Disconnected from 45.224.235.24 port 58920 [preauth] Jan 19 10:25:10 host sshd[14424]: User root from 64.227.182.117 not allowed because not listed in AllowUsers Jan 19 10:25:10 host sshd[14424]: input_userauth_request: invalid user root [preauth] Jan 19 10:25:10 host unix_chkpwd[14426]: password check failed for user (root) Jan 19 10:25:10 host sshd[14424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.182.117 user=root Jan 19 10:25:10 host sshd[14424]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:25:13 host sshd[14424]: Failed password for invalid user root from 64.227.182.117 port 52312 ssh2 Jan 19 10:25:13 host sshd[14424]: Received disconnect from 64.227.182.117 port 52312:11: Bye Bye [preauth] Jan 19 10:25:13 host sshd[14424]: Disconnected from 64.227.182.117 port 52312 [preauth] Jan 19 10:25:44 host sshd[14659]: User root from 223.204.203.181 not allowed because not listed in AllowUsers Jan 19 10:25:44 host sshd[14659]: input_userauth_request: invalid user root [preauth] Jan 19 10:25:44 host unix_chkpwd[14664]: password check failed for user (root) Jan 19 10:25:44 host sshd[14659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.204.203.181 user=root Jan 19 10:25:44 host sshd[14659]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:25:46 host sshd[14659]: Failed password for invalid user root from 223.204.203.181 port 43864 ssh2 Jan 19 10:25:47 host unix_chkpwd[14670]: password check failed for user (root) Jan 19 10:25:47 host sshd[14659]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:25:49 host sshd[14659]: Failed password for invalid user root from 223.204.203.181 port 43864 ssh2 Jan 19 10:25:49 host unix_chkpwd[14674]: password check failed for user (root) Jan 19 10:25:49 host sshd[14659]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:25:51 host sshd[14659]: Failed password for invalid user root from 223.204.203.181 port 43864 ssh2 Jan 19 10:25:52 host sshd[14659]: Connection reset by 223.204.203.181 port 43864 [preauth] Jan 19 10:25:52 host sshd[14659]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.204.203.181 user=root Jan 19 10:26:24 host sshd[14819]: User root from 35.226.126.79 not allowed because not listed in AllowUsers Jan 19 10:26:24 host sshd[14819]: input_userauth_request: invalid user root [preauth] Jan 19 10:26:24 host unix_chkpwd[14825]: password check failed for user (root) Jan 19 10:26:24 host sshd[14819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.226.126.79 user=root Jan 19 10:26:24 host sshd[14819]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:26:26 host sshd[14819]: Failed password for invalid user root from 35.226.126.79 port 45364 ssh2 Jan 19 10:26:26 host sshd[14819]: Received disconnect from 35.226.126.79 port 45364:11: Bye Bye [preauth] Jan 19 10:26:26 host sshd[14819]: Disconnected from 35.226.126.79 port 45364 [preauth] Jan 19 10:26:31 host sshd[14860]: Invalid user installer from 159.89.85.209 port 45190 Jan 19 10:26:31 host sshd[14860]: input_userauth_request: invalid user installer [preauth] Jan 19 10:26:31 host sshd[14860]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:26:31 host sshd[14860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.85.209 Jan 19 10:26:33 host sshd[14860]: Failed password for invalid user installer from 159.89.85.209 port 45190 ssh2 Jan 19 10:26:33 host sshd[14860]: Received disconnect from 159.89.85.209 port 45190:11: Bye Bye [preauth] Jan 19 10:26:33 host sshd[14860]: Disconnected from 159.89.85.209 port 45190 [preauth] Jan 19 10:26:36 host sshd[14876]: Invalid user www from 201.48.115.235 port 52826 Jan 19 10:26:36 host sshd[14876]: input_userauth_request: invalid user www [preauth] Jan 19 10:26:36 host sshd[14876]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:26:36 host sshd[14876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.115.235 Jan 19 10:26:38 host sshd[14876]: Failed password for invalid user www from 201.48.115.235 port 52826 ssh2 Jan 19 10:26:38 host sshd[14876]: Received disconnect from 201.48.115.235 port 52826:11: Bye Bye [preauth] Jan 19 10:26:38 host sshd[14876]: Disconnected from 201.48.115.235 port 52826 [preauth] Jan 19 10:26:45 host sshd[14899]: Invalid user newuser from 174.138.95.43 port 41576 Jan 19 10:26:45 host sshd[14899]: input_userauth_request: invalid user newuser [preauth] Jan 19 10:26:45 host sshd[14899]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:26:45 host sshd[14899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.95.43 Jan 19 10:26:48 host sshd[14899]: Failed password for invalid user newuser from 174.138.95.43 port 41576 ssh2 Jan 19 10:26:48 host sshd[14899]: Received disconnect from 174.138.95.43 port 41576:11: Bye Bye [preauth] Jan 19 10:26:48 host sshd[14899]: Disconnected from 174.138.95.43 port 41576 [preauth] Jan 19 10:28:10 host sshd[15125]: User root from 165.232.168.216 not allowed because not listed in AllowUsers Jan 19 10:28:10 host sshd[15125]: input_userauth_request: invalid user root [preauth] Jan 19 10:28:10 host unix_chkpwd[15128]: password check failed for user (root) Jan 19 10:28:10 host sshd[15125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.168.216 user=root Jan 19 10:28:10 host sshd[15125]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:28:12 host sshd[15125]: Failed password for invalid user root from 165.232.168.216 port 43336 ssh2 Jan 19 10:28:12 host sshd[15125]: Received disconnect from 165.232.168.216 port 43336:11: Bye Bye [preauth] Jan 19 10:28:12 host sshd[15125]: Disconnected from 165.232.168.216 port 43336 [preauth] Jan 19 10:29:11 host sshd[15345]: Invalid user bitrix from 103.166.103.50 port 49444 Jan 19 10:29:11 host sshd[15345]: input_userauth_request: invalid user bitrix [preauth] Jan 19 10:29:11 host sshd[15345]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:29:11 host sshd[15345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.166.103.50 Jan 19 10:29:13 host sshd[15345]: Failed password for invalid user bitrix from 103.166.103.50 port 49444 ssh2 Jan 19 10:29:13 host sshd[15345]: Received disconnect from 103.166.103.50 port 49444:11: Bye Bye [preauth] Jan 19 10:29:13 host sshd[15345]: Disconnected from 103.166.103.50 port 49444 [preauth] Jan 19 10:29:15 host sshd[15359]: Invalid user ansadmin from 43.134.186.44 port 36866 Jan 19 10:29:15 host sshd[15359]: input_userauth_request: invalid user ansadmin [preauth] Jan 19 10:29:15 host sshd[15359]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:29:15 host sshd[15359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.186.44 Jan 19 10:29:17 host sshd[15359]: Failed password for invalid user ansadmin from 43.134.186.44 port 36866 ssh2 Jan 19 10:29:17 host sshd[15359]: Received disconnect from 43.134.186.44 port 36866:11: Bye Bye [preauth] Jan 19 10:29:17 host sshd[15359]: Disconnected from 43.134.186.44 port 36866 [preauth] Jan 19 10:29:54 host sshd[15495]: User root from 174.138.95.43 not allowed because not listed in AllowUsers Jan 19 10:29:54 host sshd[15495]: input_userauth_request: invalid user root [preauth] Jan 19 10:29:54 host unix_chkpwd[15501]: password check failed for user (root) Jan 19 10:29:54 host sshd[15495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.95.43 user=root Jan 19 10:29:54 host sshd[15495]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:29:56 host sshd[15495]: Failed password for invalid user root from 174.138.95.43 port 53172 ssh2 Jan 19 10:29:56 host sshd[15495]: Received disconnect from 174.138.95.43 port 53172:11: Bye Bye [preauth] Jan 19 10:29:56 host sshd[15495]: Disconnected from 174.138.95.43 port 53172 [preauth] Jan 19 10:30:10 host sshd[15584]: Invalid user magento from 35.226.126.79 port 48306 Jan 19 10:30:10 host sshd[15584]: input_userauth_request: invalid user magento [preauth] Jan 19 10:30:10 host sshd[15584]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:30:10 host sshd[15584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.226.126.79 Jan 19 10:30:12 host sshd[15584]: Failed password for invalid user magento from 35.226.126.79 port 48306 ssh2 Jan 19 10:30:12 host sshd[15584]: Received disconnect from 35.226.126.79 port 48306:11: Bye Bye [preauth] Jan 19 10:30:12 host sshd[15584]: Disconnected from 35.226.126.79 port 48306 [preauth] Jan 19 10:30:52 host sshd[15862]: User root from 201.48.115.235 not allowed because not listed in AllowUsers Jan 19 10:30:52 host sshd[15862]: input_userauth_request: invalid user root [preauth] Jan 19 10:30:52 host unix_chkpwd[15870]: password check failed for user (root) Jan 19 10:30:52 host sshd[15862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.115.235 user=root Jan 19 10:30:52 host sshd[15862]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:30:54 host sshd[15862]: Failed password for invalid user root from 201.48.115.235 port 56892 ssh2 Jan 19 10:30:55 host sshd[15862]: Received disconnect from 201.48.115.235 port 56892:11: Bye Bye [preauth] Jan 19 10:30:55 host sshd[15862]: Disconnected from 201.48.115.235 port 56892 [preauth] Jan 19 10:30:57 host sshd[15880]: Invalid user user2 from 159.89.85.209 port 41424 Jan 19 10:30:57 host sshd[15880]: input_userauth_request: invalid user user2 [preauth] Jan 19 10:30:57 host sshd[15880]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:30:57 host sshd[15880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.85.209 Jan 19 10:30:59 host sshd[15880]: Failed password for invalid user user2 from 159.89.85.209 port 41424 ssh2 Jan 19 10:30:59 host sshd[15880]: Received disconnect from 159.89.85.209 port 41424:11: Bye Bye [preauth] Jan 19 10:30:59 host sshd[15880]: Disconnected from 159.89.85.209 port 41424 [preauth] Jan 19 10:31:01 host sshd[15929]: Invalid user usuario from 43.134.186.44 port 47008 Jan 19 10:31:01 host sshd[15929]: input_userauth_request: invalid user usuario [preauth] Jan 19 10:31:01 host sshd[15929]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:31:01 host sshd[15929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.186.44 Jan 19 10:31:04 host sshd[15929]: Failed password for invalid user usuario from 43.134.186.44 port 47008 ssh2 Jan 19 10:31:04 host sshd[15929]: Received disconnect from 43.134.186.44 port 47008:11: Bye Bye [preauth] Jan 19 10:31:04 host sshd[15929]: Disconnected from 43.134.186.44 port 47008 [preauth] Jan 19 10:31:21 host sshd[16011]: Invalid user www from 45.224.235.24 port 55442 Jan 19 10:31:21 host sshd[16011]: input_userauth_request: invalid user www [preauth] Jan 19 10:31:21 host sshd[16011]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:31:21 host sshd[16011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.224.235.24 Jan 19 10:31:23 host sshd[16011]: Failed password for invalid user www from 45.224.235.24 port 55442 ssh2 Jan 19 10:31:23 host sshd[16011]: Received disconnect from 45.224.235.24 port 55442:11: Bye Bye [preauth] Jan 19 10:31:23 host sshd[16011]: Disconnected from 45.224.235.24 port 55442 [preauth] Jan 19 10:31:35 host sshd[16086]: User root from 64.227.182.117 not allowed because not listed in AllowUsers Jan 19 10:31:35 host sshd[16086]: input_userauth_request: invalid user root [preauth] Jan 19 10:31:35 host unix_chkpwd[16088]: password check failed for user (root) Jan 19 10:31:35 host sshd[16086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.182.117 user=root Jan 19 10:31:35 host sshd[16086]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:31:37 host sshd[16086]: Failed password for invalid user root from 64.227.182.117 port 52084 ssh2 Jan 19 10:31:37 host sshd[16086]: Received disconnect from 64.227.182.117 port 52084:11: Bye Bye [preauth] Jan 19 10:31:37 host sshd[16086]: Disconnected from 64.227.182.117 port 52084 [preauth] Jan 19 10:31:44 host sshd[16152]: Invalid user radio from 165.232.168.216 port 58190 Jan 19 10:31:44 host sshd[16152]: input_userauth_request: invalid user radio [preauth] Jan 19 10:31:44 host sshd[16152]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:31:44 host sshd[16152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.168.216 Jan 19 10:31:46 host sshd[16152]: Failed password for invalid user radio from 165.232.168.216 port 58190 ssh2 Jan 19 10:31:46 host sshd[16152]: Received disconnect from 165.232.168.216 port 58190:11: Bye Bye [preauth] Jan 19 10:31:46 host sshd[16152]: Disconnected from 165.232.168.216 port 58190 [preauth] Jan 19 10:32:01 host sshd[16241]: User root from 159.89.85.209 not allowed because not listed in AllowUsers Jan 19 10:32:01 host sshd[16241]: input_userauth_request: invalid user root [preauth] Jan 19 10:32:01 host unix_chkpwd[16248]: password check failed for user (root) Jan 19 10:32:01 host sshd[16241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.85.209 user=root Jan 19 10:32:01 host sshd[16241]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:32:03 host sshd[16241]: Failed password for invalid user root from 159.89.85.209 port 60550 ssh2 Jan 19 10:32:22 host sshd[16381]: User root from 43.134.186.44 not allowed because not listed in AllowUsers Jan 19 10:32:22 host sshd[16381]: input_userauth_request: invalid user root [preauth] Jan 19 10:32:22 host unix_chkpwd[16383]: password check failed for user (root) Jan 19 10:32:22 host sshd[16381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.186.44 user=root Jan 19 10:32:22 host sshd[16381]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:32:25 host sshd[16381]: Failed password for invalid user root from 43.134.186.44 port 34162 ssh2 Jan 19 10:32:27 host sshd[16426]: Invalid user osboxes from 103.166.103.50 port 53658 Jan 19 10:32:27 host sshd[16426]: input_userauth_request: invalid user osboxes [preauth] Jan 19 10:32:27 host sshd[16426]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:32:27 host sshd[16426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.166.103.50 Jan 19 10:32:29 host sshd[16426]: Failed password for invalid user osboxes from 103.166.103.50 port 53658 ssh2 Jan 19 10:32:30 host sshd[16426]: Received disconnect from 103.166.103.50 port 53658:11: Bye Bye [preauth] Jan 19 10:32:30 host sshd[16426]: Disconnected from 103.166.103.50 port 53658 [preauth] Jan 19 10:32:45 host sshd[16505]: User root from 45.224.235.24 not allowed because not listed in AllowUsers Jan 19 10:32:45 host sshd[16505]: input_userauth_request: invalid user root [preauth] Jan 19 10:32:45 host unix_chkpwd[16518]: password check failed for user (root) Jan 19 10:32:45 host sshd[16505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.224.235.24 user=root Jan 19 10:32:45 host sshd[16505]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:32:47 host sshd[16505]: Failed password for invalid user root from 45.224.235.24 port 53940 ssh2 Jan 19 10:32:47 host sshd[16505]: Received disconnect from 45.224.235.24 port 53940:11: Bye Bye [preauth] Jan 19 10:32:47 host sshd[16505]: Disconnected from 45.224.235.24 port 53940 [preauth] Jan 19 10:33:05 host sshd[16601]: Invalid user telnet from 36.37.181.181 port 34680 Jan 19 10:33:05 host sshd[16601]: input_userauth_request: invalid user telnet [preauth] Jan 19 10:33:05 host sshd[16601]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:33:05 host sshd[16601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.37.181.181 Jan 19 10:33:07 host sshd[16601]: Failed password for invalid user telnet from 36.37.181.181 port 34680 ssh2 Jan 19 10:33:07 host sshd[16601]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:33:08 host sshd[16601]: Failed password for invalid user telnet from 36.37.181.181 port 34680 ssh2 Jan 19 10:33:12 host sshd[16601]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:33:14 host sshd[16601]: Failed password for invalid user telnet from 36.37.181.181 port 34680 ssh2 Jan 19 10:33:16 host sshd[16601]: Failed password for invalid user telnet from 36.37.181.181 port 34680 ssh2 Jan 19 10:33:17 host sshd[16601]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:33:19 host sshd[16601]: Failed password for invalid user telnet from 36.37.181.181 port 34680 ssh2 Jan 19 10:33:53 host sshd[16801]: Invalid user usuario from 103.166.103.50 port 48600 Jan 19 10:33:53 host sshd[16801]: input_userauth_request: invalid user usuario [preauth] Jan 19 10:33:53 host sshd[16801]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:33:53 host sshd[16801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.166.103.50 Jan 19 10:33:55 host sshd[16801]: Failed password for invalid user usuario from 103.166.103.50 port 48600 ssh2 Jan 19 10:33:55 host sshd[16801]: Received disconnect from 103.166.103.50 port 48600:11: Bye Bye [preauth] Jan 19 10:33:55 host sshd[16801]: Disconnected from 103.166.103.50 port 48600 [preauth] Jan 19 10:42:24 host sshd[18828]: Connection reset by 112.167.200.181 port 60067 [preauth] Jan 19 10:44:19 host sshd[19212]: Invalid user es from 175.126.232.120 port 44864 Jan 19 10:44:19 host sshd[19212]: input_userauth_request: invalid user es [preauth] Jan 19 10:44:19 host sshd[19212]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:44:19 host sshd[19212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.232.120 Jan 19 10:44:21 host sshd[19212]: Failed password for invalid user es from 175.126.232.120 port 44864 ssh2 Jan 19 10:44:21 host sshd[19212]: Received disconnect from 175.126.232.120 port 44864:11: Bye Bye [preauth] Jan 19 10:44:21 host sshd[19212]: Disconnected from 175.126.232.120 port 44864 [preauth] Jan 19 10:45:25 host sshd[19365]: User root from 188.80.228.9 not allowed because not listed in AllowUsers Jan 19 10:45:25 host sshd[19365]: input_userauth_request: invalid user root [preauth] Jan 19 10:45:25 host unix_chkpwd[19368]: password check failed for user (root) Jan 19 10:45:25 host sshd[19365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.80.228.9 user=root Jan 19 10:45:25 host sshd[19365]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:45:26 host sshd[19365]: Failed password for invalid user root from 188.80.228.9 port 59875 ssh2 Jan 19 10:45:26 host sshd[19365]: Received disconnect from 188.80.228.9 port 59875:11: Bye Bye [preauth] Jan 19 10:45:26 host sshd[19365]: Disconnected from 188.80.228.9 port 59875 [preauth] Jan 19 10:47:50 host sshd[19928]: Invalid user amssys from 89.134.172.107 port 44148 Jan 19 10:47:50 host sshd[19928]: input_userauth_request: invalid user amssys [preauth] Jan 19 10:47:50 host sshd[19928]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:47:50 host sshd[19928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.134.172.107 Jan 19 10:47:52 host sshd[19928]: Failed password for invalid user amssys from 89.134.172.107 port 44148 ssh2 Jan 19 10:47:52 host sshd[19928]: Received disconnect from 89.134.172.107 port 44148:11: Bye Bye [preauth] Jan 19 10:47:52 host sshd[19928]: Disconnected from 89.134.172.107 port 44148 [preauth] Jan 19 10:50:46 host sshd[20432]: User root from 175.126.232.120 not allowed because not listed in AllowUsers Jan 19 10:50:46 host sshd[20432]: input_userauth_request: invalid user root [preauth] Jan 19 10:50:46 host unix_chkpwd[20436]: password check failed for user (root) Jan 19 10:50:46 host sshd[20432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.126.232.120 user=root Jan 19 10:50:46 host sshd[20432]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 10:50:48 host sshd[20432]: Failed password for invalid user root from 175.126.232.120 port 42872 ssh2 Jan 19 10:50:48 host sshd[20432]: Received disconnect from 175.126.232.120 port 42872:11: Bye Bye [preauth] Jan 19 10:50:48 host sshd[20432]: Disconnected from 175.126.232.120 port 42872 [preauth] Jan 19 10:50:52 host sshd[20459]: Invalid user radio from 89.134.172.107 port 50272 Jan 19 10:50:52 host sshd[20459]: input_userauth_request: invalid user radio [preauth] Jan 19 10:50:52 host sshd[20459]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:50:52 host sshd[20459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.134.172.107 Jan 19 10:50:54 host sshd[20459]: Failed password for invalid user radio from 89.134.172.107 port 50272 ssh2 Jan 19 10:50:54 host sshd[20459]: Received disconnect from 89.134.172.107 port 50272:11: Bye Bye [preauth] Jan 19 10:50:54 host sshd[20459]: Disconnected from 89.134.172.107 port 50272 [preauth] Jan 19 10:51:18 host sshd[20595]: User mysql from 188.80.228.9 not allowed because not listed in AllowUsers Jan 19 10:51:18 host sshd[20595]: input_userauth_request: invalid user mysql [preauth] Jan 19 10:51:18 host unix_chkpwd[20600]: password check failed for user (mysql) Jan 19 10:51:18 host sshd[20595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.80.228.9 user=mysql Jan 19 10:51:18 host sshd[20595]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 19 10:51:20 host sshd[20595]: Failed password for invalid user mysql from 188.80.228.9 port 64818 ssh2 Jan 19 10:52:01 host sshd[20812]: Invalid user trojanuser from 89.134.172.107 port 33350 Jan 19 10:52:01 host sshd[20812]: input_userauth_request: invalid user trojanuser [preauth] Jan 19 10:52:01 host sshd[20812]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:52:01 host sshd[20812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.134.172.107 Jan 19 10:52:03 host sshd[20812]: Failed password for invalid user trojanuser from 89.134.172.107 port 33350 ssh2 Jan 19 10:52:03 host sshd[20812]: Received disconnect from 89.134.172.107 port 33350:11: Bye Bye [preauth] Jan 19 10:52:03 host sshd[20812]: Disconnected from 89.134.172.107 port 33350 [preauth] Jan 19 10:52:16 host sshd[20899]: Connection reset by 59.125.184.176 port 43952 [preauth] Jan 19 10:59:05 host sshd[22134]: Invalid user admin from 112.158.159.107 port 40573 Jan 19 10:59:05 host sshd[22134]: input_userauth_request: invalid user admin [preauth] Jan 19 10:59:05 host sshd[22134]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:59:05 host sshd[22134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.158.159.107 Jan 19 10:59:08 host sshd[22134]: Failed password for invalid user admin from 112.158.159.107 port 40573 ssh2 Jan 19 10:59:09 host sshd[22134]: Failed password for invalid user admin from 112.158.159.107 port 40573 ssh2 Jan 19 10:59:09 host sshd[22134]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:59:11 host sshd[22134]: Failed password for invalid user admin from 112.158.159.107 port 40573 ssh2 Jan 19 10:59:12 host sshd[22134]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:59:14 host sshd[22134]: Failed password for invalid user admin from 112.158.159.107 port 40573 ssh2 Jan 19 10:59:15 host sshd[22134]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:59:16 host sshd[22134]: Failed password for invalid user admin from 112.158.159.107 port 40573 ssh2 Jan 19 10:59:17 host sshd[22134]: pam_unix(sshd:auth): check pass; user unknown Jan 19 10:59:19 host sshd[22134]: Failed password for invalid user admin from 112.158.159.107 port 40573 ssh2 Jan 19 10:59:19 host sshd[22134]: error: maximum authentication attempts exceeded for invalid user admin from 112.158.159.107 port 40573 ssh2 [preauth] Jan 19 10:59:19 host sshd[22134]: Disconnecting: Too many authentication failures [preauth] Jan 19 10:59:19 host sshd[22134]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.158.159.107 Jan 19 10:59:19 host sshd[22134]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 19 11:03:48 host sshd[23034]: Invalid user pi from 181.89.204.96 port 54260 Jan 19 11:03:48 host sshd[23034]: input_userauth_request: invalid user pi [preauth] Jan 19 11:03:48 host sshd[23035]: Invalid user pi from 181.89.204.96 port 54264 Jan 19 11:03:48 host sshd[23035]: input_userauth_request: invalid user pi [preauth] Jan 19 11:03:48 host sshd[23034]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:03:48 host sshd[23034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.89.204.96 Jan 19 11:03:48 host sshd[23035]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:03:48 host sshd[23035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.89.204.96 Jan 19 11:03:51 host sshd[23034]: Failed password for invalid user pi from 181.89.204.96 port 54260 ssh2 Jan 19 11:03:51 host sshd[23035]: Failed password for invalid user pi from 181.89.204.96 port 54264 ssh2 Jan 19 11:03:51 host sshd[23034]: Connection closed by 181.89.204.96 port 54260 [preauth] Jan 19 11:03:51 host sshd[23035]: Connection closed by 181.89.204.96 port 54264 [preauth] Jan 19 11:04:02 host sshd[23067]: Invalid user amssys from 181.206.14.42 port 36994 Jan 19 11:04:02 host sshd[23067]: input_userauth_request: invalid user amssys [preauth] Jan 19 11:04:02 host sshd[23067]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:04:02 host sshd[23067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.206.14.42 Jan 19 11:04:04 host sshd[23067]: Failed password for invalid user amssys from 181.206.14.42 port 36994 ssh2 Jan 19 11:04:04 host sshd[23067]: Received disconnect from 181.206.14.42 port 36994:11: Bye Bye [preauth] Jan 19 11:04:04 host sshd[23067]: Disconnected from 181.206.14.42 port 36994 [preauth] Jan 19 11:04:05 host sshd[23084]: User root from 216.137.185.18 not allowed because not listed in AllowUsers Jan 19 11:04:05 host sshd[23084]: input_userauth_request: invalid user root [preauth] Jan 19 11:04:05 host unix_chkpwd[23086]: password check failed for user (root) Jan 19 11:04:05 host sshd[23084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.137.185.18 user=root Jan 19 11:04:05 host sshd[23084]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 11:04:07 host sshd[23084]: Failed password for invalid user root from 216.137.185.18 port 49236 ssh2 Jan 19 11:04:07 host sshd[23084]: Received disconnect from 216.137.185.18 port 49236:11: Bye Bye [preauth] Jan 19 11:04:07 host sshd[23084]: Disconnected from 216.137.185.18 port 49236 [preauth] Jan 19 11:04:24 host sshd[23116]: Invalid user temp from 43.129.186.111 port 41902 Jan 19 11:04:24 host sshd[23116]: input_userauth_request: invalid user temp [preauth] Jan 19 11:04:24 host sshd[23116]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:04:24 host sshd[23116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.129.186.111 Jan 19 11:04:26 host sshd[23116]: Failed password for invalid user temp from 43.129.186.111 port 41902 ssh2 Jan 19 11:04:27 host sshd[23116]: Received disconnect from 43.129.186.111 port 41902:11: Bye Bye [preauth] Jan 19 11:04:27 host sshd[23116]: Disconnected from 43.129.186.111 port 41902 [preauth] Jan 19 11:04:35 host sshd[23167]: Invalid user azureuser from 46.101.249.11 port 56496 Jan 19 11:04:35 host sshd[23167]: input_userauth_request: invalid user azureuser [preauth] Jan 19 11:04:35 host sshd[23167]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:04:35 host sshd[23167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.249.11 Jan 19 11:04:38 host sshd[23167]: Failed password for invalid user azureuser from 46.101.249.11 port 56496 ssh2 Jan 19 11:04:38 host sshd[23167]: Received disconnect from 46.101.249.11 port 56496:11: Bye Bye [preauth] Jan 19 11:04:38 host sshd[23167]: Disconnected from 46.101.249.11 port 56496 [preauth] Jan 19 11:05:12 host sshd[23381]: Invalid user demo from 43.240.103.140 port 58900 Jan 19 11:05:12 host sshd[23381]: input_userauth_request: invalid user demo [preauth] Jan 19 11:05:12 host sshd[23381]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:05:12 host sshd[23381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.240.103.140 Jan 19 11:05:14 host sshd[23381]: Failed password for invalid user demo from 43.240.103.140 port 58900 ssh2 Jan 19 11:05:14 host sshd[23381]: Received disconnect from 43.240.103.140 port 58900:11: Bye Bye [preauth] Jan 19 11:05:14 host sshd[23381]: Disconnected from 43.240.103.140 port 58900 [preauth] Jan 19 11:05:15 host sshd[23389]: Invalid user mcserver from 130.61.228.129 port 34008 Jan 19 11:05:15 host sshd[23389]: input_userauth_request: invalid user mcserver [preauth] Jan 19 11:05:15 host sshd[23389]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:05:15 host sshd[23389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.228.129 Jan 19 11:05:17 host sshd[23389]: Failed password for invalid user mcserver from 130.61.228.129 port 34008 ssh2 Jan 19 11:05:17 host sshd[23389]: Received disconnect from 130.61.228.129 port 34008:11: Bye Bye [preauth] Jan 19 11:05:17 host sshd[23389]: Disconnected from 130.61.228.129 port 34008 [preauth] Jan 19 11:05:54 host sshd[23536]: Invalid user vagrant from 213.6.118.170 port 54816 Jan 19 11:05:54 host sshd[23536]: input_userauth_request: invalid user vagrant [preauth] Jan 19 11:05:54 host sshd[23536]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:05:54 host sshd[23536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.118.170 Jan 19 11:05:55 host sshd[23536]: Failed password for invalid user vagrant from 213.6.118.170 port 54816 ssh2 Jan 19 11:05:56 host sshd[23536]: Received disconnect from 213.6.118.170 port 54816:11: Bye Bye [preauth] Jan 19 11:05:56 host sshd[23536]: Disconnected from 213.6.118.170 port 54816 [preauth] Jan 19 11:06:13 host sshd[23575]: Invalid user int from 84.201.173.228 port 53788 Jan 19 11:06:13 host sshd[23575]: input_userauth_request: invalid user int [preauth] Jan 19 11:06:13 host sshd[23575]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:06:13 host sshd[23575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.173.228 Jan 19 11:06:15 host sshd[23575]: Failed password for invalid user int from 84.201.173.228 port 53788 ssh2 Jan 19 11:06:15 host sshd[23575]: Received disconnect from 84.201.173.228 port 53788:11: Bye Bye [preauth] Jan 19 11:06:15 host sshd[23575]: Disconnected from 84.201.173.228 port 53788 [preauth] Jan 19 11:06:39 host sshd[23644]: Connection reset by 114.151.127.4 port 56594 [preauth] Jan 19 11:07:09 host sshd[23711]: Invalid user gitlab from 46.101.32.38 port 35290 Jan 19 11:07:09 host sshd[23711]: input_userauth_request: invalid user gitlab [preauth] Jan 19 11:07:09 host sshd[23711]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:07:09 host sshd[23711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.32.38 Jan 19 11:07:11 host sshd[23711]: Failed password for invalid user gitlab from 46.101.32.38 port 35290 ssh2 Jan 19 11:07:11 host sshd[23711]: Received disconnect from 46.101.32.38 port 35290:11: Bye Bye [preauth] Jan 19 11:07:11 host sshd[23711]: Disconnected from 46.101.32.38 port 35290 [preauth] Jan 19 11:08:00 host sshd[23875]: Invalid user gns3 from 178.128.16.206 port 45406 Jan 19 11:08:00 host sshd[23875]: input_userauth_request: invalid user gns3 [preauth] Jan 19 11:08:00 host sshd[23875]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:08:00 host sshd[23875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.16.206 Jan 19 11:08:02 host sshd[23875]: Failed password for invalid user gns3 from 178.128.16.206 port 45406 ssh2 Jan 19 11:08:02 host sshd[23875]: Received disconnect from 178.128.16.206 port 45406:11: Bye Bye [preauth] Jan 19 11:08:02 host sshd[23875]: Disconnected from 178.128.16.206 port 45406 [preauth] Jan 19 11:08:28 host sshd[23962]: Invalid user sammy from 103.150.60.6 port 34996 Jan 19 11:08:28 host sshd[23962]: input_userauth_request: invalid user sammy [preauth] Jan 19 11:08:28 host sshd[23962]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:08:28 host sshd[23962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.150.60.6 Jan 19 11:08:30 host sshd[23962]: Failed password for invalid user sammy from 103.150.60.6 port 34996 ssh2 Jan 19 11:08:30 host sshd[23962]: Received disconnect from 103.150.60.6 port 34996:11: Bye Bye [preauth] Jan 19 11:08:30 host sshd[23962]: Disconnected from 103.150.60.6 port 34996 [preauth] Jan 19 11:08:58 host sshd[24060]: User root from 125.137.209.111 not allowed because not listed in AllowUsers Jan 19 11:08:58 host sshd[24060]: input_userauth_request: invalid user root [preauth] Jan 19 11:08:58 host unix_chkpwd[24065]: password check failed for user (root) Jan 19 11:08:58 host sshd[24060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.137.209.111 user=root Jan 19 11:08:58 host sshd[24060]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 11:09:01 host sshd[24082]: User root from 103.146.203.217 not allowed because not listed in AllowUsers Jan 19 11:09:01 host sshd[24082]: input_userauth_request: invalid user root [preauth] Jan 19 11:09:01 host unix_chkpwd[24084]: password check failed for user (root) Jan 19 11:09:01 host sshd[24060]: Failed password for invalid user root from 125.137.209.111 port 63442 ssh2 Jan 19 11:09:01 host sshd[24082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.203.217 user=root Jan 19 11:09:01 host sshd[24082]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 11:09:01 host unix_chkpwd[24098]: password check failed for user (root) Jan 19 11:09:01 host sshd[24060]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 11:09:03 host sshd[24082]: Failed password for invalid user root from 103.146.203.217 port 51884 ssh2 Jan 19 11:09:03 host sshd[24082]: Received disconnect from 103.146.203.217 port 51884:11: Bye Bye [preauth] Jan 19 11:09:03 host sshd[24082]: Disconnected from 103.146.203.217 port 51884 [preauth] Jan 19 11:09:03 host sshd[24060]: Failed password for invalid user root from 125.137.209.111 port 63442 ssh2 Jan 19 11:09:04 host unix_chkpwd[24109]: password check failed for user (root) Jan 19 11:09:04 host sshd[24060]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 11:09:07 host sshd[24060]: Failed password for invalid user root from 125.137.209.111 port 63442 ssh2 Jan 19 11:10:15 host sshd[24358]: Invalid user solr from 213.6.118.170 port 56468 Jan 19 11:10:15 host sshd[24358]: input_userauth_request: invalid user solr [preauth] Jan 19 11:10:15 host sshd[24358]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:10:15 host sshd[24358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.118.170 Jan 19 11:10:17 host sshd[24358]: Failed password for invalid user solr from 213.6.118.170 port 56468 ssh2 Jan 19 11:10:17 host sshd[24358]: Received disconnect from 213.6.118.170 port 56468:11: Bye Bye [preauth] Jan 19 11:10:17 host sshd[24358]: Disconnected from 213.6.118.170 port 56468 [preauth] Jan 19 11:10:35 host sshd[24542]: Invalid user vagrant from 84.201.173.228 port 44672 Jan 19 11:10:35 host sshd[24542]: input_userauth_request: invalid user vagrant [preauth] Jan 19 11:10:35 host sshd[24542]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:10:35 host sshd[24542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.173.228 Jan 19 11:10:38 host sshd[24542]: Failed password for invalid user vagrant from 84.201.173.228 port 44672 ssh2 Jan 19 11:10:38 host sshd[24542]: Received disconnect from 84.201.173.228 port 44672:11: Bye Bye [preauth] Jan 19 11:10:38 host sshd[24542]: Disconnected from 84.201.173.228 port 44672 [preauth] Jan 19 11:10:54 host sshd[24568]: Invalid user john from 46.101.249.11 port 55780 Jan 19 11:10:54 host sshd[24568]: input_userauth_request: invalid user john [preauth] Jan 19 11:10:54 host sshd[24568]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:10:54 host sshd[24568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.249.11 Jan 19 11:10:55 host sshd[24573]: User root from 190.147.33.242 not allowed because not listed in AllowUsers Jan 19 11:10:55 host sshd[24573]: input_userauth_request: invalid user root [preauth] Jan 19 11:10:55 host unix_chkpwd[24579]: password check failed for user (root) Jan 19 11:10:55 host sshd[24573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.147.33.242 user=root Jan 19 11:10:55 host sshd[24573]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 11:10:55 host sshd[24580]: Invalid user radio from 216.137.185.18 port 35260 Jan 19 11:10:55 host sshd[24580]: input_userauth_request: invalid user radio [preauth] Jan 19 11:10:55 host sshd[24580]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:10:55 host sshd[24580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.137.185.18 Jan 19 11:10:55 host sshd[24568]: Failed password for invalid user john from 46.101.249.11 port 55780 ssh2 Jan 19 11:10:55 host sshd[24568]: Received disconnect from 46.101.249.11 port 55780:11: Bye Bye [preauth] Jan 19 11:10:55 host sshd[24568]: Disconnected from 46.101.249.11 port 55780 [preauth] Jan 19 11:10:56 host sshd[24573]: Failed password for invalid user root from 190.147.33.242 port 41568 ssh2 Jan 19 11:10:56 host sshd[24573]: Received disconnect from 190.147.33.242 port 41568:11: Bye Bye [preauth] Jan 19 11:10:56 host sshd[24573]: Disconnected from 190.147.33.242 port 41568 [preauth] Jan 19 11:10:56 host sshd[24580]: Failed password for invalid user radio from 216.137.185.18 port 35260 ssh2 Jan 19 11:10:56 host sshd[24580]: Received disconnect from 216.137.185.18 port 35260:11: Bye Bye [preauth] Jan 19 11:10:56 host sshd[24580]: Disconnected from 216.137.185.18 port 35260 [preauth] Jan 19 11:10:57 host sshd[24583]: Invalid user manager from 46.101.32.38 port 39866 Jan 19 11:10:57 host sshd[24583]: input_userauth_request: invalid user manager [preauth] Jan 19 11:10:57 host sshd[24583]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:10:57 host sshd[24583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.32.38 Jan 19 11:10:59 host sshd[24583]: Failed password for invalid user manager from 46.101.32.38 port 39866 ssh2 Jan 19 11:10:59 host sshd[24583]: Received disconnect from 46.101.32.38 port 39866:11: Bye Bye [preauth] Jan 19 11:10:59 host sshd[24583]: Disconnected from 46.101.32.38 port 39866 [preauth] Jan 19 11:11:00 host sshd[24598]: Invalid user azureuser from 43.129.186.111 port 43500 Jan 19 11:11:00 host sshd[24598]: input_userauth_request: invalid user azureuser [preauth] Jan 19 11:11:00 host sshd[24598]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:11:00 host sshd[24598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.129.186.111 Jan 19 11:11:01 host sshd[24629]: User root from 121.130.111.133 not allowed because not listed in AllowUsers Jan 19 11:11:01 host sshd[24629]: input_userauth_request: invalid user root [preauth] Jan 19 11:11:01 host unix_chkpwd[24646]: password check failed for user (root) Jan 19 11:11:01 host sshd[24629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.130.111.133 user=root Jan 19 11:11:01 host sshd[24629]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 11:11:02 host sshd[24598]: Failed password for invalid user azureuser from 43.129.186.111 port 43500 ssh2 Jan 19 11:11:02 host sshd[24598]: Received disconnect from 43.129.186.111 port 43500:11: Bye Bye [preauth] Jan 19 11:11:02 host sshd[24598]: Disconnected from 43.129.186.111 port 43500 [preauth] Jan 19 11:11:04 host sshd[24629]: Failed password for invalid user root from 121.130.111.133 port 53794 ssh2 Jan 19 11:11:04 host sshd[24629]: Received disconnect from 121.130.111.133 port 53794:11: Bye Bye [preauth] Jan 19 11:11:04 host sshd[24629]: Disconnected from 121.130.111.133 port 53794 [preauth] Jan 19 11:11:11 host sshd[24681]: Invalid user prueba from 103.146.203.217 port 55784 Jan 19 11:11:11 host sshd[24681]: input_userauth_request: invalid user prueba [preauth] Jan 19 11:11:11 host sshd[24681]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:11:11 host sshd[24681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.146.203.217 Jan 19 11:11:14 host sshd[24681]: Failed password for invalid user prueba from 103.146.203.217 port 55784 ssh2 Jan 19 11:11:14 host sshd[24681]: Received disconnect from 103.146.203.217 port 55784:11: Bye Bye [preauth] Jan 19 11:11:14 host sshd[24681]: Disconnected from 103.146.203.217 port 55784 [preauth] Jan 19 11:11:28 host sshd[24774]: User root from 43.240.103.140 not allowed because not listed in AllowUsers Jan 19 11:11:28 host sshd[24774]: input_userauth_request: invalid user root [preauth] Jan 19 11:11:28 host unix_chkpwd[24777]: password check failed for user (root) Jan 19 11:11:28 host sshd[24774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.240.103.140 user=root Jan 19 11:11:28 host sshd[24774]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 11:11:29 host sshd[24773]: Invalid user support from 213.6.118.170 port 40848 Jan 19 11:11:29 host sshd[24773]: input_userauth_request: invalid user support [preauth] Jan 19 11:11:29 host sshd[24773]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:11:29 host sshd[24773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.118.170 Jan 19 11:11:30 host sshd[24774]: Failed password for invalid user root from 43.240.103.140 port 56590 ssh2 Jan 19 11:11:30 host sshd[24774]: Received disconnect from 43.240.103.140 port 56590:11: Bye Bye [preauth] Jan 19 11:11:30 host sshd[24774]: Disconnected from 43.240.103.140 port 56590 [preauth] Jan 19 11:11:31 host sshd[24773]: Failed password for invalid user support from 213.6.118.170 port 40848 ssh2 Jan 19 11:11:43 host sshd[24868]: Invalid user sammy from 178.128.16.206 port 55398 Jan 19 11:11:43 host sshd[24868]: input_userauth_request: invalid user sammy [preauth] Jan 19 11:11:43 host sshd[24868]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:11:43 host sshd[24868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.16.206 Jan 19 11:11:45 host sshd[24868]: Failed password for invalid user sammy from 178.128.16.206 port 55398 ssh2 Jan 19 11:11:45 host sshd[24868]: Received disconnect from 178.128.16.206 port 55398:11: Bye Bye [preauth] Jan 19 11:11:45 host sshd[24868]: Disconnected from 178.128.16.206 port 55398 [preauth] Jan 19 11:11:46 host sshd[24877]: User root from 103.150.60.6 not allowed because not listed in AllowUsers Jan 19 11:11:46 host sshd[24877]: input_userauth_request: invalid user root [preauth] Jan 19 11:11:46 host unix_chkpwd[24880]: password check failed for user (root) Jan 19 11:11:46 host sshd[24877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.150.60.6 user=root Jan 19 11:11:46 host sshd[24877]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 11:11:49 host sshd[24877]: Failed password for invalid user root from 103.150.60.6 port 43314 ssh2 Jan 19 11:11:49 host sshd[24877]: Received disconnect from 103.150.60.6 port 43314:11: Bye Bye [preauth] Jan 19 11:11:49 host sshd[24877]: Disconnected from 103.150.60.6 port 43314 [preauth] Jan 19 11:11:55 host sshd[24891]: Invalid user temp from 84.201.173.228 port 43430 Jan 19 11:11:55 host sshd[24891]: input_userauth_request: invalid user temp [preauth] Jan 19 11:11:55 host sshd[24891]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:11:55 host sshd[24891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.173.228 Jan 19 11:11:56 host sshd[24891]: Failed password for invalid user temp from 84.201.173.228 port 43430 ssh2 Jan 19 11:11:57 host sshd[24891]: Received disconnect from 84.201.173.228 port 43430:11: Bye Bye [preauth] Jan 19 11:11:57 host sshd[24891]: Disconnected from 84.201.173.228 port 43430 [preauth] Jan 19 11:12:12 host sshd[24993]: Invalid user solr from 190.147.33.242 port 36104 Jan 19 11:12:12 host sshd[24993]: input_userauth_request: invalid user solr [preauth] Jan 19 11:12:12 host sshd[24993]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:12:12 host sshd[24993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.147.33.242 Jan 19 11:12:14 host sshd[24993]: Failed password for invalid user solr from 190.147.33.242 port 36104 ssh2 Jan 19 11:12:15 host sshd[24993]: Received disconnect from 190.147.33.242 port 36104:11: Bye Bye [preauth] Jan 19 11:12:15 host sshd[24993]: Disconnected from 190.147.33.242 port 36104 [preauth] Jan 19 11:12:16 host sshd[25009]: Invalid user zjw from 43.129.186.111 port 38106 Jan 19 11:12:16 host sshd[25009]: input_userauth_request: invalid user zjw [preauth] Jan 19 11:12:16 host sshd[25009]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:12:16 host sshd[25009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.129.186.111 Jan 19 11:12:18 host sshd[25009]: Failed password for invalid user zjw from 43.129.186.111 port 38106 ssh2 Jan 19 11:12:18 host sshd[25009]: Received disconnect from 43.129.186.111 port 38106:11: Bye Bye [preauth] Jan 19 11:12:18 host sshd[25009]: Disconnected from 43.129.186.111 port 38106 [preauth] Jan 19 11:12:20 host sshd[25015]: Invalid user manager from 46.101.249.11 port 49774 Jan 19 11:12:20 host sshd[25015]: input_userauth_request: invalid user manager [preauth] Jan 19 11:12:20 host sshd[25015]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:12:20 host sshd[25015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.249.11 Jan 19 11:12:21 host sshd[25015]: Failed password for invalid user manager from 46.101.249.11 port 49774 ssh2 Jan 19 11:12:21 host sshd[25015]: Received disconnect from 46.101.249.11 port 49774:11: Bye Bye [preauth] Jan 19 11:12:21 host sshd[25015]: Disconnected from 46.101.249.11 port 49774 [preauth] Jan 19 11:12:33 host sshd[25163]: Invalid user sam from 121.130.111.133 port 39134 Jan 19 11:12:33 host sshd[25163]: input_userauth_request: invalid user sam [preauth] Jan 19 11:12:33 host sshd[25163]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:12:33 host sshd[25163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.130.111.133 Jan 19 11:12:36 host sshd[25163]: Failed password for invalid user sam from 121.130.111.133 port 39134 ssh2 Jan 19 11:12:36 host sshd[25163]: Received disconnect from 121.130.111.133 port 39134:11: Bye Bye [preauth] Jan 19 11:12:36 host sshd[25163]: Disconnected from 121.130.111.133 port 39134 [preauth] Jan 19 11:12:55 host sshd[25243]: Invalid user server from 46.101.32.38 port 51770 Jan 19 11:12:55 host sshd[25243]: input_userauth_request: invalid user server [preauth] Jan 19 11:12:55 host sshd[25243]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:12:55 host sshd[25243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.32.38 Jan 19 11:12:57 host sshd[25243]: Failed password for invalid user server from 46.101.32.38 port 51770 ssh2 Jan 19 11:12:57 host sshd[25243]: Received disconnect from 46.101.32.38 port 51770:11: Bye Bye [preauth] Jan 19 11:12:57 host sshd[25243]: Disconnected from 46.101.32.38 port 51770 [preauth] Jan 19 11:12:58 host sshd[25250]: Invalid user kira from 178.128.16.206 port 49772 Jan 19 11:12:58 host sshd[25250]: input_userauth_request: invalid user kira [preauth] Jan 19 11:12:58 host sshd[25250]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:12:58 host sshd[25250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.16.206 Jan 19 11:13:00 host sshd[25250]: Failed password for invalid user kira from 178.128.16.206 port 49772 ssh2 Jan 19 11:13:00 host sshd[25250]: Received disconnect from 178.128.16.206 port 49772:11: Bye Bye [preauth] Jan 19 11:13:00 host sshd[25250]: Disconnected from 178.128.16.206 port 49772 [preauth] Jan 19 11:16:04 host sshd[26021]: Did not receive identification string from 167.71.166.243 port 53436 Jan 19 11:16:48 host sshd[26113]: Invalid user rapport from 205.185.113.129 port 43416 Jan 19 11:16:48 host sshd[26113]: input_userauth_request: invalid user rapport [preauth] Jan 19 11:16:48 host sshd[26113]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:16:48 host sshd[26113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 19 11:16:49 host sshd[26113]: Failed password for invalid user rapport from 205.185.113.129 port 43416 ssh2 Jan 19 11:16:50 host sshd[26113]: Connection closed by 205.185.113.129 port 43416 [preauth] Jan 19 11:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 11:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 11:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 11:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 11:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 11:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 11:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=kottayamcalldriv user-2=phmetals user-3=gifterman user-4=palco123 user-5=mrsclean user-6=wwwnexidigital user-7=wwwevmhonda user-8=bonifacegroup user-9=wwwletsstalkfood user-10=straightcurve user-11=wwwtestugo user-12=shalinijames user-13=vfmassets user-14=pmcresources user-15=remysagr user-16=disposeat user-17=wwwkmaorg user-18=wwwkapin user-19=woodpeck user-20=travelboniface user-21=ugotscom user-22=wwwrmswll user-23=keralaholi user-24=wwwresourcehunte user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 11:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-kRLk75hwOGw8YNM9.~ Jan 19 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-kRLk75hwOGw8YNM9.~' Jan 19 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-kRLk75hwOGw8YNM9.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 11:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 11:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 11:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 11:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 11:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 11:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 11:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 11:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 11:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 11:24:45 host sshd[27983]: User root from 121.138.91.29 not allowed because not listed in AllowUsers Jan 19 11:24:45 host sshd[27983]: input_userauth_request: invalid user root [preauth] Jan 19 11:24:45 host unix_chkpwd[27986]: password check failed for user (root) Jan 19 11:24:45 host sshd[27983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.138.91.29 user=root Jan 19 11:24:45 host sshd[27983]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 11:24:47 host sshd[27983]: Failed password for invalid user root from 121.138.91.29 port 63014 ssh2 Jan 19 11:24:48 host unix_chkpwd[27996]: password check failed for user (root) Jan 19 11:24:48 host sshd[27983]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 11:24:50 host sshd[27983]: Failed password for invalid user root from 121.138.91.29 port 63014 ssh2 Jan 19 11:24:50 host unix_chkpwd[28002]: password check failed for user (root) Jan 19 11:24:50 host sshd[27983]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 11:24:53 host sshd[27983]: Failed password for invalid user root from 121.138.91.29 port 63014 ssh2 Jan 19 11:25:11 host sshd[28107]: Invalid user init from 195.226.194.242 port 59258 Jan 19 11:25:11 host sshd[28107]: input_userauth_request: invalid user init [preauth] Jan 19 11:25:11 host sshd[28107]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:25:11 host sshd[28107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 19 11:25:13 host sshd[28107]: Failed password for invalid user init from 195.226.194.242 port 59258 ssh2 Jan 19 11:25:13 host sshd[28107]: Received disconnect from 195.226.194.242 port 59258:11: Bye Bye [preauth] Jan 19 11:25:13 host sshd[28107]: Disconnected from 195.226.194.242 port 59258 [preauth] Jan 19 11:25:22 host sshd[28153]: Connection closed by 167.71.166.243 port 35424 [preauth] Jan 19 11:29:27 host sshd[28996]: Invalid user amssys from 117.186.96.54 port 64474 Jan 19 11:29:27 host sshd[28996]: input_userauth_request: invalid user amssys [preauth] Jan 19 11:29:27 host sshd[28996]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:29:27 host sshd[28996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.186.96.54 Jan 19 11:29:29 host sshd[28996]: Failed password for invalid user amssys from 117.186.96.54 port 64474 ssh2 Jan 19 11:29:29 host sshd[28996]: Received disconnect from 117.186.96.54 port 64474:11: Bye Bye [preauth] Jan 19 11:29:29 host sshd[28996]: Disconnected from 117.186.96.54 port 64474 [preauth] Jan 19 11:33:38 host sshd[29736]: Invalid user gj from 194.110.203.109 port 58316 Jan 19 11:33:38 host sshd[29736]: input_userauth_request: invalid user gj [preauth] Jan 19 11:33:38 host sshd[29736]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:33:38 host sshd[29736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 11:33:40 host sshd[29736]: Failed password for invalid user gj from 194.110.203.109 port 58316 ssh2 Jan 19 11:33:43 host sshd[29736]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:33:45 host sshd[29736]: Failed password for invalid user gj from 194.110.203.109 port 58316 ssh2 Jan 19 11:33:48 host sshd[29736]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:33:51 host sshd[29736]: Failed password for invalid user gj from 194.110.203.109 port 58316 ssh2 Jan 19 11:33:54 host sshd[29736]: Connection closed by 194.110.203.109 port 58316 [preauth] Jan 19 11:33:54 host sshd[29736]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 11:43:56 host sshd[31534]: User root from 122.117.90.144 not allowed because not listed in AllowUsers Jan 19 11:43:56 host sshd[31534]: input_userauth_request: invalid user root [preauth] Jan 19 11:43:56 host unix_chkpwd[31539]: password check failed for user (root) Jan 19 11:43:56 host sshd[31534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.90.144 user=root Jan 19 11:43:56 host sshd[31534]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 11:43:59 host sshd[31534]: Failed password for invalid user root from 122.117.90.144 port 34817 ssh2 Jan 19 11:43:59 host sshd[31534]: Connection reset by 122.117.90.144 port 34817 [preauth] Jan 19 11:45:10 host sshd[31740]: Invalid user admin from 14.53.134.163 port 40350 Jan 19 11:45:10 host sshd[31740]: input_userauth_request: invalid user admin [preauth] Jan 19 11:45:10 host sshd[31740]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:45:10 host sshd[31740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.53.134.163 Jan 19 11:45:12 host sshd[31740]: Failed password for invalid user admin from 14.53.134.163 port 40350 ssh2 Jan 19 11:45:13 host sshd[31740]: Failed password for invalid user admin from 14.53.134.163 port 40350 ssh2 Jan 19 11:45:13 host sshd[31740]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:45:15 host sshd[31740]: Failed password for invalid user admin from 14.53.134.163 port 40350 ssh2 Jan 19 11:45:16 host sshd[31740]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:45:18 host sshd[31740]: Failed password for invalid user admin from 14.53.134.163 port 40350 ssh2 Jan 19 11:45:19 host sshd[31740]: Connection reset by 14.53.134.163 port 40350 [preauth] Jan 19 11:45:19 host sshd[31740]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.53.134.163 Jan 19 11:45:37 host sshd[31893]: Connection reset by 183.104.215.10 port 41276 [preauth] Jan 19 11:47:39 host sshd[32313]: Did not receive identification string from 178.62.238.239 port 59935 Jan 19 11:47:40 host sshd[32315]: Invalid user steam from 178.62.238.239 port 60709 Jan 19 11:47:40 host sshd[32315]: input_userauth_request: invalid user steam [preauth] Jan 19 11:47:40 host sshd[32315]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:47:40 host sshd[32315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.238.239 Jan 19 11:47:42 host sshd[32315]: Failed password for invalid user steam from 178.62.238.239 port 60709 ssh2 Jan 19 11:47:43 host sshd[32315]: Connection closed by 178.62.238.239 port 60709 [preauth] Jan 19 11:48:12 host sshd[32391]: Invalid user solr from 117.186.96.54 port 58376 Jan 19 11:48:12 host sshd[32391]: input_userauth_request: invalid user solr [preauth] Jan 19 11:48:12 host sshd[32391]: pam_unix(sshd:auth): check pass; user unknown Jan 19 11:48:12 host sshd[32391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.186.96.54 Jan 19 11:48:14 host sshd[32391]: Failed password for invalid user solr from 117.186.96.54 port 58376 ssh2 Jan 19 11:48:15 host sshd[32391]: Received disconnect from 117.186.96.54 port 58376:11: Bye Bye [preauth] Jan 19 11:48:15 host sshd[32391]: Disconnected from 117.186.96.54 port 58376 [preauth] Jan 19 11:52:09 host sshd[812]: Did not receive identification string from 8.219.76.192 port 61000 Jan 19 12:00:02 host sshd[2092]: User root from 117.186.96.54 not allowed because not listed in AllowUsers Jan 19 12:00:02 host sshd[2092]: input_userauth_request: invalid user root [preauth] Jan 19 12:00:02 host unix_chkpwd[2108]: password check failed for user (root) Jan 19 12:00:02 host sshd[2092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.186.96.54 user=root Jan 19 12:00:02 host sshd[2092]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 12:00:04 host sshd[2092]: Failed password for invalid user root from 117.186.96.54 port 21353 ssh2 Jan 19 12:00:05 host sshd[2092]: Received disconnect from 117.186.96.54 port 21353:11: Bye Bye [preauth] Jan 19 12:00:05 host sshd[2092]: Disconnected from 117.186.96.54 port 21353 [preauth] Jan 19 12:10:26 host sshd[4833]: Invalid user zyfwp from 221.165.200.53 port 62403 Jan 19 12:10:26 host sshd[4833]: input_userauth_request: invalid user zyfwp [preauth] Jan 19 12:10:26 host sshd[4833]: pam_unix(sshd:auth): check pass; user unknown Jan 19 12:10:26 host sshd[4833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.165.200.53 Jan 19 12:10:28 host sshd[4833]: Failed password for invalid user zyfwp from 221.165.200.53 port 62403 ssh2 Jan 19 12:10:29 host sshd[4833]: Connection reset by 221.165.200.53 port 62403 [preauth] Jan 19 12:10:30 host sshd[4862]: Invalid user admin from 59.28.194.230 port 62608 Jan 19 12:10:30 host sshd[4862]: input_userauth_request: invalid user admin [preauth] Jan 19 12:10:30 host sshd[4862]: pam_unix(sshd:auth): check pass; user unknown Jan 19 12:10:30 host sshd[4862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.28.194.230 Jan 19 12:10:33 host sshd[4862]: Failed password for invalid user admin from 59.28.194.230 port 62608 ssh2 Jan 19 12:10:33 host sshd[4862]: Failed password for invalid user admin from 59.28.194.230 port 62608 ssh2 Jan 19 12:10:34 host sshd[4862]: pam_unix(sshd:auth): check pass; user unknown Jan 19 12:10:36 host sshd[4862]: Failed password for invalid user admin from 59.28.194.230 port 62608 ssh2 Jan 19 12:10:38 host sshd[4862]: pam_unix(sshd:auth): check pass; user unknown Jan 19 12:10:40 host sshd[4862]: Failed password for invalid user admin from 59.28.194.230 port 62608 ssh2 Jan 19 12:10:41 host sshd[4862]: pam_unix(sshd:auth): check pass; user unknown Jan 19 12:10:43 host sshd[4862]: Failed password for invalid user admin from 59.28.194.230 port 62608 ssh2 Jan 19 12:11:03 host sshd[4970]: Invalid user admin from 59.126.87.108 port 48843 Jan 19 12:11:03 host sshd[4970]: input_userauth_request: invalid user admin [preauth] Jan 19 12:11:03 host sshd[4970]: pam_unix(sshd:auth): check pass; user unknown Jan 19 12:11:03 host sshd[4970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.87.108 Jan 19 12:11:05 host sshd[4970]: Failed password for invalid user admin from 59.126.87.108 port 48843 ssh2 Jan 19 12:11:06 host sshd[4970]: Failed password for invalid user admin from 59.126.87.108 port 48843 ssh2 Jan 19 12:11:06 host sshd[4970]: pam_unix(sshd:auth): check pass; user unknown Jan 19 12:11:09 host sshd[4970]: Failed password for invalid user admin from 59.126.87.108 port 48843 ssh2 Jan 19 12:11:10 host sshd[4970]: pam_unix(sshd:auth): check pass; user unknown Jan 19 12:11:12 host sshd[4970]: Failed password for invalid user admin from 59.126.87.108 port 48843 ssh2 Jan 19 12:11:14 host sshd[4970]: pam_unix(sshd:auth): check pass; user unknown Jan 19 12:11:15 host sshd[4970]: Failed password for invalid user admin from 59.126.87.108 port 48843 ssh2 Jan 19 12:11:17 host sshd[4970]: pam_unix(sshd:auth): check pass; user unknown Jan 19 12:11:19 host sshd[4970]: Failed password for invalid user admin from 59.126.87.108 port 48843 ssh2 Jan 19 12:11:19 host sshd[4970]: error: maximum authentication attempts exceeded for invalid user admin from 59.126.87.108 port 48843 ssh2 [preauth] Jan 19 12:11:19 host sshd[4970]: Disconnecting: Too many authentication failures [preauth] Jan 19 12:11:19 host sshd[4970]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.87.108 Jan 19 12:11:19 host sshd[4970]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 19 12:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 12:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 12:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 12:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=a2zgroup user-3=dartsimp user-4=wwwkaretakers user-5=cochintaxi user-6=ugotscom user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=shalinijames user-14=wwwtestugo user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=wwwnexidigital user-22=mrsclean user-23=phmetals user-24=kottayamcalldriv user-25=palco123 user-26=gifterman user-27=wwwletsstalkfood user-28=straightcurve user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 12:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sbl4Cg2COJWjdcc8.~ Jan 19 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sbl4Cg2COJWjdcc8.~' Jan 19 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sbl4Cg2COJWjdcc8.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 12:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 12:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 12:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 12:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 12:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 12:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 12:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 12:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 12:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 12:26:38 host sshd[7365]: Connection closed by 45.79.181.223 port 24104 [preauth] Jan 19 12:26:40 host sshd[7371]: Connection closed by 45.79.181.223 port 37082 [preauth] Jan 19 12:26:43 host sshd[7380]: Connection closed by 45.79.181.223 port 37096 [preauth] Jan 19 12:27:47 host sshd[7518]: Invalid user prueba from 195.226.194.242 port 61194 Jan 19 12:27:47 host sshd[7518]: input_userauth_request: invalid user prueba [preauth] Jan 19 12:27:47 host sshd[7518]: pam_unix(sshd:auth): check pass; user unknown Jan 19 12:27:47 host sshd[7518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 19 12:27:48 host sshd[7518]: Failed password for invalid user prueba from 195.226.194.242 port 61194 ssh2 Jan 19 12:27:48 host sshd[7518]: Received disconnect from 195.226.194.242 port 61194:11: Bye Bye [preauth] Jan 19 12:27:48 host sshd[7518]: Disconnected from 195.226.194.242 port 61194 [preauth] Jan 19 12:28:30 host sshd[7630]: Invalid user sFTPUser from 220.135.198.206 port 33366 Jan 19 12:28:30 host sshd[7630]: input_userauth_request: invalid user sFTPUser [preauth] Jan 19 12:28:30 host sshd[7630]: pam_unix(sshd:auth): check pass; user unknown Jan 19 12:28:30 host sshd[7630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.198.206 Jan 19 12:28:32 host sshd[7630]: Failed password for invalid user sFTPUser from 220.135.198.206 port 33366 ssh2 Jan 19 12:28:33 host sshd[7630]: pam_unix(sshd:auth): check pass; user unknown Jan 19 12:28:34 host sshd[7630]: Failed password for invalid user sFTPUser from 220.135.198.206 port 33366 ssh2 Jan 19 12:28:35 host sshd[7630]: pam_unix(sshd:auth): check pass; user unknown Jan 19 12:28:36 host sshd[7630]: Failed password for invalid user sFTPUser from 220.135.198.206 port 33366 ssh2 Jan 19 12:28:37 host sshd[7630]: Failed password for invalid user sFTPUser from 220.135.198.206 port 33366 ssh2 Jan 19 12:28:38 host sshd[7630]: Connection reset by 220.135.198.206 port 33366 [preauth] Jan 19 12:28:38 host sshd[7630]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.198.206 Jan 19 12:37:09 host sshd[8893]: User root from 222.114.116.228 not allowed because not listed in AllowUsers Jan 19 12:37:09 host sshd[8893]: input_userauth_request: invalid user root [preauth] Jan 19 12:37:09 host unix_chkpwd[8896]: password check failed for user (root) Jan 19 12:37:09 host sshd[8893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.114.116.228 user=root Jan 19 12:37:09 host sshd[8893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 12:37:11 host sshd[8893]: Failed password for invalid user root from 222.114.116.228 port 63479 ssh2 Jan 19 12:37:11 host unix_chkpwd[8899]: password check failed for user (root) Jan 19 12:37:11 host sshd[8893]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 12:37:14 host sshd[8893]: Failed password for invalid user root from 222.114.116.228 port 63479 ssh2 Jan 19 12:39:46 host sshd[9195]: Invalid user usr from 171.250.47.132 port 57239 Jan 19 12:39:46 host sshd[9195]: input_userauth_request: invalid user usr [preauth] Jan 19 12:39:46 host sshd[9195]: pam_unix(sshd:auth): check pass; user unknown Jan 19 12:39:46 host sshd[9195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.250.47.132 Jan 19 12:39:48 host sshd[9195]: Failed password for invalid user usr from 171.250.47.132 port 57239 ssh2 Jan 19 12:39:50 host sshd[9195]: pam_unix(sshd:auth): check pass; user unknown Jan 19 12:39:51 host sshd[9195]: Failed password for invalid user usr from 171.250.47.132 port 57239 ssh2 Jan 19 12:39:52 host sshd[9195]: Connection reset by 171.250.47.132 port 57239 [preauth] Jan 19 12:39:52 host sshd[9195]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.250.47.132 Jan 19 12:58:34 host sshd[11739]: Connection closed by 188.255.125.201 port 33034 [preauth] Jan 19 13:00:11 host sshd[12128]: Connection reset by 122.117.72.55 port 52753 [preauth] Jan 19 13:01:01 host sshd[12235]: Invalid user pi from 125.228.183.102 port 51779 Jan 19 13:01:01 host sshd[12235]: input_userauth_request: invalid user pi [preauth] Jan 19 13:01:01 host sshd[12235]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:01:01 host sshd[12235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.183.102 Jan 19 13:01:04 host sshd[12235]: Failed password for invalid user pi from 125.228.183.102 port 51779 ssh2 Jan 19 13:01:04 host sshd[12235]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:01:06 host sshd[12235]: Failed password for invalid user pi from 125.228.183.102 port 51779 ssh2 Jan 19 13:01:07 host sshd[12235]: Connection reset by 125.228.183.102 port 51779 [preauth] Jan 19 13:01:07 host sshd[12235]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.183.102 Jan 19 13:02:04 host sshd[12394]: Invalid user dlxuser from 112.165.36.115 port 34586 Jan 19 13:02:04 host sshd[12394]: input_userauth_request: invalid user dlxuser [preauth] Jan 19 13:02:04 host sshd[12394]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:02:04 host sshd[12394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.165.36.115 Jan 19 13:02:06 host sshd[12394]: Failed password for invalid user dlxuser from 112.165.36.115 port 34586 ssh2 Jan 19 13:02:08 host sshd[12394]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:02:09 host sshd[12394]: Failed password for invalid user dlxuser from 112.165.36.115 port 34586 ssh2 Jan 19 13:02:10 host sshd[12394]: Failed password for invalid user dlxuser from 112.165.36.115 port 34586 ssh2 Jan 19 13:02:11 host sshd[12394]: Connection closed by 112.165.36.115 port 34586 [preauth] Jan 19 13:02:11 host sshd[12394]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.165.36.115 Jan 19 13:04:46 host sshd[12892]: Invalid user gitlab-runner from 112.185.172.12 port 63822 Jan 19 13:04:46 host sshd[12892]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 19 13:04:46 host sshd[12892]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:04:46 host sshd[12892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.185.172.12 Jan 19 13:04:48 host sshd[12892]: Failed password for invalid user gitlab-runner from 112.185.172.12 port 63822 ssh2 Jan 19 13:04:49 host sshd[12892]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:04:51 host sshd[12892]: Failed password for invalid user gitlab-runner from 112.185.172.12 port 63822 ssh2 Jan 19 13:04:51 host sshd[12892]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:04:53 host sshd[12892]: Failed password for invalid user gitlab-runner from 112.185.172.12 port 63822 ssh2 Jan 19 13:04:53 host sshd[12892]: Failed password for invalid user gitlab-runner from 112.185.172.12 port 63822 ssh2 Jan 19 13:04:54 host sshd[12892]: Connection closed by 112.185.172.12 port 63822 [preauth] Jan 19 13:04:54 host sshd[12892]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.185.172.12 Jan 19 13:12:26 host sshd[13997]: Invalid user chad from 107.189.30.59 port 46388 Jan 19 13:12:26 host sshd[13997]: input_userauth_request: invalid user chad [preauth] Jan 19 13:12:26 host sshd[13997]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:12:26 host sshd[13997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 19 13:12:28 host sshd[13997]: Failed password for invalid user chad from 107.189.30.59 port 46388 ssh2 Jan 19 13:12:29 host sshd[13997]: Connection closed by 107.189.30.59 port 46388 [preauth] Jan 19 13:15:02 host sshd[14301]: Did not receive identification string from 180.76.135.104 port 42678 Jan 19 13:15:04 host sshd[14311]: User root from 180.76.135.104 not allowed because not listed in AllowUsers Jan 19 13:15:04 host sshd[14311]: input_userauth_request: invalid user root [preauth] Jan 19 13:15:05 host unix_chkpwd[14359]: password check failed for user (root) Jan 19 13:15:05 host sshd[14311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.135.104 user=root Jan 19 13:15:05 host sshd[14311]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 13:15:05 host sshd[14314]: Invalid user admin from 180.76.135.104 port 45008 Jan 19 13:15:05 host sshd[14314]: input_userauth_request: invalid user admin [preauth] Jan 19 13:15:05 host sshd[14320]: Invalid user steam from 180.76.135.104 port 44976 Jan 19 13:15:05 host sshd[14320]: input_userauth_request: invalid user steam [preauth] Jan 19 13:15:05 host sshd[14351]: Invalid user test from 180.76.135.104 port 45046 Jan 19 13:15:05 host sshd[14351]: input_userauth_request: invalid user test [preauth] Jan 19 13:15:05 host sshd[14314]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:15:05 host sshd[14314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.135.104 Jan 19 13:15:05 host sshd[14321]: Invalid user ubuntu from 180.76.135.104 port 45044 Jan 19 13:15:05 host sshd[14321]: input_userauth_request: invalid user ubuntu [preauth] Jan 19 13:15:05 host sshd[14320]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:15:05 host sshd[14320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.135.104 Jan 19 13:15:05 host sshd[14315]: User root from 180.76.135.104 not allowed because not listed in AllowUsers Jan 19 13:15:05 host sshd[14315]: input_userauth_request: invalid user root [preauth] Jan 19 13:15:06 host sshd[14321]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:15:06 host sshd[14321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.135.104 Jan 19 13:15:06 host unix_chkpwd[14361]: password check failed for user (root) Jan 19 13:15:06 host sshd[14315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.135.104 user=root Jan 19 13:15:06 host sshd[14315]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 13:15:06 host sshd[14309]: Invalid user oracle from 180.76.135.104 port 45048 Jan 19 13:15:06 host sshd[14309]: input_userauth_request: invalid user oracle [preauth] Jan 19 13:15:06 host sshd[14309]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:15:06 host sshd[14309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.135.104 Jan 19 13:15:06 host sshd[14351]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:15:06 host sshd[14351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.135.104 Jan 19 13:15:06 host sshd[14312]: User root from 180.76.135.104 not allowed because not listed in AllowUsers Jan 19 13:15:06 host sshd[14312]: input_userauth_request: invalid user root [preauth] Jan 19 13:15:07 host unix_chkpwd[14362]: password check failed for user (root) Jan 19 13:15:07 host sshd[14312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.135.104 user=root Jan 19 13:15:07 host sshd[14312]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 13:15:07 host sshd[14311]: Failed password for invalid user root from 180.76.135.104 port 44994 ssh2 Jan 19 13:15:07 host sshd[14311]: Connection closed by 180.76.135.104 port 44994 [preauth] Jan 19 13:15:07 host sshd[14314]: Failed password for invalid user admin from 180.76.135.104 port 45008 ssh2 Jan 19 13:15:07 host sshd[14320]: Failed password for invalid user steam from 180.76.135.104 port 44976 ssh2 Jan 19 13:15:08 host sshd[14314]: Connection closed by 180.76.135.104 port 45008 [preauth] Jan 19 13:15:08 host sshd[14320]: Connection closed by 180.76.135.104 port 44976 [preauth] Jan 19 13:15:08 host sshd[14321]: Failed password for invalid user ubuntu from 180.76.135.104 port 45044 ssh2 Jan 19 13:15:08 host sshd[14315]: Failed password for invalid user root from 180.76.135.104 port 45004 ssh2 Jan 19 13:15:08 host sshd[14346]: Invalid user ubuntu from 180.76.135.104 port 45050 Jan 19 13:15:08 host sshd[14346]: input_userauth_request: invalid user ubuntu [preauth] Jan 19 13:15:08 host sshd[14321]: Connection closed by 180.76.135.104 port 45044 [preauth] Jan 19 13:15:08 host sshd[14315]: Connection closed by 180.76.135.104 port 45004 [preauth] Jan 19 13:15:08 host sshd[14346]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:15:08 host sshd[14346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.135.104 Jan 19 13:15:09 host sshd[14309]: Failed password for invalid user oracle from 180.76.135.104 port 45048 ssh2 Jan 19 13:15:09 host sshd[14351]: Failed password for invalid user test from 180.76.135.104 port 45046 ssh2 Jan 19 13:15:09 host sshd[14344]: Invalid user ubuntu from 180.76.135.104 port 45030 Jan 19 13:15:09 host sshd[14344]: input_userauth_request: invalid user ubuntu [preauth] Jan 19 13:15:09 host sshd[14347]: Invalid user test from 180.76.135.104 port 45010 Jan 19 13:15:09 host sshd[14347]: input_userauth_request: invalid user test [preauth] Jan 19 13:15:09 host sshd[14308]: Invalid user dmdba from 180.76.135.104 port 45032 Jan 19 13:15:09 host sshd[14308]: input_userauth_request: invalid user dmdba [preauth] Jan 19 13:15:09 host sshd[14309]: Connection closed by 180.76.135.104 port 45048 [preauth] Jan 19 13:15:09 host sshd[14351]: Connection closed by 180.76.135.104 port 45046 [preauth] Jan 19 13:15:09 host sshd[14344]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:15:09 host sshd[14344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.135.104 Jan 19 13:15:09 host sshd[14347]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:15:09 host sshd[14347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.135.104 Jan 19 13:15:09 host sshd[14308]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:15:09 host sshd[14308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.135.104 Jan 19 13:15:09 host sshd[14312]: Failed password for invalid user root from 180.76.135.104 port 44978 ssh2 Jan 19 13:15:09 host sshd[14350]: Invalid user ansible from 180.76.135.104 port 45038 Jan 19 13:15:09 host sshd[14350]: input_userauth_request: invalid user ansible [preauth] Jan 19 13:15:10 host sshd[14312]: Connection closed by 180.76.135.104 port 44978 [preauth] Jan 19 13:15:10 host sshd[14350]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:15:10 host sshd[14350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.135.104 Jan 19 13:15:11 host sshd[14346]: Failed password for invalid user ubuntu from 180.76.135.104 port 45050 ssh2 Jan 19 13:15:11 host sshd[14344]: Failed password for invalid user ubuntu from 180.76.135.104 port 45030 ssh2 Jan 19 13:15:11 host sshd[14347]: Failed password for invalid user test from 180.76.135.104 port 45010 ssh2 Jan 19 13:15:11 host sshd[14308]: Failed password for invalid user dmdba from 180.76.135.104 port 45032 ssh2 Jan 19 13:15:12 host sshd[14350]: Failed password for invalid user ansible from 180.76.135.104 port 45038 ssh2 Jan 19 13:16:06 host sshd[14612]: Invalid user steam from 211.185.212.124 port 36496 Jan 19 13:16:06 host sshd[14612]: input_userauth_request: invalid user steam [preauth] Jan 19 13:16:06 host sshd[14612]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:16:06 host sshd[14612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.185.212.124 Jan 19 13:16:08 host sshd[14612]: Failed password for invalid user steam from 211.185.212.124 port 36496 ssh2 Jan 19 13:16:09 host sshd[14612]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:16:10 host sshd[14612]: Failed password for invalid user steam from 211.185.212.124 port 36496 ssh2 Jan 19 13:16:12 host sshd[14612]: Failed password for invalid user steam from 211.185.212.124 port 36496 ssh2 Jan 19 13:16:12 host sshd[14612]: Connection closed by 211.185.212.124 port 36496 [preauth] Jan 19 13:16:12 host sshd[14612]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.185.212.124 Jan 19 13:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 13:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 13:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=wwwkmaorg user-4=disposeat user-5=remysagr user-6=pmcresources user-7=wwwtestugo user-8=shalinijames user-9=vfmassets user-10=straightcurve user-11=wwwletsstalkfood user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwnexidigital user-15=mrsclean user-16=phmetals user-17=kottayamcalldriv user-18=gifterman user-19=palco123 user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=ugotscom user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 13:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DYaDMNRxsWCPs7f5.~ Jan 19 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DYaDMNRxsWCPs7f5.~' Jan 19 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DYaDMNRxsWCPs7f5.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 13:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 13:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 13:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 13:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 13:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 13:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 13:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 13:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 13:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 13:25:22 host sshd[15993]: Invalid user gk from 194.110.203.109 port 52340 Jan 19 13:25:22 host sshd[15993]: input_userauth_request: invalid user gk [preauth] Jan 19 13:25:22 host sshd[15993]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:25:22 host sshd[15993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 13:25:24 host sshd[15993]: Failed password for invalid user gk from 194.110.203.109 port 52340 ssh2 Jan 19 13:25:28 host sshd[15993]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:25:30 host sshd[15993]: Failed password for invalid user gk from 194.110.203.109 port 52340 ssh2 Jan 19 13:25:33 host sshd[15993]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:25:35 host sshd[15993]: Failed password for invalid user gk from 194.110.203.109 port 52340 ssh2 Jan 19 13:25:38 host sshd[15993]: Connection closed by 194.110.203.109 port 52340 [preauth] Jan 19 13:25:38 host sshd[15993]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 13:28:54 host sshd[16577]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 19 13:28:54 host sshd[16577]: input_userauth_request: invalid user root [preauth] Jan 19 13:28:54 host unix_chkpwd[16580]: password check failed for user (root) Jan 19 13:28:54 host sshd[16577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 19 13:28:54 host sshd[16577]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 13:28:57 host sshd[16577]: Failed password for invalid user root from 195.226.194.242 port 23192 ssh2 Jan 19 13:28:57 host sshd[16577]: Received disconnect from 195.226.194.242 port 23192:11: Bye Bye [preauth] Jan 19 13:28:57 host sshd[16577]: Disconnected from 195.226.194.242 port 23192 [preauth] Jan 19 13:30:10 host sshd[16741]: Invalid user pi from 49.213.237.225 port 52796 Jan 19 13:30:10 host sshd[16741]: input_userauth_request: invalid user pi [preauth] Jan 19 13:30:10 host sshd[16741]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:30:10 host sshd[16741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.213.237.225 Jan 19 13:30:12 host sshd[16741]: Failed password for invalid user pi from 49.213.237.225 port 52796 ssh2 Jan 19 13:30:14 host sshd[16741]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:30:16 host sshd[16741]: Failed password for invalid user pi from 49.213.237.225 port 52796 ssh2 Jan 19 13:30:17 host sshd[16741]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:30:19 host sshd[16741]: Failed password for invalid user pi from 49.213.237.225 port 52796 ssh2 Jan 19 13:30:20 host sshd[16741]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:30:22 host sshd[16741]: Failed password for invalid user pi from 49.213.237.225 port 52796 ssh2 Jan 19 13:30:23 host sshd[16741]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:30:25 host sshd[16741]: Failed password for invalid user pi from 49.213.237.225 port 52796 ssh2 Jan 19 13:42:39 host sshd[18596]: Invalid user keith from 209.141.56.48 port 35550 Jan 19 13:42:39 host sshd[18596]: input_userauth_request: invalid user keith [preauth] Jan 19 13:42:39 host sshd[18596]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:42:39 host sshd[18596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 19 13:42:40 host sshd[18596]: Failed password for invalid user keith from 209.141.56.48 port 35550 ssh2 Jan 19 13:42:41 host sshd[18596]: Connection closed by 209.141.56.48 port 35550 [preauth] Jan 19 13:43:12 host sshd[18655]: Invalid user keith from 209.141.56.48 port 55284 Jan 19 13:43:12 host sshd[18655]: input_userauth_request: invalid user keith [preauth] Jan 19 13:43:12 host sshd[18655]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:12 host sshd[18655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 19 13:43:14 host sshd[18655]: Failed password for invalid user keith from 209.141.56.48 port 55284 ssh2 Jan 19 13:43:14 host sshd[18655]: Connection closed by 209.141.56.48 port 55284 [preauth] Jan 19 13:43:29 host sshd[18712]: Did not receive identification string from 59.120.155.106 port 33262 Jan 19 13:43:30 host sshd[18716]: Invalid user linaro from 59.120.155.106 port 33456 Jan 19 13:43:30 host sshd[18716]: input_userauth_request: invalid user linaro [preauth] Jan 19 13:43:30 host sshd[18714]: Invalid user guest from 59.120.155.106 port 33282 Jan 19 13:43:30 host sshd[18714]: input_userauth_request: invalid user guest [preauth] Jan 19 13:43:30 host sshd[18718]: Invalid user posiflex from 59.120.155.106 port 33296 Jan 19 13:43:30 host sshd[18718]: input_userauth_request: invalid user posiflex [preauth] Jan 19 13:43:30 host sshd[18719]: Invalid user git from 59.120.155.106 port 33478 Jan 19 13:43:30 host sshd[18719]: input_userauth_request: invalid user git [preauth] Jan 19 13:43:30 host sshd[18732]: Invalid user admin from 59.120.155.106 port 33468 Jan 19 13:43:30 host sshd[18732]: input_userauth_request: invalid user admin [preauth] Jan 19 13:43:30 host sshd[18730]: Invalid user es from 59.120.155.106 port 33560 Jan 19 13:43:30 host sshd[18730]: input_userauth_request: invalid user es [preauth] Jan 19 13:43:30 host sshd[18722]: Invalid user test from 59.120.155.106 port 33382 Jan 19 13:43:30 host sshd[18722]: input_userauth_request: invalid user test [preauth] Jan 19 13:43:30 host sshd[18720]: Invalid user elastic from 59.120.155.106 port 33352 Jan 19 13:43:30 host sshd[18720]: input_userauth_request: invalid user elastic [preauth] Jan 19 13:43:30 host sshd[18737]: User mysql from 59.120.155.106 not allowed because not listed in AllowUsers Jan 19 13:43:30 host sshd[18737]: input_userauth_request: invalid user mysql [preauth] Jan 19 13:43:30 host sshd[18715]: Invalid user admin from 59.120.155.106 port 33534 Jan 19 13:43:30 host sshd[18715]: input_userauth_request: invalid user admin [preauth] Jan 19 13:43:30 host sshd[18721]: Invalid user tester from 59.120.155.106 port 33418 Jan 19 13:43:30 host sshd[18721]: input_userauth_request: invalid user tester [preauth] Jan 19 13:43:30 host sshd[18725]: Invalid user guest from 59.120.155.106 port 33576 Jan 19 13:43:30 host sshd[18725]: input_userauth_request: invalid user guest [preauth] Jan 19 13:43:30 host sshd[18741]: Invalid user testuser from 59.120.155.106 port 33442 Jan 19 13:43:30 host sshd[18741]: input_userauth_request: invalid user testuser [preauth] Jan 19 13:43:30 host sshd[18738]: User centos from 59.120.155.106 not allowed because not listed in AllowUsers Jan 19 13:43:30 host sshd[18738]: input_userauth_request: invalid user centos [preauth] Jan 19 13:43:30 host sshd[18727]: Invalid user ec2-user from 59.120.155.106 port 33264 Jan 19 13:43:30 host sshd[18734]: Invalid user dmdba from 59.120.155.106 port 33438 Jan 19 13:43:30 host sshd[18734]: input_userauth_request: invalid user dmdba [preauth] Jan 19 13:43:30 host sshd[18727]: input_userauth_request: invalid user ec2-user [preauth] Jan 19 13:43:30 host sshd[18713]: Invalid user steam from 59.120.155.106 port 33342 Jan 19 13:43:30 host sshd[18713]: input_userauth_request: invalid user steam [preauth] Jan 19 13:43:30 host sshd[18740]: Invalid user user from 59.120.155.106 port 33310 Jan 19 13:43:30 host sshd[18742]: Invalid user dmdba from 59.120.155.106 port 33572 Jan 19 13:43:30 host sshd[18736]: Invalid user dockeradmin from 59.120.155.106 port 33374 Jan 19 13:43:30 host sshd[18742]: input_userauth_request: invalid user dmdba [preauth] Jan 19 13:43:30 host sshd[18740]: input_userauth_request: invalid user user [preauth] Jan 19 13:43:30 host sshd[18714]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18718]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18736]: input_userauth_request: invalid user dockeradmin [preauth] Jan 19 13:43:30 host sshd[18718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18726]: Invalid user user from 59.120.155.106 port 33270 Jan 19 13:43:30 host sshd[18726]: input_userauth_request: invalid user user [preauth] Jan 19 13:43:30 host sshd[18739]: Invalid user esuser from 59.120.155.106 port 33548 Jan 19 13:43:30 host sshd[18731]: Invalid user user from 59.120.155.106 port 33420 Jan 19 13:43:30 host sshd[18739]: input_userauth_request: invalid user esuser [preauth] Jan 19 13:43:30 host sshd[18731]: input_userauth_request: invalid user user [preauth] Jan 19 13:43:30 host sshd[18743]: Invalid user user from 59.120.155.106 port 33486 Jan 19 13:43:30 host sshd[18743]: input_userauth_request: invalid user user [preauth] Jan 19 13:43:30 host sshd[18732]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18719]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18716]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18722]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18724]: Invalid user mcserver from 59.120.155.106 port 33436 Jan 19 13:43:30 host sshd[18724]: input_userauth_request: invalid user mcserver [preauth] Jan 19 13:43:30 host sshd[18728]: Invalid user ansadmin from 59.120.155.106 port 33510 Jan 19 13:43:30 host sshd[18728]: input_userauth_request: invalid user ansadmin [preauth] Jan 19 13:43:30 host sshd[18735]: Invalid user ftpuser from 59.120.155.106 port 33322 Jan 19 13:43:30 host sshd[18735]: input_userauth_request: invalid user ftpuser [preauth] Jan 19 13:43:30 host sshd[18733]: Invalid user ansadmin from 59.120.155.106 port 33366 Jan 19 13:43:30 host sshd[18733]: input_userauth_request: invalid user ansadmin [preauth] Jan 19 13:43:30 host sshd[18723]: Invalid user ubuntu from 59.120.155.106 port 33526 Jan 19 13:43:30 host sshd[18723]: input_userauth_request: invalid user ubuntu [preauth] Jan 19 13:43:30 host sshd[18730]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18720]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host unix_chkpwd[18776]: password check failed for user (mysql) Jan 19 13:43:30 host sshd[18737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 user=mysql Jan 19 13:43:30 host sshd[18737]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 19 13:43:30 host sshd[18721]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18725]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18715]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18741]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18734]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18727]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host unix_chkpwd[18780]: password check failed for user (centos) Jan 19 13:43:30 host sshd[18738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 user=centos Jan 19 13:43:30 host sshd[18740]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18731]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18713]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18726]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18743]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18742]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18736]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18739]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18724]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18723]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18735]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18728]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:30 host sshd[18733]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:30 host sshd[18733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.155.106 Jan 19 13:43:32 host sshd[18714]: Failed password for invalid user guest from 59.120.155.106 port 33282 ssh2 Jan 19 13:43:32 host sshd[18718]: Failed password for invalid user posiflex from 59.120.155.106 port 33296 ssh2 Jan 19 13:43:32 host sshd[18732]: Failed password for invalid user admin from 59.120.155.106 port 33468 ssh2 Jan 19 13:43:32 host sshd[18719]: Failed password for invalid user git from 59.120.155.106 port 33478 ssh2 Jan 19 13:43:32 host sshd[18716]: Failed password for invalid user linaro from 59.120.155.106 port 33456 ssh2 Jan 19 13:43:32 host sshd[18722]: Failed password for invalid user test from 59.120.155.106 port 33382 ssh2 Jan 19 13:43:32 host sshd[18730]: Failed password for invalid user es from 59.120.155.106 port 33560 ssh2 Jan 19 13:43:32 host sshd[18720]: Failed password for invalid user elastic from 59.120.155.106 port 33352 ssh2 Jan 19 13:43:32 host sshd[18737]: Failed password for invalid user mysql from 59.120.155.106 port 33502 ssh2 Jan 19 13:43:32 host sshd[18721]: Failed password for invalid user tester from 59.120.155.106 port 33418 ssh2 Jan 19 13:43:32 host sshd[18725]: Failed password for invalid user guest from 59.120.155.106 port 33576 ssh2 Jan 19 13:43:32 host sshd[18715]: Failed password for invalid user admin from 59.120.155.106 port 33534 ssh2 Jan 19 13:43:33 host sshd[18741]: Failed password for invalid user testuser from 59.120.155.106 port 33442 ssh2 Jan 19 13:43:33 host sshd[18734]: Failed password for invalid user dmdba from 59.120.155.106 port 33438 ssh2 Jan 19 13:43:33 host sshd[18727]: Failed password for invalid user ec2-user from 59.120.155.106 port 33264 ssh2 Jan 19 13:43:33 host sshd[18738]: Failed password for invalid user centos from 59.120.155.106 port 33364 ssh2 Jan 19 13:43:33 host sshd[18740]: Failed password for invalid user user from 59.120.155.106 port 33310 ssh2 Jan 19 13:43:33 host sshd[18731]: Failed password for invalid user user from 59.120.155.106 port 33420 ssh2 Jan 19 13:43:33 host sshd[18713]: Failed password for invalid user steam from 59.120.155.106 port 33342 ssh2 Jan 19 13:43:33 host sshd[18726]: Failed password for invalid user user from 59.120.155.106 port 33270 ssh2 Jan 19 13:43:33 host sshd[18743]: Failed password for invalid user user from 59.120.155.106 port 33486 ssh2 Jan 19 13:43:33 host sshd[18742]: Failed password for invalid user dmdba from 59.120.155.106 port 33572 ssh2 Jan 19 13:43:33 host sshd[18736]: Failed password for invalid user dockeradmin from 59.120.155.106 port 33374 ssh2 Jan 19 13:43:33 host sshd[18739]: Failed password for invalid user esuser from 59.120.155.106 port 33548 ssh2 Jan 19 13:43:33 host sshd[18724]: Failed password for invalid user mcserver from 59.120.155.106 port 33436 ssh2 Jan 19 13:43:33 host sshd[18723]: Failed password for invalid user ubuntu from 59.120.155.106 port 33526 ssh2 Jan 19 13:43:33 host sshd[18735]: Failed password for invalid user ftpuser from 59.120.155.106 port 33322 ssh2 Jan 19 13:43:33 host sshd[18728]: Failed password for invalid user ansadmin from 59.120.155.106 port 33510 ssh2 Jan 19 13:43:33 host sshd[18733]: Failed password for invalid user ansadmin from 59.120.155.106 port 33366 ssh2 Jan 19 13:43:43 host sshd[18810]: Invalid user zyfwp from 152.250.50.179 port 40090 Jan 19 13:43:43 host sshd[18810]: input_userauth_request: invalid user zyfwp [preauth] Jan 19 13:43:43 host sshd[18810]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:43 host sshd[18810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.250.50.179 Jan 19 13:43:46 host sshd[18810]: Failed password for invalid user zyfwp from 152.250.50.179 port 40090 ssh2 Jan 19 13:43:47 host sshd[18810]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:48 host sshd[18810]: Failed password for invalid user zyfwp from 152.250.50.179 port 40090 ssh2 Jan 19 13:43:49 host sshd[18810]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:43:51 host sshd[18810]: Failed password for invalid user zyfwp from 152.250.50.179 port 40090 ssh2 Jan 19 13:43:52 host sshd[18810]: Connection closed by 152.250.50.179 port 40090 [preauth] Jan 19 13:43:52 host sshd[18810]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.250.50.179 Jan 19 13:50:36 host sshd[19903]: User root from 59.19.54.199 not allowed because not listed in AllowUsers Jan 19 13:50:36 host sshd[19903]: input_userauth_request: invalid user root [preauth] Jan 19 13:50:36 host unix_chkpwd[19922]: password check failed for user (root) Jan 19 13:50:36 host sshd[19903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.19.54.199 user=root Jan 19 13:50:36 host sshd[19903]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 13:50:37 host sshd[19919]: Invalid user admin from 138.68.176.196 port 45756 Jan 19 13:50:37 host sshd[19919]: input_userauth_request: invalid user admin [preauth] Jan 19 13:50:37 host sshd[19919]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:50:37 host sshd[19919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.176.196 Jan 19 13:50:38 host sshd[19903]: Failed password for invalid user root from 59.19.54.199 port 41482 ssh2 Jan 19 13:50:39 host sshd[19919]: Failed password for invalid user admin from 138.68.176.196 port 45756 ssh2 Jan 19 13:50:39 host sshd[19919]: Connection closed by 138.68.176.196 port 45756 [preauth] Jan 19 13:50:40 host unix_chkpwd[19927]: password check failed for user (root) Jan 19 13:50:40 host sshd[19903]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 13:50:42 host sshd[19903]: Failed password for invalid user root from 59.19.54.199 port 41482 ssh2 Jan 19 13:50:42 host sshd[19903]: Connection reset by 59.19.54.199 port 41482 [preauth] Jan 19 13:50:42 host sshd[19903]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.19.54.199 user=root Jan 19 13:52:34 host sshd[20120]: Invalid user admin from 125.228.158.220 port 43089 Jan 19 13:52:34 host sshd[20120]: input_userauth_request: invalid user admin [preauth] Jan 19 13:52:34 host sshd[20120]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:52:34 host sshd[20120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.158.220 Jan 19 13:52:36 host sshd[20120]: Failed password for invalid user admin from 125.228.158.220 port 43089 ssh2 Jan 19 13:52:37 host sshd[20120]: Failed password for invalid user admin from 125.228.158.220 port 43089 ssh2 Jan 19 13:52:38 host sshd[20120]: Connection reset by 125.228.158.220 port 43089 [preauth] Jan 19 13:59:08 host sshd[20965]: Invalid user ubnt from 121.186.6.200 port 59128 Jan 19 13:59:08 host sshd[20965]: input_userauth_request: invalid user ubnt [preauth] Jan 19 13:59:08 host sshd[20965]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:59:08 host sshd[20965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.186.6.200 Jan 19 13:59:10 host sshd[20965]: Failed password for invalid user ubnt from 121.186.6.200 port 59128 ssh2 Jan 19 13:59:15 host sshd[20972]: Invalid user bigipuser3 from 122.117.193.130 port 44141 Jan 19 13:59:15 host sshd[20972]: input_userauth_request: invalid user bigipuser3 [preauth] Jan 19 13:59:15 host sshd[20972]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:59:15 host sshd[20972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.193.130 Jan 19 13:59:17 host sshd[20972]: Failed password for invalid user bigipuser3 from 122.117.193.130 port 44141 ssh2 Jan 19 13:59:18 host sshd[20972]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:59:20 host sshd[20972]: Failed password for invalid user bigipuser3 from 122.117.193.130 port 44141 ssh2 Jan 19 13:59:21 host sshd[20972]: pam_unix(sshd:auth): check pass; user unknown Jan 19 13:59:23 host sshd[20972]: Failed password for invalid user bigipuser3 from 122.117.193.130 port 44141 ssh2 Jan 19 13:59:24 host sshd[20972]: Failed password for invalid user bigipuser3 from 122.117.193.130 port 44141 ssh2 Jan 19 13:59:24 host sshd[20972]: Connection reset by 122.117.193.130 port 44141 [preauth] Jan 19 13:59:24 host sshd[20972]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.193.130 Jan 19 14:00:19 host sshd[21226]: Invalid user sFTPUser from 114.34.150.178 port 52334 Jan 19 14:00:19 host sshd[21226]: input_userauth_request: invalid user sFTPUser [preauth] Jan 19 14:00:19 host sshd[21226]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:00:19 host sshd[21226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.150.178 Jan 19 14:00:21 host sshd[21226]: Failed password for invalid user sFTPUser from 114.34.150.178 port 52334 ssh2 Jan 19 14:00:22 host sshd[21226]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:00:24 host sshd[21226]: Failed password for invalid user sFTPUser from 114.34.150.178 port 52334 ssh2 Jan 19 14:00:26 host sshd[21226]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:00:28 host sshd[21226]: Failed password for invalid user sFTPUser from 114.34.150.178 port 52334 ssh2 Jan 19 14:00:29 host sshd[21226]: Failed password for invalid user sFTPUser from 114.34.150.178 port 52334 ssh2 Jan 19 14:00:30 host sshd[21226]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:00:33 host sshd[21226]: Failed password for invalid user sFTPUser from 114.34.150.178 port 52334 ssh2 Jan 19 14:08:40 host sshd[22344]: User root from 138.68.176.196 not allowed because not listed in AllowUsers Jan 19 14:08:40 host sshd[22344]: input_userauth_request: invalid user root [preauth] Jan 19 14:08:40 host unix_chkpwd[22347]: password check failed for user (root) Jan 19 14:08:40 host sshd[22344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.176.196 user=root Jan 19 14:08:40 host sshd[22344]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 14:08:43 host sshd[22344]: Failed password for invalid user root from 138.68.176.196 port 39174 ssh2 Jan 19 14:08:43 host sshd[22344]: Connection closed by 138.68.176.196 port 39174 [preauth] Jan 19 14:08:44 host sshd[22350]: User root from 138.68.176.196 not allowed because not listed in AllowUsers Jan 19 14:08:44 host sshd[22350]: input_userauth_request: invalid user root [preauth] Jan 19 14:08:45 host unix_chkpwd[22353]: password check failed for user (root) Jan 19 14:08:45 host sshd[22350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.176.196 user=root Jan 19 14:08:45 host sshd[22350]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 14:08:46 host sshd[22350]: Failed password for invalid user root from 138.68.176.196 port 39178 ssh2 Jan 19 14:11:04 host sshd[22774]: Invalid user keith from 209.141.56.48 port 58082 Jan 19 14:11:04 host sshd[22774]: input_userauth_request: invalid user keith [preauth] Jan 19 14:11:04 host sshd[22774]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:11:04 host sshd[22774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 19 14:11:06 host sshd[22774]: Failed password for invalid user keith from 209.141.56.48 port 58082 ssh2 Jan 19 14:11:06 host sshd[22774]: Connection closed by 209.141.56.48 port 58082 [preauth] Jan 19 14:15:34 host sshd[23327]: Did not receive identification string from 143.198.128.123 port 49600 Jan 19 14:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 14:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 14:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 14:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 14:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 14:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=shalinijames user-3=wwwtestugo user-4=vfmassets user-5=woodpeck user-6=wwwkapin user-7=wwwkmaorg user-8=disposeat user-9=remysagr user-10=wwwnexidigital user-11=mrsclean user-12=phmetals user-13=kottayamcalldriv user-14=palco123 user-15=gifterman user-16=straightcurve user-17=wwwletsstalkfood user-18=wwwevmhonda user-19=bonifacegroup user-20=laundryboniface user-21=a2zgroup user-22=dartsimp user-23=cochintaxi user-24=wwwkaretakers user-25=ugotscom user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 14:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 14:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-VxTkrVAb9b3AWFAR.~ Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-VxTkrVAb9b3AWFAR.~' Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-VxTkrVAb9b3AWFAR.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 14:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 14:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 14:22:43 host sshd[24615]: Connection reset by 78.193.208.86 port 43542 [preauth] Jan 19 14:23:35 host sshd[24709]: Invalid user hikvision from 210.186.189.33 port 47079 Jan 19 14:23:35 host sshd[24709]: input_userauth_request: invalid user hikvision [preauth] Jan 19 14:23:35 host sshd[24709]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:23:35 host sshd[24709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.186.189.33 Jan 19 14:23:37 host sshd[24709]: Failed password for invalid user hikvision from 210.186.189.33 port 47079 ssh2 Jan 19 14:23:37 host sshd[24709]: Connection reset by 210.186.189.33 port 47079 [preauth] Jan 19 14:30:08 host sshd[25541]: Invalid user oracle from 218.32.152.212 port 37630 Jan 19 14:30:08 host sshd[25541]: input_userauth_request: invalid user oracle [preauth] Jan 19 14:30:08 host sshd[25541]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:30:08 host sshd[25541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.32.152.212 Jan 19 14:30:10 host sshd[25541]: Failed password for invalid user oracle from 218.32.152.212 port 37630 ssh2 Jan 19 14:30:11 host sshd[25541]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:30:14 host sshd[25541]: Failed password for invalid user oracle from 218.32.152.212 port 37630 ssh2 Jan 19 14:30:14 host sshd[25541]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:30:16 host sshd[25541]: Failed password for invalid user oracle from 218.32.152.212 port 37630 ssh2 Jan 19 14:30:17 host sshd[25541]: Failed password for invalid user oracle from 218.32.152.212 port 37630 ssh2 Jan 19 14:30:18 host sshd[25541]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:30:20 host sshd[25541]: Failed password for invalid user oracle from 218.32.152.212 port 37630 ssh2 Jan 19 14:30:21 host sshd[25541]: Connection reset by 218.32.152.212 port 37630 [preauth] Jan 19 14:30:21 host sshd[25541]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.32.152.212 Jan 19 14:30:21 host sshd[25541]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 19 14:34:43 host sshd[26178]: Connection reset by 59.126.240.2 port 53203 [preauth] Jan 19 14:34:55 host sshd[26196]: Invalid user from 64.62.197.49 port 40839 Jan 19 14:34:55 host sshd[26196]: input_userauth_request: invalid user [preauth] Jan 19 14:34:59 host sshd[26196]: Connection closed by 64.62.197.49 port 40839 [preauth] Jan 19 14:38:59 host sshd[26795]: Invalid user cpd from 116.236.41.248 port 44106 Jan 19 14:38:59 host sshd[26795]: input_userauth_request: invalid user cpd [preauth] Jan 19 14:38:59 host sshd[26795]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:38:59 host sshd[26795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.41.248 Jan 19 14:39:01 host sshd[26795]: Failed password for invalid user cpd from 116.236.41.248 port 44106 ssh2 Jan 19 14:39:01 host sshd[26795]: Received disconnect from 116.236.41.248 port 44106:11: Bye Bye [preauth] Jan 19 14:39:01 host sshd[26795]: Disconnected from 116.236.41.248 port 44106 [preauth] Jan 19 14:40:07 host sshd[26946]: Invalid user newadmin from 59.111.231.241 port 56116 Jan 19 14:40:07 host sshd[26946]: input_userauth_request: invalid user newadmin [preauth] Jan 19 14:40:07 host sshd[26946]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:40:07 host sshd[26946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.111.231.241 Jan 19 14:40:09 host sshd[26946]: Failed password for invalid user newadmin from 59.111.231.241 port 56116 ssh2 Jan 19 14:40:10 host sshd[26946]: Received disconnect from 59.111.231.241 port 56116:11: Bye Bye [preauth] Jan 19 14:40:10 host sshd[26946]: Disconnected from 59.111.231.241 port 56116 [preauth] Jan 19 14:41:24 host sshd[27196]: Invalid user cloud from 95.0.15.234 port 13807 Jan 19 14:41:24 host sshd[27196]: input_userauth_request: invalid user cloud [preauth] Jan 19 14:41:24 host sshd[27196]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:41:24 host sshd[27196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.0.15.234 Jan 19 14:41:25 host sshd[27198]: Invalid user kafka from 190.191.23.210 port 51287 Jan 19 14:41:25 host sshd[27198]: input_userauth_request: invalid user kafka [preauth] Jan 19 14:41:25 host sshd[27198]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:41:25 host sshd[27198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.191.23.210 Jan 19 14:41:26 host sshd[27196]: Failed password for invalid user cloud from 95.0.15.234 port 13807 ssh2 Jan 19 14:41:27 host sshd[27196]: Received disconnect from 95.0.15.234 port 13807:11: Bye Bye [preauth] Jan 19 14:41:27 host sshd[27196]: Disconnected from 95.0.15.234 port 13807 [preauth] Jan 19 14:41:27 host sshd[27198]: Failed password for invalid user kafka from 190.191.23.210 port 51287 ssh2 Jan 19 14:41:27 host sshd[27198]: Received disconnect from 190.191.23.210 port 51287:11: Bye Bye [preauth] Jan 19 14:41:27 host sshd[27198]: Disconnected from 190.191.23.210 port 51287 [preauth] Jan 19 14:41:32 host sshd[27242]: Invalid user vbird4 from 92.46.108.20 port 43898 Jan 19 14:41:32 host sshd[27242]: input_userauth_request: invalid user vbird4 [preauth] Jan 19 14:41:32 host sshd[27242]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:41:32 host sshd[27242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Jan 19 14:41:34 host sshd[27242]: Failed password for invalid user vbird4 from 92.46.108.20 port 43898 ssh2 Jan 19 14:41:34 host sshd[27242]: Connection closed by 92.46.108.20 port 43898 [preauth] Jan 19 14:41:35 host sshd[27253]: Invalid user vagrant from 208.109.15.199 port 57404 Jan 19 14:41:35 host sshd[27253]: input_userauth_request: invalid user vagrant [preauth] Jan 19 14:41:35 host sshd[27253]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:41:35 host sshd[27253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.109.15.199 Jan 19 14:41:37 host sshd[27253]: Failed password for invalid user vagrant from 208.109.15.199 port 57404 ssh2 Jan 19 14:41:37 host sshd[27253]: Received disconnect from 208.109.15.199 port 57404:11: Bye Bye [preauth] Jan 19 14:41:37 host sshd[27253]: Disconnected from 208.109.15.199 port 57404 [preauth] Jan 19 14:43:51 host sshd[27818]: Invalid user test from 43.155.140.221 port 55958 Jan 19 14:43:51 host sshd[27818]: input_userauth_request: invalid user test [preauth] Jan 19 14:43:51 host sshd[27818]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:43:51 host sshd[27818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.140.221 Jan 19 14:43:53 host sshd[27818]: Failed password for invalid user test from 43.155.140.221 port 55958 ssh2 Jan 19 14:43:53 host sshd[27818]: Received disconnect from 43.155.140.221 port 55958:11: Bye Bye [preauth] Jan 19 14:43:53 host sshd[27818]: Disconnected from 43.155.140.221 port 55958 [preauth] Jan 19 14:45:15 host sshd[28121]: Invalid user max from 95.0.15.234 port 23403 Jan 19 14:45:15 host sshd[28121]: input_userauth_request: invalid user max [preauth] Jan 19 14:45:15 host sshd[28121]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:45:15 host sshd[28121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.0.15.234 Jan 19 14:45:17 host sshd[28121]: Failed password for invalid user max from 95.0.15.234 port 23403 ssh2 Jan 19 14:45:17 host sshd[28121]: Received disconnect from 95.0.15.234 port 23403:11: Bye Bye [preauth] Jan 19 14:45:17 host sshd[28121]: Disconnected from 95.0.15.234 port 23403 [preauth] Jan 19 14:45:23 host sshd[28149]: Invalid user arkserver from 208.109.15.199 port 40014 Jan 19 14:45:23 host sshd[28149]: input_userauth_request: invalid user arkserver [preauth] Jan 19 14:45:23 host sshd[28149]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:45:23 host sshd[28149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.109.15.199 Jan 19 14:45:25 host sshd[28149]: Failed password for invalid user arkserver from 208.109.15.199 port 40014 ssh2 Jan 19 14:45:25 host sshd[28149]: Received disconnect from 208.109.15.199 port 40014:11: Bye Bye [preauth] Jan 19 14:45:25 host sshd[28149]: Disconnected from 208.109.15.199 port 40014 [preauth] Jan 19 14:45:38 host sshd[28224]: Invalid user adsl from 43.155.140.221 port 42764 Jan 19 14:45:38 host sshd[28224]: input_userauth_request: invalid user adsl [preauth] Jan 19 14:45:38 host sshd[28224]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:45:38 host sshd[28224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.140.221 Jan 19 14:45:40 host sshd[28224]: Failed password for invalid user adsl from 43.155.140.221 port 42764 ssh2 Jan 19 14:45:40 host sshd[28224]: Received disconnect from 43.155.140.221 port 42764:11: Bye Bye [preauth] Jan 19 14:45:40 host sshd[28224]: Disconnected from 43.155.140.221 port 42764 [preauth] Jan 19 14:46:00 host sshd[28284]: Invalid user jboss from 190.191.23.210 port 50407 Jan 19 14:46:00 host sshd[28284]: input_userauth_request: invalid user jboss [preauth] Jan 19 14:46:00 host sshd[28284]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:46:00 host sshd[28284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.191.23.210 Jan 19 14:46:02 host sshd[28284]: Failed password for invalid user jboss from 190.191.23.210 port 50407 ssh2 Jan 19 14:46:03 host sshd[28284]: Received disconnect from 190.191.23.210 port 50407:11: Bye Bye [preauth] Jan 19 14:46:03 host sshd[28284]: Disconnected from 190.191.23.210 port 50407 [preauth] Jan 19 14:46:03 host sshd[28306]: Invalid user super from 220.135.89.182 port 33823 Jan 19 14:46:03 host sshd[28306]: input_userauth_request: invalid user super [preauth] Jan 19 14:46:04 host sshd[28306]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:46:04 host sshd[28306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.89.182 Jan 19 14:46:05 host sshd[28306]: Failed password for invalid user super from 220.135.89.182 port 33823 ssh2 Jan 19 14:46:06 host sshd[28306]: Connection reset by 220.135.89.182 port 33823 [preauth] Jan 19 14:46:13 host sshd[28348]: Invalid user smart from 116.236.41.248 port 44364 Jan 19 14:46:13 host sshd[28348]: input_userauth_request: invalid user smart [preauth] Jan 19 14:46:13 host sshd[28348]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:46:13 host sshd[28348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.41.248 Jan 19 14:46:15 host sshd[28348]: Failed password for invalid user smart from 116.236.41.248 port 44364 ssh2 Jan 19 14:46:15 host sshd[28348]: Received disconnect from 116.236.41.248 port 44364:11: Bye Bye [preauth] Jan 19 14:46:15 host sshd[28348]: Disconnected from 116.236.41.248 port 44364 [preauth] Jan 19 14:46:35 host sshd[28453]: Invalid user magento from 95.0.15.234 port 16364 Jan 19 14:46:35 host sshd[28453]: input_userauth_request: invalid user magento [preauth] Jan 19 14:46:35 host sshd[28453]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:46:35 host sshd[28453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.0.15.234 Jan 19 14:46:38 host sshd[28453]: Failed password for invalid user magento from 95.0.15.234 port 16364 ssh2 Jan 19 14:46:38 host sshd[28453]: Received disconnect from 95.0.15.234 port 16364:11: Bye Bye [preauth] Jan 19 14:46:38 host sshd[28453]: Disconnected from 95.0.15.234 port 16364 [preauth] Jan 19 14:46:42 host sshd[28508]: Invalid user teamspeak3 from 208.109.15.199 port 34600 Jan 19 14:46:42 host sshd[28508]: input_userauth_request: invalid user teamspeak3 [preauth] Jan 19 14:46:42 host sshd[28508]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:46:42 host sshd[28508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.109.15.199 Jan 19 14:46:45 host sshd[28508]: Failed password for invalid user teamspeak3 from 208.109.15.199 port 34600 ssh2 Jan 19 14:47:01 host sshd[28595]: Invalid user ts2 from 43.155.140.221 port 49960 Jan 19 14:47:01 host sshd[28595]: input_userauth_request: invalid user ts2 [preauth] Jan 19 14:47:01 host sshd[28595]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:47:01 host sshd[28595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.140.221 Jan 19 14:47:03 host sshd[28595]: Failed password for invalid user ts2 from 43.155.140.221 port 49960 ssh2 Jan 19 14:47:03 host sshd[28595]: Received disconnect from 43.155.140.221 port 49960:11: Bye Bye [preauth] Jan 19 14:47:03 host sshd[28595]: Disconnected from 43.155.140.221 port 49960 [preauth] Jan 19 14:47:10 host sshd[28762]: Invalid user remote from 116.236.41.248 port 32924 Jan 19 14:47:10 host sshd[28762]: input_userauth_request: invalid user remote [preauth] Jan 19 14:47:10 host sshd[28762]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:47:10 host sshd[28762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.41.248 Jan 19 14:47:12 host sshd[28762]: Failed password for invalid user remote from 116.236.41.248 port 32924 ssh2 Jan 19 14:47:12 host sshd[28762]: Received disconnect from 116.236.41.248 port 32924:11: Bye Bye [preauth] Jan 19 14:47:12 host sshd[28762]: Disconnected from 116.236.41.248 port 32924 [preauth] Jan 19 14:48:15 host sshd[29005]: Invalid user ts3server from 190.191.23.210 port 48968 Jan 19 14:48:15 host sshd[29005]: input_userauth_request: invalid user ts3server [preauth] Jan 19 14:48:15 host sshd[29005]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:48:15 host sshd[29005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.191.23.210 Jan 19 14:48:17 host sshd[29005]: Failed password for invalid user ts3server from 190.191.23.210 port 48968 ssh2 Jan 19 14:48:17 host sshd[29005]: Received disconnect from 190.191.23.210 port 48968:11: Bye Bye [preauth] Jan 19 14:48:17 host sshd[29005]: Disconnected from 190.191.23.210 port 48968 [preauth] Jan 19 14:48:59 host sshd[29198]: Invalid user tmax from 59.111.231.241 port 51012 Jan 19 14:48:59 host sshd[29198]: input_userauth_request: invalid user tmax [preauth] Jan 19 14:48:59 host sshd[29198]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:48:59 host sshd[29198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.111.231.241 Jan 19 14:49:01 host sshd[29198]: Failed password for invalid user tmax from 59.111.231.241 port 51012 ssh2 Jan 19 14:49:01 host sshd[29198]: Received disconnect from 59.111.231.241 port 51012:11: Bye Bye [preauth] Jan 19 14:49:01 host sshd[29198]: Disconnected from 59.111.231.241 port 51012 [preauth] Jan 19 14:49:34 host sshd[29315]: Invalid user jboss from 59.111.231.241 port 59796 Jan 19 14:49:34 host sshd[29315]: input_userauth_request: invalid user jboss [preauth] Jan 19 14:49:34 host sshd[29315]: pam_unix(sshd:auth): check pass; user unknown Jan 19 14:49:34 host sshd[29315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.111.231.241 Jan 19 14:49:37 host sshd[29315]: Failed password for invalid user jboss from 59.111.231.241 port 59796 ssh2 Jan 19 14:49:37 host sshd[29315]: Received disconnect from 59.111.231.241 port 59796:11: Bye Bye [preauth] Jan 19 14:49:37 host sshd[29315]: Disconnected from 59.111.231.241 port 59796 [preauth] Jan 19 14:49:45 host sshd[29367]: Did not receive identification string from 206.189.23.129 port 61000 Jan 19 15:02:41 host sshd[31528]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 19 15:02:41 host sshd[31528]: input_userauth_request: invalid user root [preauth] Jan 19 15:02:42 host unix_chkpwd[31531]: password check failed for user (root) Jan 19 15:02:42 host sshd[31528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 19 15:02:42 host sshd[31528]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 15:02:43 host sshd[31528]: Failed password for invalid user root from 195.226.194.242 port 18132 ssh2 Jan 19 15:02:44 host sshd[31528]: Received disconnect from 195.226.194.242 port 18132:11: Bye Bye [preauth] Jan 19 15:02:44 host sshd[31528]: Disconnected from 195.226.194.242 port 18132 [preauth] Jan 19 15:09:06 host sshd[32599]: Invalid user celery from 139.59.23.154 port 45296 Jan 19 15:09:06 host sshd[32599]: input_userauth_request: invalid user celery [preauth] Jan 19 15:09:06 host sshd[32599]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:09:06 host sshd[32599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.23.154 Jan 19 15:09:08 host sshd[32599]: Failed password for invalid user celery from 139.59.23.154 port 45296 ssh2 Jan 19 15:09:08 host sshd[32599]: Received disconnect from 139.59.23.154 port 45296:11: Bye Bye [preauth] Jan 19 15:09:08 host sshd[32599]: Disconnected from 139.59.23.154 port 45296 [preauth] Jan 19 15:09:22 host sshd[32618]: Invalid user admin from 73.248.213.94 port 55422 Jan 19 15:09:22 host sshd[32618]: input_userauth_request: invalid user admin [preauth] Jan 19 15:09:22 host sshd[32618]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:09:22 host sshd[32618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.248.213.94 Jan 19 15:09:23 host sshd[32618]: Failed password for invalid user admin from 73.248.213.94 port 55422 ssh2 Jan 19 15:09:24 host sshd[32618]: Failed password for invalid user admin from 73.248.213.94 port 55422 ssh2 Jan 19 15:09:24 host sshd[32618]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:09:27 host sshd[32618]: Failed password for invalid user admin from 73.248.213.94 port 55422 ssh2 Jan 19 15:09:27 host sshd[32618]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:09:29 host sshd[32618]: Failed password for invalid user admin from 73.248.213.94 port 55422 ssh2 Jan 19 15:09:32 host sshd[32618]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:09:34 host sshd[32618]: Failed password for invalid user admin from 73.248.213.94 port 55422 ssh2 Jan 19 15:09:44 host sshd[32706]: Invalid user soporte from 46.105.29.159 port 58222 Jan 19 15:09:44 host sshd[32706]: input_userauth_request: invalid user soporte [preauth] Jan 19 15:09:44 host sshd[32706]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:09:44 host sshd[32706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.29.159 Jan 19 15:09:46 host sshd[32706]: Failed password for invalid user soporte from 46.105.29.159 port 58222 ssh2 Jan 19 15:09:46 host sshd[32706]: Received disconnect from 46.105.29.159 port 58222:11: Bye Bye [preauth] Jan 19 15:09:46 host sshd[32706]: Disconnected from 46.105.29.159 port 58222 [preauth] Jan 19 15:09:47 host sshd[32710]: Connection reset by 125.229.130.156 port 41352 [preauth] Jan 19 15:10:20 host sshd[355]: Invalid user jason from 176.10.207.140 port 36628 Jan 19 15:10:20 host sshd[355]: input_userauth_request: invalid user jason [preauth] Jan 19 15:10:20 host sshd[355]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:10:20 host sshd[355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.10.207.140 Jan 19 15:10:23 host sshd[355]: Failed password for invalid user jason from 176.10.207.140 port 36628 ssh2 Jan 19 15:10:23 host sshd[355]: Received disconnect from 176.10.207.140 port 36628:11: Bye Bye [preauth] Jan 19 15:10:23 host sshd[355]: Disconnected from 176.10.207.140 port 36628 [preauth] Jan 19 15:11:06 host sshd[472]: Invalid user celery from 50.193.220.21 port 40660 Jan 19 15:11:06 host sshd[472]: input_userauth_request: invalid user celery [preauth] Jan 19 15:11:06 host sshd[472]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:11:06 host sshd[472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.193.220.21 Jan 19 15:11:08 host sshd[472]: Failed password for invalid user celery from 50.193.220.21 port 40660 ssh2 Jan 19 15:11:08 host sshd[472]: Received disconnect from 50.193.220.21 port 40660:11: Bye Bye [preauth] Jan 19 15:11:08 host sshd[472]: Disconnected from 50.193.220.21 port 40660 [preauth] Jan 19 15:13:03 host sshd[745]: Invalid user elastic from 165.227.140.53 port 54546 Jan 19 15:13:03 host sshd[745]: input_userauth_request: invalid user elastic [preauth] Jan 19 15:13:03 host sshd[745]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:13:03 host sshd[745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.140.53 Jan 19 15:13:05 host sshd[745]: Failed password for invalid user elastic from 165.227.140.53 port 54546 ssh2 Jan 19 15:13:06 host sshd[745]: Received disconnect from 165.227.140.53 port 54546:11: Bye Bye [preauth] Jan 19 15:13:06 host sshd[745]: Disconnected from 165.227.140.53 port 54546 [preauth] Jan 19 15:13:46 host sshd[940]: Invalid user jupyter from 165.154.224.80 port 39360 Jan 19 15:13:46 host sshd[940]: input_userauth_request: invalid user jupyter [preauth] Jan 19 15:13:46 host sshd[940]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:13:46 host sshd[940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.224.80 Jan 19 15:13:48 host sshd[940]: Failed password for invalid user jupyter from 165.154.224.80 port 39360 ssh2 Jan 19 15:13:48 host sshd[940]: Received disconnect from 165.154.224.80 port 39360:11: Bye Bye [preauth] Jan 19 15:13:48 host sshd[940]: Disconnected from 165.154.224.80 port 39360 [preauth] Jan 19 15:13:59 host sshd[965]: Invalid user sam from 122.168.194.41 port 54870 Jan 19 15:13:59 host sshd[965]: input_userauth_request: invalid user sam [preauth] Jan 19 15:13:59 host sshd[965]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:13:59 host sshd[965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.168.194.41 Jan 19 15:14:02 host sshd[965]: Failed password for invalid user sam from 122.168.194.41 port 54870 ssh2 Jan 19 15:14:02 host sshd[965]: Received disconnect from 122.168.194.41 port 54870:11: Bye Bye [preauth] Jan 19 15:14:02 host sshd[965]: Disconnected from 122.168.194.41 port 54870 [preauth] Jan 19 15:14:13 host sshd[993]: Invalid user sinusbot from 176.10.207.140 port 33068 Jan 19 15:14:13 host sshd[993]: input_userauth_request: invalid user sinusbot [preauth] Jan 19 15:14:13 host sshd[993]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:14:13 host sshd[993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.10.207.140 Jan 19 15:14:16 host sshd[993]: Failed password for invalid user sinusbot from 176.10.207.140 port 33068 ssh2 Jan 19 15:14:16 host sshd[993]: Received disconnect from 176.10.207.140 port 33068:11: Bye Bye [preauth] Jan 19 15:14:16 host sshd[993]: Disconnected from 176.10.207.140 port 33068 [preauth] Jan 19 15:14:35 host sshd[1044]: Invalid user virl from 46.105.29.159 port 44974 Jan 19 15:14:35 host sshd[1044]: input_userauth_request: invalid user virl [preauth] Jan 19 15:14:35 host sshd[1044]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:14:35 host sshd[1044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.29.159 Jan 19 15:14:37 host sshd[1044]: Failed password for invalid user virl from 46.105.29.159 port 44974 ssh2 Jan 19 15:14:38 host sshd[1044]: Received disconnect from 46.105.29.159 port 44974:11: Bye Bye [preauth] Jan 19 15:14:38 host sshd[1044]: Disconnected from 46.105.29.159 port 44974 [preauth] Jan 19 15:14:43 host sshd[1061]: Invalid user redis from 187.243.248.114 port 48720 Jan 19 15:14:43 host sshd[1061]: input_userauth_request: invalid user redis [preauth] Jan 19 15:14:43 host sshd[1061]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:14:43 host sshd[1061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.243.248.114 Jan 19 15:14:45 host sshd[1061]: Failed password for invalid user redis from 187.243.248.114 port 48720 ssh2 Jan 19 15:14:46 host sshd[1061]: Received disconnect from 187.243.248.114 port 48720:11: Bye Bye [preauth] Jan 19 15:14:46 host sshd[1061]: Disconnected from 187.243.248.114 port 48720 [preauth] Jan 19 15:14:47 host sshd[1067]: Invalid user tom from 50.193.220.21 port 55948 Jan 19 15:14:47 host sshd[1067]: input_userauth_request: invalid user tom [preauth] Jan 19 15:14:47 host sshd[1067]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:14:47 host sshd[1067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.193.220.21 Jan 19 15:14:49 host sshd[1067]: Failed password for invalid user tom from 50.193.220.21 port 55948 ssh2 Jan 19 15:14:49 host sshd[1067]: Received disconnect from 50.193.220.21 port 55948:11: Bye Bye [preauth] Jan 19 15:14:49 host sshd[1067]: Disconnected from 50.193.220.21 port 55948 [preauth] Jan 19 15:15:25 host sshd[1156]: Invalid user alice from 176.10.207.140 port 57498 Jan 19 15:15:25 host sshd[1156]: input_userauth_request: invalid user alice [preauth] Jan 19 15:15:25 host sshd[1156]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:15:25 host sshd[1156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.10.207.140 Jan 19 15:15:27 host sshd[1156]: Failed password for invalid user alice from 176.10.207.140 port 57498 ssh2 Jan 19 15:15:27 host sshd[1156]: Received disconnect from 176.10.207.140 port 57498:11: Bye Bye [preauth] Jan 19 15:15:27 host sshd[1156]: Disconnected from 176.10.207.140 port 57498 [preauth] Jan 19 15:15:42 host sshd[1252]: Invalid user jason from 122.168.194.41 port 33626 Jan 19 15:15:42 host sshd[1252]: input_userauth_request: invalid user jason [preauth] Jan 19 15:15:42 host sshd[1252]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:15:42 host sshd[1252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.168.194.41 Jan 19 15:15:44 host sshd[1252]: Failed password for invalid user jason from 122.168.194.41 port 33626 ssh2 Jan 19 15:15:44 host sshd[1252]: Received disconnect from 122.168.194.41 port 33626:11: Bye Bye [preauth] Jan 19 15:15:44 host sshd[1252]: Disconnected from 122.168.194.41 port 33626 [preauth] Jan 19 15:15:45 host sshd[1259]: Invalid user demo from 46.105.29.159 port 40432 Jan 19 15:15:45 host sshd[1259]: input_userauth_request: invalid user demo [preauth] Jan 19 15:15:45 host sshd[1259]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:15:45 host sshd[1259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.29.159 Jan 19 15:15:47 host sshd[1259]: Failed password for invalid user demo from 46.105.29.159 port 40432 ssh2 Jan 19 15:15:47 host sshd[1259]: Received disconnect from 46.105.29.159 port 40432:11: Bye Bye [preauth] Jan 19 15:15:47 host sshd[1259]: Disconnected from 46.105.29.159 port 40432 [preauth] Jan 19 15:15:47 host sshd[1265]: Invalid user cashier from 165.154.224.80 port 14850 Jan 19 15:15:47 host sshd[1265]: input_userauth_request: invalid user cashier [preauth] Jan 19 15:15:47 host sshd[1265]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:15:47 host sshd[1265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.224.80 Jan 19 15:15:49 host sshd[1265]: Failed password for invalid user cashier from 165.154.224.80 port 14850 ssh2 Jan 19 15:15:49 host sshd[1265]: Received disconnect from 165.154.224.80 port 14850:11: Bye Bye [preauth] Jan 19 15:15:49 host sshd[1265]: Disconnected from 165.154.224.80 port 14850 [preauth] Jan 19 15:15:58 host sshd[1316]: Invalid user vss from 50.193.220.21 port 54738 Jan 19 15:15:58 host sshd[1316]: input_userauth_request: invalid user vss [preauth] Jan 19 15:15:58 host sshd[1316]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:15:58 host sshd[1316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.193.220.21 Jan 19 15:15:59 host sshd[1316]: Failed password for invalid user vss from 50.193.220.21 port 54738 ssh2 Jan 19 15:16:15 host sshd[1395]: Invalid user gl from 194.110.203.109 port 51446 Jan 19 15:16:15 host sshd[1395]: input_userauth_request: invalid user gl [preauth] Jan 19 15:16:15 host sshd[1395]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:16:15 host sshd[1395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 15:16:16 host sshd[1395]: Failed password for invalid user gl from 194.110.203.109 port 51446 ssh2 Jan 19 15:16:20 host sshd[1395]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:16:22 host sshd[1395]: Failed password for invalid user gl from 194.110.203.109 port 51446 ssh2 Jan 19 15:16:25 host sshd[1395]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:16:25 host sshd[1414]: Invalid user admin1 from 187.243.248.114 port 55124 Jan 19 15:16:25 host sshd[1414]: input_userauth_request: invalid user admin1 [preauth] Jan 19 15:16:25 host sshd[1414]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:16:25 host sshd[1414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.243.248.114 Jan 19 15:16:28 host sshd[1395]: Failed password for invalid user gl from 194.110.203.109 port 51446 ssh2 Jan 19 15:16:28 host sshd[1414]: Failed password for invalid user admin1 from 187.243.248.114 port 55124 ssh2 Jan 19 15:16:28 host sshd[1414]: Received disconnect from 187.243.248.114 port 55124:11: Bye Bye [preauth] Jan 19 15:16:28 host sshd[1414]: Disconnected from 187.243.248.114 port 55124 [preauth] Jan 19 15:16:31 host sshd[1395]: Connection closed by 194.110.203.109 port 51446 [preauth] Jan 19 15:16:31 host sshd[1395]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 15:16:39 host sshd[1468]: Invalid user jeremy from 139.59.23.154 port 48442 Jan 19 15:16:39 host sshd[1468]: input_userauth_request: invalid user jeremy [preauth] Jan 19 15:16:39 host sshd[1468]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:16:39 host sshd[1468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.23.154 Jan 19 15:16:40 host sshd[1460]: Invalid user kali from 165.227.140.53 port 51720 Jan 19 15:16:40 host sshd[1460]: input_userauth_request: invalid user kali [preauth] Jan 19 15:16:40 host sshd[1460]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:16:40 host sshd[1460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.140.53 Jan 19 15:16:41 host sshd[1460]: Failed password for invalid user kali from 165.227.140.53 port 51720 ssh2 Jan 19 15:16:42 host sshd[1460]: Received disconnect from 165.227.140.53 port 51720:11: Bye Bye [preauth] Jan 19 15:16:42 host sshd[1460]: Disconnected from 165.227.140.53 port 51720 [preauth] Jan 19 15:16:42 host sshd[1468]: Failed password for invalid user jeremy from 139.59.23.154 port 48442 ssh2 Jan 19 15:16:42 host sshd[1468]: Received disconnect from 139.59.23.154 port 48442:11: Bye Bye [preauth] Jan 19 15:16:42 host sshd[1468]: Disconnected from 139.59.23.154 port 48442 [preauth] Jan 19 15:17:08 host sshd[1526]: Invalid user web from 122.168.194.41 port 50846 Jan 19 15:17:08 host sshd[1526]: input_userauth_request: invalid user web [preauth] Jan 19 15:17:08 host sshd[1526]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:17:08 host sshd[1526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.168.194.41 Jan 19 15:17:11 host sshd[1526]: Failed password for invalid user web from 122.168.194.41 port 50846 ssh2 Jan 19 15:17:23 host sshd[1593]: Invalid user tech from 165.154.224.80 port 41862 Jan 19 15:17:23 host sshd[1593]: input_userauth_request: invalid user tech [preauth] Jan 19 15:17:23 host sshd[1593]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:17:23 host sshd[1593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.224.80 Jan 19 15:17:25 host sshd[1593]: Failed password for invalid user tech from 165.154.224.80 port 41862 ssh2 Jan 19 15:18:04 host sshd[1732]: Invalid user info from 187.243.248.114 port 36234 Jan 19 15:18:04 host sshd[1732]: input_userauth_request: invalid user info [preauth] Jan 19 15:18:04 host sshd[1732]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:18:04 host sshd[1732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.243.248.114 Jan 19 15:18:06 host sshd[1732]: Failed password for invalid user info from 187.243.248.114 port 36234 ssh2 Jan 19 15:18:07 host sshd[1732]: Received disconnect from 187.243.248.114 port 36234:11: Bye Bye [preauth] Jan 19 15:18:07 host sshd[1732]: Disconnected from 187.243.248.114 port 36234 [preauth] Jan 19 15:18:08 host sshd[1740]: User tomcat from 165.227.140.53 not allowed because not listed in AllowUsers Jan 19 15:18:08 host sshd[1740]: input_userauth_request: invalid user tomcat [preauth] Jan 19 15:18:08 host unix_chkpwd[1745]: password check failed for user (tomcat) Jan 19 15:18:08 host sshd[1740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.140.53 user=tomcat Jan 19 15:18:08 host sshd[1740]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "tomcat" Jan 19 15:18:10 host sshd[1740]: Failed password for invalid user tomcat from 165.227.140.53 port 58472 ssh2 Jan 19 15:18:24 host sshd[1873]: Invalid user esuser from 139.59.23.154 port 46504 Jan 19 15:18:24 host sshd[1873]: input_userauth_request: invalid user esuser [preauth] Jan 19 15:18:24 host sshd[1873]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:18:24 host sshd[1873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.23.154 Jan 19 15:18:26 host sshd[1873]: Failed password for invalid user esuser from 139.59.23.154 port 46504 ssh2 Jan 19 15:18:26 host sshd[1873]: Received disconnect from 139.59.23.154 port 46504:11: Bye Bye [preauth] Jan 19 15:18:26 host sshd[1873]: Disconnected from 139.59.23.154 port 46504 [preauth] Jan 19 15:18:53 host sshd[2125]: Invalid user qsrv from 205.185.113.129 port 58108 Jan 19 15:18:53 host sshd[2125]: input_userauth_request: invalid user qsrv [preauth] Jan 19 15:18:53 host sshd[2125]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:18:53 host sshd[2125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 19 15:18:55 host sshd[2125]: Failed password for invalid user qsrv from 205.185.113.129 port 58108 ssh2 Jan 19 15:18:56 host sshd[2125]: Connection closed by 205.185.113.129 port 58108 [preauth] Jan 19 15:20:47 host sshd[2416]: Invalid user admin1 from 41.170.14.90 port 57537 Jan 19 15:20:47 host sshd[2416]: input_userauth_request: invalid user admin1 [preauth] Jan 19 15:20:47 host sshd[2416]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:20:47 host sshd[2416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.170.14.90 Jan 19 15:20:49 host sshd[2416]: Failed password for invalid user admin1 from 41.170.14.90 port 57537 ssh2 Jan 19 15:20:50 host sshd[2416]: Received disconnect from 41.170.14.90 port 57537:11: Bye Bye [preauth] Jan 19 15:20:50 host sshd[2416]: Disconnected from 41.170.14.90 port 57537 [preauth] Jan 19 15:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 15:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 15:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=gifterman user-2=palco123 user-3=phmetals user-4=kottayamcalldriv user-5=mrsclean user-6=wwwnexidigital user-7=bonifacegroup user-8=wwwevmhonda user-9=wwwletsstalkfood user-10=straightcurve user-11=vfmassets user-12=wwwtestugo user-13=shalinijames user-14=pmcresources user-15=remysagr user-16=disposeat user-17=wwwkmaorg user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=wwwrmswll user-22=wwwresourcehunte user-23=keralaholi user-24=ugotscom user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 15:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ldVEzhdLjgANAuD3.~ Jan 19 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ldVEzhdLjgANAuD3.~' Jan 19 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ldVEzhdLjgANAuD3.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 15:21:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 15:21:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 15:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 15:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 15:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 15:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 15:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 15:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 15:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 15:22:08 host sshd[2831]: User root from 220.121.65.85 not allowed because not listed in AllowUsers Jan 19 15:22:08 host sshd[2831]: input_userauth_request: invalid user root [preauth] Jan 19 15:22:08 host unix_chkpwd[2837]: password check failed for user (root) Jan 19 15:22:08 host sshd[2831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.121.65.85 user=root Jan 19 15:22:08 host sshd[2831]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 15:22:10 host sshd[2831]: Failed password for invalid user root from 220.121.65.85 port 49206 ssh2 Jan 19 15:22:11 host unix_chkpwd[2842]: password check failed for user (root) Jan 19 15:22:11 host sshd[2831]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 15:22:13 host sshd[2831]: Failed password for invalid user root from 220.121.65.85 port 49206 ssh2 Jan 19 15:22:14 host unix_chkpwd[2848]: password check failed for user (root) Jan 19 15:22:14 host sshd[2831]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 15:22:16 host sshd[2831]: Failed password for invalid user root from 220.121.65.85 port 49206 ssh2 Jan 19 15:24:40 host sshd[3247]: Invalid user admin from 61.63.228.122 port 58017 Jan 19 15:24:40 host sshd[3247]: input_userauth_request: invalid user admin [preauth] Jan 19 15:24:40 host sshd[3247]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:24:40 host sshd[3247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.63.228.122 Jan 19 15:24:41 host sshd[3247]: Failed password for invalid user admin from 61.63.228.122 port 58017 ssh2 Jan 19 15:24:42 host sshd[3247]: Failed password for invalid user admin from 61.63.228.122 port 58017 ssh2 Jan 19 15:24:42 host sshd[3247]: Connection reset by 61.63.228.122 port 58017 [preauth] Jan 19 15:25:53 host sshd[3459]: Invalid user ts2 from 41.170.14.90 port 50271 Jan 19 15:25:53 host sshd[3459]: input_userauth_request: invalid user ts2 [preauth] Jan 19 15:25:53 host sshd[3459]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:25:53 host sshd[3459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.170.14.90 Jan 19 15:25:55 host sshd[3459]: Failed password for invalid user ts2 from 41.170.14.90 port 50271 ssh2 Jan 19 15:25:55 host sshd[3459]: Received disconnect from 41.170.14.90 port 50271:11: Bye Bye [preauth] Jan 19 15:25:55 host sshd[3459]: Disconnected from 41.170.14.90 port 50271 [preauth] Jan 19 15:28:19 host sshd[3728]: Invalid user info from 41.170.14.90 port 44696 Jan 19 15:28:19 host sshd[3728]: input_userauth_request: invalid user info [preauth] Jan 19 15:28:19 host sshd[3728]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:28:19 host sshd[3728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.170.14.90 Jan 19 15:28:20 host sshd[3728]: Failed password for invalid user info from 41.170.14.90 port 44696 ssh2 Jan 19 15:32:37 host sshd[4368]: Invalid user admin from 195.226.194.242 port 53974 Jan 19 15:32:37 host sshd[4368]: input_userauth_request: invalid user admin [preauth] Jan 19 15:32:37 host sshd[4368]: pam_unix(sshd:auth): check pass; user unknown Jan 19 15:32:37 host sshd[4368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 19 15:32:39 host sshd[4368]: Failed password for invalid user admin from 195.226.194.242 port 53974 ssh2 Jan 19 15:32:39 host sshd[4368]: Received disconnect from 195.226.194.242 port 53974:11: Bye Bye [preauth] Jan 19 15:32:39 host sshd[4368]: Disconnected from 195.226.194.242 port 53974 [preauth] Jan 19 15:44:44 host sshd[6002]: Connection reset by 96.66.141.130 port 62727 [preauth] Jan 19 16:02:23 host sshd[8626]: Invalid user super from 121.149.93.24 port 33718 Jan 19 16:02:23 host sshd[8626]: input_userauth_request: invalid user super [preauth] Jan 19 16:02:23 host sshd[8626]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:02:23 host sshd[8626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.149.93.24 Jan 19 16:02:25 host sshd[8626]: Failed password for invalid user super from 121.149.93.24 port 33718 ssh2 Jan 19 16:02:26 host sshd[8626]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:02:28 host sshd[8626]: Failed password for invalid user super from 121.149.93.24 port 33718 ssh2 Jan 19 16:02:30 host sshd[8626]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:02:32 host sshd[8626]: Failed password for invalid user super from 121.149.93.24 port 33718 ssh2 Jan 19 16:02:33 host sshd[8626]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:02:36 host sshd[8626]: Failed password for invalid user super from 121.149.93.24 port 33718 ssh2 Jan 19 16:02:37 host sshd[8626]: Failed password for invalid user super from 121.149.93.24 port 33718 ssh2 Jan 19 16:02:37 host sshd[8626]: Connection closed by 121.149.93.24 port 33718 [preauth] Jan 19 16:02:37 host sshd[8626]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.149.93.24 Jan 19 16:02:37 host sshd[8626]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 19 16:04:44 host sshd[8919]: Connection reset by 50.78.5.142 port 50179 [preauth] Jan 19 16:15:09 host sshd[10733]: Connection reset by 114.33.7.225 port 35308 [preauth] Jan 19 16:19:12 host sshd[11329]: Invalid user angelica from 111.238.174.6 port 47028 Jan 19 16:19:12 host sshd[11329]: input_userauth_request: invalid user angelica [preauth] Jan 19 16:19:12 host sshd[11329]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:19:12 host sshd[11329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.238.174.6 Jan 19 16:19:13 host sshd[11329]: Failed password for invalid user angelica from 111.238.174.6 port 47028 ssh2 Jan 19 16:19:13 host sshd[11329]: Received disconnect from 111.238.174.6 port 47028:11: Bye Bye [preauth] Jan 19 16:19:13 host sshd[11329]: Disconnected from 111.238.174.6 port 47028 [preauth] Jan 19 16:20:10 host sshd[11508]: Invalid user training from 211.45.162.52 port 43300 Jan 19 16:20:10 host sshd[11508]: input_userauth_request: invalid user training [preauth] Jan 19 16:20:10 host sshd[11508]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:20:10 host sshd[11508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.45.162.52 Jan 19 16:20:12 host sshd[11508]: Failed password for invalid user training from 211.45.162.52 port 43300 ssh2 Jan 19 16:20:12 host sshd[11508]: Received disconnect from 211.45.162.52 port 43300:11: Bye Bye [preauth] Jan 19 16:20:12 host sshd[11508]: Disconnected from 211.45.162.52 port 43300 [preauth] Jan 19 16:20:40 host sshd[11578]: Invalid user user5 from 206.189.84.58 port 36504 Jan 19 16:20:40 host sshd[11578]: input_userauth_request: invalid user user5 [preauth] Jan 19 16:20:40 host sshd[11578]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:20:40 host sshd[11578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.84.58 Jan 19 16:20:42 host sshd[11578]: Failed password for invalid user user5 from 206.189.84.58 port 36504 ssh2 Jan 19 16:20:42 host sshd[11578]: Received disconnect from 206.189.84.58 port 36504:11: Bye Bye [preauth] Jan 19 16:20:42 host sshd[11578]: Disconnected from 206.189.84.58 port 36504 [preauth] Jan 19 16:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 16:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 16:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 16:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 16:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=ugotscom user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=wwwletsstalkfood user-13=straightcurve user-14=bonifacegroup user-15=wwwevmhonda user-16=wwwnexidigital user-17=mrsclean user-18=gifterman user-19=palco123 user-20=phmetals user-21=kottayamcalldriv user-22=wwwkapin user-23=woodpeck user-24=wwwkmaorg user-25=disposeat user-26=remysagr user-27=pmcresources user-28=vfmassets user-29=wwwtestugo user-30=shalinijames feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 16:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 16:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-46b6GasVMpUi3Rsy.~ Jan 19 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-46b6GasVMpUi3Rsy.~' Jan 19 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-46b6GasVMpUi3Rsy.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 16:21:09 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 16:21:09 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 16:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 16:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 16:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 16:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 16:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 16:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 16:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 16:21:39 host sshd[12028]: Invalid user packer from 200.16.132.42 port 47820 Jan 19 16:21:39 host sshd[12028]: input_userauth_request: invalid user packer [preauth] Jan 19 16:21:39 host sshd[12028]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:21:39 host sshd[12028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.16.132.42 Jan 19 16:21:41 host sshd[12028]: Failed password for invalid user packer from 200.16.132.42 port 47820 ssh2 Jan 19 16:21:42 host sshd[12028]: Received disconnect from 200.16.132.42 port 47820:11: Bye Bye [preauth] Jan 19 16:21:42 host sshd[12028]: Disconnected from 200.16.132.42 port 47820 [preauth] Jan 19 16:25:01 host sshd[12414]: Invalid user shiny from 211.45.162.52 port 60264 Jan 19 16:25:01 host sshd[12414]: input_userauth_request: invalid user shiny [preauth] Jan 19 16:25:01 host sshd[12414]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:25:01 host sshd[12414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.45.162.52 Jan 19 16:25:03 host sshd[12414]: Failed password for invalid user shiny from 211.45.162.52 port 60264 ssh2 Jan 19 16:25:03 host sshd[12414]: Received disconnect from 211.45.162.52 port 60264:11: Bye Bye [preauth] Jan 19 16:25:03 host sshd[12414]: Disconnected from 211.45.162.52 port 60264 [preauth] Jan 19 16:25:24 host sshd[12471]: Invalid user gerrit from 206.189.84.58 port 51094 Jan 19 16:25:24 host sshd[12471]: input_userauth_request: invalid user gerrit [preauth] Jan 19 16:25:24 host sshd[12471]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:25:24 host sshd[12471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.84.58 Jan 19 16:25:26 host sshd[12471]: Failed password for invalid user gerrit from 206.189.84.58 port 51094 ssh2 Jan 19 16:25:26 host sshd[12471]: Received disconnect from 206.189.84.58 port 51094:11: Bye Bye [preauth] Jan 19 16:25:26 host sshd[12471]: Disconnected from 206.189.84.58 port 51094 [preauth] Jan 19 16:25:57 host sshd[12538]: Invalid user gmodserver from 200.16.132.42 port 42479 Jan 19 16:25:57 host sshd[12538]: input_userauth_request: invalid user gmodserver [preauth] Jan 19 16:25:57 host sshd[12538]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:25:57 host sshd[12538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.16.132.42 Jan 19 16:25:59 host sshd[12538]: Failed password for invalid user gmodserver from 200.16.132.42 port 42479 ssh2 Jan 19 16:25:59 host sshd[12538]: Received disconnect from 200.16.132.42 port 42479:11: Bye Bye [preauth] Jan 19 16:25:59 host sshd[12538]: Disconnected from 200.16.132.42 port 42479 [preauth] Jan 19 16:26:22 host sshd[12591]: Invalid user support from 211.45.162.52 port 46710 Jan 19 16:26:22 host sshd[12591]: input_userauth_request: invalid user support [preauth] Jan 19 16:26:22 host sshd[12591]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:26:22 host sshd[12591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.45.162.52 Jan 19 16:26:24 host sshd[12591]: Failed password for invalid user support from 211.45.162.52 port 46710 ssh2 Jan 19 16:26:24 host sshd[12591]: Received disconnect from 211.45.162.52 port 46710:11: Bye Bye [preauth] Jan 19 16:26:24 host sshd[12591]: Disconnected from 211.45.162.52 port 46710 [preauth] Jan 19 16:26:48 host sshd[12832]: Invalid user system from 206.189.84.58 port 42572 Jan 19 16:26:48 host sshd[12832]: input_userauth_request: invalid user system [preauth] Jan 19 16:26:48 host sshd[12832]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:26:48 host sshd[12832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.84.58 Jan 19 16:26:50 host sshd[12832]: Failed password for invalid user system from 206.189.84.58 port 42572 ssh2 Jan 19 16:26:50 host sshd[12832]: Received disconnect from 206.189.84.58 port 42572:11: Bye Bye [preauth] Jan 19 16:26:50 host sshd[12832]: Disconnected from 206.189.84.58 port 42572 [preauth] Jan 19 16:27:31 host sshd[12940]: Invalid user test1 from 200.69.196.27 port 56075 Jan 19 16:27:31 host sshd[12940]: input_userauth_request: invalid user test1 [preauth] Jan 19 16:27:31 host sshd[12940]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:27:31 host sshd[12940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.196.27 Jan 19 16:27:33 host sshd[12940]: Failed password for invalid user test1 from 200.69.196.27 port 56075 ssh2 Jan 19 16:27:34 host sshd[12940]: Received disconnect from 200.69.196.27 port 56075:11: Bye Bye [preauth] Jan 19 16:27:34 host sshd[12940]: Disconnected from 200.69.196.27 port 56075 [preauth] Jan 19 16:29:05 host sshd[13133]: Invalid user hb from 200.16.132.42 port 41437 Jan 19 16:29:05 host sshd[13133]: input_userauth_request: invalid user hb [preauth] Jan 19 16:29:05 host sshd[13133]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:29:05 host sshd[13133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.16.132.42 Jan 19 16:29:07 host sshd[13133]: Failed password for invalid user hb from 200.16.132.42 port 41437 ssh2 Jan 19 16:33:30 host sshd[13819]: User root from 141.98.11.151 not allowed because not listed in AllowUsers Jan 19 16:33:30 host sshd[13819]: input_userauth_request: invalid user root [preauth] Jan 19 16:33:30 host unix_chkpwd[13823]: password check failed for user (root) Jan 19 16:33:30 host sshd[13819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.151 user=root Jan 19 16:33:30 host sshd[13819]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:33:31 host sshd[13819]: Failed password for invalid user root from 141.98.11.151 port 51782 ssh2 Jan 19 16:33:32 host sshd[13819]: Received disconnect from 141.98.11.151 port 51782:11: Normal Shutdown, Thank you for playing [preauth] Jan 19 16:33:32 host sshd[13819]: Disconnected from 141.98.11.151 port 51782 [preauth] Jan 19 16:37:59 host sshd[14400]: Invalid user Hayami from 106.10.122.53 port 43542 Jan 19 16:37:59 host sshd[14400]: input_userauth_request: invalid user Hayami [preauth] Jan 19 16:37:59 host sshd[14400]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:37:59 host sshd[14400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 19 16:38:01 host sshd[14400]: Failed password for invalid user Hayami from 106.10.122.53 port 43542 ssh2 Jan 19 16:38:01 host sshd[14400]: Connection closed by 106.10.122.53 port 43542 [preauth] Jan 19 16:38:09 host sshd[14419]: Invalid user bitnami from 200.69.196.27 port 38309 Jan 19 16:38:09 host sshd[14419]: input_userauth_request: invalid user bitnami [preauth] Jan 19 16:38:09 host sshd[14419]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:38:09 host sshd[14419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.196.27 Jan 19 16:38:11 host sshd[14419]: Failed password for invalid user bitnami from 200.69.196.27 port 38309 ssh2 Jan 19 16:38:11 host sshd[14419]: Received disconnect from 200.69.196.27 port 38309:11: Bye Bye [preauth] Jan 19 16:38:11 host sshd[14419]: Disconnected from 200.69.196.27 port 38309 [preauth] Jan 19 16:39:56 host sshd[14640]: User root from 141.98.11.151 not allowed because not listed in AllowUsers Jan 19 16:39:56 host sshd[14640]: input_userauth_request: invalid user root [preauth] Jan 19 16:39:56 host unix_chkpwd[14643]: password check failed for user (root) Jan 19 16:39:56 host sshd[14640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.151 user=root Jan 19 16:39:56 host sshd[14640]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:39:58 host sshd[14640]: Failed password for invalid user root from 141.98.11.151 port 49428 ssh2 Jan 19 16:39:58 host sshd[14640]: Received disconnect from 141.98.11.151 port 49428:11: Normal Shutdown, Thank you for playing [preauth] Jan 19 16:39:58 host sshd[14640]: Disconnected from 141.98.11.151 port 49428 [preauth] Jan 19 16:41:18 host sshd[14874]: Invalid user user8 from 200.69.196.27 port 37267 Jan 19 16:41:18 host sshd[14874]: input_userauth_request: invalid user user8 [preauth] Jan 19 16:41:18 host sshd[14874]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:41:18 host sshd[14874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.196.27 Jan 19 16:41:20 host sshd[14874]: Failed password for invalid user user8 from 200.69.196.27 port 37267 ssh2 Jan 19 16:41:20 host sshd[14874]: Received disconnect from 200.69.196.27 port 37267:11: Bye Bye [preauth] Jan 19 16:41:20 host sshd[14874]: Disconnected from 200.69.196.27 port 37267 [preauth] Jan 19 16:42:56 host sshd[15068]: Invalid user docker from 190.104.220.42 port 50863 Jan 19 16:42:56 host sshd[15068]: input_userauth_request: invalid user docker [preauth] Jan 19 16:42:56 host sshd[15068]: pam_unix(sshd:auth): check pass; user unknown Jan 19 16:42:56 host sshd[15068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.220.42 Jan 19 16:42:58 host sshd[15068]: Failed password for invalid user docker from 190.104.220.42 port 50863 ssh2 Jan 19 16:42:58 host sshd[15068]: Received disconnect from 190.104.220.42 port 50863:11: Bye Bye [preauth] Jan 19 16:42:58 host sshd[15068]: Disconnected from 190.104.220.42 port 50863 [preauth] Jan 19 16:56:13 host sshd[16996]: User root from 183.108.122.61 not allowed because not listed in AllowUsers Jan 19 16:56:13 host sshd[16996]: input_userauth_request: invalid user root [preauth] Jan 19 16:56:13 host unix_chkpwd[17001]: password check failed for user (root) Jan 19 16:56:13 host sshd[16996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.108.122.61 user=root Jan 19 16:56:13 host sshd[16996]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:56:15 host sshd[16996]: Failed password for invalid user root from 183.108.122.61 port 57521 ssh2 Jan 19 16:56:16 host sshd[16996]: Connection reset by 183.108.122.61 port 57521 [preauth] Jan 19 16:56:28 host sshd[17012]: User root from 45.129.56.207 not allowed because not listed in AllowUsers Jan 19 16:56:28 host sshd[17012]: input_userauth_request: invalid user root [preauth] Jan 19 16:56:29 host sshd[17012]: Connection closed by 45.129.56.207 port 36724 [preauth] Jan 19 16:56:32 host sshd[17043]: User root from 162.247.74.216 not allowed because not listed in AllowUsers Jan 19 16:56:32 host sshd[17043]: input_userauth_request: invalid user root [preauth] Jan 19 16:56:32 host unix_chkpwd[17048]: password check failed for user (root) Jan 19 16:56:32 host sshd[17043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.216 user=root Jan 19 16:56:32 host sshd[17043]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:56:33 host sshd[17043]: Failed password for invalid user root from 162.247.74.216 port 35490 ssh2 Jan 19 16:56:34 host unix_chkpwd[17051]: password check failed for user (root) Jan 19 16:56:34 host sshd[17043]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:56:36 host sshd[17043]: Failed password for invalid user root from 162.247.74.216 port 35490 ssh2 Jan 19 16:56:37 host unix_chkpwd[17057]: password check failed for user (root) Jan 19 16:56:37 host sshd[17043]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:56:39 host sshd[17043]: Failed password for invalid user root from 162.247.74.216 port 35490 ssh2 Jan 19 16:56:39 host unix_chkpwd[17062]: password check failed for user (root) Jan 19 16:56:39 host sshd[17043]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:56:41 host sshd[17043]: Failed password for invalid user root from 162.247.74.216 port 35490 ssh2 Jan 19 16:56:41 host unix_chkpwd[17065]: password check failed for user (root) Jan 19 16:56:41 host sshd[17043]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:56:43 host sshd[17043]: Failed password for invalid user root from 162.247.74.216 port 35490 ssh2 Jan 19 16:57:16 host sshd[17153]: User root from 66.115.189.149 not allowed because not listed in AllowUsers Jan 19 16:57:16 host sshd[17153]: input_userauth_request: invalid user root [preauth] Jan 19 16:57:16 host unix_chkpwd[17161]: password check failed for user (root) Jan 19 16:57:16 host sshd[17153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.115.189.149 user=root Jan 19 16:57:16 host sshd[17153]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:57:18 host sshd[17153]: Failed password for invalid user root from 66.115.189.149 port 7875 ssh2 Jan 19 16:57:19 host unix_chkpwd[17165]: password check failed for user (root) Jan 19 16:57:19 host sshd[17153]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:57:21 host sshd[17153]: Failed password for invalid user root from 66.115.189.149 port 7875 ssh2 Jan 19 16:57:22 host unix_chkpwd[17171]: password check failed for user (root) Jan 19 16:57:22 host sshd[17153]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:57:24 host sshd[17153]: Failed password for invalid user root from 66.115.189.149 port 7875 ssh2 Jan 19 16:57:25 host unix_chkpwd[17175]: password check failed for user (root) Jan 19 16:57:25 host sshd[17153]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:57:27 host sshd[17153]: Failed password for invalid user root from 66.115.189.149 port 7875 ssh2 Jan 19 16:58:11 host sshd[17343]: User root from 185.220.102.247 not allowed because not listed in AllowUsers Jan 19 16:58:11 host sshd[17343]: input_userauth_request: invalid user root [preauth] Jan 19 16:58:11 host unix_chkpwd[17347]: password check failed for user (root) Jan 19 16:58:11 host sshd[17343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.247 user=root Jan 19 16:58:11 host sshd[17343]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:58:14 host sshd[17343]: Failed password for invalid user root from 185.220.102.247 port 30351 ssh2 Jan 19 16:58:14 host unix_chkpwd[17351]: password check failed for user (root) Jan 19 16:58:14 host sshd[17343]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:58:16 host sshd[17343]: Failed password for invalid user root from 185.220.102.247 port 30351 ssh2 Jan 19 16:58:20 host unix_chkpwd[17360]: password check failed for user (root) Jan 19 16:58:20 host sshd[17343]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:58:21 host sshd[17343]: Failed password for invalid user root from 185.220.102.247 port 30351 ssh2 Jan 19 16:58:22 host unix_chkpwd[17363]: password check failed for user (root) Jan 19 16:58:22 host sshd[17343]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:58:24 host sshd[17343]: Failed password for invalid user root from 185.220.102.247 port 30351 ssh2 Jan 19 16:58:55 host sshd[17448]: User root from 23.129.64.223 not allowed because not listed in AllowUsers Jan 19 16:58:55 host sshd[17448]: input_userauth_request: invalid user root [preauth] Jan 19 16:58:55 host unix_chkpwd[17453]: password check failed for user (root) Jan 19 16:58:55 host sshd[17448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.223 user=root Jan 19 16:58:55 host sshd[17448]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:58:58 host sshd[17448]: Failed password for invalid user root from 23.129.64.223 port 42150 ssh2 Jan 19 16:58:58 host unix_chkpwd[17456]: password check failed for user (root) Jan 19 16:58:58 host sshd[17448]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:59:00 host sshd[17448]: Failed password for invalid user root from 23.129.64.223 port 42150 ssh2 Jan 19 16:59:01 host unix_chkpwd[17459]: password check failed for user (root) Jan 19 16:59:01 host sshd[17448]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:59:03 host sshd[17448]: Failed password for invalid user root from 23.129.64.223 port 42150 ssh2 Jan 19 16:59:04 host unix_chkpwd[17473]: password check failed for user (root) Jan 19 16:59:04 host sshd[17448]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:59:06 host sshd[17448]: Failed password for invalid user root from 23.129.64.223 port 42150 ssh2 Jan 19 16:59:06 host unix_chkpwd[17476]: password check failed for user (root) Jan 19 16:59:06 host sshd[17448]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:59:08 host sshd[17448]: Failed password for invalid user root from 23.129.64.223 port 42150 ssh2 Jan 19 16:59:43 host sshd[17658]: User root from 209.141.51.30 not allowed because not listed in AllowUsers Jan 19 16:59:43 host sshd[17658]: input_userauth_request: invalid user root [preauth] Jan 19 16:59:43 host unix_chkpwd[17671]: password check failed for user (root) Jan 19 16:59:43 host sshd[17658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.51.30 user=root Jan 19 16:59:43 host sshd[17658]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:59:45 host sshd[17658]: Failed password for invalid user root from 209.141.51.30 port 35248 ssh2 Jan 19 16:59:46 host unix_chkpwd[17677]: password check failed for user (root) Jan 19 16:59:46 host sshd[17658]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:59:49 host sshd[17658]: Failed password for invalid user root from 209.141.51.30 port 35248 ssh2 Jan 19 16:59:49 host unix_chkpwd[17685]: password check failed for user (root) Jan 19 16:59:49 host sshd[17658]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:59:51 host sshd[17658]: Failed password for invalid user root from 209.141.51.30 port 35248 ssh2 Jan 19 16:59:52 host unix_chkpwd[17689]: password check failed for user (root) Jan 19 16:59:52 host sshd[17658]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 16:59:54 host sshd[17658]: Failed password for invalid user root from 209.141.51.30 port 35248 ssh2 Jan 19 17:00:23 host sshd[17779]: User root from 185.220.102.252 not allowed because not listed in AllowUsers Jan 19 17:00:23 host sshd[17779]: input_userauth_request: invalid user root [preauth] Jan 19 17:00:23 host unix_chkpwd[17781]: password check failed for user (root) Jan 19 17:00:23 host sshd[17779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.252 user=root Jan 19 17:00:23 host sshd[17779]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:00:25 host sshd[17779]: Failed password for invalid user root from 185.220.102.252 port 28577 ssh2 Jan 19 17:00:25 host unix_chkpwd[17784]: password check failed for user (root) Jan 19 17:00:25 host sshd[17779]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:00:27 host sshd[17779]: Failed password for invalid user root from 185.220.102.252 port 28577 ssh2 Jan 19 17:00:28 host unix_chkpwd[17813]: password check failed for user (root) Jan 19 17:00:28 host sshd[17779]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:00:30 host sshd[17779]: Failed password for invalid user root from 185.220.102.252 port 28577 ssh2 Jan 19 17:01:55 host sshd[17995]: User root from 45.8.146.213 not allowed because not listed in AllowUsers Jan 19 17:01:55 host sshd[17995]: input_userauth_request: invalid user root [preauth] Jan 19 17:01:55 host unix_chkpwd[18003]: password check failed for user (root) Jan 19 17:01:55 host sshd[17995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.8.146.213 user=root Jan 19 17:01:55 host sshd[17995]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:01:57 host sshd[17995]: Failed password for invalid user root from 45.8.146.213 port 35420 ssh2 Jan 19 17:02:00 host unix_chkpwd[18008]: password check failed for user (root) Jan 19 17:02:00 host sshd[17995]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:02:02 host sshd[17995]: Failed password for invalid user root from 45.8.146.213 port 35420 ssh2 Jan 19 17:02:03 host unix_chkpwd[18021]: password check failed for user (root) Jan 19 17:02:03 host sshd[17995]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:02:04 host sshd[17995]: Failed password for invalid user root from 45.8.146.213 port 35420 ssh2 Jan 19 17:02:05 host unix_chkpwd[18024]: password check failed for user (root) Jan 19 17:02:05 host sshd[17995]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:02:07 host sshd[17995]: Failed password for invalid user root from 45.8.146.213 port 35420 ssh2 Jan 19 17:02:09 host unix_chkpwd[18047]: password check failed for user (root) Jan 19 17:02:09 host sshd[17995]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:02:10 host sshd[17995]: Failed password for invalid user root from 45.8.146.213 port 35420 ssh2 Jan 19 17:02:34 host sshd[18105]: Invalid user gm from 194.110.203.109 port 57570 Jan 19 17:02:34 host sshd[18105]: input_userauth_request: invalid user gm [preauth] Jan 19 17:02:34 host sshd[18105]: pam_unix(sshd:auth): check pass; user unknown Jan 19 17:02:34 host sshd[18105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 17:02:36 host sshd[18105]: Failed password for invalid user gm from 194.110.203.109 port 57570 ssh2 Jan 19 17:02:40 host sshd[18105]: pam_unix(sshd:auth): check pass; user unknown Jan 19 17:02:41 host sshd[18112]: User root from 162.247.72.199 not allowed because not listed in AllowUsers Jan 19 17:02:41 host sshd[18112]: input_userauth_request: invalid user root [preauth] Jan 19 17:02:41 host unix_chkpwd[18116]: password check failed for user (root) Jan 19 17:02:41 host sshd[18112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.72.199 user=root Jan 19 17:02:41 host sshd[18112]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:02:41 host sshd[18105]: Failed password for invalid user gm from 194.110.203.109 port 57570 ssh2 Jan 19 17:02:43 host sshd[18112]: Failed password for invalid user root from 162.247.72.199 port 36240 ssh2 Jan 19 17:02:44 host unix_chkpwd[18126]: password check failed for user (root) Jan 19 17:02:44 host sshd[18112]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:02:44 host sshd[18105]: pam_unix(sshd:auth): check pass; user unknown Jan 19 17:02:46 host sshd[18112]: Failed password for invalid user root from 162.247.72.199 port 36240 ssh2 Jan 19 17:02:47 host unix_chkpwd[18130]: password check failed for user (root) Jan 19 17:02:47 host sshd[18112]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:02:47 host sshd[18105]: Failed password for invalid user gm from 194.110.203.109 port 57570 ssh2 Jan 19 17:02:49 host sshd[18112]: Failed password for invalid user root from 162.247.72.199 port 36240 ssh2 Jan 19 17:02:49 host unix_chkpwd[18135]: password check failed for user (root) Jan 19 17:02:49 host sshd[18112]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:02:50 host sshd[18105]: Connection closed by 194.110.203.109 port 57570 [preauth] Jan 19 17:02:50 host sshd[18105]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 17:02:51 host sshd[18112]: Failed password for invalid user root from 162.247.72.199 port 36240 ssh2 Jan 19 17:02:52 host unix_chkpwd[18138]: password check failed for user (root) Jan 19 17:02:52 host sshd[18112]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:02:54 host sshd[18112]: Failed password for invalid user root from 162.247.72.199 port 36240 ssh2 Jan 19 17:03:26 host sshd[18234]: User root from 185.220.101.185 not allowed because not listed in AllowUsers Jan 19 17:03:26 host sshd[18234]: input_userauth_request: invalid user root [preauth] Jan 19 17:03:26 host unix_chkpwd[18237]: password check failed for user (root) Jan 19 17:03:26 host sshd[18234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.185 user=root Jan 19 17:03:26 host sshd[18234]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:03:28 host sshd[18234]: Failed password for invalid user root from 185.220.101.185 port 31140 ssh2 Jan 19 17:03:29 host unix_chkpwd[18261]: password check failed for user (root) Jan 19 17:03:29 host sshd[18234]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:03:31 host sshd[18234]: Failed password for invalid user root from 185.220.101.185 port 31140 ssh2 Jan 19 17:03:31 host unix_chkpwd[18267]: password check failed for user (root) Jan 19 17:03:31 host sshd[18234]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:03:33 host sshd[18234]: Failed password for invalid user root from 185.220.101.185 port 31140 ssh2 Jan 19 17:03:34 host unix_chkpwd[18270]: password check failed for user (root) Jan 19 17:03:34 host sshd[18234]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:03:36 host sshd[18234]: Failed password for invalid user root from 185.220.101.185 port 31140 ssh2 Jan 19 17:03:36 host unix_chkpwd[18273]: password check failed for user (root) Jan 19 17:03:36 host sshd[18234]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:03:38 host sshd[18234]: Failed password for invalid user root from 185.220.101.185 port 31140 ssh2 Jan 19 17:03:38 host unix_chkpwd[18281]: password check failed for user (root) Jan 19 17:03:38 host sshd[18234]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:03:40 host sshd[18234]: Failed password for invalid user root from 185.220.101.185 port 31140 ssh2 Jan 19 17:03:40 host sshd[18234]: error: maximum authentication attempts exceeded for invalid user root from 185.220.101.185 port 31140 ssh2 [preauth] Jan 19 17:03:40 host sshd[18234]: Disconnecting: Too many authentication failures [preauth] Jan 19 17:03:40 host sshd[18234]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.185 user=root Jan 19 17:03:40 host sshd[18234]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 19 17:04:12 host sshd[18423]: User root from 45.139.122.241 not allowed because not listed in AllowUsers Jan 19 17:04:12 host sshd[18423]: input_userauth_request: invalid user root [preauth] Jan 19 17:04:12 host unix_chkpwd[18468]: password check failed for user (root) Jan 19 17:04:12 host sshd[18423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.139.122.241 user=root Jan 19 17:04:12 host sshd[18423]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:04:14 host sshd[18423]: Failed password for invalid user root from 45.139.122.241 port 58330 ssh2 Jan 19 17:04:15 host unix_chkpwd[18474]: password check failed for user (root) Jan 19 17:04:15 host sshd[18423]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:04:17 host sshd[18423]: Failed password for invalid user root from 45.139.122.241 port 58330 ssh2 Jan 19 17:04:18 host unix_chkpwd[18480]: password check failed for user (root) Jan 19 17:04:18 host sshd[18423]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:04:20 host sshd[18423]: Failed password for invalid user root from 45.139.122.241 port 58330 ssh2 Jan 19 17:04:21 host unix_chkpwd[18483]: password check failed for user (root) Jan 19 17:04:21 host sshd[18423]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:04:23 host sshd[18423]: Failed password for invalid user root from 45.139.122.241 port 58330 ssh2 Jan 19 17:05:00 host sshd[18575]: User root from 185.220.102.241 not allowed because not listed in AllowUsers Jan 19 17:05:00 host sshd[18575]: input_userauth_request: invalid user root [preauth] Jan 19 17:05:00 host unix_chkpwd[18582]: password check failed for user (root) Jan 19 17:05:00 host sshd[18575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.241 user=root Jan 19 17:05:00 host sshd[18575]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:05:03 host sshd[18575]: Failed password for invalid user root from 185.220.102.241 port 33597 ssh2 Jan 19 17:05:04 host unix_chkpwd[18608]: password check failed for user (root) Jan 19 17:05:04 host sshd[18575]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:05:05 host sshd[18575]: Failed password for invalid user root from 185.220.102.241 port 33597 ssh2 Jan 19 17:05:06 host unix_chkpwd[18613]: password check failed for user (root) Jan 19 17:05:06 host sshd[18575]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:05:08 host sshd[18575]: Failed password for invalid user root from 185.220.102.241 port 33597 ssh2 Jan 19 17:05:09 host unix_chkpwd[18619]: password check failed for user (root) Jan 19 17:05:09 host sshd[18575]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:05:11 host sshd[18575]: Failed password for invalid user root from 185.220.102.241 port 33597 ssh2 Jan 19 17:05:12 host unix_chkpwd[18624]: password check failed for user (root) Jan 19 17:05:12 host sshd[18575]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:05:14 host sshd[18575]: Failed password for invalid user root from 185.220.102.241 port 33597 ssh2 Jan 19 17:05:21 host sshd[18664]: Invalid user admin from 220.132.245.196 port 43231 Jan 19 17:05:21 host sshd[18664]: input_userauth_request: invalid user admin [preauth] Jan 19 17:05:21 host sshd[18664]: pam_unix(sshd:auth): check pass; user unknown Jan 19 17:05:21 host sshd[18664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.245.196 Jan 19 17:05:23 host sshd[18664]: Failed password for invalid user admin from 220.132.245.196 port 43231 ssh2 Jan 19 17:05:24 host sshd[18664]: Failed password for invalid user admin from 220.132.245.196 port 43231 ssh2 Jan 19 17:05:24 host sshd[18664]: Connection reset by 220.132.245.196 port 43231 [preauth] Jan 19 17:05:44 host sshd[18725]: User root from 144.172.73.16 not allowed because not listed in AllowUsers Jan 19 17:05:44 host sshd[18725]: input_userauth_request: invalid user root [preauth] Jan 19 17:05:44 host unix_chkpwd[18740]: password check failed for user (root) Jan 19 17:05:44 host sshd[18725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.172.73.16 user=root Jan 19 17:05:44 host sshd[18725]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:05:46 host sshd[18725]: Failed password for invalid user root from 144.172.73.16 port 47068 ssh2 Jan 19 17:05:47 host unix_chkpwd[18744]: password check failed for user (root) Jan 19 17:05:47 host sshd[18725]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:05:49 host sshd[18725]: Failed password for invalid user root from 144.172.73.16 port 47068 ssh2 Jan 19 17:05:50 host unix_chkpwd[18747]: password check failed for user (root) Jan 19 17:05:50 host sshd[18725]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:05:52 host sshd[18725]: Failed password for invalid user root from 144.172.73.16 port 47068 ssh2 Jan 19 17:05:52 host unix_chkpwd[18750]: password check failed for user (root) Jan 19 17:05:52 host sshd[18725]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:05:54 host sshd[18725]: Failed password for invalid user root from 144.172.73.16 port 47068 ssh2 Jan 19 17:06:27 host sshd[18822]: User root from 162.247.74.201 not allowed because not listed in AllowUsers Jan 19 17:06:27 host sshd[18822]: input_userauth_request: invalid user root [preauth] Jan 19 17:06:27 host unix_chkpwd[18851]: password check failed for user (root) Jan 19 17:06:27 host sshd[18822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.201 user=root Jan 19 17:06:27 host sshd[18822]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:06:29 host sshd[18822]: Failed password for invalid user root from 162.247.74.201 port 34180 ssh2 Jan 19 17:06:29 host unix_chkpwd[18854]: password check failed for user (root) Jan 19 17:06:29 host sshd[18822]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:06:32 host sshd[18822]: Failed password for invalid user root from 162.247.74.201 port 34180 ssh2 Jan 19 17:06:32 host unix_chkpwd[18858]: password check failed for user (root) Jan 19 17:06:32 host sshd[18822]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:06:34 host sshd[18822]: Failed password for invalid user root from 162.247.74.201 port 34180 ssh2 Jan 19 17:06:35 host unix_chkpwd[18861]: password check failed for user (root) Jan 19 17:06:35 host sshd[18822]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:06:37 host sshd[18822]: Failed password for invalid user root from 162.247.74.201 port 34180 ssh2 Jan 19 17:06:37 host unix_chkpwd[18864]: password check failed for user (root) Jan 19 17:06:37 host sshd[18822]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:06:40 host sshd[18822]: Failed password for invalid user root from 162.247.74.201 port 34180 ssh2 Jan 19 17:07:15 host sshd[18953]: User root from 185.129.61.129 not allowed because not listed in AllowUsers Jan 19 17:07:15 host sshd[18953]: input_userauth_request: invalid user root [preauth] Jan 19 17:07:15 host unix_chkpwd[18958]: password check failed for user (root) Jan 19 17:07:15 host sshd[18953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.129.61.129 user=root Jan 19 17:07:15 host sshd[18953]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:07:16 host sshd[18953]: Failed password for invalid user root from 185.129.61.129 port 46266 ssh2 Jan 19 17:07:16 host unix_chkpwd[18966]: password check failed for user (root) Jan 19 17:07:16 host sshd[18953]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:07:19 host sshd[18953]: Failed password for invalid user root from 185.129.61.129 port 46266 ssh2 Jan 19 17:07:19 host unix_chkpwd[18971]: password check failed for user (root) Jan 19 17:07:19 host sshd[18953]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:07:22 host sshd[18953]: Failed password for invalid user root from 185.129.61.129 port 46266 ssh2 Jan 19 17:07:22 host unix_chkpwd[18975]: password check failed for user (root) Jan 19 17:07:22 host sshd[18953]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:07:24 host sshd[18953]: Failed password for invalid user root from 185.129.61.129 port 46266 ssh2 Jan 19 17:07:24 host unix_chkpwd[18995]: password check failed for user (root) Jan 19 17:07:24 host sshd[18953]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:07:26 host sshd[18953]: Failed password for invalid user root from 185.129.61.129 port 46266 ssh2 Jan 19 17:08:00 host sshd[19070]: User root from 107.189.4.169 not allowed because not listed in AllowUsers Jan 19 17:08:00 host sshd[19070]: input_userauth_request: invalid user root [preauth] Jan 19 17:08:00 host unix_chkpwd[19075]: password check failed for user (root) Jan 19 17:08:00 host sshd[19070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.4.169 user=root Jan 19 17:08:00 host sshd[19070]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:08:02 host sshd[19070]: Failed password for invalid user root from 107.189.4.169 port 52358 ssh2 Jan 19 17:08:02 host unix_chkpwd[19088]: password check failed for user (root) Jan 19 17:08:02 host sshd[19070]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:08:05 host sshd[19070]: Failed password for invalid user root from 107.189.4.169 port 52358 ssh2 Jan 19 17:08:05 host unix_chkpwd[19091]: password check failed for user (root) Jan 19 17:08:05 host sshd[19070]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:08:07 host sshd[19070]: Failed password for invalid user root from 107.189.4.169 port 52358 ssh2 Jan 19 17:08:08 host unix_chkpwd[19094]: password check failed for user (root) Jan 19 17:08:08 host sshd[19070]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:08:10 host sshd[19070]: Failed password for invalid user root from 107.189.4.169 port 52358 ssh2 Jan 19 17:08:39 host sshd[19183]: User root from 162.247.74.204 not allowed because not listed in AllowUsers Jan 19 17:08:39 host sshd[19183]: input_userauth_request: invalid user root [preauth] Jan 19 17:08:39 host unix_chkpwd[19189]: password check failed for user (root) Jan 19 17:08:39 host sshd[19183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.204 user=root Jan 19 17:08:39 host sshd[19183]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:08:41 host sshd[19183]: Failed password for invalid user root from 162.247.74.204 port 50912 ssh2 Jan 19 17:08:42 host unix_chkpwd[19192]: password check failed for user (root) Jan 19 17:08:42 host sshd[19183]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:08:44 host sshd[19183]: Failed password for invalid user root from 162.247.74.204 port 50912 ssh2 Jan 19 17:08:44 host unix_chkpwd[19200]: password check failed for user (root) Jan 19 17:08:44 host sshd[19183]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:08:47 host sshd[19183]: Failed password for invalid user root from 162.247.74.204 port 50912 ssh2 Jan 19 17:08:47 host unix_chkpwd[19206]: password check failed for user (root) Jan 19 17:08:47 host sshd[19183]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:08:49 host sshd[19183]: Failed password for invalid user root from 162.247.74.204 port 50912 ssh2 Jan 19 17:09:22 host sshd[19308]: User root from 185.220.102.244 not allowed because not listed in AllowUsers Jan 19 17:09:22 host sshd[19308]: input_userauth_request: invalid user root [preauth] Jan 19 17:09:22 host unix_chkpwd[19313]: password check failed for user (root) Jan 19 17:09:22 host sshd[19308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.244 user=root Jan 19 17:09:22 host sshd[19308]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:09:23 host sshd[19308]: Failed password for invalid user root from 185.220.102.244 port 14561 ssh2 Jan 19 17:09:24 host unix_chkpwd[19316]: password check failed for user (root) Jan 19 17:09:24 host sshd[19308]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:09:26 host sshd[19308]: Failed password for invalid user root from 185.220.102.244 port 14561 ssh2 Jan 19 17:09:27 host unix_chkpwd[19320]: password check failed for user (root) Jan 19 17:09:27 host sshd[19308]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:09:29 host sshd[19308]: Failed password for invalid user root from 185.220.102.244 port 14561 ssh2 Jan 19 17:09:30 host unix_chkpwd[19355]: password check failed for user (root) Jan 19 17:09:30 host sshd[19308]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:09:31 host sshd[19308]: Failed password for invalid user root from 185.220.102.244 port 14561 ssh2 Jan 19 17:09:32 host unix_chkpwd[19359]: password check failed for user (root) Jan 19 17:09:32 host sshd[19308]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:09:34 host sshd[19308]: Failed password for invalid user root from 185.220.102.244 port 14561 ssh2 Jan 19 17:10:06 host sshd[19568]: User root from 104.244.76.170 not allowed because not listed in AllowUsers Jan 19 17:10:06 host sshd[19568]: input_userauth_request: invalid user root [preauth] Jan 19 17:10:06 host unix_chkpwd[19577]: password check failed for user (root) Jan 19 17:10:06 host sshd[19568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.76.170 user=root Jan 19 17:10:06 host sshd[19568]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:10:08 host sshd[19568]: Failed password for invalid user root from 104.244.76.170 port 45322 ssh2 Jan 19 17:10:09 host unix_chkpwd[19582]: password check failed for user (root) Jan 19 17:10:09 host sshd[19568]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:10:11 host sshd[19568]: Failed password for invalid user root from 104.244.76.170 port 45322 ssh2 Jan 19 17:10:11 host unix_chkpwd[19587]: password check failed for user (root) Jan 19 17:10:11 host sshd[19568]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:10:13 host sshd[19568]: Failed password for invalid user root from 104.244.76.170 port 45322 ssh2 Jan 19 17:10:13 host unix_chkpwd[19604]: password check failed for user (root) Jan 19 17:10:13 host sshd[19568]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:10:16 host sshd[19568]: Failed password for invalid user root from 104.244.76.170 port 45322 ssh2 Jan 19 17:10:56 host sshd[19726]: User root from 103.251.167.21 not allowed because not listed in AllowUsers Jan 19 17:10:56 host sshd[19726]: input_userauth_request: invalid user root [preauth] Jan 19 17:10:56 host unix_chkpwd[19729]: password check failed for user (root) Jan 19 17:10:56 host sshd[19726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.251.167.21 user=root Jan 19 17:10:56 host sshd[19726]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:10:58 host sshd[19726]: Failed password for invalid user root from 103.251.167.21 port 45946 ssh2 Jan 19 17:10:58 host unix_chkpwd[19740]: password check failed for user (root) Jan 19 17:10:58 host sshd[19726]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:11:00 host sshd[19726]: Failed password for invalid user root from 103.251.167.21 port 45946 ssh2 Jan 19 17:11:01 host unix_chkpwd[19745]: password check failed for user (root) Jan 19 17:11:01 host sshd[19726]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:11:02 host sshd[19726]: Failed password for invalid user root from 103.251.167.21 port 45946 ssh2 Jan 19 17:11:03 host unix_chkpwd[19758]: password check failed for user (root) Jan 19 17:11:03 host sshd[19726]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:11:05 host sshd[19726]: Failed password for invalid user root from 103.251.167.21 port 45946 ssh2 Jan 19 17:11:09 host sshd[19797]: Invalid user kodi from 190.104.220.42 port 57164 Jan 19 17:11:09 host sshd[19797]: input_userauth_request: invalid user kodi [preauth] Jan 19 17:11:09 host sshd[19797]: pam_unix(sshd:auth): check pass; user unknown Jan 19 17:11:09 host sshd[19797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.220.42 Jan 19 17:11:11 host sshd[19797]: Failed password for invalid user kodi from 190.104.220.42 port 57164 ssh2 Jan 19 17:11:11 host sshd[19797]: Received disconnect from 190.104.220.42 port 57164:11: Bye Bye [preauth] Jan 19 17:11:11 host sshd[19797]: Disconnected from 190.104.220.42 port 57164 [preauth] Jan 19 17:11:37 host sshd[19861]: User root from 162.247.74.206 not allowed because not listed in AllowUsers Jan 19 17:11:37 host sshd[19861]: input_userauth_request: invalid user root [preauth] Jan 19 17:11:37 host unix_chkpwd[19869]: password check failed for user (root) Jan 19 17:11:37 host sshd[19861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.206 user=root Jan 19 17:11:37 host sshd[19861]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:11:40 host sshd[19861]: Failed password for invalid user root from 162.247.74.206 port 51146 ssh2 Jan 19 17:11:40 host unix_chkpwd[19877]: password check failed for user (root) Jan 19 17:11:40 host sshd[19861]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:11:42 host sshd[19861]: Failed password for invalid user root from 162.247.74.206 port 51146 ssh2 Jan 19 17:11:43 host unix_chkpwd[19881]: password check failed for user (root) Jan 19 17:11:43 host sshd[19861]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:11:45 host sshd[19861]: Failed password for invalid user root from 162.247.74.206 port 51146 ssh2 Jan 19 17:11:46 host unix_chkpwd[19892]: password check failed for user (root) Jan 19 17:11:46 host sshd[19861]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:11:48 host sshd[19861]: Failed password for invalid user root from 162.247.74.206 port 51146 ssh2 Jan 19 17:11:48 host unix_chkpwd[19902]: password check failed for user (root) Jan 19 17:11:48 host sshd[19861]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:11:50 host sshd[19861]: Failed password for invalid user root from 162.247.74.206 port 51146 ssh2 Jan 19 17:12:21 host sshd[19991]: User root from 152.32.150.9 not allowed because not listed in AllowUsers Jan 19 17:12:21 host sshd[19991]: input_userauth_request: invalid user root [preauth] Jan 19 17:12:21 host unix_chkpwd[19997]: password check failed for user (root) Jan 19 17:12:21 host sshd[19991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.150.9 user=root Jan 19 17:12:21 host sshd[19991]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:12:23 host sshd[19991]: Failed password for invalid user root from 152.32.150.9 port 36714 ssh2 Jan 19 17:12:23 host unix_chkpwd[20002]: password check failed for user (root) Jan 19 17:12:23 host sshd[19991]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:12:26 host sshd[19991]: Failed password for invalid user root from 152.32.150.9 port 36714 ssh2 Jan 19 17:12:27 host unix_chkpwd[20008]: password check failed for user (root) Jan 19 17:12:27 host sshd[19991]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:12:29 host sshd[19991]: Failed password for invalid user root from 152.32.150.9 port 36714 ssh2 Jan 19 17:12:30 host unix_chkpwd[20037]: password check failed for user (root) Jan 19 17:12:30 host sshd[19991]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:12:32 host sshd[19991]: Failed password for invalid user root from 152.32.150.9 port 36714 ssh2 Jan 19 17:12:33 host unix_chkpwd[20041]: password check failed for user (root) Jan 19 17:12:33 host sshd[19991]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:12:35 host sshd[19991]: Failed password for invalid user root from 152.32.150.9 port 36714 ssh2 Jan 19 17:13:05 host sshd[20144]: User root from 185.220.102.250 not allowed because not listed in AllowUsers Jan 19 17:13:05 host sshd[20144]: input_userauth_request: invalid user root [preauth] Jan 19 17:13:05 host unix_chkpwd[20149]: password check failed for user (root) Jan 19 17:13:05 host sshd[20144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.250 user=root Jan 19 17:13:05 host sshd[20144]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:13:07 host sshd[20144]: Failed password for invalid user root from 185.220.102.250 port 18553 ssh2 Jan 19 17:13:08 host unix_chkpwd[20153]: password check failed for user (root) Jan 19 17:13:08 host sshd[20144]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:13:10 host sshd[20144]: Failed password for invalid user root from 185.220.102.250 port 18553 ssh2 Jan 19 17:13:11 host unix_chkpwd[20156]: password check failed for user (root) Jan 19 17:13:11 host sshd[20144]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:13:13 host sshd[20144]: Failed password for invalid user root from 185.220.102.250 port 18553 ssh2 Jan 19 17:13:14 host unix_chkpwd[20182]: password check failed for user (root) Jan 19 17:13:14 host sshd[20144]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:13:16 host sshd[20144]: Failed password for invalid user root from 185.220.102.250 port 18553 ssh2 Jan 19 17:13:55 host sshd[20276]: User root from 91.203.5.115 not allowed because not listed in AllowUsers Jan 19 17:13:55 host sshd[20276]: input_userauth_request: invalid user root [preauth] Jan 19 17:13:55 host unix_chkpwd[20279]: password check failed for user (root) Jan 19 17:13:55 host sshd[20276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.203.5.115 user=root Jan 19 17:13:55 host sshd[20276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:13:58 host sshd[20276]: Failed password for invalid user root from 91.203.5.115 port 34526 ssh2 Jan 19 17:13:59 host unix_chkpwd[20285]: password check failed for user (root) Jan 19 17:13:59 host sshd[20276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:14:01 host sshd[20276]: Failed password for invalid user root from 91.203.5.115 port 34526 ssh2 Jan 19 17:14:01 host unix_chkpwd[20297]: password check failed for user (root) Jan 19 17:14:01 host sshd[20276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:14:03 host sshd[20276]: Failed password for invalid user root from 91.203.5.115 port 34526 ssh2 Jan 19 17:14:03 host unix_chkpwd[20301]: password check failed for user (root) Jan 19 17:14:03 host sshd[20276]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:14:05 host sshd[20276]: Failed password for invalid user root from 91.203.5.115 port 34526 ssh2 Jan 19 17:14:36 host sshd[20393]: User root from 185.220.102.243 not allowed because not listed in AllowUsers Jan 19 17:14:36 host sshd[20393]: input_userauth_request: invalid user root [preauth] Jan 19 17:14:36 host unix_chkpwd[20397]: password check failed for user (root) Jan 19 17:14:36 host sshd[20393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.243 user=root Jan 19 17:14:36 host sshd[20393]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:14:38 host sshd[20393]: Failed password for invalid user root from 185.220.102.243 port 25435 ssh2 Jan 19 17:14:38 host unix_chkpwd[20399]: password check failed for user (root) Jan 19 17:14:38 host sshd[20393]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:14:41 host sshd[20393]: Failed password for invalid user root from 185.220.102.243 port 25435 ssh2 Jan 19 17:14:41 host unix_chkpwd[20442]: password check failed for user (root) Jan 19 17:14:41 host sshd[20393]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:14:43 host sshd[20393]: Failed password for invalid user root from 185.220.102.243 port 25435 ssh2 Jan 19 17:14:43 host unix_chkpwd[20476]: password check failed for user (root) Jan 19 17:14:43 host sshd[20393]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:14:45 host sshd[20393]: Failed password for invalid user root from 185.220.102.243 port 25435 ssh2 Jan 19 17:15:41 host sshd[20674]: User root from 5.255.97.170 not allowed because not listed in AllowUsers Jan 19 17:15:41 host sshd[20674]: input_userauth_request: invalid user root [preauth] Jan 19 17:15:41 host unix_chkpwd[20686]: password check failed for user (root) Jan 19 17:15:41 host sshd[20674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.255.97.170 user=root Jan 19 17:15:41 host sshd[20674]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:15:43 host sshd[20674]: Failed password for invalid user root from 5.255.97.170 port 40178 ssh2 Jan 19 17:15:44 host unix_chkpwd[20703]: password check failed for user (root) Jan 19 17:15:44 host sshd[20674]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:15:46 host sshd[20674]: Failed password for invalid user root from 5.255.97.170 port 40178 ssh2 Jan 19 17:15:47 host unix_chkpwd[20708]: password check failed for user (root) Jan 19 17:15:47 host sshd[20674]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:15:48 host sshd[20674]: Failed password for invalid user root from 5.255.97.170 port 40178 ssh2 Jan 19 17:15:49 host unix_chkpwd[20713]: password check failed for user (root) Jan 19 17:15:49 host sshd[20674]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:15:51 host sshd[20674]: Failed password for invalid user root from 5.255.97.170 port 40178 ssh2 Jan 19 17:15:53 host unix_chkpwd[20717]: password check failed for user (root) Jan 19 17:15:53 host sshd[20674]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:15:54 host sshd[20674]: Failed password for invalid user root from 5.255.97.170 port 40178 ssh2 Jan 19 17:16:40 host sshd[20859]: User root from 185.220.101.187 not allowed because not listed in AllowUsers Jan 19 17:16:40 host sshd[20859]: input_userauth_request: invalid user root [preauth] Jan 19 17:16:40 host unix_chkpwd[20868]: password check failed for user (root) Jan 19 17:16:40 host sshd[20859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.187 user=root Jan 19 17:16:40 host sshd[20859]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:16:41 host sshd[20859]: Failed password for invalid user root from 185.220.101.187 port 22916 ssh2 Jan 19 17:16:42 host unix_chkpwd[20870]: password check failed for user (root) Jan 19 17:16:42 host sshd[20859]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:16:44 host sshd[20859]: Failed password for invalid user root from 185.220.101.187 port 22916 ssh2 Jan 19 17:16:44 host unix_chkpwd[20880]: password check failed for user (root) Jan 19 17:16:44 host sshd[20859]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:16:47 host sshd[20859]: Failed password for invalid user root from 185.220.101.187 port 22916 ssh2 Jan 19 17:16:47 host unix_chkpwd[20885]: password check failed for user (root) Jan 19 17:16:47 host sshd[20859]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:16:49 host sshd[20859]: Failed password for invalid user root from 185.220.101.187 port 22916 ssh2 Jan 19 17:16:50 host unix_chkpwd[20909]: password check failed for user (root) Jan 19 17:16:50 host sshd[20859]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:16:52 host sshd[20859]: Failed password for invalid user root from 185.220.101.187 port 22916 ssh2 Jan 19 17:17:22 host sshd[20970]: User root from 185.220.102.249 not allowed because not listed in AllowUsers Jan 19 17:17:22 host sshd[20970]: input_userauth_request: invalid user root [preauth] Jan 19 17:17:22 host unix_chkpwd[20974]: password check failed for user (root) Jan 19 17:17:22 host sshd[20970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.249 user=root Jan 19 17:17:22 host sshd[20970]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:17:24 host sshd[20970]: Failed password for invalid user root from 185.220.102.249 port 44235 ssh2 Jan 19 17:17:25 host unix_chkpwd[20979]: password check failed for user (root) Jan 19 17:17:25 host sshd[20970]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 17:17:27 host sshd[20970]: Failed password for invalid user root from 185.220.102.249 port 44235 ssh2 Jan 19 17:17:28 host sshd[20970]: Connection closed by 185.220.102.249 port 44235 [preauth] Jan 19 17:17:28 host sshd[20970]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.249 user=root Jan 19 17:18:32 host sshd[21142]: Connection reset by 121.128.171.245 port 60644 [preauth] Jan 19 17:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 17:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 17:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=keralaholi user-8=wwwresourcehunte user-9=wwwrmswll user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=pmcresources user-16=wwwkmaorg user-17=disposeat user-18=remysagr user-19=woodpeck user-20=wwwkapin user-21=palco123 user-22=gifterman user-23=phmetals user-24=kottayamcalldriv user-25=wwwnexidigital user-26=mrsclean user-27=bonifacegroup user-28=wwwevmhonda user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 17:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 17:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 17:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QYBrWnANXAjzglwu.~ Jan 19 17:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QYBrWnANXAjzglwu.~' Jan 19 17:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-QYBrWnANXAjzglwu.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 17:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 17:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 17:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 17:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 17:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 17:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 17:39:07 host sshd[24320]: Invalid user sFTPUser from 171.7.29.131 port 46928 Jan 19 17:39:07 host sshd[24320]: input_userauth_request: invalid user sFTPUser [preauth] Jan 19 17:39:07 host sshd[24320]: pam_unix(sshd:auth): check pass; user unknown Jan 19 17:39:07 host sshd[24320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.7.29.131 Jan 19 17:39:10 host sshd[24320]: Failed password for invalid user sFTPUser from 171.7.29.131 port 46928 ssh2 Jan 19 17:39:10 host sshd[24320]: pam_unix(sshd:auth): check pass; user unknown Jan 19 17:39:12 host sshd[24320]: Failed password for invalid user sFTPUser from 171.7.29.131 port 46928 ssh2 Jan 19 17:39:12 host sshd[24320]: Connection reset by 171.7.29.131 port 46928 [preauth] Jan 19 17:39:12 host sshd[24320]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.7.29.131 Jan 19 17:42:15 host sshd[24767]: Connection reset by 122.117.91.252 port 36357 [preauth] Jan 19 17:51:38 host sshd[25960]: Invalid user zyfwp from 112.160.9.96 port 61028 Jan 19 17:51:38 host sshd[25960]: input_userauth_request: invalid user zyfwp [preauth] Jan 19 17:51:38 host sshd[25960]: pam_unix(sshd:auth): check pass; user unknown Jan 19 17:51:38 host sshd[25960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.160.9.96 Jan 19 17:51:40 host sshd[25960]: Failed password for invalid user zyfwp from 112.160.9.96 port 61028 ssh2 Jan 19 17:51:40 host sshd[25960]: Connection reset by 112.160.9.96 port 61028 [preauth] Jan 19 18:04:40 host sshd[27692]: Invalid user pi from 1.34.159.50 port 43163 Jan 19 18:04:40 host sshd[27692]: input_userauth_request: invalid user pi [preauth] Jan 19 18:04:40 host sshd[27692]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:04:40 host sshd[27692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.159.50 Jan 19 18:04:42 host sshd[27692]: Failed password for invalid user pi from 1.34.159.50 port 43163 ssh2 Jan 19 18:04:42 host sshd[27692]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:04:44 host sshd[27692]: Failed password for invalid user pi from 1.34.159.50 port 43163 ssh2 Jan 19 18:04:44 host sshd[27692]: Connection reset by 1.34.159.50 port 43163 [preauth] Jan 19 18:04:44 host sshd[27692]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.159.50 Jan 19 18:06:16 host sshd[27990]: User root from 114.33.1.109 not allowed because not listed in AllowUsers Jan 19 18:06:16 host sshd[27990]: input_userauth_request: invalid user root [preauth] Jan 19 18:06:16 host unix_chkpwd[27995]: password check failed for user (root) Jan 19 18:06:16 host sshd[27990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.1.109 user=root Jan 19 18:06:16 host sshd[27990]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 18:06:18 host sshd[27988]: User root from 114.33.1.109 not allowed because not listed in AllowUsers Jan 19 18:06:18 host sshd[27988]: input_userauth_request: invalid user root [preauth] Jan 19 18:06:18 host unix_chkpwd[27998]: password check failed for user (root) Jan 19 18:06:18 host sshd[27988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.1.109 user=root Jan 19 18:06:18 host sshd[27988]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 18:06:18 host sshd[27990]: Failed password for invalid user root from 114.33.1.109 port 35563 ssh2 Jan 19 18:06:19 host unix_chkpwd[28006]: password check failed for user (root) Jan 19 18:06:19 host sshd[27990]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 18:06:19 host sshd[27988]: Failed password for invalid user root from 114.33.1.109 port 35577 ssh2 Jan 19 18:06:20 host unix_chkpwd[28008]: password check failed for user (root) Jan 19 18:06:20 host sshd[27988]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 18:06:21 host sshd[27990]: Failed password for invalid user root from 114.33.1.109 port 35563 ssh2 Jan 19 18:06:22 host sshd[27988]: Failed password for invalid user root from 114.33.1.109 port 35577 ssh2 Jan 19 18:17:29 host sshd[29655]: Invalid user jacob from 107.189.30.59 port 32848 Jan 19 18:17:29 host sshd[29655]: input_userauth_request: invalid user jacob [preauth] Jan 19 18:17:29 host sshd[29655]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:17:29 host sshd[29655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 19 18:17:32 host sshd[29655]: Failed password for invalid user jacob from 107.189.30.59 port 32848 ssh2 Jan 19 18:17:32 host sshd[29655]: Connection closed by 107.189.30.59 port 32848 [preauth] Jan 19 18:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=ugotscom user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=wwwkmaorg user-15=disposeat user-16=remysagr user-17=pmcresources user-18=wwwtestugo user-19=shalinijames user-20=vfmassets user-21=straightcurve user-22=wwwletsstalkfood user-23=wwwevmhonda user-24=bonifacegroup user-25=wwwnexidigital user-26=mrsclean user-27=kottayamcalldriv user-28=phmetals user-29=gifterman user-30=palco123 feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 18:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RDepXqXzBSGGMlrc.~ Jan 19 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RDepXqXzBSGGMlrc.~' Jan 19 18:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-RDepXqXzBSGGMlrc.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 18:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 18:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 18:21:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 18:21:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 18:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 18:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 18:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 18:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 18:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 18:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 18:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 18:25:05 host sshd[30818]: Connection closed by 45.79.181.223 port 46872 [preauth] Jan 19 18:25:08 host sshd[30825]: Connection closed by 45.79.181.223 port 64802 [preauth] Jan 19 18:25:11 host sshd[30835]: Connection closed by 45.79.181.223 port 64818 [preauth] Jan 19 18:25:25 host sshd[30866]: Invalid user mm from 49.248.17.3 port 57150 Jan 19 18:25:25 host sshd[30866]: input_userauth_request: invalid user mm [preauth] Jan 19 18:25:25 host sshd[30866]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:25:25 host sshd[30866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.17.3 Jan 19 18:25:26 host sshd[30866]: Failed password for invalid user mm from 49.248.17.3 port 57150 ssh2 Jan 19 18:25:26 host sshd[30866]: Received disconnect from 49.248.17.3 port 57150:11: Bye Bye [preauth] Jan 19 18:25:26 host sshd[30866]: Disconnected from 49.248.17.3 port 57150 [preauth] Jan 19 18:27:08 host sshd[31180]: Invalid user asterisk from 200.70.56.202 port 34596 Jan 19 18:27:08 host sshd[31180]: input_userauth_request: invalid user asterisk [preauth] Jan 19 18:27:08 host sshd[31180]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:27:08 host sshd[31180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.202 Jan 19 18:27:09 host sshd[31185]: Invalid user db2inst1 from 103.240.110.130 port 55698 Jan 19 18:27:09 host sshd[31185]: input_userauth_request: invalid user db2inst1 [preauth] Jan 19 18:27:09 host sshd[31185]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:27:09 host sshd[31185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.240.110.130 Jan 19 18:27:11 host sshd[31180]: Failed password for invalid user asterisk from 200.70.56.202 port 34596 ssh2 Jan 19 18:27:11 host sshd[31185]: Failed password for invalid user db2inst1 from 103.240.110.130 port 55698 ssh2 Jan 19 18:27:11 host sshd[31185]: Received disconnect from 103.240.110.130 port 55698:11: Bye Bye [preauth] Jan 19 18:27:11 host sshd[31185]: Disconnected from 103.240.110.130 port 55698 [preauth] Jan 19 18:27:11 host sshd[31180]: Received disconnect from 200.70.56.202 port 34596:11: Bye Bye [preauth] Jan 19 18:27:11 host sshd[31180]: Disconnected from 200.70.56.202 port 34596 [preauth] Jan 19 18:27:12 host sshd[31189]: Invalid user uftp from 165.227.64.86 port 42012 Jan 19 18:27:12 host sshd[31189]: input_userauth_request: invalid user uftp [preauth] Jan 19 18:27:12 host sshd[31189]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:27:12 host sshd[31189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.64.86 Jan 19 18:27:14 host sshd[31189]: Failed password for invalid user uftp from 165.227.64.86 port 42012 ssh2 Jan 19 18:27:14 host sshd[31189]: Received disconnect from 165.227.64.86 port 42012:11: Bye Bye [preauth] Jan 19 18:27:14 host sshd[31189]: Disconnected from 165.227.64.86 port 42012 [preauth] Jan 19 18:29:37 host sshd[31511]: Invalid user vnc from 138.0.239.70 port 52664 Jan 19 18:29:37 host sshd[31511]: input_userauth_request: invalid user vnc [preauth] Jan 19 18:29:37 host sshd[31511]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:29:37 host sshd[31511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.0.239.70 Jan 19 18:29:39 host sshd[31511]: Failed password for invalid user vnc from 138.0.239.70 port 52664 ssh2 Jan 19 18:29:40 host sshd[31511]: Received disconnect from 138.0.239.70 port 52664:11: Bye Bye [preauth] Jan 19 18:29:40 host sshd[31511]: Disconnected from 138.0.239.70 port 52664 [preauth] Jan 19 18:30:01 host sshd[31565]: Invalid user factorio from 202.139.199.93 port 45796 Jan 19 18:30:01 host sshd[31565]: input_userauth_request: invalid user factorio [preauth] Jan 19 18:30:01 host sshd[31565]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:30:01 host sshd[31565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.139.199.93 Jan 19 18:30:03 host sshd[31565]: Failed password for invalid user factorio from 202.139.199.93 port 45796 ssh2 Jan 19 18:30:03 host sshd[31565]: Received disconnect from 202.139.199.93 port 45796:11: Bye Bye [preauth] Jan 19 18:30:03 host sshd[31565]: Disconnected from 202.139.199.93 port 45796 [preauth] Jan 19 18:31:06 host sshd[31741]: Invalid user scanner from 49.248.17.3 port 44286 Jan 19 18:31:06 host sshd[31741]: input_userauth_request: invalid user scanner [preauth] Jan 19 18:31:06 host sshd[31741]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:31:06 host sshd[31741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.17.3 Jan 19 18:31:08 host sshd[31741]: Failed password for invalid user scanner from 49.248.17.3 port 44286 ssh2 Jan 19 18:31:08 host sshd[31741]: Received disconnect from 49.248.17.3 port 44286:11: Bye Bye [preauth] Jan 19 18:31:08 host sshd[31741]: Disconnected from 49.248.17.3 port 44286 [preauth] Jan 19 18:31:15 host sshd[31758]: Invalid user samba from 103.115.24.11 port 50894 Jan 19 18:31:15 host sshd[31758]: input_userauth_request: invalid user samba [preauth] Jan 19 18:31:15 host sshd[31758]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:31:15 host sshd[31758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.24.11 Jan 19 18:31:17 host sshd[31758]: Failed password for invalid user samba from 103.115.24.11 port 50894 ssh2 Jan 19 18:31:17 host sshd[31758]: Received disconnect from 103.115.24.11 port 50894:11: Bye Bye [preauth] Jan 19 18:31:17 host sshd[31758]: Disconnected from 103.115.24.11 port 50894 [preauth] Jan 19 18:31:23 host sshd[31773]: Invalid user nvidia from 165.227.64.86 port 57232 Jan 19 18:31:23 host sshd[31773]: input_userauth_request: invalid user nvidia [preauth] Jan 19 18:31:23 host sshd[31773]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:31:23 host sshd[31773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.64.86 Jan 19 18:31:25 host sshd[31773]: Failed password for invalid user nvidia from 165.227.64.86 port 57232 ssh2 Jan 19 18:31:25 host sshd[31773]: Received disconnect from 165.227.64.86 port 57232:11: Bye Bye [preauth] Jan 19 18:31:25 host sshd[31773]: Disconnected from 165.227.64.86 port 57232 [preauth] Jan 19 18:31:34 host sshd[31813]: Invalid user apagar from 202.139.199.93 port 44798 Jan 19 18:31:34 host sshd[31813]: input_userauth_request: invalid user apagar [preauth] Jan 19 18:31:34 host sshd[31813]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:31:34 host sshd[31813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.139.199.93 Jan 19 18:31:36 host sshd[31813]: Failed password for invalid user apagar from 202.139.199.93 port 44798 ssh2 Jan 19 18:31:36 host sshd[31813]: Received disconnect from 202.139.199.93 port 44798:11: Bye Bye [preauth] Jan 19 18:31:36 host sshd[31813]: Disconnected from 202.139.199.93 port 44798 [preauth] Jan 19 18:31:50 host sshd[31842]: Invalid user hdfs from 43.155.130.86 port 53444 Jan 19 18:31:50 host sshd[31842]: input_userauth_request: invalid user hdfs [preauth] Jan 19 18:31:50 host sshd[31842]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:31:50 host sshd[31842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.130.86 Jan 19 18:31:53 host sshd[31842]: Failed password for invalid user hdfs from 43.155.130.86 port 53444 ssh2 Jan 19 18:31:53 host sshd[31842]: Received disconnect from 43.155.130.86 port 53444:11: Bye Bye [preauth] Jan 19 18:31:53 host sshd[31842]: Disconnected from 43.155.130.86 port 53444 [preauth] Jan 19 18:32:09 host sshd[31888]: Invalid user elastic from 138.0.239.70 port 55292 Jan 19 18:32:09 host sshd[31888]: input_userauth_request: invalid user elastic [preauth] Jan 19 18:32:09 host sshd[31888]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:32:09 host sshd[31888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.0.239.70 Jan 19 18:32:10 host sshd[31888]: Failed password for invalid user elastic from 138.0.239.70 port 55292 ssh2 Jan 19 18:32:11 host sshd[31888]: Received disconnect from 138.0.239.70 port 55292:11: Bye Bye [preauth] Jan 19 18:32:11 host sshd[31888]: Disconnected from 138.0.239.70 port 55292 [preauth] Jan 19 18:32:18 host sshd[31907]: Invalid user master from 103.240.110.130 port 45710 Jan 19 18:32:18 host sshd[31907]: input_userauth_request: invalid user master [preauth] Jan 19 18:32:18 host sshd[31907]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:32:18 host sshd[31907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.240.110.130 Jan 19 18:32:20 host sshd[31907]: Failed password for invalid user master from 103.240.110.130 port 45710 ssh2 Jan 19 18:32:20 host sshd[31907]: Received disconnect from 103.240.110.130 port 45710:11: Bye Bye [preauth] Jan 19 18:32:20 host sshd[31907]: Disconnected from 103.240.110.130 port 45710 [preauth] Jan 19 18:32:21 host sshd[31911]: Invalid user administrator from 165.227.64.86 port 51900 Jan 19 18:32:21 host sshd[31911]: input_userauth_request: invalid user administrator [preauth] Jan 19 18:32:21 host sshd[31911]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:32:21 host sshd[31911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.64.86 Jan 19 18:32:23 host sshd[31911]: Failed password for invalid user administrator from 165.227.64.86 port 51900 ssh2 Jan 19 18:32:23 host sshd[31911]: Received disconnect from 165.227.64.86 port 51900:11: Bye Bye [preauth] Jan 19 18:32:23 host sshd[31911]: Disconnected from 165.227.64.86 port 51900 [preauth] Jan 19 18:32:25 host sshd[31920]: Invalid user ventas from 49.248.17.3 port 40188 Jan 19 18:32:25 host sshd[31920]: input_userauth_request: invalid user ventas [preauth] Jan 19 18:32:25 host sshd[31920]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:32:25 host sshd[31920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.17.3 Jan 19 18:32:27 host sshd[31920]: Failed password for invalid user ventas from 49.248.17.3 port 40188 ssh2 Jan 19 18:32:27 host sshd[31920]: Received disconnect from 49.248.17.3 port 40188:11: Bye Bye [preauth] Jan 19 18:32:27 host sshd[31920]: Disconnected from 49.248.17.3 port 40188 [preauth] Jan 19 18:32:53 host sshd[32158]: Invalid user usuario from 202.139.199.93 port 38378 Jan 19 18:32:53 host sshd[32158]: input_userauth_request: invalid user usuario [preauth] Jan 19 18:32:53 host sshd[32158]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:32:53 host sshd[32158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.139.199.93 Jan 19 18:32:55 host sshd[32158]: Failed password for invalid user usuario from 202.139.199.93 port 38378 ssh2 Jan 19 18:32:55 host sshd[32158]: Received disconnect from 202.139.199.93 port 38378:11: Bye Bye [preauth] Jan 19 18:32:55 host sshd[32158]: Disconnected from 202.139.199.93 port 38378 [preauth] Jan 19 18:33:09 host sshd[32230]: Invalid user tom from 200.70.56.202 port 60694 Jan 19 18:33:09 host sshd[32230]: input_userauth_request: invalid user tom [preauth] Jan 19 18:33:09 host sshd[32230]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:33:09 host sshd[32230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.202 Jan 19 18:33:11 host sshd[32230]: Failed password for invalid user tom from 200.70.56.202 port 60694 ssh2 Jan 19 18:33:11 host sshd[32230]: Received disconnect from 200.70.56.202 port 60694:11: Bye Bye [preauth] Jan 19 18:33:11 host sshd[32230]: Disconnected from 200.70.56.202 port 60694 [preauth] Jan 19 18:33:15 host sshd[32243]: Invalid user test from 43.155.130.86 port 44446 Jan 19 18:33:15 host sshd[32243]: input_userauth_request: invalid user test [preauth] Jan 19 18:33:15 host sshd[32243]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:33:15 host sshd[32243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.130.86 Jan 19 18:33:17 host sshd[32249]: Invalid user user8 from 103.115.24.11 port 45182 Jan 19 18:33:17 host sshd[32249]: input_userauth_request: invalid user user8 [preauth] Jan 19 18:33:17 host sshd[32249]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:33:17 host sshd[32249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.24.11 Jan 19 18:33:17 host sshd[32243]: Failed password for invalid user test from 43.155.130.86 port 44446 ssh2 Jan 19 18:33:17 host sshd[32243]: Received disconnect from 43.155.130.86 port 44446:11: Bye Bye [preauth] Jan 19 18:33:17 host sshd[32243]: Disconnected from 43.155.130.86 port 44446 [preauth] Jan 19 18:33:19 host sshd[32249]: Failed password for invalid user user8 from 103.115.24.11 port 45182 ssh2 Jan 19 18:33:19 host sshd[32249]: Received disconnect from 103.115.24.11 port 45182:11: Bye Bye [preauth] Jan 19 18:33:19 host sshd[32249]: Disconnected from 103.115.24.11 port 45182 [preauth] Jan 19 18:33:32 host sshd[32295]: Invalid user glenn from 138.0.239.70 port 50254 Jan 19 18:33:32 host sshd[32295]: input_userauth_request: invalid user glenn [preauth] Jan 19 18:33:32 host sshd[32295]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:33:32 host sshd[32295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.0.239.70 Jan 19 18:33:35 host sshd[32295]: Failed password for invalid user glenn from 138.0.239.70 port 50254 ssh2 Jan 19 18:33:35 host sshd[32295]: Received disconnect from 138.0.239.70 port 50254:11: Bye Bye [preauth] Jan 19 18:33:35 host sshd[32295]: Disconnected from 138.0.239.70 port 50254 [preauth] Jan 19 18:33:56 host sshd[32377]: Invalid user temp from 103.240.110.130 port 44558 Jan 19 18:33:56 host sshd[32377]: input_userauth_request: invalid user temp [preauth] Jan 19 18:33:56 host sshd[32377]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:33:56 host sshd[32377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.240.110.130 Jan 19 18:33:58 host sshd[32377]: Failed password for invalid user temp from 103.240.110.130 port 44558 ssh2 Jan 19 18:34:29 host sshd[32492]: Invalid user david from 43.155.130.86 port 52702 Jan 19 18:34:29 host sshd[32492]: input_userauth_request: invalid user david [preauth] Jan 19 18:34:29 host sshd[32492]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:34:29 host sshd[32492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.130.86 Jan 19 18:34:31 host sshd[32492]: Failed password for invalid user david from 43.155.130.86 port 52702 ssh2 Jan 19 18:34:31 host sshd[32492]: Received disconnect from 43.155.130.86 port 52702:11: Bye Bye [preauth] Jan 19 18:34:31 host sshd[32492]: Disconnected from 43.155.130.86 port 52702 [preauth] Jan 19 18:34:57 host sshd[32581]: Invalid user www from 103.115.24.11 port 60436 Jan 19 18:34:57 host sshd[32581]: input_userauth_request: invalid user www [preauth] Jan 19 18:34:57 host sshd[32581]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:34:57 host sshd[32581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.24.11 Jan 19 18:35:00 host sshd[32581]: Failed password for invalid user www from 103.115.24.11 port 60436 ssh2 Jan 19 18:35:00 host sshd[32581]: Received disconnect from 103.115.24.11 port 60436:11: Bye Bye [preauth] Jan 19 18:35:00 host sshd[32581]: Disconnected from 103.115.24.11 port 60436 [preauth] Jan 19 18:35:01 host sshd[32586]: Invalid user ts2 from 200.70.56.202 port 60150 Jan 19 18:35:01 host sshd[32586]: input_userauth_request: invalid user ts2 [preauth] Jan 19 18:35:01 host sshd[32586]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:35:01 host sshd[32586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.70.56.202 Jan 19 18:35:04 host sshd[32586]: Failed password for invalid user ts2 from 200.70.56.202 port 60150 ssh2 Jan 19 18:45:09 host sshd[1757]: User root from 220.134.100.207 not allowed because not listed in AllowUsers Jan 19 18:45:09 host sshd[1757]: input_userauth_request: invalid user root [preauth] Jan 19 18:45:09 host unix_chkpwd[1762]: password check failed for user (root) Jan 19 18:45:09 host sshd[1757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.100.207 user=root Jan 19 18:45:09 host sshd[1757]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 18:45:11 host sshd[1757]: Failed password for invalid user root from 220.134.100.207 port 52660 ssh2 Jan 19 18:45:12 host unix_chkpwd[1766]: password check failed for user (root) Jan 19 18:45:12 host sshd[1757]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 18:45:14 host sshd[1757]: Failed password for invalid user root from 220.134.100.207 port 52660 ssh2 Jan 19 18:45:15 host sshd[1757]: Connection reset by 220.134.100.207 port 52660 [preauth] Jan 19 18:45:15 host sshd[1757]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.100.207 user=root Jan 19 18:45:28 host sshd[1799]: Invalid user gn from 194.110.203.109 port 56770 Jan 19 18:45:28 host sshd[1799]: input_userauth_request: invalid user gn [preauth] Jan 19 18:45:28 host sshd[1799]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:45:28 host sshd[1799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 18:45:30 host sshd[1799]: Failed password for invalid user gn from 194.110.203.109 port 56770 ssh2 Jan 19 18:45:34 host sshd[1799]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:45:36 host sshd[1799]: Failed password for invalid user gn from 194.110.203.109 port 56770 ssh2 Jan 19 18:45:39 host sshd[1799]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:45:42 host sshd[1799]: Failed password for invalid user gn from 194.110.203.109 port 56770 ssh2 Jan 19 18:45:45 host sshd[1799]: Connection closed by 194.110.203.109 port 56770 [preauth] Jan 19 18:45:45 host sshd[1799]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 18:46:16 host sshd[1902]: Invalid user nginx from 175.200.90.176 port 60705 Jan 19 18:46:16 host sshd[1902]: input_userauth_request: invalid user nginx [preauth] Jan 19 18:46:16 host sshd[1902]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:46:16 host sshd[1902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.200.90.176 Jan 19 18:46:19 host sshd[1902]: Failed password for invalid user nginx from 175.200.90.176 port 60705 ssh2 Jan 19 18:46:19 host sshd[1902]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:46:22 host sshd[1902]: Failed password for invalid user nginx from 175.200.90.176 port 60705 ssh2 Jan 19 18:46:23 host sshd[1902]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:46:24 host sshd[1902]: Failed password for invalid user nginx from 175.200.90.176 port 60705 ssh2 Jan 19 18:46:25 host sshd[1902]: Failed password for invalid user nginx from 175.200.90.176 port 60705 ssh2 Jan 19 18:46:26 host sshd[1902]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:46:28 host sshd[1902]: Failed password for invalid user nginx from 175.200.90.176 port 60705 ssh2 Jan 19 18:54:08 host sshd[2950]: Invalid user ubuntu from 59.11.37.70 port 59543 Jan 19 18:54:08 host sshd[2950]: input_userauth_request: invalid user ubuntu [preauth] Jan 19 18:54:08 host sshd[2950]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:54:08 host sshd[2950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.11.37.70 Jan 19 18:54:10 host sshd[2950]: Failed password for invalid user ubuntu from 59.11.37.70 port 59543 ssh2 Jan 19 18:54:12 host sshd[2950]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:54:14 host sshd[2950]: Failed password for invalid user ubuntu from 59.11.37.70 port 59543 ssh2 Jan 19 18:54:15 host sshd[2950]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:54:17 host sshd[2950]: Failed password for invalid user ubuntu from 59.11.37.70 port 59543 ssh2 Jan 19 18:54:18 host sshd[2950]: Failed password for invalid user ubuntu from 59.11.37.70 port 59543 ssh2 Jan 19 18:54:19 host sshd[2950]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:54:21 host sshd[2950]: Failed password for invalid user ubuntu from 59.11.37.70 port 59543 ssh2 Jan 19 18:54:21 host sshd[2950]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:54:24 host sshd[2950]: Failed password for invalid user ubuntu from 59.11.37.70 port 59543 ssh2 Jan 19 18:54:24 host sshd[2950]: error: maximum authentication attempts exceeded for invalid user ubuntu from 59.11.37.70 port 59543 ssh2 [preauth] Jan 19 18:54:24 host sshd[2950]: Disconnecting: Too many authentication failures [preauth] Jan 19 18:54:24 host sshd[2950]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.11.37.70 Jan 19 18:54:24 host sshd[2950]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 19 18:55:17 host sshd[3217]: Invalid user ubnt from 114.33.46.107 port 47744 Jan 19 18:55:17 host sshd[3217]: input_userauth_request: invalid user ubnt [preauth] Jan 19 18:55:17 host sshd[3217]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:55:17 host sshd[3217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.46.107 Jan 19 18:55:19 host sshd[3217]: Failed password for invalid user ubnt from 114.33.46.107 port 47744 ssh2 Jan 19 18:55:21 host sshd[3217]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:55:23 host sshd[3217]: Failed password for invalid user ubnt from 114.33.46.107 port 47744 ssh2 Jan 19 18:55:24 host sshd[3217]: Failed password for invalid user ubnt from 114.33.46.107 port 47744 ssh2 Jan 19 18:55:25 host sshd[3217]: pam_unix(sshd:auth): check pass; user unknown Jan 19 18:55:27 host sshd[3217]: Failed password for invalid user ubnt from 114.33.46.107 port 47744 ssh2 Jan 19 19:07:38 host sshd[4879]: Invalid user vadmin from 114.32.168.57 port 40515 Jan 19 19:07:38 host sshd[4879]: input_userauth_request: invalid user vadmin [preauth] Jan 19 19:07:38 host sshd[4879]: pam_unix(sshd:auth): check pass; user unknown Jan 19 19:07:38 host sshd[4879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.168.57 Jan 19 19:07:41 host sshd[4879]: Failed password for invalid user vadmin from 114.32.168.57 port 40515 ssh2 Jan 19 19:07:41 host sshd[4879]: pam_unix(sshd:auth): check pass; user unknown Jan 19 19:07:43 host sshd[4879]: Failed password for invalid user vadmin from 114.32.168.57 port 40515 ssh2 Jan 19 19:07:44 host sshd[4879]: Failed password for invalid user vadmin from 114.32.168.57 port 40515 ssh2 Jan 19 19:07:44 host sshd[4879]: Connection closed by 114.32.168.57 port 40515 [preauth] Jan 19 19:07:44 host sshd[4879]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.168.57 Jan 19 19:18:17 host sshd[6657]: Invalid user test from 67.205.135.136 port 57930 Jan 19 19:18:17 host sshd[6657]: input_userauth_request: invalid user test [preauth] Jan 19 19:18:17 host sshd[6657]: pam_unix(sshd:auth): check pass; user unknown Jan 19 19:18:17 host sshd[6657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.135.136 Jan 19 19:18:19 host sshd[6657]: Failed password for invalid user test from 67.205.135.136 port 57930 ssh2 Jan 19 19:18:19 host sshd[6657]: Received disconnect from 67.205.135.136 port 57930:11: Bye Bye [preauth] Jan 19 19:18:19 host sshd[6657]: Disconnected from 67.205.135.136 port 57930 [preauth] Jan 19 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=ugotscom user-8=wwwrmswll user-9=wwwresourcehunte user-10=keralaholi user-11=travelboniface user-12=woodpeck user-13=wwwkapin user-14=disposeat user-15=wwwkmaorg user-16=remysagr user-17=pmcresources user-18=wwwtestugo user-19=shalinijames user-20=vfmassets user-21=wwwletsstalkfood user-22=straightcurve user-23=wwwevmhonda user-24=bonifacegroup user-25=wwwnexidigital user-26=mrsclean user-27=phmetals user-28=kottayamcalldriv user-29=gifterman user-30=palco123 feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 19:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bH1cEGnqFHU49Vgg.~ Jan 19 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bH1cEGnqFHU49Vgg.~' Jan 19 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-bH1cEGnqFHU49Vgg.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 19:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 19:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 19:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 19:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 19:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 19:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 19:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 19:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 19:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 19:23:24 host sshd[7570]: Invalid user super from 131.129.129.40 port 45816 Jan 19 19:23:24 host sshd[7570]: input_userauth_request: invalid user super [preauth] Jan 19 19:23:24 host sshd[7570]: pam_unix(sshd:auth): check pass; user unknown Jan 19 19:23:24 host sshd[7570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.129.129.40 Jan 19 19:23:26 host sshd[7570]: Failed password for invalid user super from 131.129.129.40 port 45816 ssh2 Jan 19 19:23:26 host sshd[7570]: pam_unix(sshd:auth): check pass; user unknown Jan 19 19:23:27 host sshd[7574]: Invalid user hikvision from 131.129.129.40 port 45804 Jan 19 19:23:27 host sshd[7574]: input_userauth_request: invalid user hikvision [preauth] Jan 19 19:23:27 host sshd[7574]: pam_unix(sshd:auth): check pass; user unknown Jan 19 19:23:27 host sshd[7574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.129.129.40 Jan 19 19:23:28 host sshd[7570]: Failed password for invalid user super from 131.129.129.40 port 45816 ssh2 Jan 19 19:23:28 host sshd[7570]: pam_unix(sshd:auth): check pass; user unknown Jan 19 19:23:29 host sshd[7574]: Failed password for invalid user hikvision from 131.129.129.40 port 45804 ssh2 Jan 19 19:23:29 host sshd[7574]: pam_unix(sshd:auth): check pass; user unknown Jan 19 19:23:30 host sshd[7570]: Failed password for invalid user super from 131.129.129.40 port 45816 ssh2 Jan 19 19:23:30 host sshd[7570]: Connection reset by 131.129.129.40 port 45816 [preauth] Jan 19 19:23:30 host sshd[7570]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.129.129.40 Jan 19 19:23:31 host sshd[7574]: Failed password for invalid user hikvision from 131.129.129.40 port 45804 ssh2 Jan 19 19:23:31 host sshd[7574]: Connection reset by 131.129.129.40 port 45804 [preauth] Jan 19 19:23:31 host sshd[7574]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.129.129.40 Jan 19 19:30:32 host sshd[8701]: Invalid user jupyter from 130.61.228.129 port 35942 Jan 19 19:30:32 host sshd[8701]: input_userauth_request: invalid user jupyter [preauth] Jan 19 19:30:32 host sshd[8701]: pam_unix(sshd:auth): check pass; user unknown Jan 19 19:30:32 host sshd[8701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.228.129 Jan 19 19:30:34 host sshd[8701]: Failed password for invalid user jupyter from 130.61.228.129 port 35942 ssh2 Jan 19 19:30:34 host sshd[8701]: Received disconnect from 130.61.228.129 port 35942:11: Bye Bye [preauth] Jan 19 19:30:34 host sshd[8701]: Disconnected from 130.61.228.129 port 35942 [preauth] Jan 19 19:31:36 host sshd[8849]: Invalid user testuser from 130.61.228.129 port 51842 Jan 19 19:31:36 host sshd[8849]: input_userauth_request: invalid user testuser [preauth] Jan 19 19:31:36 host sshd[8849]: pam_unix(sshd:auth): check pass; user unknown Jan 19 19:31:36 host sshd[8849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.228.129 Jan 19 19:31:38 host sshd[8849]: Failed password for invalid user testuser from 130.61.228.129 port 51842 ssh2 Jan 19 19:31:38 host sshd[8849]: Received disconnect from 130.61.228.129 port 51842:11: Bye Bye [preauth] Jan 19 19:31:38 host sshd[8849]: Disconnected from 130.61.228.129 port 51842 [preauth] Jan 19 19:32:05 host sshd[8908]: Invalid user test1 from 101.36.121.124 port 54914 Jan 19 19:32:05 host sshd[8908]: input_userauth_request: invalid user test1 [preauth] Jan 19 19:32:05 host sshd[8908]: pam_unix(sshd:auth): check pass; user unknown Jan 19 19:32:05 host sshd[8908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.121.124 Jan 19 19:32:07 host sshd[8908]: Failed password for invalid user test1 from 101.36.121.124 port 54914 ssh2 Jan 19 19:32:07 host sshd[8908]: Received disconnect from 101.36.121.124 port 54914:11: Bye Bye [preauth] Jan 19 19:32:07 host sshd[8908]: Disconnected from 101.36.121.124 port 54914 [preauth] Jan 19 19:32:35 host sshd[8972]: User operator from 130.61.228.129 not allowed because not listed in AllowUsers Jan 19 19:32:35 host sshd[8972]: input_userauth_request: invalid user operator [preauth] Jan 19 19:32:35 host unix_chkpwd[8975]: password check failed for user (operator) Jan 19 19:32:35 host sshd[8972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.228.129 user=operator Jan 19 19:32:35 host sshd[8972]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "operator" Jan 19 19:32:37 host sshd[8972]: Failed password for invalid user operator from 130.61.228.129 port 34417 ssh2 Jan 19 19:32:37 host sshd[8972]: Received disconnect from 130.61.228.129 port 34417:11: Bye Bye [preauth] Jan 19 19:32:37 host sshd[8972]: Disconnected from 130.61.228.129 port 34417 [preauth] Jan 19 19:33:32 host sshd[9119]: User sshd from 194.169.175.102 not allowed because not listed in AllowUsers Jan 19 19:33:32 host sshd[9119]: input_userauth_request: invalid user sshd [preauth] Jan 19 19:33:32 host unix_chkpwd[9124]: password check failed for user (sshd) Jan 19 19:33:32 host sshd[9119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=sshd Jan 19 19:33:32 host sshd[9119]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sshd" Jan 19 19:33:34 host sshd[9119]: Failed password for invalid user sshd from 194.169.175.102 port 64779 ssh2 Jan 19 19:33:34 host sshd[9119]: Received disconnect from 194.169.175.102 port 64779:11: Client disconnecting normally [preauth] Jan 19 19:33:34 host sshd[9119]: Disconnected from 194.169.175.102 port 64779 [preauth] Jan 19 19:34:06 host sshd[9178]: Invalid user azureuser from 101.36.121.124 port 44158 Jan 19 19:34:06 host sshd[9178]: input_userauth_request: invalid user azureuser [preauth] Jan 19 19:34:06 host sshd[9178]: pam_unix(sshd:auth): check pass; user unknown Jan 19 19:34:06 host sshd[9178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.121.124 Jan 19 19:34:09 host sshd[9178]: Failed password for invalid user azureuser from 101.36.121.124 port 44158 ssh2 Jan 19 19:34:09 host sshd[9178]: Received disconnect from 101.36.121.124 port 44158:11: Bye Bye [preauth] Jan 19 19:34:09 host sshd[9178]: Disconnected from 101.36.121.124 port 44158 [preauth] Jan 19 19:35:29 host sshd[9393]: Invalid user ftpadmin from 101.36.121.124 port 57848 Jan 19 19:35:29 host sshd[9393]: input_userauth_request: invalid user ftpadmin [preauth] Jan 19 19:35:29 host sshd[9393]: pam_unix(sshd:auth): check pass; user unknown Jan 19 19:35:29 host sshd[9393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.121.124 Jan 19 19:35:31 host sshd[9393]: Failed password for invalid user ftpadmin from 101.36.121.124 port 57848 ssh2 Jan 19 19:35:31 host sshd[9393]: Received disconnect from 101.36.121.124 port 57848:11: Bye Bye [preauth] Jan 19 19:35:31 host sshd[9393]: Disconnected from 101.36.121.124 port 57848 [preauth] Jan 19 20:10:37 host sshd[14704]: Connection closed by 147.139.5.108 port 46874 [preauth] Jan 19 20:18:24 host sshd[15811]: Invalid user super from 60.244.213.73 port 56993 Jan 19 20:18:24 host sshd[15811]: input_userauth_request: invalid user super [preauth] Jan 19 20:18:24 host sshd[15811]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:18:24 host sshd[15811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.244.213.73 Jan 19 20:18:26 host sshd[15811]: Failed password for invalid user super from 60.244.213.73 port 56993 ssh2 Jan 19 20:18:27 host sshd[15811]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:18:29 host sshd[15811]: Failed password for invalid user super from 60.244.213.73 port 56993 ssh2 Jan 19 20:18:29 host sshd[15811]: Connection reset by 60.244.213.73 port 56993 [preauth] Jan 19 20:18:29 host sshd[15811]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.244.213.73 Jan 19 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=bonifacegroup user-4=wwwevmhonda user-5=mrsclean user-6=wwwnexidigital user-7=palco123 user-8=gifterman user-9=phmetals user-10=kottayamcalldriv user-11=woodpeck user-12=wwwkapin user-13=wwwkmaorg user-14=disposeat user-15=remysagr user-16=pmcresources user-17=vfmassets user-18=shalinijames user-19=wwwtestugo user-20=wwwpmcresource user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=ugotscom user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 20:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cxJWLLkuFY0R3PTa.~ Jan 19 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cxJWLLkuFY0R3PTa.~' Jan 19 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-cxJWLLkuFY0R3PTa.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 20:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 20:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 20:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 20:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 20:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 20:27:13 host sshd[17258]: Invalid user go from 194.110.203.109 port 59192 Jan 19 20:27:13 host sshd[17258]: input_userauth_request: invalid user go [preauth] Jan 19 20:27:13 host sshd[17258]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:27:13 host sshd[17258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 20:27:15 host sshd[17258]: Failed password for invalid user go from 194.110.203.109 port 59192 ssh2 Jan 19 20:27:19 host sshd[17258]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:27:21 host sshd[17258]: Failed password for invalid user go from 194.110.203.109 port 59192 ssh2 Jan 19 20:27:24 host sshd[17258]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:27:26 host sshd[17258]: Failed password for invalid user go from 194.110.203.109 port 59192 ssh2 Jan 19 20:27:29 host sshd[17258]: Connection closed by 194.110.203.109 port 59192 [preauth] Jan 19 20:27:29 host sshd[17258]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 20:32:36 host sshd[18004]: Invalid user pi from 220.134.6.194 port 33215 Jan 19 20:32:36 host sshd[18004]: input_userauth_request: invalid user pi [preauth] Jan 19 20:32:36 host sshd[18004]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:32:36 host sshd[18004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.6.194 Jan 19 20:32:38 host sshd[18004]: Failed password for invalid user pi from 220.134.6.194 port 33215 ssh2 Jan 19 20:32:38 host sshd[18004]: Connection reset by 220.134.6.194 port 33215 [preauth] Jan 19 20:36:30 host sshd[18562]: Invalid user Admin from 59.2.56.154 port 40388 Jan 19 20:36:30 host sshd[18562]: input_userauth_request: invalid user Admin [preauth] Jan 19 20:36:30 host sshd[18562]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:36:30 host sshd[18562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.2.56.154 Jan 19 20:36:32 host sshd[18562]: Failed password for invalid user Admin from 59.2.56.154 port 40388 ssh2 Jan 19 20:36:38 host sshd[18562]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:36:40 host sshd[18562]: Failed password for invalid user Admin from 59.2.56.154 port 40388 ssh2 Jan 19 20:36:42 host sshd[18562]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:36:44 host sshd[18562]: Failed password for invalid user Admin from 59.2.56.154 port 40388 ssh2 Jan 19 20:36:45 host sshd[18562]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:36:48 host sshd[18562]: Failed password for invalid user Admin from 59.2.56.154 port 40388 ssh2 Jan 19 20:45:17 host sshd[20203]: Invalid user ts from 114.206.23.151 port 35238 Jan 19 20:45:17 host sshd[20203]: input_userauth_request: invalid user ts [preauth] Jan 19 20:45:17 host sshd[20203]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:45:17 host sshd[20203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.206.23.151 Jan 19 20:45:19 host sshd[20203]: Failed password for invalid user ts from 114.206.23.151 port 35238 ssh2 Jan 19 20:45:19 host sshd[20203]: Received disconnect from 114.206.23.151 port 35238:11: Bye Bye [preauth] Jan 19 20:45:19 host sshd[20203]: Disconnected from 114.206.23.151 port 35238 [preauth] Jan 19 20:45:32 host sshd[20240]: Connection reset by 118.41.108.141 port 50043 [preauth] Jan 19 20:46:03 host sshd[20300]: Invalid user test1 from 122.170.105.253 port 60156 Jan 19 20:46:03 host sshd[20300]: input_userauth_request: invalid user test1 [preauth] Jan 19 20:46:03 host sshd[20300]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:46:03 host sshd[20300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.170.105.253 Jan 19 20:46:06 host sshd[20300]: Failed password for invalid user test1 from 122.170.105.253 port 60156 ssh2 Jan 19 20:46:06 host sshd[20300]: Received disconnect from 122.170.105.253 port 60156:11: Bye Bye [preauth] Jan 19 20:46:06 host sshd[20300]: Disconnected from 122.170.105.253 port 60156 [preauth] Jan 19 20:46:44 host sshd[20371]: Invalid user compras from 98.243.72.196 port 52938 Jan 19 20:46:44 host sshd[20371]: input_userauth_request: invalid user compras [preauth] Jan 19 20:46:44 host sshd[20371]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:46:44 host sshd[20371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.243.72.196 Jan 19 20:46:46 host sshd[20371]: Failed password for invalid user compras from 98.243.72.196 port 52938 ssh2 Jan 19 20:46:46 host sshd[20371]: Received disconnect from 98.243.72.196 port 52938:11: Bye Bye [preauth] Jan 19 20:46:46 host sshd[20371]: Disconnected from 98.243.72.196 port 52938 [preauth] Jan 19 20:47:51 host sshd[20512]: Invalid user student from 207.154.228.201 port 40570 Jan 19 20:47:51 host sshd[20512]: input_userauth_request: invalid user student [preauth] Jan 19 20:47:51 host sshd[20512]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:47:51 host sshd[20512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.228.201 Jan 19 20:47:53 host sshd[20512]: Failed password for invalid user student from 207.154.228.201 port 40570 ssh2 Jan 19 20:47:53 host sshd[20512]: Received disconnect from 207.154.228.201 port 40570:11: Bye Bye [preauth] Jan 19 20:47:53 host sshd[20512]: Disconnected from 207.154.228.201 port 40570 [preauth] Jan 19 20:48:48 host sshd[20618]: Invalid user panda from 105.96.11.65 port 45976 Jan 19 20:48:48 host sshd[20618]: input_userauth_request: invalid user panda [preauth] Jan 19 20:48:48 host sshd[20618]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:48:48 host sshd[20618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.96.11.65 Jan 19 20:48:50 host sshd[20618]: Failed password for invalid user panda from 105.96.11.65 port 45976 ssh2 Jan 19 20:48:51 host sshd[20618]: Received disconnect from 105.96.11.65 port 45976:11: Bye Bye [preauth] Jan 19 20:48:51 host sshd[20618]: Disconnected from 105.96.11.65 port 45976 [preauth] Jan 19 20:49:35 host sshd[20707]: Invalid user minecraft from 177.76.246.1 port 40876 Jan 19 20:49:35 host sshd[20707]: input_userauth_request: invalid user minecraft [preauth] Jan 19 20:49:35 host sshd[20707]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:49:35 host sshd[20707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.76.246.1 Jan 19 20:49:37 host sshd[20707]: Failed password for invalid user minecraft from 177.76.246.1 port 40876 ssh2 Jan 19 20:49:37 host sshd[20707]: Received disconnect from 177.76.246.1 port 40876:11: Bye Bye [preauth] Jan 19 20:49:37 host sshd[20707]: Disconnected from 177.76.246.1 port 40876 [preauth] Jan 19 20:49:45 host sshd[20828]: Invalid user adsl from 167.71.77.9 port 55648 Jan 19 20:49:45 host sshd[20828]: input_userauth_request: invalid user adsl [preauth] Jan 19 20:49:45 host sshd[20828]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:49:45 host sshd[20828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.77.9 Jan 19 20:49:47 host sshd[20828]: Failed password for invalid user adsl from 167.71.77.9 port 55648 ssh2 Jan 19 20:49:47 host sshd[20828]: Received disconnect from 167.71.77.9 port 55648:11: Bye Bye [preauth] Jan 19 20:49:47 host sshd[20828]: Disconnected from 167.71.77.9 port 55648 [preauth] Jan 19 20:50:24 host sshd[20921]: Invalid user user from 222.120.209.218 port 61888 Jan 19 20:50:24 host sshd[20921]: input_userauth_request: invalid user user [preauth] Jan 19 20:50:24 host sshd[20921]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:50:24 host sshd[20921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.120.209.218 Jan 19 20:50:26 host sshd[20921]: Failed password for invalid user user from 222.120.209.218 port 61888 ssh2 Jan 19 20:50:27 host sshd[20921]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:50:30 host sshd[20921]: Failed password for invalid user user from 222.120.209.218 port 61888 ssh2 Jan 19 20:50:30 host sshd[20921]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:50:32 host sshd[20921]: Failed password for invalid user user from 222.120.209.218 port 61888 ssh2 Jan 19 20:50:32 host sshd[20921]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:50:33 host sshd[20964]: Invalid user seafile from 165.154.253.141 port 38436 Jan 19 20:50:33 host sshd[20964]: input_userauth_request: invalid user seafile [preauth] Jan 19 20:50:33 host sshd[20964]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:50:33 host sshd[20964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.253.141 Jan 19 20:50:34 host sshd[20921]: Failed password for invalid user user from 222.120.209.218 port 61888 ssh2 Jan 19 20:50:36 host sshd[20921]: Connection reset by 222.120.209.218 port 61888 [preauth] Jan 19 20:50:36 host sshd[20921]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.120.209.218 Jan 19 20:50:36 host sshd[20921]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 19 20:50:36 host sshd[20964]: Failed password for invalid user seafile from 165.154.253.141 port 38436 ssh2 Jan 19 20:50:36 host sshd[20964]: Received disconnect from 165.154.253.141 port 38436:11: Bye Bye [preauth] Jan 19 20:50:36 host sshd[20964]: Disconnected from 165.154.253.141 port 38436 [preauth] Jan 19 20:51:32 host sshd[21107]: Invalid user csgoserver from 207.154.228.201 port 56822 Jan 19 20:51:32 host sshd[21107]: input_userauth_request: invalid user csgoserver [preauth] Jan 19 20:51:32 host sshd[21107]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:51:32 host sshd[21107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.228.201 Jan 19 20:51:34 host sshd[21107]: Failed password for invalid user csgoserver from 207.154.228.201 port 56822 ssh2 Jan 19 20:51:34 host sshd[21107]: Received disconnect from 207.154.228.201 port 56822:11: Bye Bye [preauth] Jan 19 20:51:34 host sshd[21107]: Disconnected from 207.154.228.201 port 56822 [preauth] Jan 19 20:51:59 host sshd[21144]: Invalid user user4 from 167.71.77.9 port 37816 Jan 19 20:51:59 host sshd[21144]: input_userauth_request: invalid user user4 [preauth] Jan 19 20:51:59 host sshd[21144]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:51:59 host sshd[21144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.77.9 Jan 19 20:52:00 host sshd[21144]: Failed password for invalid user user4 from 167.71.77.9 port 37816 ssh2 Jan 19 20:52:00 host sshd[21144]: Received disconnect from 167.71.77.9 port 37816:11: Bye Bye [preauth] Jan 19 20:52:00 host sshd[21144]: Disconnected from 167.71.77.9 port 37816 [preauth] Jan 19 20:52:09 host sshd[21169]: Invalid user bot from 114.206.23.151 port 40018 Jan 19 20:52:09 host sshd[21169]: input_userauth_request: invalid user bot [preauth] Jan 19 20:52:09 host sshd[21169]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:52:09 host sshd[21169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.206.23.151 Jan 19 20:52:12 host sshd[21169]: Failed password for invalid user bot from 114.206.23.151 port 40018 ssh2 Jan 19 20:52:12 host sshd[21169]: Received disconnect from 114.206.23.151 port 40018:11: Bye Bye [preauth] Jan 19 20:52:12 host sshd[21169]: Disconnected from 114.206.23.151 port 40018 [preauth] Jan 19 20:52:12 host sshd[21166]: Invalid user deploy from 177.76.246.1 port 53822 Jan 19 20:52:12 host sshd[21166]: input_userauth_request: invalid user deploy [preauth] Jan 19 20:52:12 host sshd[21166]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:52:12 host sshd[21166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.76.246.1 Jan 19 20:52:14 host sshd[21166]: Failed password for invalid user deploy from 177.76.246.1 port 53822 ssh2 Jan 19 20:52:14 host sshd[21166]: Received disconnect from 177.76.246.1 port 53822:11: Bye Bye [preauth] Jan 19 20:52:14 host sshd[21166]: Disconnected from 177.76.246.1 port 53822 [preauth] Jan 19 20:52:18 host sshd[21184]: Invalid user magento from 122.170.105.253 port 46544 Jan 19 20:52:18 host sshd[21184]: input_userauth_request: invalid user magento [preauth] Jan 19 20:52:18 host sshd[21184]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:52:18 host sshd[21184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.170.105.253 Jan 19 20:52:19 host sshd[21182]: Invalid user jason from 98.243.72.196 port 53156 Jan 19 20:52:19 host sshd[21182]: input_userauth_request: invalid user jason [preauth] Jan 19 20:52:19 host sshd[21182]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:52:19 host sshd[21182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.243.72.196 Jan 19 20:52:19 host sshd[21184]: Failed password for invalid user magento from 122.170.105.253 port 46544 ssh2 Jan 19 20:52:19 host sshd[21184]: Received disconnect from 122.170.105.253 port 46544:11: Bye Bye [preauth] Jan 19 20:52:19 host sshd[21184]: Disconnected from 122.170.105.253 port 46544 [preauth] Jan 19 20:52:20 host sshd[21182]: Failed password for invalid user jason from 98.243.72.196 port 53156 ssh2 Jan 19 20:52:21 host sshd[21182]: Received disconnect from 98.243.72.196 port 53156:11: Bye Bye [preauth] Jan 19 20:52:21 host sshd[21182]: Disconnected from 98.243.72.196 port 53156 [preauth] Jan 19 20:52:37 host sshd[21235]: Invalid user vagrant from 207.154.228.201 port 55616 Jan 19 20:52:37 host sshd[21235]: input_userauth_request: invalid user vagrant [preauth] Jan 19 20:52:37 host sshd[21235]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:52:37 host sshd[21235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.228.201 Jan 19 20:52:38 host sshd[21235]: Failed password for invalid user vagrant from 207.154.228.201 port 55616 ssh2 Jan 19 20:52:38 host sshd[21235]: Received disconnect from 207.154.228.201 port 55616:11: Bye Bye [preauth] Jan 19 20:52:38 host sshd[21235]: Disconnected from 207.154.228.201 port 55616 [preauth] Jan 19 20:52:47 host sshd[21282]: Invalid user user from 165.154.253.141 port 12590 Jan 19 20:52:47 host sshd[21282]: input_userauth_request: invalid user user [preauth] Jan 19 20:52:47 host sshd[21282]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:52:47 host sshd[21282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.253.141 Jan 19 20:52:49 host sshd[21282]: Failed password for invalid user user from 165.154.253.141 port 12590 ssh2 Jan 19 20:52:49 host sshd[21282]: Received disconnect from 165.154.253.141 port 12590:11: Bye Bye [preauth] Jan 19 20:52:49 host sshd[21282]: Disconnected from 165.154.253.141 port 12590 [preauth] Jan 19 20:53:04 host sshd[21324]: Invalid user smart from 167.71.77.9 port 36766 Jan 19 20:53:04 host sshd[21324]: input_userauth_request: invalid user smart [preauth] Jan 19 20:53:04 host sshd[21324]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:53:04 host sshd[21324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.77.9 Jan 19 20:53:06 host sshd[21324]: Failed password for invalid user smart from 167.71.77.9 port 36766 ssh2 Jan 19 20:53:06 host sshd[21324]: Received disconnect from 167.71.77.9 port 36766:11: Bye Bye [preauth] Jan 19 20:53:06 host sshd[21324]: Disconnected from 167.71.77.9 port 36766 [preauth] Jan 19 20:53:21 host sshd[21378]: Invalid user gitlab from 114.206.23.151 port 55138 Jan 19 20:53:21 host sshd[21378]: input_userauth_request: invalid user gitlab [preauth] Jan 19 20:53:21 host sshd[21378]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:53:21 host sshd[21378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.206.23.151 Jan 19 20:53:24 host sshd[21378]: Failed password for invalid user gitlab from 114.206.23.151 port 55138 ssh2 Jan 19 20:53:24 host sshd[21378]: Received disconnect from 114.206.23.151 port 55138:11: Bye Bye [preauth] Jan 19 20:53:24 host sshd[21378]: Disconnected from 114.206.23.151 port 55138 [preauth] Jan 19 20:53:27 host sshd[21385]: Invalid user ec2-user from 98.243.72.196 port 53250 Jan 19 20:53:27 host sshd[21385]: input_userauth_request: invalid user ec2-user [preauth] Jan 19 20:53:27 host sshd[21385]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:53:27 host sshd[21385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.243.72.196 Jan 19 20:53:29 host sshd[21385]: Failed password for invalid user ec2-user from 98.243.72.196 port 53250 ssh2 Jan 19 20:53:29 host sshd[21385]: Received disconnect from 98.243.72.196 port 53250:11: Bye Bye [preauth] Jan 19 20:53:29 host sshd[21385]: Disconnected from 98.243.72.196 port 53250 [preauth] Jan 19 20:53:30 host sshd[21440]: Invalid user jenkins from 177.76.246.1 port 33242 Jan 19 20:53:30 host sshd[21440]: input_userauth_request: invalid user jenkins [preauth] Jan 19 20:53:30 host sshd[21440]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:53:30 host sshd[21440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.76.246.1 Jan 19 20:53:31 host sshd[21446]: Invalid user db2inst1 from 122.170.105.253 port 40468 Jan 19 20:53:31 host sshd[21446]: input_userauth_request: invalid user db2inst1 [preauth] Jan 19 20:53:31 host sshd[21446]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:53:31 host sshd[21446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.170.105.253 Jan 19 20:53:31 host sshd[21440]: Failed password for invalid user jenkins from 177.76.246.1 port 33242 ssh2 Jan 19 20:53:32 host sshd[21440]: Received disconnect from 177.76.246.1 port 33242:11: Bye Bye [preauth] Jan 19 20:53:32 host sshd[21440]: Disconnected from 177.76.246.1 port 33242 [preauth] Jan 19 20:53:32 host sshd[21446]: Failed password for invalid user db2inst1 from 122.170.105.253 port 40468 ssh2 Jan 19 20:54:07 host sshd[21602]: Invalid user steam from 165.154.253.141 port 35466 Jan 19 20:54:07 host sshd[21602]: input_userauth_request: invalid user steam [preauth] Jan 19 20:54:07 host sshd[21602]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:54:07 host sshd[21602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.253.141 Jan 19 20:54:09 host sshd[21602]: Failed password for invalid user steam from 165.154.253.141 port 35466 ssh2 Jan 19 20:54:09 host sshd[21602]: Received disconnect from 165.154.253.141 port 35466:11: Bye Bye [preauth] Jan 19 20:54:09 host sshd[21602]: Disconnected from 165.154.253.141 port 35466 [preauth] Jan 19 20:57:34 host sshd[22158]: Invalid user admin from 183.107.45.127 port 49395 Jan 19 20:57:34 host sshd[22158]: input_userauth_request: invalid user admin [preauth] Jan 19 20:57:34 host sshd[22158]: pam_unix(sshd:auth): check pass; user unknown Jan 19 20:57:34 host sshd[22158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.107.45.127 Jan 19 20:57:36 host sshd[22158]: Failed password for invalid user admin from 183.107.45.127 port 49395 ssh2 Jan 19 20:57:37 host sshd[22158]: Connection closed by 183.107.45.127 port 49395 [preauth] Jan 19 20:58:26 host sshd[22250]: Connection reset by 112.172.237.26 port 63357 [preauth] Jan 19 21:11:56 host sshd[24448]: Invalid user gmodserver from 51.250.54.145 port 43916 Jan 19 21:11:56 host sshd[24448]: input_userauth_request: invalid user gmodserver [preauth] Jan 19 21:11:56 host sshd[24448]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:11:56 host sshd[24448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.54.145 Jan 19 21:11:58 host sshd[24448]: Failed password for invalid user gmodserver from 51.250.54.145 port 43916 ssh2 Jan 19 21:11:59 host sshd[24448]: Received disconnect from 51.250.54.145 port 43916:11: Bye Bye [preauth] Jan 19 21:11:59 host sshd[24448]: Disconnected from 51.250.54.145 port 43916 [preauth] Jan 19 21:12:15 host sshd[24484]: Invalid user nexus from 142.93.220.110 port 33390 Jan 19 21:12:15 host sshd[24484]: input_userauth_request: invalid user nexus [preauth] Jan 19 21:12:15 host sshd[24484]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:12:15 host sshd[24484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.220.110 Jan 19 21:12:17 host sshd[24484]: Failed password for invalid user nexus from 142.93.220.110 port 33390 ssh2 Jan 19 21:12:17 host sshd[24484]: Received disconnect from 142.93.220.110 port 33390:11: Bye Bye [preauth] Jan 19 21:12:17 host sshd[24484]: Disconnected from 142.93.220.110 port 33390 [preauth] Jan 19 21:16:05 host sshd[25089]: Invalid user compras from 146.190.127.140 port 45444 Jan 19 21:16:05 host sshd[25089]: input_userauth_request: invalid user compras [preauth] Jan 19 21:16:05 host sshd[25089]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:16:05 host sshd[25089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.127.140 Jan 19 21:16:07 host sshd[25089]: Failed password for invalid user compras from 146.190.127.140 port 45444 ssh2 Jan 19 21:16:07 host sshd[25089]: Received disconnect from 146.190.127.140 port 45444:11: Bye Bye [preauth] Jan 19 21:16:07 host sshd[25089]: Disconnected from 146.190.127.140 port 45444 [preauth] Jan 19 21:17:04 host sshd[25289]: Invalid user testftp from 197.227.8.186 port 25381 Jan 19 21:17:04 host sshd[25289]: input_userauth_request: invalid user testftp [preauth] Jan 19 21:17:04 host sshd[25289]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:17:04 host sshd[25289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.8.186 Jan 19 21:17:06 host sshd[25289]: Failed password for invalid user testftp from 197.227.8.186 port 25381 ssh2 Jan 19 21:17:06 host sshd[25289]: Received disconnect from 197.227.8.186 port 25381:11: Bye Bye [preauth] Jan 19 21:17:06 host sshd[25289]: Disconnected from 197.227.8.186 port 25381 [preauth] Jan 19 21:18:06 host sshd[25389]: Invalid user ben from 146.190.127.140 port 50116 Jan 19 21:18:06 host sshd[25389]: input_userauth_request: invalid user ben [preauth] Jan 19 21:18:06 host sshd[25389]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:18:06 host sshd[25389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.127.140 Jan 19 21:18:08 host sshd[25389]: Failed password for invalid user ben from 146.190.127.140 port 50116 ssh2 Jan 19 21:18:08 host sshd[25389]: Received disconnect from 146.190.127.140 port 50116:11: Bye Bye [preauth] Jan 19 21:18:08 host sshd[25389]: Disconnected from 146.190.127.140 port 50116 [preauth] Jan 19 21:18:21 host sshd[25416]: Invalid user support from 142.93.220.110 port 58824 Jan 19 21:18:21 host sshd[25416]: input_userauth_request: invalid user support [preauth] Jan 19 21:18:21 host sshd[25416]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:18:21 host sshd[25416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.220.110 Jan 19 21:18:23 host sshd[25416]: Failed password for invalid user support from 142.93.220.110 port 58824 ssh2 Jan 19 21:18:23 host sshd[25416]: Received disconnect from 142.93.220.110 port 58824:11: Bye Bye [preauth] Jan 19 21:18:23 host sshd[25416]: Disconnected from 142.93.220.110 port 58824 [preauth] Jan 19 21:18:25 host sshd[25423]: Invalid user bitnami from 51.250.54.145 port 56006 Jan 19 21:18:25 host sshd[25423]: input_userauth_request: invalid user bitnami [preauth] Jan 19 21:18:25 host sshd[25423]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:18:25 host sshd[25423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.54.145 Jan 19 21:18:27 host sshd[25423]: Failed password for invalid user bitnami from 51.250.54.145 port 56006 ssh2 Jan 19 21:18:27 host sshd[25423]: Received disconnect from 51.250.54.145 port 56006:11: Bye Bye [preauth] Jan 19 21:18:27 host sshd[25423]: Disconnected from 51.250.54.145 port 56006 [preauth] Jan 19 21:19:15 host sshd[25516]: Invalid user kafka from 146.190.127.140 port 42928 Jan 19 21:19:15 host sshd[25516]: input_userauth_request: invalid user kafka [preauth] Jan 19 21:19:15 host sshd[25516]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:19:15 host sshd[25516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.127.140 Jan 19 21:19:17 host sshd[25516]: Failed password for invalid user kafka from 146.190.127.140 port 42928 ssh2 Jan 19 21:19:17 host sshd[25516]: Received disconnect from 146.190.127.140 port 42928:11: Bye Bye [preauth] Jan 19 21:19:17 host sshd[25516]: Disconnected from 146.190.127.140 port 42928 [preauth] Jan 19 21:19:34 host sshd[25595]: Invalid user mqm from 142.93.220.110 port 52824 Jan 19 21:19:34 host sshd[25595]: input_userauth_request: invalid user mqm [preauth] Jan 19 21:19:34 host sshd[25595]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:19:34 host sshd[25595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.220.110 Jan 19 21:19:36 host sshd[25595]: Failed password for invalid user mqm from 142.93.220.110 port 52824 ssh2 Jan 19 21:19:36 host sshd[25595]: Received disconnect from 142.93.220.110 port 52824:11: Bye Bye [preauth] Jan 19 21:19:36 host sshd[25595]: Disconnected from 142.93.220.110 port 52824 [preauth] Jan 19 21:19:37 host sshd[25598]: Invalid user mcserver from 51.250.54.145 port 56816 Jan 19 21:19:37 host sshd[25598]: input_userauth_request: invalid user mcserver [preauth] Jan 19 21:19:37 host sshd[25598]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:19:37 host sshd[25598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.250.54.145 Jan 19 21:19:39 host sshd[25598]: Failed password for invalid user mcserver from 51.250.54.145 port 56816 ssh2 Jan 19 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 21:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=bonifacegroup user-4=wwwevmhonda user-5=wwwnexidigital user-6=mrsclean user-7=palco123 user-8=gifterman user-9=kottayamcalldriv user-10=phmetals user-11=woodpeck user-12=wwwkapin user-13=wwwkmaorg user-14=disposeat user-15=remysagr user-16=pmcresources user-17=vfmassets user-18=shalinijames user-19=wwwtestugo user-20=wwwpmcresource user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=ugotscom user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 21:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-djPzzUR7cSSlLPVl.~ Jan 19 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-djPzzUR7cSSlLPVl.~' Jan 19 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-djPzzUR7cSSlLPVl.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 21:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 21:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 21:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 21:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 21:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 21:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 21:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:08 host sshd[25995]: User centos from 197.227.8.186 not allowed because not listed in AllowUsers Jan 19 21:21:08 host sshd[25995]: input_userauth_request: invalid user centos [preauth] Jan 19 21:21:08 host unix_chkpwd[26000]: password check failed for user (centos) Jan 19 21:21:08 host sshd[25995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.227.8.186 user=centos Jan 19 21:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 21:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 21:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 21:21:10 host sshd[25995]: Failed password for invalid user centos from 197.227.8.186 port 44107 ssh2 Jan 19 21:21:10 host sshd[25995]: Received disconnect from 197.227.8.186 port 44107:11: Bye Bye [preauth] Jan 19 21:21:10 host sshd[25995]: Disconnected from 197.227.8.186 port 44107 [preauth] Jan 19 21:24:25 host sshd[26612]: Connection reset by 24.95.143.50 port 47140 [preauth] Jan 19 21:28:04 host sshd[27422]: Invalid user admin from 149.106.251.56 port 36143 Jan 19 21:28:04 host sshd[27422]: input_userauth_request: invalid user admin [preauth] Jan 19 21:28:04 host sshd[27422]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:28:04 host sshd[27422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.106.251.56 Jan 19 21:28:06 host sshd[27422]: Failed password for invalid user admin from 149.106.251.56 port 36143 ssh2 Jan 19 21:28:07 host sshd[27422]: Failed password for invalid user admin from 149.106.251.56 port 36143 ssh2 Jan 19 21:28:08 host sshd[27422]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:28:10 host sshd[27422]: Failed password for invalid user admin from 149.106.251.56 port 36143 ssh2 Jan 19 21:28:11 host sshd[27422]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:28:13 host sshd[27422]: Failed password for invalid user admin from 149.106.251.56 port 36143 ssh2 Jan 19 21:28:13 host sshd[27422]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:28:16 host sshd[27422]: Failed password for invalid user admin from 149.106.251.56 port 36143 ssh2 Jan 19 21:38:16 host sshd[29046]: Invalid user pi from 118.37.244.77 port 62277 Jan 19 21:38:16 host sshd[29046]: input_userauth_request: invalid user pi [preauth] Jan 19 21:38:16 host sshd[29046]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:38:16 host sshd[29046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.37.244.77 Jan 19 21:38:19 host sshd[29046]: Failed password for invalid user pi from 118.37.244.77 port 62277 ssh2 Jan 19 21:38:19 host sshd[29046]: Connection reset by 118.37.244.77 port 62277 [preauth] Jan 19 21:44:24 host sshd[29897]: User root from 114.157.94.16 not allowed because not listed in AllowUsers Jan 19 21:44:24 host sshd[29897]: input_userauth_request: invalid user root [preauth] Jan 19 21:44:24 host unix_chkpwd[29902]: password check failed for user (root) Jan 19 21:44:24 host sshd[29897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.157.94.16 user=root Jan 19 21:44:24 host sshd[29897]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 21:44:25 host sshd[29897]: Failed password for invalid user root from 114.157.94.16 port 58087 ssh2 Jan 19 21:44:26 host unix_chkpwd[29905]: password check failed for user (root) Jan 19 21:44:26 host sshd[29897]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 21:44:28 host sshd[29897]: Failed password for invalid user root from 114.157.94.16 port 58087 ssh2 Jan 19 21:44:28 host unix_chkpwd[29932]: password check failed for user (root) Jan 19 21:44:28 host sshd[29897]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 21:44:31 host sshd[29897]: Failed password for invalid user root from 114.157.94.16 port 58087 ssh2 Jan 19 21:44:31 host unix_chkpwd[29937]: password check failed for user (root) Jan 19 21:44:31 host sshd[29897]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 21:44:33 host sshd[29897]: Failed password for invalid user root from 114.157.94.16 port 58087 ssh2 Jan 19 21:44:33 host unix_chkpwd[29940]: password check failed for user (root) Jan 19 21:44:33 host sshd[29897]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 21:44:35 host sshd[29897]: Failed password for invalid user root from 114.157.94.16 port 58087 ssh2 Jan 19 21:56:26 host sshd[31514]: Invalid user cisco from 159.203.181.214 port 55626 Jan 19 21:56:26 host sshd[31514]: input_userauth_request: invalid user cisco [preauth] Jan 19 21:56:26 host sshd[31514]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:56:26 host sshd[31514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.181.214 Jan 19 21:56:28 host sshd[31514]: Failed password for invalid user cisco from 159.203.181.214 port 55626 ssh2 Jan 19 21:56:28 host sshd[31514]: Received disconnect from 159.203.181.214 port 55626:11: Bye Bye [preauth] Jan 19 21:56:28 host sshd[31514]: Disconnected from 159.203.181.214 port 55626 [preauth] Jan 19 21:58:49 host sshd[31874]: Invalid user pos from 138.197.180.102 port 37870 Jan 19 21:58:49 host sshd[31874]: input_userauth_request: invalid user pos [preauth] Jan 19 21:58:49 host sshd[31874]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:58:49 host sshd[31874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.102 Jan 19 21:58:51 host sshd[31874]: Failed password for invalid user pos from 138.197.180.102 port 37870 ssh2 Jan 19 21:58:52 host sshd[31874]: Received disconnect from 138.197.180.102 port 37870:11: Bye Bye [preauth] Jan 19 21:58:52 host sshd[31874]: Disconnected from 138.197.180.102 port 37870 [preauth] Jan 19 21:58:56 host sshd[31891]: Invalid user elena from 161.35.35.9 port 33424 Jan 19 21:58:56 host sshd[31891]: input_userauth_request: invalid user elena [preauth] Jan 19 21:58:56 host sshd[31891]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:58:56 host sshd[31891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.35.9 Jan 19 21:58:58 host sshd[31891]: Failed password for invalid user elena from 161.35.35.9 port 33424 ssh2 Jan 19 21:58:58 host sshd[31891]: Received disconnect from 161.35.35.9 port 33424:11: Bye Bye [preauth] Jan 19 21:58:58 host sshd[31891]: Disconnected from 161.35.35.9 port 33424 [preauth] Jan 19 21:59:50 host sshd[31986]: Invalid user media from 139.59.0.163 port 43322 Jan 19 21:59:50 host sshd[31986]: input_userauth_request: invalid user media [preauth] Jan 19 21:59:50 host sshd[31986]: pam_unix(sshd:auth): check pass; user unknown Jan 19 21:59:50 host sshd[31986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.0.163 Jan 19 21:59:52 host sshd[31986]: Failed password for invalid user media from 139.59.0.163 port 43322 ssh2 Jan 19 21:59:52 host sshd[31986]: Received disconnect from 139.59.0.163 port 43322:11: Bye Bye [preauth] Jan 19 21:59:52 host sshd[31986]: Disconnected from 139.59.0.163 port 43322 [preauth] Jan 19 22:01:12 host sshd[32277]: Invalid user minecraft from 137.184.54.207 port 44924 Jan 19 22:01:12 host sshd[32277]: input_userauth_request: invalid user minecraft [preauth] Jan 19 22:01:12 host sshd[32277]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:01:12 host sshd[32277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.54.207 Jan 19 22:01:14 host sshd[32277]: Failed password for invalid user minecraft from 137.184.54.207 port 44924 ssh2 Jan 19 22:01:15 host sshd[32277]: Received disconnect from 137.184.54.207 port 44924:11: Bye Bye [preauth] Jan 19 22:01:15 host sshd[32277]: Disconnected from 137.184.54.207 port 44924 [preauth] Jan 19 22:01:29 host sshd[32318]: Invalid user test01 from 138.197.180.102 port 59836 Jan 19 22:01:29 host sshd[32318]: input_userauth_request: invalid user test01 [preauth] Jan 19 22:01:29 host sshd[32318]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:01:29 host sshd[32318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.102 Jan 19 22:01:31 host sshd[32318]: Failed password for invalid user test01 from 138.197.180.102 port 59836 ssh2 Jan 19 22:01:31 host sshd[32318]: Received disconnect from 138.197.180.102 port 59836:11: Bye Bye [preauth] Jan 19 22:01:31 host sshd[32318]: Disconnected from 138.197.180.102 port 59836 [preauth] Jan 19 22:02:27 host sshd[32411]: Invalid user elena from 159.203.181.214 port 55314 Jan 19 22:02:27 host sshd[32411]: input_userauth_request: invalid user elena [preauth] Jan 19 22:02:27 host sshd[32411]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:02:27 host sshd[32411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.181.214 Jan 19 22:02:29 host sshd[32411]: Failed password for invalid user elena from 159.203.181.214 port 55314 ssh2 Jan 19 22:02:29 host sshd[32411]: Received disconnect from 159.203.181.214 port 55314:11: Bye Bye [preauth] Jan 19 22:02:29 host sshd[32411]: Disconnected from 159.203.181.214 port 55314 [preauth] Jan 19 22:02:34 host sshd[32440]: Invalid user test from 138.197.180.102 port 49076 Jan 19 22:02:34 host sshd[32440]: input_userauth_request: invalid user test [preauth] Jan 19 22:02:34 host sshd[32440]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:02:34 host sshd[32440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.102 Jan 19 22:02:37 host sshd[32440]: Failed password for invalid user test from 138.197.180.102 port 49076 ssh2 Jan 19 22:02:37 host sshd[32440]: Received disconnect from 138.197.180.102 port 49076:11: Bye Bye [preauth] Jan 19 22:02:37 host sshd[32440]: Disconnected from 138.197.180.102 port 49076 [preauth] Jan 19 22:02:42 host sshd[32477]: Invalid user admin1 from 137.184.54.207 port 46064 Jan 19 22:02:42 host sshd[32477]: input_userauth_request: invalid user admin1 [preauth] Jan 19 22:02:42 host sshd[32477]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:02:42 host sshd[32477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.54.207 Jan 19 22:02:43 host sshd[32477]: Failed password for invalid user admin1 from 137.184.54.207 port 46064 ssh2 Jan 19 22:02:43 host sshd[32477]: Received disconnect from 137.184.54.207 port 46064:11: Bye Bye [preauth] Jan 19 22:02:43 host sshd[32477]: Disconnected from 137.184.54.207 port 46064 [preauth] Jan 19 22:03:02 host sshd[32502]: Invalid user arkserver from 161.35.35.9 port 47836 Jan 19 22:03:02 host sshd[32502]: input_userauth_request: invalid user arkserver [preauth] Jan 19 22:03:02 host sshd[32502]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:03:02 host sshd[32502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.35.9 Jan 19 22:03:04 host sshd[32502]: Failed password for invalid user arkserver from 161.35.35.9 port 47836 ssh2 Jan 19 22:03:05 host sshd[32502]: Received disconnect from 161.35.35.9 port 47836:11: Bye Bye [preauth] Jan 19 22:03:05 host sshd[32502]: Disconnected from 161.35.35.9 port 47836 [preauth] Jan 19 22:03:26 host sshd[32542]: Invalid user testftp from 139.59.0.163 port 55646 Jan 19 22:03:26 host sshd[32542]: input_userauth_request: invalid user testftp [preauth] Jan 19 22:03:26 host sshd[32542]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:03:26 host sshd[32542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.0.163 Jan 19 22:03:28 host sshd[32542]: Failed password for invalid user testftp from 139.59.0.163 port 55646 ssh2 Jan 19 22:03:28 host sshd[32542]: Received disconnect from 139.59.0.163 port 55646:11: Bye Bye [preauth] Jan 19 22:03:28 host sshd[32542]: Disconnected from 139.59.0.163 port 55646 [preauth] Jan 19 22:03:45 host sshd[32582]: Invalid user git from 159.203.181.214 port 54068 Jan 19 22:03:45 host sshd[32582]: input_userauth_request: invalid user git [preauth] Jan 19 22:03:45 host sshd[32582]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:03:45 host sshd[32582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.181.214 Jan 19 22:03:47 host sshd[32585]: Invalid user kali from 137.184.54.207 port 44792 Jan 19 22:03:47 host sshd[32585]: input_userauth_request: invalid user kali [preauth] Jan 19 22:03:47 host sshd[32585]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:03:47 host sshd[32585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.54.207 Jan 19 22:03:48 host sshd[32582]: Failed password for invalid user git from 159.203.181.214 port 54068 ssh2 Jan 19 22:03:48 host sshd[32582]: Received disconnect from 159.203.181.214 port 54068:11: Bye Bye [preauth] Jan 19 22:03:48 host sshd[32582]: Disconnected from 159.203.181.214 port 54068 [preauth] Jan 19 22:03:49 host sshd[32585]: Failed password for invalid user kali from 137.184.54.207 port 44792 ssh2 Jan 19 22:03:49 host sshd[32585]: Received disconnect from 137.184.54.207 port 44792:11: Bye Bye [preauth] Jan 19 22:03:49 host sshd[32585]: Disconnected from 137.184.54.207 port 44792 [preauth] Jan 19 22:04:07 host sshd[32681]: Invalid user temp from 161.35.35.9 port 42648 Jan 19 22:04:07 host sshd[32681]: input_userauth_request: invalid user temp [preauth] Jan 19 22:04:07 host sshd[32681]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:04:07 host sshd[32681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.35.9 Jan 19 22:04:09 host sshd[32681]: Failed password for invalid user temp from 161.35.35.9 port 42648 ssh2 Jan 19 22:04:09 host sshd[32681]: Received disconnect from 161.35.35.9 port 42648:11: Bye Bye [preauth] Jan 19 22:04:09 host sshd[32681]: Disconnected from 161.35.35.9 port 42648 [preauth] Jan 19 22:04:50 host sshd[332]: Invalid user butter from 139.59.0.163 port 53998 Jan 19 22:04:50 host sshd[332]: input_userauth_request: invalid user butter [preauth] Jan 19 22:04:50 host sshd[332]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:04:50 host sshd[332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.0.163 Jan 19 22:04:51 host sshd[332]: Failed password for invalid user butter from 139.59.0.163 port 53998 ssh2 Jan 19 22:04:51 host sshd[332]: Received disconnect from 139.59.0.163 port 53998:11: Bye Bye [preauth] Jan 19 22:04:51 host sshd[332]: Disconnected from 139.59.0.163 port 53998 [preauth] Jan 19 22:06:35 host sshd[703]: User root from 125.139.60.143 not allowed because not listed in AllowUsers Jan 19 22:06:35 host sshd[703]: input_userauth_request: invalid user root [preauth] Jan 19 22:06:35 host unix_chkpwd[710]: password check failed for user (root) Jan 19 22:06:35 host sshd[703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.139.60.143 user=root Jan 19 22:06:35 host sshd[703]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 22:06:36 host sshd[703]: Failed password for invalid user root from 125.139.60.143 port 60965 ssh2 Jan 19 22:06:37 host sshd[703]: Connection reset by 125.139.60.143 port 60965 [preauth] Jan 19 22:07:43 host sshd[837]: Invalid user jenkins from 107.182.181.15 port 41154 Jan 19 22:07:43 host sshd[837]: input_userauth_request: invalid user jenkins [preauth] Jan 19 22:07:43 host sshd[837]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:07:43 host sshd[837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.181.15 Jan 19 22:07:44 host sshd[837]: Failed password for invalid user jenkins from 107.182.181.15 port 41154 ssh2 Jan 19 22:07:44 host sshd[837]: Received disconnect from 107.182.181.15 port 41154:11: Bye Bye [preauth] Jan 19 22:07:44 host sshd[837]: Disconnected from 107.182.181.15 port 41154 [preauth] Jan 19 22:10:33 host sshd[1229]: Invalid user invoices from 107.182.181.15 port 59024 Jan 19 22:10:33 host sshd[1229]: input_userauth_request: invalid user invoices [preauth] Jan 19 22:10:33 host sshd[1229]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:10:33 host sshd[1229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.181.15 Jan 19 22:10:35 host sshd[1229]: Failed password for invalid user invoices from 107.182.181.15 port 59024 ssh2 Jan 19 22:10:36 host sshd[1229]: Received disconnect from 107.182.181.15 port 59024:11: Bye Bye [preauth] Jan 19 22:10:36 host sshd[1229]: Disconnected from 107.182.181.15 port 59024 [preauth] Jan 19 22:11:50 host sshd[1475]: Invalid user oracle from 107.182.181.15 port 53740 Jan 19 22:11:50 host sshd[1475]: input_userauth_request: invalid user oracle [preauth] Jan 19 22:11:50 host sshd[1475]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:11:50 host sshd[1475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.181.15 Jan 19 22:11:52 host sshd[1475]: Failed password for invalid user oracle from 107.182.181.15 port 53740 ssh2 Jan 19 22:11:52 host sshd[1475]: Received disconnect from 107.182.181.15 port 53740:11: Bye Bye [preauth] Jan 19 22:11:52 host sshd[1475]: Disconnected from 107.182.181.15 port 53740 [preauth] Jan 19 22:12:24 host sshd[1555]: Invalid user gp from 194.110.203.109 port 33512 Jan 19 22:12:24 host sshd[1555]: input_userauth_request: invalid user gp [preauth] Jan 19 22:12:24 host sshd[1555]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:12:24 host sshd[1555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 22:12:26 host sshd[1555]: Failed password for invalid user gp from 194.110.203.109 port 33512 ssh2 Jan 19 22:12:29 host sshd[1555]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:12:31 host sshd[1555]: Failed password for invalid user gp from 194.110.203.109 port 33512 ssh2 Jan 19 22:12:34 host sshd[1555]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:12:36 host sshd[1555]: Failed password for invalid user gp from 194.110.203.109 port 33512 ssh2 Jan 19 22:12:39 host sshd[1555]: Connection closed by 194.110.203.109 port 33512 [preauth] Jan 19 22:12:39 host sshd[1555]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=wwwevmhonda user-4=bonifacegroup user-5=wwwnexidigital user-6=mrsclean user-7=kottayamcalldriv user-8=phmetals user-9=palco123 user-10=gifterman user-11=woodpeck user-12=wwwkapin user-13=wwwkmaorg user-14=disposeat user-15=remysagr user-16=pmcresources user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 22:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vosGfFnaMhPGQfZB.~ Jan 19 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vosGfFnaMhPGQfZB.~' Jan 19 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vosGfFnaMhPGQfZB.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 22:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 22:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 22:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 22:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 22:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 22:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 22:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 22:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 22:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 22:24:27 host sshd[3427]: Did not receive identification string from 193.35.18.139 port 56582 Jan 19 22:25:16 host sshd[3530]: Did not receive identification string from 193.35.18.139 port 52738 Jan 19 22:26:22 host sshd[3661]: Invalid user admin from 112.104.20.23 port 32936 Jan 19 22:26:22 host sshd[3661]: input_userauth_request: invalid user admin [preauth] Jan 19 22:26:22 host sshd[3661]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:26:22 host sshd[3661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.104.20.23 Jan 19 22:26:24 host sshd[3661]: Failed password for invalid user admin from 112.104.20.23 port 32936 ssh2 Jan 19 22:26:24 host sshd[3661]: Failed password for invalid user admin from 112.104.20.23 port 32936 ssh2 Jan 19 22:26:25 host sshd[3661]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:26:27 host sshd[3661]: Failed password for invalid user admin from 112.104.20.23 port 32936 ssh2 Jan 19 22:26:28 host sshd[3661]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:26:30 host sshd[3661]: Failed password for invalid user admin from 112.104.20.23 port 32936 ssh2 Jan 19 22:26:30 host sshd[3661]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:26:33 host sshd[3661]: Failed password for invalid user admin from 112.104.20.23 port 32936 ssh2 Jan 19 22:26:48 host sshd[3749]: User root from 193.35.18.139 not allowed because not listed in AllowUsers Jan 19 22:26:48 host sshd[3749]: input_userauth_request: invalid user root [preauth] Jan 19 22:26:48 host unix_chkpwd[3752]: password check failed for user (root) Jan 19 22:26:48 host sshd[3749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.35.18.139 user=root Jan 19 22:26:48 host sshd[3749]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 22:26:49 host sshd[3749]: Failed password for invalid user root from 193.35.18.139 port 43814 ssh2 Jan 19 22:26:49 host sshd[3749]: Received disconnect from 193.35.18.139 port 43814:11: Normal Shutdown, Thank you for playing [preauth] Jan 19 22:26:49 host sshd[3749]: Disconnected from 193.35.18.139 port 43814 [preauth] Jan 19 22:46:26 host sshd[6523]: Invalid user techuser from 54.38.156.102 port 37804 Jan 19 22:46:26 host sshd[6523]: input_userauth_request: invalid user techuser [preauth] Jan 19 22:46:26 host sshd[6523]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:46:26 host sshd[6523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.156.102 Jan 19 22:46:28 host sshd[6523]: Failed password for invalid user techuser from 54.38.156.102 port 37804 ssh2 Jan 19 22:46:28 host sshd[6523]: Received disconnect from 54.38.156.102 port 37804:11: Bye Bye [preauth] Jan 19 22:46:28 host sshd[6523]: Disconnected from 54.38.156.102 port 37804 [preauth] Jan 19 22:47:06 host sshd[6612]: Invalid user ariel from 159.223.102.145 port 37920 Jan 19 22:47:06 host sshd[6612]: input_userauth_request: invalid user ariel [preauth] Jan 19 22:47:06 host sshd[6612]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:47:06 host sshd[6612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.102.145 Jan 19 22:47:07 host sshd[6612]: Failed password for invalid user ariel from 159.223.102.145 port 37920 ssh2 Jan 19 22:47:08 host sshd[6612]: Received disconnect from 159.223.102.145 port 37920:11: Bye Bye [preauth] Jan 19 22:47:08 host sshd[6612]: Disconnected from 159.223.102.145 port 37920 [preauth] Jan 19 22:48:01 host sshd[6721]: Invalid user deployer from 119.252.143.6 port 61311 Jan 19 22:48:01 host sshd[6721]: input_userauth_request: invalid user deployer [preauth] Jan 19 22:48:01 host sshd[6721]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:48:01 host sshd[6721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.252.143.6 Jan 19 22:48:04 host sshd[6721]: Failed password for invalid user deployer from 119.252.143.6 port 61311 ssh2 Jan 19 22:48:04 host sshd[6721]: Received disconnect from 119.252.143.6 port 61311:11: Bye Bye [preauth] Jan 19 22:48:04 host sshd[6721]: Disconnected from 119.252.143.6 port 61311 [preauth] Jan 19 22:48:09 host sshd[6740]: Invalid user local from 31.209.38.156 port 40240 Jan 19 22:48:09 host sshd[6740]: input_userauth_request: invalid user local [preauth] Jan 19 22:48:09 host sshd[6740]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:48:09 host sshd[6740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.209.38.156 Jan 19 22:48:12 host sshd[6740]: Failed password for invalid user local from 31.209.38.156 port 40240 ssh2 Jan 19 22:48:12 host sshd[6740]: Received disconnect from 31.209.38.156 port 40240:11: Bye Bye [preauth] Jan 19 22:48:12 host sshd[6740]: Disconnected from 31.209.38.156 port 40240 [preauth] Jan 19 22:49:12 host sshd[6962]: User centos from 194.65.144.243 not allowed because not listed in AllowUsers Jan 19 22:49:12 host sshd[6962]: input_userauth_request: invalid user centos [preauth] Jan 19 22:49:12 host unix_chkpwd[6964]: password check failed for user (centos) Jan 19 22:49:12 host sshd[6962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.65.144.243 user=centos Jan 19 22:49:15 host sshd[6962]: Failed password for invalid user centos from 194.65.144.243 port 62722 ssh2 Jan 19 22:49:15 host sshd[6962]: Received disconnect from 194.65.144.243 port 62722:11: Bye Bye [preauth] Jan 19 22:49:15 host sshd[6962]: Disconnected from 194.65.144.243 port 62722 [preauth] Jan 19 22:49:33 host sshd[7007]: Invalid user share from 165.22.240.159 port 34384 Jan 19 22:49:33 host sshd[7007]: input_userauth_request: invalid user share [preauth] Jan 19 22:49:33 host sshd[7007]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:49:33 host sshd[7007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.240.159 Jan 19 22:49:35 host sshd[7007]: Failed password for invalid user share from 165.22.240.159 port 34384 ssh2 Jan 19 22:49:35 host sshd[7007]: Received disconnect from 165.22.240.159 port 34384:11: Bye Bye [preauth] Jan 19 22:49:35 host sshd[7007]: Disconnected from 165.22.240.159 port 34384 [preauth] Jan 19 22:50:23 host sshd[7117]: Invalid user asterisk from 164.90.229.196 port 42956 Jan 19 22:50:23 host sshd[7117]: input_userauth_request: invalid user asterisk [preauth] Jan 19 22:50:23 host sshd[7117]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:50:23 host sshd[7117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.229.196 Jan 19 22:50:24 host sshd[7119]: User root from 122.117.58.111 not allowed because not listed in AllowUsers Jan 19 22:50:24 host sshd[7119]: input_userauth_request: invalid user root [preauth] Jan 19 22:50:24 host unix_chkpwd[7123]: password check failed for user (root) Jan 19 22:50:24 host sshd[7119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.58.111 user=root Jan 19 22:50:24 host sshd[7119]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 22:50:25 host sshd[7117]: Failed password for invalid user asterisk from 164.90.229.196 port 42956 ssh2 Jan 19 22:50:25 host sshd[7117]: Received disconnect from 164.90.229.196 port 42956:11: Bye Bye [preauth] Jan 19 22:50:25 host sshd[7117]: Disconnected from 164.90.229.196 port 42956 [preauth] Jan 19 22:50:26 host sshd[7119]: Failed password for invalid user root from 122.117.58.111 port 35061 ssh2 Jan 19 22:50:26 host unix_chkpwd[7126]: password check failed for user (root) Jan 19 22:50:26 host sshd[7119]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 22:50:28 host sshd[7119]: Failed password for invalid user root from 122.117.58.111 port 35061 ssh2 Jan 19 22:50:28 host sshd[7119]: Connection reset by 122.117.58.111 port 35061 [preauth] Jan 19 22:50:28 host sshd[7119]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.58.111 user=root Jan 19 22:51:18 host sshd[7219]: Invalid user cisco from 159.223.102.145 port 47894 Jan 19 22:51:18 host sshd[7219]: input_userauth_request: invalid user cisco [preauth] Jan 19 22:51:18 host sshd[7219]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:51:18 host sshd[7219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.102.145 Jan 19 22:51:20 host sshd[7219]: Failed password for invalid user cisco from 159.223.102.145 port 47894 ssh2 Jan 19 22:51:21 host sshd[7219]: Received disconnect from 159.223.102.145 port 47894:11: Bye Bye [preauth] Jan 19 22:51:21 host sshd[7219]: Disconnected from 159.223.102.145 port 47894 [preauth] Jan 19 22:51:23 host sshd[7225]: Invalid user taiga from 31.209.38.156 port 54092 Jan 19 22:51:23 host sshd[7225]: input_userauth_request: invalid user taiga [preauth] Jan 19 22:51:23 host sshd[7225]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:51:23 host sshd[7225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.209.38.156 Jan 19 22:51:24 host sshd[7225]: Failed password for invalid user taiga from 31.209.38.156 port 54092 ssh2 Jan 19 22:51:24 host sshd[7225]: Received disconnect from 31.209.38.156 port 54092:11: Bye Bye [preauth] Jan 19 22:51:24 host sshd[7225]: Disconnected from 31.209.38.156 port 54092 [preauth] Jan 19 22:51:28 host sshd[7257]: Invalid user grid from 159.65.128.241 port 40068 Jan 19 22:51:28 host sshd[7257]: input_userauth_request: invalid user grid [preauth] Jan 19 22:51:28 host sshd[7257]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:51:28 host sshd[7257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.128.241 Jan 19 22:51:29 host sshd[7260]: Invalid user radio from 54.38.156.102 port 54926 Jan 19 22:51:29 host sshd[7260]: input_userauth_request: invalid user radio [preauth] Jan 19 22:51:29 host sshd[7260]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:51:29 host sshd[7260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.156.102 Jan 19 22:51:30 host sshd[7257]: Failed password for invalid user grid from 159.65.128.241 port 40068 ssh2 Jan 19 22:51:30 host sshd[7257]: Received disconnect from 159.65.128.241 port 40068:11: Bye Bye [preauth] Jan 19 22:51:30 host sshd[7257]: Disconnected from 159.65.128.241 port 40068 [preauth] Jan 19 22:51:32 host sshd[7260]: Failed password for invalid user radio from 54.38.156.102 port 54926 ssh2 Jan 19 22:51:32 host sshd[7260]: Received disconnect from 54.38.156.102 port 54926:11: Bye Bye [preauth] Jan 19 22:51:32 host sshd[7260]: Disconnected from 54.38.156.102 port 54926 [preauth] Jan 19 22:51:52 host sshd[7292]: User adm from 194.65.144.243 not allowed because not listed in AllowUsers Jan 19 22:51:52 host sshd[7292]: input_userauth_request: invalid user adm [preauth] Jan 19 22:51:52 host unix_chkpwd[7294]: password check failed for user (adm) Jan 19 22:51:52 host sshd[7292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.65.144.243 user=adm Jan 19 22:51:52 host sshd[7292]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "adm" Jan 19 22:51:55 host sshd[7292]: Failed password for invalid user adm from 194.65.144.243 port 52036 ssh2 Jan 19 22:51:55 host sshd[7292]: Received disconnect from 194.65.144.243 port 52036:11: Bye Bye [preauth] Jan 19 22:51:55 host sshd[7292]: Disconnected from 194.65.144.243 port 52036 [preauth] Jan 19 22:52:02 host sshd[7339]: Invalid user ts2 from 164.90.229.196 port 43166 Jan 19 22:52:02 host sshd[7339]: input_userauth_request: invalid user ts2 [preauth] Jan 19 22:52:02 host sshd[7339]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:52:02 host sshd[7339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.229.196 Jan 19 22:52:04 host sshd[7339]: Failed password for invalid user ts2 from 164.90.229.196 port 43166 ssh2 Jan 19 22:52:04 host sshd[7339]: Received disconnect from 164.90.229.196 port 43166:11: Bye Bye [preauth] Jan 19 22:52:04 host sshd[7339]: Disconnected from 164.90.229.196 port 43166 [preauth] Jan 19 22:52:21 host sshd[7368]: Invalid user nextcloud from 159.223.102.145 port 58210 Jan 19 22:52:21 host sshd[7368]: input_userauth_request: invalid user nextcloud [preauth] Jan 19 22:52:21 host sshd[7368]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:52:21 host sshd[7368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.102.145 Jan 19 22:52:22 host sshd[7368]: Failed password for invalid user nextcloud from 159.223.102.145 port 58210 ssh2 Jan 19 22:52:30 host sshd[7435]: User centos from 54.38.156.102 not allowed because not listed in AllowUsers Jan 19 22:52:30 host sshd[7435]: input_userauth_request: invalid user centos [preauth] Jan 19 22:52:30 host unix_chkpwd[7440]: password check failed for user (centos) Jan 19 22:52:30 host sshd[7435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.156.102 user=centos Jan 19 22:52:31 host sshd[7437]: Invalid user user7 from 31.209.38.156 port 47756 Jan 19 22:52:31 host sshd[7437]: input_userauth_request: invalid user user7 [preauth] Jan 19 22:52:31 host sshd[7437]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:52:31 host sshd[7437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.209.38.156 Jan 19 22:52:32 host sshd[7435]: Failed password for invalid user centos from 54.38.156.102 port 56120 ssh2 Jan 19 22:52:33 host sshd[7437]: Failed password for invalid user user7 from 31.209.38.156 port 47756 ssh2 Jan 19 22:52:59 host sshd[7537]: Invalid user teamspeak from 164.90.229.196 port 55296 Jan 19 22:52:59 host sshd[7537]: input_userauth_request: invalid user teamspeak [preauth] Jan 19 22:52:59 host sshd[7537]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:52:59 host sshd[7537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.229.196 Jan 19 22:53:01 host sshd[7537]: Failed password for invalid user teamspeak from 164.90.229.196 port 55296 ssh2 Jan 19 22:53:01 host sshd[7537]: Received disconnect from 164.90.229.196 port 55296:11: Bye Bye [preauth] Jan 19 22:53:01 host sshd[7537]: Disconnected from 164.90.229.196 port 55296 [preauth] Jan 19 22:53:10 host sshd[7597]: Invalid user remote from 159.65.128.241 port 42842 Jan 19 22:53:10 host sshd[7597]: input_userauth_request: invalid user remote [preauth] Jan 19 22:53:10 host sshd[7597]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:53:10 host sshd[7597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.128.241 Jan 19 22:53:12 host sshd[7597]: Failed password for invalid user remote from 159.65.128.241 port 42842 ssh2 Jan 19 22:53:12 host sshd[7597]: Received disconnect from 159.65.128.241 port 42842:11: Bye Bye [preauth] Jan 19 22:53:12 host sshd[7597]: Disconnected from 159.65.128.241 port 42842 [preauth] Jan 19 22:53:18 host sshd[7618]: Invalid user elasticsearch from 165.22.240.159 port 40676 Jan 19 22:53:18 host sshd[7618]: input_userauth_request: invalid user elasticsearch [preauth] Jan 19 22:53:18 host sshd[7618]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:53:18 host sshd[7618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.240.159 Jan 19 22:53:19 host sshd[7618]: Failed password for invalid user elasticsearch from 165.22.240.159 port 40676 ssh2 Jan 19 22:53:19 host sshd[7618]: Received disconnect from 165.22.240.159 port 40676:11: Bye Bye [preauth] Jan 19 22:53:19 host sshd[7618]: Disconnected from 165.22.240.159 port 40676 [preauth] Jan 19 22:53:21 host sshd[7624]: Invalid user hduser from 119.252.143.6 port 28523 Jan 19 22:53:21 host sshd[7624]: input_userauth_request: invalid user hduser [preauth] Jan 19 22:53:21 host sshd[7624]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:53:21 host sshd[7624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.252.143.6 Jan 19 22:53:23 host sshd[7624]: Failed password for invalid user hduser from 119.252.143.6 port 28523 ssh2 Jan 19 22:53:23 host sshd[7624]: Received disconnect from 119.252.143.6 port 28523:11: Bye Bye [preauth] Jan 19 22:53:23 host sshd[7624]: Disconnected from 119.252.143.6 port 28523 [preauth] Jan 19 22:54:27 host sshd[7872]: Invalid user david from 159.65.128.241 port 45192 Jan 19 22:54:27 host sshd[7872]: input_userauth_request: invalid user david [preauth] Jan 19 22:54:27 host sshd[7872]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:54:27 host sshd[7872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.128.241 Jan 19 22:54:30 host sshd[7872]: Failed password for invalid user david from 159.65.128.241 port 45192 ssh2 Jan 19 22:54:30 host sshd[7872]: Received disconnect from 159.65.128.241 port 45192:11: Bye Bye [preauth] Jan 19 22:54:30 host sshd[7872]: Disconnected from 159.65.128.241 port 45192 [preauth] Jan 19 22:54:44 host sshd[7923]: Invalid user devops from 165.22.240.159 port 41240 Jan 19 22:54:44 host sshd[7923]: input_userauth_request: invalid user devops [preauth] Jan 19 22:54:44 host sshd[7923]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:54:44 host sshd[7923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.240.159 Jan 19 22:54:46 host sshd[7923]: Failed password for invalid user devops from 165.22.240.159 port 41240 ssh2 Jan 19 22:54:46 host sshd[7923]: Received disconnect from 165.22.240.159 port 41240:11: Bye Bye [preauth] Jan 19 22:54:46 host sshd[7923]: Disconnected from 165.22.240.159 port 41240 [preauth] Jan 19 22:55:08 host sshd[8005]: Invalid user sftpuser from 119.252.143.6 port 41889 Jan 19 22:55:08 host sshd[8005]: input_userauth_request: invalid user sftpuser [preauth] Jan 19 22:55:08 host sshd[8005]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:55:08 host sshd[8005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.252.143.6 Jan 19 22:55:10 host sshd[8005]: Failed password for invalid user sftpuser from 119.252.143.6 port 41889 ssh2 Jan 19 22:55:10 host sshd[8005]: Received disconnect from 119.252.143.6 port 41889:11: Bye Bye [preauth] Jan 19 22:55:10 host sshd[8005]: Disconnected from 119.252.143.6 port 41889 [preauth] Jan 19 22:55:14 host sshd[8031]: Invalid user restoreonly from 205.185.113.129 port 59260 Jan 19 22:55:14 host sshd[8031]: input_userauth_request: invalid user restoreonly [preauth] Jan 19 22:55:14 host sshd[8031]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:55:14 host sshd[8031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 19 22:55:16 host sshd[8031]: Failed password for invalid user restoreonly from 205.185.113.129 port 59260 ssh2 Jan 19 22:55:17 host sshd[8031]: Connection closed by 205.185.113.129 port 59260 [preauth] Jan 19 22:58:37 host sshd[8465]: Invalid user admin from 121.191.20.19 port 60789 Jan 19 22:58:37 host sshd[8465]: input_userauth_request: invalid user admin [preauth] Jan 19 22:58:37 host sshd[8465]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:58:37 host sshd[8465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.191.20.19 Jan 19 22:58:39 host sshd[8465]: Failed password for invalid user admin from 121.191.20.19 port 60789 ssh2 Jan 19 22:58:39 host sshd[8465]: Failed password for invalid user admin from 121.191.20.19 port 60789 ssh2 Jan 19 22:58:39 host sshd[8465]: pam_unix(sshd:auth): check pass; user unknown Jan 19 22:58:41 host sshd[8465]: Failed password for invalid user admin from 121.191.20.19 port 60789 ssh2 Jan 19 22:58:55 host sshd[8482]: Connection reset by 116.106.157.138 port 55494 [preauth] Jan 19 23:06:35 host sshd[9663]: Connection reset by 118.35.18.59 port 57715 [preauth] Jan 19 23:08:30 host sshd[9898]: Invalid user user from 195.226.194.142 port 21544 Jan 19 23:08:30 host sshd[9898]: input_userauth_request: invalid user user [preauth] Jan 19 23:08:30 host sshd[9898]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:08:30 host sshd[9898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 19 23:08:33 host sshd[9898]: Failed password for invalid user user from 195.226.194.142 port 21544 ssh2 Jan 19 23:08:33 host sshd[9898]: Received disconnect from 195.226.194.142 port 21544:11: Bye Bye [preauth] Jan 19 23:08:33 host sshd[9898]: Disconnected from 195.226.194.142 port 21544 [preauth] Jan 19 23:16:47 host sshd[11107]: Invalid user lee from 107.189.30.59 port 47540 Jan 19 23:16:47 host sshd[11107]: input_userauth_request: invalid user lee [preauth] Jan 19 23:16:47 host sshd[11107]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:16:47 host sshd[11107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 19 23:16:49 host sshd[11107]: Failed password for invalid user lee from 107.189.30.59 port 47540 ssh2 Jan 19 23:16:50 host sshd[11107]: Connection closed by 107.189.30.59 port 47540 [preauth] Jan 19 23:19:16 host sshd[11418]: Invalid user dlxuser from 61.77.220.204 port 49690 Jan 19 23:19:16 host sshd[11418]: input_userauth_request: invalid user dlxuser [preauth] Jan 19 23:19:16 host sshd[11418]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:19:16 host sshd[11418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.77.220.204 Jan 19 23:19:18 host sshd[11418]: Failed password for invalid user dlxuser from 61.77.220.204 port 49690 ssh2 Jan 19 23:19:18 host sshd[11418]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:19:20 host sshd[11418]: Failed password for invalid user dlxuser from 61.77.220.204 port 49690 ssh2 Jan 19 23:19:23 host sshd[11418]: Failed password for invalid user dlxuser from 61.77.220.204 port 49690 ssh2 Jan 19 23:19:24 host sshd[11418]: Connection reset by 61.77.220.204 port 49690 [preauth] Jan 19 23:19:24 host sshd[11418]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.77.220.204 Jan 19 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 23:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 19 23:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=phmetals user-4=kottayamcalldriv user-5=palco123 user-6=gifterman user-7=wwwletsstalkfood user-8=straightcurve user-9=wwwevmhonda user-10=bonifacegroup user-11=pmcresources user-12=shalinijames user-13=wwwtestugo user-14=vfmassets user-15=woodpeck user-16=wwwkapin user-17=disposeat user-18=wwwkmaorg user-19=remysagr user-20=ugotscom user-21=wwwresourcehunte user-22=keralaholi user-23=wwwrmswll user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 19 23:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 19 23:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DLdNK9BXEiZs3B8D.~ Jan 19 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DLdNK9BXEiZs3B8D.~' Jan 19 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-DLdNK9BXEiZs3B8D.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 19 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 19 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 19 23:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 19 23:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 19 23:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 19 23:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 19 23:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 19 23:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 19 23:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 19 23:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 19 23:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 19 23:24:28 host sshd[12365]: Connection closed by 67.205.135.136 port 57998 [preauth] Jan 19 23:29:51 host sshd[13144]: Invalid user test from 67.205.135.136 port 55450 Jan 19 23:29:51 host sshd[13144]: input_userauth_request: invalid user test [preauth] Jan 19 23:29:51 host sshd[13144]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:29:51 host sshd[13144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.135.136 Jan 19 23:29:53 host sshd[13144]: Failed password for invalid user test from 67.205.135.136 port 55450 ssh2 Jan 19 23:29:53 host sshd[13144]: Received disconnect from 67.205.135.136 port 55450:11: Bye Bye [preauth] Jan 19 23:29:53 host sshd[13144]: Disconnected from 67.205.135.136 port 55450 [preauth] Jan 19 23:33:52 host sshd[13789]: User root from 114.35.114.30 not allowed because not listed in AllowUsers Jan 19 23:33:52 host sshd[13789]: input_userauth_request: invalid user root [preauth] Jan 19 23:33:52 host unix_chkpwd[13794]: password check failed for user (root) Jan 19 23:33:52 host sshd[13789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.114.30 user=root Jan 19 23:33:52 host sshd[13789]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 23:33:54 host sshd[13789]: Failed password for invalid user root from 114.35.114.30 port 49958 ssh2 Jan 19 23:33:55 host unix_chkpwd[13799]: password check failed for user (root) Jan 19 23:33:55 host sshd[13789]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 23:33:57 host sshd[13789]: Failed password for invalid user root from 114.35.114.30 port 49958 ssh2 Jan 19 23:33:58 host unix_chkpwd[13808]: password check failed for user (root) Jan 19 23:33:58 host sshd[13789]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 23:34:01 host sshd[13789]: Failed password for invalid user root from 114.35.114.30 port 49958 ssh2 Jan 19 23:34:01 host unix_chkpwd[13814]: password check failed for user (root) Jan 19 23:34:01 host sshd[13789]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 23:34:03 host sshd[13789]: Failed password for invalid user root from 114.35.114.30 port 49958 ssh2 Jan 19 23:34:07 host sshd[13858]: Invalid user hikvision from 59.126.32.51 port 50969 Jan 19 23:34:07 host sshd[13858]: input_userauth_request: invalid user hikvision [preauth] Jan 19 23:34:07 host sshd[13858]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:34:07 host sshd[13858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.32.51 Jan 19 23:34:09 host sshd[13858]: Failed password for invalid user hikvision from 59.126.32.51 port 50969 ssh2 Jan 19 23:34:10 host sshd[13858]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:34:13 host sshd[13858]: Failed password for invalid user hikvision from 59.126.32.51 port 50969 ssh2 Jan 19 23:34:13 host sshd[13858]: Connection reset by 59.126.32.51 port 50969 [preauth] Jan 19 23:34:13 host sshd[13858]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.32.51 Jan 19 23:36:22 host sshd[14148]: Invalid user test from 67.205.135.136 port 34584 Jan 19 23:36:22 host sshd[14148]: input_userauth_request: invalid user test [preauth] Jan 19 23:36:23 host sshd[14148]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:36:23 host sshd[14148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.135.136 Jan 19 23:36:25 host sshd[14148]: Failed password for invalid user test from 67.205.135.136 port 34584 ssh2 Jan 19 23:36:25 host sshd[14148]: Received disconnect from 67.205.135.136 port 34584:11: Bye Bye [preauth] Jan 19 23:36:25 host sshd[14148]: Disconnected from 67.205.135.136 port 34584 [preauth] Jan 19 23:36:59 host sshd[14219]: Invalid user virl from 201.17.131.43 port 63124 Jan 19 23:36:59 host sshd[14219]: input_userauth_request: invalid user virl [preauth] Jan 19 23:36:59 host sshd[14219]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:36:59 host sshd[14219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.131.43 Jan 19 23:37:02 host sshd[14219]: Failed password for invalid user virl from 201.17.131.43 port 63124 ssh2 Jan 19 23:37:02 host sshd[14219]: Received disconnect from 201.17.131.43 port 63124:11: Bye Bye [preauth] Jan 19 23:37:02 host sshd[14219]: Disconnected from 201.17.131.43 port 63124 [preauth] Jan 19 23:39:53 host sshd[14647]: Invalid user asterisk from 201.17.131.43 port 1706 Jan 19 23:39:53 host sshd[14647]: input_userauth_request: invalid user asterisk [preauth] Jan 19 23:39:53 host sshd[14647]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:39:53 host sshd[14647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.131.43 Jan 19 23:39:56 host sshd[14647]: Failed password for invalid user asterisk from 201.17.131.43 port 1706 ssh2 Jan 19 23:39:56 host sshd[14647]: Received disconnect from 201.17.131.43 port 1706:11: Bye Bye [preauth] Jan 19 23:39:56 host sshd[14647]: Disconnected from 201.17.131.43 port 1706 [preauth] Jan 19 23:41:40 host sshd[14878]: Invalid user manager from 201.17.131.43 port 4986 Jan 19 23:41:40 host sshd[14878]: input_userauth_request: invalid user manager [preauth] Jan 19 23:41:40 host sshd[14878]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:41:40 host sshd[14878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.131.43 Jan 19 23:41:42 host sshd[14878]: Failed password for invalid user manager from 201.17.131.43 port 4986 ssh2 Jan 19 23:41:42 host sshd[14878]: Received disconnect from 201.17.131.43 port 4986:11: Bye Bye [preauth] Jan 19 23:41:42 host sshd[14878]: Disconnected from 201.17.131.43 port 4986 [preauth] Jan 19 23:43:26 host sshd[15158]: Invalid user marie from 67.205.135.136 port 51110 Jan 19 23:43:26 host sshd[15158]: input_userauth_request: invalid user marie [preauth] Jan 19 23:43:26 host sshd[15158]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:43:26 host sshd[15158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.135.136 Jan 19 23:43:28 host sshd[15158]: Failed password for invalid user marie from 67.205.135.136 port 51110 ssh2 Jan 19 23:43:28 host sshd[15158]: Received disconnect from 67.205.135.136 port 51110:11: Bye Bye [preauth] Jan 19 23:43:28 host sshd[15158]: Disconnected from 67.205.135.136 port 51110 [preauth] Jan 19 23:45:10 host sshd[15475]: User root from 122.116.121.24 not allowed because not listed in AllowUsers Jan 19 23:45:10 host sshd[15475]: input_userauth_request: invalid user root [preauth] Jan 19 23:45:10 host unix_chkpwd[15483]: password check failed for user (root) Jan 19 23:45:10 host sshd[15475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.121.24 user=root Jan 19 23:45:10 host sshd[15475]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 19 23:45:12 host sshd[15475]: Failed password for invalid user root from 122.116.121.24 port 48426 ssh2 Jan 19 23:45:13 host sshd[15475]: Connection reset by 122.116.121.24 port 48426 [preauth] Jan 19 23:51:50 host sshd[16645]: Invalid user admin from 59.126.124.2 port 48871 Jan 19 23:51:50 host sshd[16645]: input_userauth_request: invalid user admin [preauth] Jan 19 23:51:50 host sshd[16645]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:51:50 host sshd[16645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.124.2 Jan 19 23:51:52 host sshd[16645]: Failed password for invalid user admin from 59.126.124.2 port 48871 ssh2 Jan 19 23:51:52 host sshd[16645]: Failed password for invalid user admin from 59.126.124.2 port 48871 ssh2 Jan 19 23:51:53 host sshd[16645]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:51:55 host sshd[16645]: Failed password for invalid user admin from 59.126.124.2 port 48871 ssh2 Jan 19 23:51:56 host sshd[16645]: Connection reset by 59.126.124.2 port 48871 [preauth] Jan 19 23:51:56 host sshd[16645]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.124.2 Jan 19 23:53:35 host sshd[16885]: Invalid user conectar from 64.227.72.154 port 52632 Jan 19 23:53:35 host sshd[16885]: input_userauth_request: invalid user conectar [preauth] Jan 19 23:53:35 host sshd[16885]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:53:35 host sshd[16885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.72.154 Jan 19 23:53:37 host sshd[16885]: Failed password for invalid user conectar from 64.227.72.154 port 52632 ssh2 Jan 19 23:53:38 host sshd[16885]: Received disconnect from 64.227.72.154 port 52632:11: Bye Bye [preauth] Jan 19 23:53:38 host sshd[16885]: Disconnected from 64.227.72.154 port 52632 [preauth] Jan 19 23:53:44 host sshd[17002]: Invalid user gq from 194.110.203.109 port 38844 Jan 19 23:53:44 host sshd[17002]: input_userauth_request: invalid user gq [preauth] Jan 19 23:53:44 host sshd[17002]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:53:44 host sshd[17002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 23:53:45 host sshd[17002]: Failed password for invalid user gq from 194.110.203.109 port 38844 ssh2 Jan 19 23:53:49 host sshd[17002]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:53:50 host sshd[17002]: Failed password for invalid user gq from 194.110.203.109 port 38844 ssh2 Jan 19 23:53:53 host sshd[17002]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:53:56 host sshd[17002]: Failed password for invalid user gq from 194.110.203.109 port 38844 ssh2 Jan 19 23:53:59 host sshd[17002]: Connection closed by 194.110.203.109 port 38844 [preauth] Jan 19 23:53:59 host sshd[17002]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 19 23:55:14 host sshd[17247]: Invalid user mike from 85.172.12.254 port 34236 Jan 19 23:55:14 host sshd[17247]: input_userauth_request: invalid user mike [preauth] Jan 19 23:55:14 host sshd[17247]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:55:14 host sshd[17247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.172.12.254 Jan 19 23:55:16 host sshd[17247]: Failed password for invalid user mike from 85.172.12.254 port 34236 ssh2 Jan 19 23:55:16 host sshd[17247]: Received disconnect from 85.172.12.254 port 34236:11: Bye Bye [preauth] Jan 19 23:55:16 host sshd[17247]: Disconnected from 85.172.12.254 port 34236 [preauth] Jan 19 23:56:29 host sshd[17518]: Invalid user adam from 159.89.206.9 port 58768 Jan 19 23:56:29 host sshd[17518]: input_userauth_request: invalid user adam [preauth] Jan 19 23:56:29 host sshd[17518]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:56:29 host sshd[17518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.206.9 Jan 19 23:56:31 host sshd[17518]: Failed password for invalid user adam from 159.89.206.9 port 58768 ssh2 Jan 19 23:56:31 host sshd[17518]: Received disconnect from 159.89.206.9 port 58768:11: Bye Bye [preauth] Jan 19 23:56:31 host sshd[17518]: Disconnected from 159.89.206.9 port 58768 [preauth] Jan 19 23:56:37 host sshd[17540]: Invalid user splunk from 64.227.72.154 port 36376 Jan 19 23:56:37 host sshd[17540]: input_userauth_request: invalid user splunk [preauth] Jan 19 23:56:37 host sshd[17540]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:56:37 host sshd[17540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.72.154 Jan 19 23:56:38 host sshd[17540]: Failed password for invalid user splunk from 64.227.72.154 port 36376 ssh2 Jan 19 23:56:38 host sshd[17540]: Received disconnect from 64.227.72.154 port 36376:11: Bye Bye [preauth] Jan 19 23:56:38 host sshd[17540]: Disconnected from 64.227.72.154 port 36376 [preauth] Jan 19 23:57:14 host sshd[17682]: Invalid user cesar from 85.172.12.254 port 36192 Jan 19 23:57:14 host sshd[17682]: input_userauth_request: invalid user cesar [preauth] Jan 19 23:57:14 host sshd[17682]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:57:14 host sshd[17682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.172.12.254 Jan 19 23:57:16 host sshd[17682]: Failed password for invalid user cesar from 85.172.12.254 port 36192 ssh2 Jan 19 23:57:16 host sshd[17682]: Received disconnect from 85.172.12.254 port 36192:11: Bye Bye [preauth] Jan 19 23:57:16 host sshd[17682]: Disconnected from 85.172.12.254 port 36192 [preauth] Jan 19 23:57:46 host sshd[17778]: Invalid user ark from 64.227.72.154 port 35124 Jan 19 23:57:46 host sshd[17778]: input_userauth_request: invalid user ark [preauth] Jan 19 23:57:46 host sshd[17778]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:57:46 host sshd[17778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.72.154 Jan 19 23:57:48 host sshd[17778]: Failed password for invalid user ark from 64.227.72.154 port 35124 ssh2 Jan 19 23:57:48 host sshd[17778]: Received disconnect from 64.227.72.154 port 35124:11: Bye Bye [preauth] Jan 19 23:57:48 host sshd[17778]: Disconnected from 64.227.72.154 port 35124 [preauth] Jan 19 23:58:25 host sshd[17946]: Invalid user grid from 159.89.206.9 port 60012 Jan 19 23:58:25 host sshd[17946]: input_userauth_request: invalid user grid [preauth] Jan 19 23:58:25 host sshd[17946]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:58:25 host sshd[17946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.206.9 Jan 19 23:58:27 host sshd[17946]: Failed password for invalid user grid from 159.89.206.9 port 60012 ssh2 Jan 19 23:58:28 host sshd[17946]: Received disconnect from 159.89.206.9 port 60012:11: Bye Bye [preauth] Jan 19 23:58:28 host sshd[17946]: Disconnected from 159.89.206.9 port 60012 [preauth] Jan 19 23:58:36 host sshd[17992]: Invalid user ftpuser1 from 85.172.12.254 port 34022 Jan 19 23:58:36 host sshd[17992]: input_userauth_request: invalid user ftpuser1 [preauth] Jan 19 23:58:36 host sshd[17992]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:58:36 host sshd[17992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.172.12.254 Jan 19 23:58:38 host sshd[17992]: Failed password for invalid user ftpuser1 from 85.172.12.254 port 34022 ssh2 Jan 19 23:58:38 host sshd[17992]: Received disconnect from 85.172.12.254 port 34022:11: Bye Bye [preauth] Jan 19 23:58:38 host sshd[17992]: Disconnected from 85.172.12.254 port 34022 [preauth] Jan 19 23:59:43 host sshd[18332]: Invalid user suporte from 159.89.206.9 port 57040 Jan 19 23:59:43 host sshd[18332]: input_userauth_request: invalid user suporte [preauth] Jan 19 23:59:43 host sshd[18332]: pam_unix(sshd:auth): check pass; user unknown Jan 19 23:59:43 host sshd[18332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.206.9 Jan 19 23:59:46 host sshd[18332]: Failed password for invalid user suporte from 159.89.206.9 port 57040 ssh2 Jan 20 00:06:05 host sshd[19724]: Invalid user pi from 121.184.105.238 port 60815 Jan 20 00:06:05 host sshd[19724]: input_userauth_request: invalid user pi [preauth] Jan 20 00:06:05 host sshd[19724]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:06:05 host sshd[19724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.184.105.238 Jan 20 00:06:07 host sshd[19724]: Failed password for invalid user pi from 121.184.105.238 port 60815 ssh2 Jan 20 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 00:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=wwwrmswll user-8=wwwresourcehunte user-9=keralaholi user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=pmcresources user-16=remysagr user-17=disposeat user-18=wwwkmaorg user-19=woodpeck user-20=wwwkapin user-21=gifterman user-22=palco123 user-23=kottayamcalldriv user-24=phmetals user-25=wwwnexidigital user-26=mrsclean user-27=bonifacegroup user-28=wwwevmhonda user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 00:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KSrlvUVtM1XMdOsx.~ Jan 20 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KSrlvUVtM1XMdOsx.~' Jan 20 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KSrlvUVtM1XMdOsx.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 00:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 00:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 00:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 00:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 00:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 00:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 00:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 00:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 00:21:13 host sshd[22727]: Connection closed by 167.248.133.63 port 58844 [preauth] Jan 20 00:22:29 host sshd[23160]: Connection closed by 45.79.181.104 port 12028 [preauth] Jan 20 00:22:32 host sshd[23167]: Connection closed by 45.79.181.104 port 12030 [preauth] Jan 20 00:22:35 host sshd[23173]: Connection closed by 45.79.181.104 port 12032 [preauth] Jan 20 00:22:58 host sshd[23207]: User root from 189.107.251.105 not allowed because not listed in AllowUsers Jan 20 00:22:58 host sshd[23207]: input_userauth_request: invalid user root [preauth] Jan 20 00:22:59 host unix_chkpwd[23214]: password check failed for user (root) Jan 20 00:22:59 host sshd[23207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.107.251.105 user=root Jan 20 00:22:59 host sshd[23207]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 00:23:00 host sshd[23207]: Failed password for invalid user root from 189.107.251.105 port 37855 ssh2 Jan 20 00:23:01 host unix_chkpwd[23226]: password check failed for user (root) Jan 20 00:23:01 host sshd[23207]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 00:23:03 host sshd[23207]: Failed password for invalid user root from 189.107.251.105 port 37855 ssh2 Jan 20 00:23:04 host sshd[23207]: Connection reset by 189.107.251.105 port 37855 [preauth] Jan 20 00:23:04 host sshd[23207]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.107.251.105 user=root Jan 20 00:27:20 host sshd[23903]: Invalid user jenkins from 206.189.130.185 port 50552 Jan 20 00:27:20 host sshd[23903]: input_userauth_request: invalid user jenkins [preauth] Jan 20 00:27:20 host sshd[23903]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:27:20 host sshd[23903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.130.185 Jan 20 00:27:22 host sshd[23903]: Failed password for invalid user jenkins from 206.189.130.185 port 50552 ssh2 Jan 20 00:27:22 host sshd[23903]: Received disconnect from 206.189.130.185 port 50552:11: Bye Bye [preauth] Jan 20 00:27:22 host sshd[23903]: Disconnected from 206.189.130.185 port 50552 [preauth] Jan 20 00:29:34 host sshd[24227]: Invalid user deployer from 220.86.68.33 port 51740 Jan 20 00:29:34 host sshd[24227]: input_userauth_request: invalid user deployer [preauth] Jan 20 00:29:34 host sshd[24227]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:29:34 host sshd[24227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.86.68.33 Jan 20 00:29:36 host sshd[24227]: Failed password for invalid user deployer from 220.86.68.33 port 51740 ssh2 Jan 20 00:29:36 host sshd[24227]: Received disconnect from 220.86.68.33 port 51740:11: Bye Bye [preauth] Jan 20 00:29:36 host sshd[24227]: Disconnected from 220.86.68.33 port 51740 [preauth] Jan 20 00:32:07 host sshd[24670]: Invalid user admin from 118.189.61.24 port 49765 Jan 20 00:32:07 host sshd[24670]: input_userauth_request: invalid user admin [preauth] Jan 20 00:32:07 host sshd[24670]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:32:07 host sshd[24670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.189.61.24 Jan 20 00:32:09 host sshd[24670]: Failed password for invalid user admin from 118.189.61.24 port 49765 ssh2 Jan 20 00:32:10 host sshd[24670]: Failed password for invalid user admin from 118.189.61.24 port 49765 ssh2 Jan 20 00:32:10 host sshd[24670]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:32:12 host sshd[24670]: Failed password for invalid user admin from 118.189.61.24 port 49765 ssh2 Jan 20 00:32:13 host sshd[24670]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:32:15 host sshd[24670]: Failed password for invalid user admin from 118.189.61.24 port 49765 ssh2 Jan 20 00:32:16 host sshd[24670]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:32:18 host sshd[24670]: Failed password for invalid user admin from 118.189.61.24 port 49765 ssh2 Jan 20 00:32:44 host sshd[24796]: Invalid user nextcloud from 159.223.87.243 port 50234 Jan 20 00:32:44 host sshd[24796]: input_userauth_request: invalid user nextcloud [preauth] Jan 20 00:32:44 host sshd[24796]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:32:44 host sshd[24796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.87.243 Jan 20 00:32:46 host sshd[24796]: Failed password for invalid user nextcloud from 159.223.87.243 port 50234 ssh2 Jan 20 00:32:46 host sshd[24796]: Received disconnect from 159.223.87.243 port 50234:11: Bye Bye [preauth] Jan 20 00:32:46 host sshd[24796]: Disconnected from 159.223.87.243 port 50234 [preauth] Jan 20 00:33:14 host sshd[24873]: Invalid user esuser from 206.189.130.185 port 36226 Jan 20 00:33:14 host sshd[24873]: input_userauth_request: invalid user esuser [preauth] Jan 20 00:33:14 host sshd[24873]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:33:14 host sshd[24873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.130.185 Jan 20 00:33:16 host sshd[24873]: Failed password for invalid user esuser from 206.189.130.185 port 36226 ssh2 Jan 20 00:33:16 host sshd[24873]: Received disconnect from 206.189.130.185 port 36226:11: Bye Bye [preauth] Jan 20 00:33:16 host sshd[24873]: Disconnected from 206.189.130.185 port 36226 [preauth] Jan 20 00:33:32 host sshd[24916]: User root from 123.240.154.251 not allowed because not listed in AllowUsers Jan 20 00:33:32 host sshd[24916]: input_userauth_request: invalid user root [preauth] Jan 20 00:33:32 host unix_chkpwd[24925]: password check failed for user (root) Jan 20 00:33:32 host sshd[24916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.240.154.251 user=root Jan 20 00:33:32 host sshd[24916]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 00:33:34 host sshd[24916]: Failed password for invalid user root from 123.240.154.251 port 58428 ssh2 Jan 20 00:33:34 host unix_chkpwd[24928]: password check failed for user (root) Jan 20 00:33:34 host sshd[24916]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 00:33:36 host sshd[24916]: Failed password for invalid user root from 123.240.154.251 port 58428 ssh2 Jan 20 00:33:36 host unix_chkpwd[24931]: password check failed for user (root) Jan 20 00:33:36 host sshd[24916]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 00:33:38 host sshd[24916]: Failed password for invalid user root from 123.240.154.251 port 58428 ssh2 Jan 20 00:33:38 host sshd[24916]: Connection reset by 123.240.154.251 port 58428 [preauth] Jan 20 00:33:38 host sshd[24916]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.240.154.251 user=root Jan 20 00:34:36 host sshd[25120]: Invalid user shadow from 200.27.113.133 port 51866 Jan 20 00:34:36 host sshd[25120]: input_userauth_request: invalid user shadow [preauth] Jan 20 00:34:36 host sshd[25120]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:34:36 host sshd[25120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.27.113.133 Jan 20 00:34:38 host sshd[25127]: Invalid user deamon from 220.86.68.33 port 43104 Jan 20 00:34:38 host sshd[25127]: input_userauth_request: invalid user deamon [preauth] Jan 20 00:34:38 host sshd[25127]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:34:38 host sshd[25127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.86.68.33 Jan 20 00:34:38 host sshd[25120]: Failed password for invalid user shadow from 200.27.113.133 port 51866 ssh2 Jan 20 00:34:38 host sshd[25120]: Received disconnect from 200.27.113.133 port 51866:11: Bye Bye [preauth] Jan 20 00:34:38 host sshd[25120]: Disconnected from 200.27.113.133 port 51866 [preauth] Jan 20 00:34:39 host sshd[25133]: Invalid user cesar from 206.189.130.185 port 54116 Jan 20 00:34:39 host sshd[25133]: input_userauth_request: invalid user cesar [preauth] Jan 20 00:34:39 host sshd[25133]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:34:39 host sshd[25133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.130.185 Jan 20 00:34:40 host sshd[25127]: Failed password for invalid user deamon from 220.86.68.33 port 43104 ssh2 Jan 20 00:34:40 host sshd[25127]: Received disconnect from 220.86.68.33 port 43104:11: Bye Bye [preauth] Jan 20 00:34:40 host sshd[25127]: Disconnected from 220.86.68.33 port 43104 [preauth] Jan 20 00:34:41 host sshd[25133]: Failed password for invalid user cesar from 206.189.130.185 port 54116 ssh2 Jan 20 00:34:41 host sshd[25133]: Received disconnect from 206.189.130.185 port 54116:11: Bye Bye [preauth] Jan 20 00:34:41 host sshd[25133]: Disconnected from 206.189.130.185 port 54116 [preauth] Jan 20 00:34:55 host sshd[25196]: Invalid user git from 159.223.87.243 port 48110 Jan 20 00:34:55 host sshd[25196]: input_userauth_request: invalid user git [preauth] Jan 20 00:34:55 host sshd[25196]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:34:55 host sshd[25196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.87.243 Jan 20 00:34:56 host sshd[25196]: Failed password for invalid user git from 159.223.87.243 port 48110 ssh2 Jan 20 00:34:56 host sshd[25196]: Received disconnect from 159.223.87.243 port 48110:11: Bye Bye [preauth] Jan 20 00:34:56 host sshd[25196]: Disconnected from 159.223.87.243 port 48110 [preauth] Jan 20 00:35:28 host sshd[25350]: Invalid user admin123 from 35.200.141.182 port 54390 Jan 20 00:35:28 host sshd[25350]: input_userauth_request: invalid user admin123 [preauth] Jan 20 00:35:28 host sshd[25350]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:35:28 host sshd[25350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.141.182 Jan 20 00:35:30 host sshd[25350]: Failed password for invalid user admin123 from 35.200.141.182 port 54390 ssh2 Jan 20 00:35:30 host sshd[25350]: Received disconnect from 35.200.141.182 port 54390:11: Bye Bye [preauth] Jan 20 00:35:30 host sshd[25350]: Disconnected from 35.200.141.182 port 54390 [preauth] Jan 20 00:35:49 host sshd[25385]: Invalid user test1 from 220.86.68.33 port 37396 Jan 20 00:35:49 host sshd[25385]: input_userauth_request: invalid user test1 [preauth] Jan 20 00:35:49 host sshd[25385]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:35:49 host sshd[25385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.86.68.33 Jan 20 00:35:51 host sshd[25385]: Failed password for invalid user test1 from 220.86.68.33 port 37396 ssh2 Jan 20 00:35:51 host sshd[25385]: Received disconnect from 220.86.68.33 port 37396:11: Bye Bye [preauth] Jan 20 00:35:51 host sshd[25385]: Disconnected from 220.86.68.33 port 37396 [preauth] Jan 20 00:35:51 host sshd[25390]: Invalid user devops from 51.178.27.210 port 43664 Jan 20 00:35:51 host sshd[25390]: input_userauth_request: invalid user devops [preauth] Jan 20 00:35:51 host sshd[25390]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:35:51 host sshd[25390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.27.210 Jan 20 00:35:53 host sshd[25390]: Failed password for invalid user devops from 51.178.27.210 port 43664 ssh2 Jan 20 00:35:54 host sshd[25390]: Received disconnect from 51.178.27.210 port 43664:11: Bye Bye [preauth] Jan 20 00:35:54 host sshd[25390]: Disconnected from 51.178.27.210 port 43664 [preauth] Jan 20 00:36:13 host sshd[25486]: Invalid user www from 159.223.87.243 port 38524 Jan 20 00:36:13 host sshd[25486]: input_userauth_request: invalid user www [preauth] Jan 20 00:36:13 host sshd[25486]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:36:13 host sshd[25486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.87.243 Jan 20 00:36:15 host sshd[25486]: Failed password for invalid user www from 159.223.87.243 port 38524 ssh2 Jan 20 00:36:15 host sshd[25489]: Invalid user ansadmin from 200.27.113.133 port 35494 Jan 20 00:36:15 host sshd[25489]: input_userauth_request: invalid user ansadmin [preauth] Jan 20 00:36:15 host sshd[25489]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:36:15 host sshd[25489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.27.113.133 Jan 20 00:36:17 host sshd[25489]: Failed password for invalid user ansadmin from 200.27.113.133 port 35494 ssh2 Jan 20 00:36:17 host sshd[25489]: Received disconnect from 200.27.113.133 port 35494:11: Bye Bye [preauth] Jan 20 00:36:17 host sshd[25489]: Disconnected from 200.27.113.133 port 35494 [preauth] Jan 20 00:36:23 host sshd[25535]: Invalid user angelica from 23.140.96.107 port 46244 Jan 20 00:36:23 host sshd[25535]: input_userauth_request: invalid user angelica [preauth] Jan 20 00:36:23 host sshd[25535]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:36:23 host sshd[25535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.140.96.107 Jan 20 00:36:25 host sshd[25535]: Failed password for invalid user angelica from 23.140.96.107 port 46244 ssh2 Jan 20 00:36:25 host sshd[25535]: Received disconnect from 23.140.96.107 port 46244:11: Bye Bye [preauth] Jan 20 00:36:25 host sshd[25535]: Disconnected from 23.140.96.107 port 46244 [preauth] Jan 20 00:36:35 host sshd[25594]: Invalid user openbravo from 43.153.193.40 port 43482 Jan 20 00:36:35 host sshd[25594]: input_userauth_request: invalid user openbravo [preauth] Jan 20 00:36:35 host sshd[25594]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:36:35 host sshd[25594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.193.40 Jan 20 00:36:37 host sshd[25594]: Failed password for invalid user openbravo from 43.153.193.40 port 43482 ssh2 Jan 20 00:36:37 host sshd[25594]: Received disconnect from 43.153.193.40 port 43482:11: Bye Bye [preauth] Jan 20 00:36:37 host sshd[25594]: Disconnected from 43.153.193.40 port 43482 [preauth] Jan 20 00:36:59 host sshd[25636]: Invalid user deployer from 81.3.206.160 port 49344 Jan 20 00:36:59 host sshd[25636]: input_userauth_request: invalid user deployer [preauth] Jan 20 00:36:59 host sshd[25636]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:36:59 host sshd[25636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.3.206.160 Jan 20 00:37:01 host sshd[25636]: Failed password for invalid user deployer from 81.3.206.160 port 49344 ssh2 Jan 20 00:37:01 host sshd[25636]: Received disconnect from 81.3.206.160 port 49344:11: Bye Bye [preauth] Jan 20 00:37:01 host sshd[25636]: Disconnected from 81.3.206.160 port 49344 [preauth] Jan 20 00:37:03 host sshd[25654]: Invalid user student from 70.88.3.29 port 56193 Jan 20 00:37:03 host sshd[25654]: input_userauth_request: invalid user student [preauth] Jan 20 00:37:03 host sshd[25654]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:37:03 host sshd[25654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.88.3.29 Jan 20 00:37:05 host sshd[25654]: Failed password for invalid user student from 70.88.3.29 port 56193 ssh2 Jan 20 00:37:05 host sshd[25654]: Received disconnect from 70.88.3.29 port 56193:11: Bye Bye [preauth] Jan 20 00:37:05 host sshd[25654]: Disconnected from 70.88.3.29 port 56193 [preauth] Jan 20 00:37:19 host sshd[25809]: Invalid user nexus from 45.114.195.2 port 54906 Jan 20 00:37:19 host sshd[25809]: input_userauth_request: invalid user nexus [preauth] Jan 20 00:37:19 host sshd[25809]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:37:19 host sshd[25809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.114.195.2 Jan 20 00:37:21 host sshd[25809]: Failed password for invalid user nexus from 45.114.195.2 port 54906 ssh2 Jan 20 00:37:21 host sshd[25809]: Received disconnect from 45.114.195.2 port 54906:11: Bye Bye [preauth] Jan 20 00:37:21 host sshd[25809]: Disconnected from 45.114.195.2 port 54906 [preauth] Jan 20 00:37:45 host sshd[25879]: Invalid user tmp from 200.27.113.133 port 46943 Jan 20 00:37:45 host sshd[25879]: input_userauth_request: invalid user tmp [preauth] Jan 20 00:37:45 host sshd[25879]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:37:45 host sshd[25879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.27.113.133 Jan 20 00:37:47 host sshd[25879]: Failed password for invalid user tmp from 200.27.113.133 port 46943 ssh2 Jan 20 00:37:48 host sshd[25879]: Received disconnect from 200.27.113.133 port 46943:11: Bye Bye [preauth] Jan 20 00:37:48 host sshd[25879]: Disconnected from 200.27.113.133 port 46943 [preauth] Jan 20 00:37:52 host sshd[25921]: Invalid user redmine from 43.157.29.8 port 35932 Jan 20 00:37:52 host sshd[25921]: input_userauth_request: invalid user redmine [preauth] Jan 20 00:37:52 host sshd[25921]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:37:52 host sshd[25921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.29.8 Jan 20 00:37:54 host sshd[25921]: Failed password for invalid user redmine from 43.157.29.8 port 35932 ssh2 Jan 20 00:37:54 host sshd[25921]: Received disconnect from 43.157.29.8 port 35932:11: Bye Bye [preauth] Jan 20 00:37:54 host sshd[25921]: Disconnected from 43.157.29.8 port 35932 [preauth] Jan 20 00:38:06 host sshd[25964]: Invalid user nextcloud from 157.230.45.177 port 32888 Jan 20 00:38:06 host sshd[25964]: input_userauth_request: invalid user nextcloud [preauth] Jan 20 00:38:06 host sshd[25964]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:38:06 host sshd[25964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.45.177 Jan 20 00:38:08 host sshd[25964]: Failed password for invalid user nextcloud from 157.230.45.177 port 32888 ssh2 Jan 20 00:38:08 host sshd[25964]: Received disconnect from 157.230.45.177 port 32888:11: Bye Bye [preauth] Jan 20 00:38:08 host sshd[25964]: Disconnected from 157.230.45.177 port 32888 [preauth] Jan 20 00:39:06 host sshd[26110]: Invalid user tom from 192.140.112.78 port 39928 Jan 20 00:39:06 host sshd[26110]: input_userauth_request: invalid user tom [preauth] Jan 20 00:39:06 host sshd[26110]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:39:06 host sshd[26110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.140.112.78 Jan 20 00:39:08 host sshd[26110]: Failed password for invalid user tom from 192.140.112.78 port 39928 ssh2 Jan 20 00:39:08 host sshd[26110]: Received disconnect from 192.140.112.78 port 39928:11: Bye Bye [preauth] Jan 20 00:39:08 host sshd[26110]: Disconnected from 192.140.112.78 port 39928 [preauth] Jan 20 00:40:03 host sshd[26264]: Invalid user remote from 147.182.228.52 port 56368 Jan 20 00:40:03 host sshd[26264]: input_userauth_request: invalid user remote [preauth] Jan 20 00:40:03 host sshd[26264]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:40:03 host sshd[26264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.228.52 Jan 20 00:40:05 host sshd[26264]: Failed password for invalid user remote from 147.182.228.52 port 56368 ssh2 Jan 20 00:40:05 host sshd[26264]: Received disconnect from 147.182.228.52 port 56368:11: Bye Bye [preauth] Jan 20 00:40:05 host sshd[26264]: Disconnected from 147.182.228.52 port 56368 [preauth] Jan 20 00:40:12 host sshd[26293]: User root from 220.134.133.112 not allowed because not listed in AllowUsers Jan 20 00:40:12 host sshd[26293]: input_userauth_request: invalid user root [preauth] Jan 20 00:40:12 host unix_chkpwd[26305]: password check failed for user (root) Jan 20 00:40:12 host sshd[26293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.133.112 user=root Jan 20 00:40:12 host sshd[26293]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 00:40:13 host sshd[26298]: Invalid user vadmin from 220.134.133.112 port 39493 Jan 20 00:40:13 host sshd[26298]: input_userauth_request: invalid user vadmin [preauth] Jan 20 00:40:13 host sshd[26298]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:40:13 host sshd[26298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.133.112 Jan 20 00:40:14 host sshd[26293]: Failed password for invalid user root from 220.134.133.112 port 39481 ssh2 Jan 20 00:40:15 host unix_chkpwd[26310]: password check failed for user (root) Jan 20 00:40:15 host sshd[26293]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 00:40:15 host sshd[26298]: Failed password for invalid user vadmin from 220.134.133.112 port 39493 ssh2 Jan 20 00:40:16 host sshd[26298]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:40:17 host sshd[26293]: Failed password for invalid user root from 220.134.133.112 port 39481 ssh2 Jan 20 00:40:17 host unix_chkpwd[26314]: password check failed for user (root) Jan 20 00:40:17 host sshd[26293]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 00:40:19 host sshd[26298]: Failed password for invalid user vadmin from 220.134.133.112 port 39493 ssh2 Jan 20 00:40:19 host sshd[26298]: Connection reset by 220.134.133.112 port 39493 [preauth] Jan 20 00:40:19 host sshd[26298]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.133.112 Jan 20 00:40:20 host sshd[26293]: Failed password for invalid user root from 220.134.133.112 port 39481 ssh2 Jan 20 00:40:36 host sshd[26398]: Invalid user sam from 103.176.78.133 port 55952 Jan 20 00:40:36 host sshd[26398]: input_userauth_request: invalid user sam [preauth] Jan 20 00:40:36 host sshd[26398]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:40:36 host sshd[26398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.176.78.133 Jan 20 00:40:38 host sshd[26398]: Failed password for invalid user sam from 103.176.78.133 port 55952 ssh2 Jan 20 00:40:38 host sshd[26398]: Received disconnect from 103.176.78.133 port 55952:11: Bye Bye [preauth] Jan 20 00:40:38 host sshd[26398]: Disconnected from 103.176.78.133 port 55952 [preauth] Jan 20 00:40:50 host sshd[26433]: Invalid user s from 193.70.0.122 port 41564 Jan 20 00:40:50 host sshd[26433]: input_userauth_request: invalid user s [preauth] Jan 20 00:40:50 host sshd[26433]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:40:50 host sshd[26433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.0.122 Jan 20 00:40:52 host sshd[26433]: Failed password for invalid user s from 193.70.0.122 port 41564 ssh2 Jan 20 00:40:52 host sshd[26433]: Received disconnect from 193.70.0.122 port 41564:11: Bye Bye [preauth] Jan 20 00:40:52 host sshd[26433]: Disconnected from 193.70.0.122 port 41564 [preauth] Jan 20 00:41:26 host sshd[26533]: Invalid user deployer from 45.114.195.2 port 41688 Jan 20 00:41:26 host sshd[26533]: input_userauth_request: invalid user deployer [preauth] Jan 20 00:41:26 host sshd[26533]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:41:26 host sshd[26533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.114.195.2 Jan 20 00:41:28 host sshd[26533]: Failed password for invalid user deployer from 45.114.195.2 port 41688 ssh2 Jan 20 00:41:28 host sshd[26533]: Received disconnect from 45.114.195.2 port 41688:11: Bye Bye [preauth] Jan 20 00:41:28 host sshd[26533]: Disconnected from 45.114.195.2 port 41688 [preauth] Jan 20 00:41:39 host sshd[26593]: Invalid user git from 70.88.3.29 port 41665 Jan 20 00:41:39 host sshd[26593]: input_userauth_request: invalid user git [preauth] Jan 20 00:41:39 host sshd[26593]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:41:39 host sshd[26593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.88.3.29 Jan 20 00:41:41 host sshd[26593]: Failed password for invalid user git from 70.88.3.29 port 41665 ssh2 Jan 20 00:41:41 host sshd[26593]: Received disconnect from 70.88.3.29 port 41665:11: Bye Bye [preauth] Jan 20 00:41:41 host sshd[26593]: Disconnected from 70.88.3.29 port 41665 [preauth] Jan 20 00:41:55 host sshd[26629]: Invalid user titan from 81.3.206.160 port 56550 Jan 20 00:41:55 host sshd[26629]: input_userauth_request: invalid user titan [preauth] Jan 20 00:41:55 host sshd[26629]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:41:55 host sshd[26629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.3.206.160 Jan 20 00:41:56 host sshd[26629]: Failed password for invalid user titan from 81.3.206.160 port 56550 ssh2 Jan 20 00:41:57 host sshd[26629]: Received disconnect from 81.3.206.160 port 56550:11: Bye Bye [preauth] Jan 20 00:41:57 host sshd[26629]: Disconnected from 81.3.206.160 port 56550 [preauth] Jan 20 00:42:05 host sshd[26670]: Invalid user testing from 51.178.27.210 port 43776 Jan 20 00:42:05 host sshd[26670]: input_userauth_request: invalid user testing [preauth] Jan 20 00:42:05 host sshd[26670]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:42:05 host sshd[26670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.27.210 Jan 20 00:42:07 host sshd[26670]: Failed password for invalid user testing from 51.178.27.210 port 43776 ssh2 Jan 20 00:42:07 host sshd[26670]: Received disconnect from 51.178.27.210 port 43776:11: Bye Bye [preauth] Jan 20 00:42:07 host sshd[26670]: Disconnected from 51.178.27.210 port 43776 [preauth] Jan 20 00:42:16 host sshd[26701]: Invalid user angel from 193.70.0.122 port 38810 Jan 20 00:42:16 host sshd[26701]: input_userauth_request: invalid user angel [preauth] Jan 20 00:42:16 host sshd[26701]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:42:16 host sshd[26701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.0.122 Jan 20 00:42:17 host sshd[26705]: Invalid user suporte from 157.230.45.177 port 46852 Jan 20 00:42:17 host sshd[26705]: input_userauth_request: invalid user suporte [preauth] Jan 20 00:42:17 host sshd[26705]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:42:17 host sshd[26705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.45.177 Jan 20 00:42:18 host sshd[26701]: Failed password for invalid user angel from 193.70.0.122 port 38810 ssh2 Jan 20 00:42:19 host sshd[26701]: Received disconnect from 193.70.0.122 port 38810:11: Bye Bye [preauth] Jan 20 00:42:19 host sshd[26701]: Disconnected from 193.70.0.122 port 38810 [preauth] Jan 20 00:42:19 host sshd[26705]: Failed password for invalid user suporte from 157.230.45.177 port 46852 ssh2 Jan 20 00:42:19 host sshd[26705]: Received disconnect from 157.230.45.177 port 46852:11: Bye Bye [preauth] Jan 20 00:42:19 host sshd[26705]: Disconnected from 157.230.45.177 port 46852 [preauth] Jan 20 00:42:35 host sshd[26759]: Invalid user virl from 43.157.29.8 port 55178 Jan 20 00:42:35 host sshd[26759]: input_userauth_request: invalid user virl [preauth] Jan 20 00:42:35 host sshd[26759]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:42:35 host sshd[26759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.29.8 Jan 20 00:42:37 host sshd[26759]: Failed password for invalid user virl from 43.157.29.8 port 55178 ssh2 Jan 20 00:42:37 host sshd[26767]: Invalid user elena from 35.200.141.182 port 56398 Jan 20 00:42:37 host sshd[26767]: input_userauth_request: invalid user elena [preauth] Jan 20 00:42:37 host sshd[26767]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:42:37 host sshd[26767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.141.182 Jan 20 00:42:38 host sshd[26759]: Received disconnect from 43.157.29.8 port 55178:11: Bye Bye [preauth] Jan 20 00:42:38 host sshd[26759]: Disconnected from 43.157.29.8 port 55178 [preauth] Jan 20 00:42:39 host sshd[26767]: Failed password for invalid user elena from 35.200.141.182 port 56398 ssh2 Jan 20 00:42:39 host sshd[26767]: Received disconnect from 35.200.141.182 port 56398:11: Bye Bye [preauth] Jan 20 00:42:39 host sshd[26767]: Disconnected from 35.200.141.182 port 56398 [preauth] Jan 20 00:42:40 host sshd[26773]: Invalid user admin123 from 23.140.96.107 port 47574 Jan 20 00:42:40 host sshd[26773]: input_userauth_request: invalid user admin123 [preauth] Jan 20 00:42:40 host sshd[26773]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:42:40 host sshd[26773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.140.96.107 Jan 20 00:42:42 host sshd[26773]: Failed password for invalid user admin123 from 23.140.96.107 port 47574 ssh2 Jan 20 00:42:42 host sshd[26773]: Received disconnect from 23.140.96.107 port 47574:11: Bye Bye [preauth] Jan 20 00:42:42 host sshd[26773]: Disconnected from 23.140.96.107 port 47574 [preauth] Jan 20 00:42:43 host sshd[26782]: Invalid user user01 from 45.114.195.2 port 53680 Jan 20 00:42:43 host sshd[26782]: input_userauth_request: invalid user user01 [preauth] Jan 20 00:42:43 host sshd[26782]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:42:43 host sshd[26782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.114.195.2 Jan 20 00:42:45 host sshd[26782]: Failed password for invalid user user01 from 45.114.195.2 port 53680 ssh2 Jan 20 00:42:51 host sshd[26932]: Invalid user sinusbot from 70.88.3.29 port 31650 Jan 20 00:42:51 host sshd[26932]: input_userauth_request: invalid user sinusbot [preauth] Jan 20 00:42:51 host sshd[26932]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:42:51 host sshd[26932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.88.3.29 Jan 20 00:42:53 host sshd[26932]: Failed password for invalid user sinusbot from 70.88.3.29 port 31650 ssh2 Jan 20 00:42:53 host sshd[26932]: Received disconnect from 70.88.3.29 port 31650:11: Bye Bye [preauth] Jan 20 00:42:53 host sshd[26932]: Disconnected from 70.88.3.29 port 31650 [preauth] Jan 20 00:42:55 host sshd[26954]: Invalid user openbravo from 147.182.228.52 port 38312 Jan 20 00:42:55 host sshd[26954]: input_userauth_request: invalid user openbravo [preauth] Jan 20 00:42:55 host sshd[26954]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:42:55 host sshd[26954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.228.52 Jan 20 00:42:57 host sshd[26954]: Failed password for invalid user openbravo from 147.182.228.52 port 38312 ssh2 Jan 20 00:42:58 host sshd[26980]: Invalid user suporte from 192.140.112.78 port 40108 Jan 20 00:42:58 host sshd[26980]: input_userauth_request: invalid user suporte [preauth] Jan 20 00:42:58 host sshd[26980]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:42:58 host sshd[26980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.140.112.78 Jan 20 00:42:58 host sshd[26954]: Received disconnect from 147.182.228.52 port 38312:11: Bye Bye [preauth] Jan 20 00:42:58 host sshd[26954]: Disconnected from 147.182.228.52 port 38312 [preauth] Jan 20 00:43:00 host sshd[26980]: Failed password for invalid user suporte from 192.140.112.78 port 40108 ssh2 Jan 20 00:43:00 host sshd[26980]: Received disconnect from 192.140.112.78 port 40108:11: Bye Bye [preauth] Jan 20 00:43:00 host sshd[26980]: Disconnected from 192.140.112.78 port 40108 [preauth] Jan 20 00:43:01 host sshd[26993]: Invalid user user8 from 81.3.206.160 port 34418 Jan 20 00:43:01 host sshd[26993]: input_userauth_request: invalid user user8 [preauth] Jan 20 00:43:01 host sshd[26993]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:43:01 host sshd[26993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.3.206.160 Jan 20 00:43:04 host sshd[26993]: Failed password for invalid user user8 from 81.3.206.160 port 34418 ssh2 Jan 20 00:43:04 host sshd[26993]: Received disconnect from 81.3.206.160 port 34418:11: Bye Bye [preauth] Jan 20 00:43:04 host sshd[26993]: Disconnected from 81.3.206.160 port 34418 [preauth] Jan 20 00:43:13 host sshd[27084]: Invalid user administrator from 51.178.27.210 port 55830 Jan 20 00:43:13 host sshd[27084]: input_userauth_request: invalid user administrator [preauth] Jan 20 00:43:13 host sshd[27084]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:43:13 host sshd[27084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.27.210 Jan 20 00:43:16 host sshd[27084]: Failed password for invalid user administrator from 51.178.27.210 port 55830 ssh2 Jan 20 00:43:18 host sshd[27128]: Invalid user mcserver from 43.153.193.40 port 41938 Jan 20 00:43:18 host sshd[27128]: input_userauth_request: invalid user mcserver [preauth] Jan 20 00:43:18 host sshd[27128]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:43:18 host sshd[27128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.193.40 Jan 20 00:43:21 host sshd[27128]: Failed password for invalid user mcserver from 43.153.193.40 port 41938 ssh2 Jan 20 00:43:21 host sshd[27128]: Received disconnect from 43.153.193.40 port 41938:11: Bye Bye [preauth] Jan 20 00:43:21 host sshd[27128]: Disconnected from 43.153.193.40 port 41938 [preauth] Jan 20 00:43:22 host sshd[27137]: Invalid user administrator from 193.70.0.122 port 33878 Jan 20 00:43:22 host sshd[27137]: input_userauth_request: invalid user administrator [preauth] Jan 20 00:43:22 host sshd[27137]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:43:22 host sshd[27137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.0.122 Jan 20 00:43:24 host sshd[27137]: Failed password for invalid user administrator from 193.70.0.122 port 33878 ssh2 Jan 20 00:43:24 host sshd[27137]: Received disconnect from 193.70.0.122 port 33878:11: Bye Bye [preauth] Jan 20 00:43:24 host sshd[27137]: Disconnected from 193.70.0.122 port 33878 [preauth] Jan 20 00:43:29 host sshd[27205]: Invalid user sistemas from 103.176.78.133 port 36048 Jan 20 00:43:29 host sshd[27205]: input_userauth_request: invalid user sistemas [preauth] Jan 20 00:43:29 host sshd[27205]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:43:29 host sshd[27205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.176.78.133 Jan 20 00:43:32 host sshd[27205]: Failed password for invalid user sistemas from 103.176.78.133 port 36048 ssh2 Jan 20 00:43:32 host sshd[27205]: Received disconnect from 103.176.78.133 port 36048:11: Bye Bye [preauth] Jan 20 00:43:32 host sshd[27205]: Disconnected from 103.176.78.133 port 36048 [preauth] Jan 20 00:43:34 host sshd[27216]: Invalid user drcomadmin from 157.230.45.177 port 41770 Jan 20 00:43:34 host sshd[27216]: input_userauth_request: invalid user drcomadmin [preauth] Jan 20 00:43:34 host sshd[27216]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:43:34 host sshd[27216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.45.177 Jan 20 00:43:36 host sshd[27216]: Failed password for invalid user drcomadmin from 157.230.45.177 port 41770 ssh2 Jan 20 00:43:36 host sshd[27216]: Received disconnect from 157.230.45.177 port 41770:11: Bye Bye [preauth] Jan 20 00:43:36 host sshd[27216]: Disconnected from 157.230.45.177 port 41770 [preauth] Jan 20 00:43:39 host sshd[27229]: Invalid user pdx from 43.157.29.8 port 50178 Jan 20 00:43:39 host sshd[27229]: input_userauth_request: invalid user pdx [preauth] Jan 20 00:43:39 host sshd[27229]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:43:39 host sshd[27229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.157.29.8 Jan 20 00:43:41 host sshd[27229]: Failed password for invalid user pdx from 43.157.29.8 port 50178 ssh2 Jan 20 00:43:41 host sshd[27229]: Received disconnect from 43.157.29.8 port 50178:11: Bye Bye [preauth] Jan 20 00:43:41 host sshd[27229]: Disconnected from 43.157.29.8 port 50178 [preauth] Jan 20 00:43:49 host sshd[27307]: Invalid user ftpadmin from 23.140.96.107 port 42426 Jan 20 00:43:49 host sshd[27307]: input_userauth_request: invalid user ftpadmin [preauth] Jan 20 00:43:49 host sshd[27307]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:43:49 host sshd[27307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.140.96.107 Jan 20 00:43:52 host sshd[27307]: Failed password for invalid user ftpadmin from 23.140.96.107 port 42426 ssh2 Jan 20 00:43:52 host sshd[27307]: Received disconnect from 23.140.96.107 port 42426:11: Bye Bye [preauth] Jan 20 00:43:52 host sshd[27307]: Disconnected from 23.140.96.107 port 42426 [preauth] Jan 20 00:44:05 host sshd[27382]: Invalid user jenkins from 147.182.228.52 port 55196 Jan 20 00:44:05 host sshd[27382]: input_userauth_request: invalid user jenkins [preauth] Jan 20 00:44:05 host sshd[27382]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:44:05 host sshd[27382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.228.52 Jan 20 00:44:07 host sshd[27382]: Failed password for invalid user jenkins from 147.182.228.52 port 55196 ssh2 Jan 20 00:44:07 host sshd[27382]: Received disconnect from 147.182.228.52 port 55196:11: Bye Bye [preauth] Jan 20 00:44:07 host sshd[27382]: Disconnected from 147.182.228.52 port 55196 [preauth] Jan 20 00:44:19 host sshd[27442]: Invalid user ts from 35.200.141.182 port 56144 Jan 20 00:44:19 host sshd[27442]: input_userauth_request: invalid user ts [preauth] Jan 20 00:44:19 host sshd[27442]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:44:19 host sshd[27442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.200.141.182 Jan 20 00:44:21 host sshd[27442]: Failed password for invalid user ts from 35.200.141.182 port 56144 ssh2 Jan 20 00:44:21 host sshd[27442]: Received disconnect from 35.200.141.182 port 56144:11: Bye Bye [preauth] Jan 20 00:44:21 host sshd[27442]: Disconnected from 35.200.141.182 port 56144 [preauth] Jan 20 00:44:29 host sshd[27524]: Invalid user fiscal from 192.140.112.78 port 40198 Jan 20 00:44:29 host sshd[27524]: input_userauth_request: invalid user fiscal [preauth] Jan 20 00:44:29 host sshd[27524]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:44:29 host sshd[27524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.140.112.78 Jan 20 00:44:30 host sshd[27524]: Failed password for invalid user fiscal from 192.140.112.78 port 40198 ssh2 Jan 20 00:44:31 host sshd[27524]: Received disconnect from 192.140.112.78 port 40198:11: Bye Bye [preauth] Jan 20 00:44:31 host sshd[27524]: Disconnected from 192.140.112.78 port 40198 [preauth] Jan 20 00:44:42 host sshd[27596]: Invalid user sinusbot from 43.153.193.40 port 36698 Jan 20 00:44:42 host sshd[27596]: input_userauth_request: invalid user sinusbot [preauth] Jan 20 00:44:42 host sshd[27596]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:44:42 host sshd[27596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.193.40 Jan 20 00:44:44 host sshd[27596]: Failed password for invalid user sinusbot from 43.153.193.40 port 36698 ssh2 Jan 20 00:44:47 host sshd[27643]: Invalid user manager from 103.176.78.133 port 49036 Jan 20 00:44:47 host sshd[27643]: input_userauth_request: invalid user manager [preauth] Jan 20 00:44:47 host sshd[27643]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:44:47 host sshd[27643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.176.78.133 Jan 20 00:44:48 host sshd[27643]: Failed password for invalid user manager from 103.176.78.133 port 49036 ssh2 Jan 20 00:44:48 host sshd[27643]: Received disconnect from 103.176.78.133 port 49036:11: Bye Bye [preauth] Jan 20 00:44:48 host sshd[27643]: Disconnected from 103.176.78.133 port 49036 [preauth] Jan 20 00:47:14 host sshd[28040]: Invalid user telnet from 220.132.53.19 port 47262 Jan 20 00:47:14 host sshd[28040]: input_userauth_request: invalid user telnet [preauth] Jan 20 00:47:14 host sshd[28040]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:47:14 host sshd[28040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.53.19 Jan 20 00:47:15 host sshd[28040]: Failed password for invalid user telnet from 220.132.53.19 port 47262 ssh2 Jan 20 00:47:16 host sshd[28040]: Connection reset by 220.132.53.19 port 47262 [preauth] Jan 20 00:57:50 host sshd[29684]: Invalid user default from 183.108.66.126 port 51658 Jan 20 00:57:50 host sshd[29684]: input_userauth_request: invalid user default [preauth] Jan 20 00:57:50 host sshd[29684]: pam_unix(sshd:auth): check pass; user unknown Jan 20 00:57:50 host sshd[29684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.108.66.126 Jan 20 00:57:52 host sshd[29684]: Failed password for invalid user default from 183.108.66.126 port 51658 ssh2 Jan 20 00:57:52 host sshd[29684]: Connection reset by 183.108.66.126 port 51658 [preauth] Jan 20 00:59:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 00:59:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 00:59:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:20:44 host sshd[939]: Did not receive identification string from 20.85.226.10 port 53770 Jan 20 01:20:45 host sshd[941]: Invalid user postgres from 20.85.226.10 port 53816 Jan 20 01:20:45 host sshd[941]: input_userauth_request: invalid user postgres [preauth] Jan 20 01:20:45 host sshd[942]: User root from 20.85.226.10 not allowed because not listed in AllowUsers Jan 20 01:20:45 host sshd[942]: input_userauth_request: invalid user root [preauth] Jan 20 01:20:45 host sshd[943]: Invalid user zjw from 20.85.226.10 port 53916 Jan 20 01:20:45 host sshd[943]: input_userauth_request: invalid user zjw [preauth] Jan 20 01:20:45 host sshd[945]: Invalid user postgres from 20.85.226.10 port 53968 Jan 20 01:20:45 host sshd[945]: input_userauth_request: invalid user postgres [preauth] Jan 20 01:20:45 host sshd[944]: User root from 20.85.226.10 not allowed because not listed in AllowUsers Jan 20 01:20:45 host sshd[944]: input_userauth_request: invalid user root [preauth] Jan 20 01:20:45 host sshd[951]: User root from 20.85.226.10 not allowed because not listed in AllowUsers Jan 20 01:20:45 host sshd[951]: input_userauth_request: invalid user root [preauth] Jan 20 01:20:45 host sshd[946]: Invalid user admin from 20.85.226.10 port 53960 Jan 20 01:20:45 host sshd[946]: input_userauth_request: invalid user admin [preauth] Jan 20 01:20:45 host sshd[949]: User centos from 20.85.226.10 not allowed because not listed in AllowUsers Jan 20 01:20:45 host sshd[949]: input_userauth_request: invalid user centos [preauth] Jan 20 01:20:45 host sshd[952]: Invalid user user from 20.85.226.10 port 54046 Jan 20 01:20:45 host sshd[952]: input_userauth_request: invalid user user [preauth] Jan 20 01:20:45 host sshd[958]: User root from 20.85.226.10 not allowed because not listed in AllowUsers Jan 20 01:20:45 host sshd[958]: input_userauth_request: invalid user root [preauth] Jan 20 01:20:45 host sshd[961]: Invalid user ftpuser from 20.85.226.10 port 54054 Jan 20 01:20:45 host sshd[961]: input_userauth_request: invalid user ftpuser [preauth] Jan 20 01:20:45 host sshd[948]: User mysql from 20.85.226.10 not allowed because not listed in AllowUsers Jan 20 01:20:45 host sshd[947]: User root from 20.85.226.10 not allowed because not listed in AllowUsers Jan 20 01:20:45 host sshd[948]: input_userauth_request: invalid user mysql [preauth] Jan 20 01:20:45 host sshd[947]: input_userauth_request: invalid user root [preauth] Jan 20 01:20:45 host sshd[953]: User root from 20.85.226.10 not allowed because not listed in AllowUsers Jan 20 01:20:45 host sshd[953]: input_userauth_request: invalid user root [preauth] Jan 20 01:20:45 host sshd[957]: Invalid user admin from 20.85.226.10 port 54042 Jan 20 01:20:45 host sshd[957]: input_userauth_request: invalid user admin [preauth] Jan 20 01:20:45 host sshd[960]: User root from 20.85.226.10 not allowed because not listed in AllowUsers Jan 20 01:20:45 host sshd[960]: input_userauth_request: invalid user root [preauth] Jan 20 01:20:45 host sshd[963]: User root from 20.85.226.10 not allowed because not listed in AllowUsers Jan 20 01:20:45 host sshd[963]: input_userauth_request: invalid user root [preauth] Jan 20 01:20:45 host sshd[954]: Invalid user postgres from 20.85.226.10 port 53926 Jan 20 01:20:45 host sshd[954]: input_userauth_request: invalid user postgres [preauth] Jan 20 01:20:45 host sshd[962]: User root from 20.85.226.10 not allowed because not listed in AllowUsers Jan 20 01:20:45 host sshd[962]: input_userauth_request: invalid user root [preauth] Jan 20 01:20:45 host sshd[965]: User centos from 20.85.226.10 not allowed because not listed in AllowUsers Jan 20 01:20:45 host sshd[965]: input_userauth_request: invalid user centos [preauth] Jan 20 01:20:45 host sshd[959]: User root from 20.85.226.10 not allowed because not listed in AllowUsers Jan 20 01:20:45 host sshd[959]: input_userauth_request: invalid user root [preauth] Jan 20 01:20:45 host sshd[955]: Invalid user admin from 20.85.226.10 port 53788 Jan 20 01:20:45 host sshd[955]: input_userauth_request: invalid user admin [preauth] Jan 20 01:20:46 host sshd[941]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:20:46 host sshd[941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 Jan 20 01:20:46 host sshd[943]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:20:46 host sshd[943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 Jan 20 01:20:46 host sshd[945]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:20:46 host sshd[945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 Jan 20 01:20:46 host unix_chkpwd[994]: password check failed for user (root) Jan 20 01:20:46 host sshd[942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 user=root Jan 20 01:20:46 host sshd[942]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:20:46 host sshd[946]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:20:46 host sshd[946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 Jan 20 01:20:46 host sshd[952]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:20:46 host sshd[952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 Jan 20 01:20:46 host unix_chkpwd[997]: password check failed for user (centos) Jan 20 01:20:46 host sshd[949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 user=centos Jan 20 01:20:46 host unix_chkpwd[995]: password check failed for user (root) Jan 20 01:20:46 host sshd[944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 user=root Jan 20 01:20:46 host sshd[944]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:20:46 host unix_chkpwd[996]: password check failed for user (root) Jan 20 01:20:46 host sshd[951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 user=root Jan 20 01:20:46 host sshd[951]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:20:46 host sshd[961]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:20:46 host sshd[961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 Jan 20 01:20:46 host unix_chkpwd[999]: password check failed for user (mysql) Jan 20 01:20:46 host sshd[948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 user=mysql Jan 20 01:20:46 host sshd[948]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 20 01:20:46 host sshd[957]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:20:46 host sshd[957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 Jan 20 01:20:46 host unix_chkpwd[998]: password check failed for user (root) Jan 20 01:20:46 host sshd[958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 user=root Jan 20 01:20:46 host sshd[958]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:20:46 host sshd[954]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:20:46 host sshd[954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 Jan 20 01:20:46 host unix_chkpwd[1000]: password check failed for user (root) Jan 20 01:20:46 host sshd[947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 user=root Jan 20 01:20:46 host sshd[947]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:20:46 host unix_chkpwd[1001]: password check failed for user (root) Jan 20 01:20:46 host sshd[953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 user=root Jan 20 01:20:46 host sshd[953]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:20:46 host sshd[955]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:20:46 host sshd[955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 Jan 20 01:20:46 host unix_chkpwd[1003]: password check failed for user (root) Jan 20 01:20:46 host sshd[963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 user=root Jan 20 01:20:46 host sshd[963]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:20:46 host unix_chkpwd[1006]: password check failed for user (centos) Jan 20 01:20:46 host unix_chkpwd[1002]: password check failed for user (root) Jan 20 01:20:46 host sshd[960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 user=root Jan 20 01:20:46 host sshd[960]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:20:46 host sshd[965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 user=centos Jan 20 01:20:46 host unix_chkpwd[1004]: password check failed for user (root) Jan 20 01:20:46 host sshd[962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 user=root Jan 20 01:20:46 host sshd[962]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:20:46 host unix_chkpwd[1005]: password check failed for user (root) Jan 20 01:20:46 host sshd[959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 user=root Jan 20 01:20:46 host sshd[959]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:20:46 host sshd[986]: Invalid user hadoop from 20.85.226.10 port 54088 Jan 20 01:20:46 host sshd[986]: input_userauth_request: invalid user hadoop [preauth] Jan 20 01:20:46 host sshd[989]: Invalid user git from 20.85.226.10 port 54112 Jan 20 01:20:46 host sshd[989]: input_userauth_request: invalid user git [preauth] Jan 20 01:20:46 host sshd[987]: Invalid user ubuntu from 20.85.226.10 port 53894 Jan 20 01:20:46 host sshd[987]: input_userauth_request: invalid user ubuntu [preauth] Jan 20 01:20:46 host sshd[988]: Invalid user pi from 20.85.226.10 port 53940 Jan 20 01:20:46 host sshd[988]: input_userauth_request: invalid user pi [preauth] Jan 20 01:20:47 host sshd[986]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:20:47 host sshd[986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 Jan 20 01:20:47 host sshd[989]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:20:47 host sshd[989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 Jan 20 01:20:47 host sshd[987]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:20:47 host sshd[987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 Jan 20 01:20:47 host sshd[988]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:20:47 host sshd[988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 Jan 20 01:20:48 host sshd[941]: Failed password for invalid user postgres from 20.85.226.10 port 53816 ssh2 Jan 20 01:20:48 host sshd[943]: Failed password for invalid user zjw from 20.85.226.10 port 53916 ssh2 Jan 20 01:20:48 host sshd[945]: Failed password for invalid user postgres from 20.85.226.10 port 53968 ssh2 Jan 20 01:20:48 host sshd[942]: Failed password for invalid user root from 20.85.226.10 port 54068 ssh2 Jan 20 01:20:48 host sshd[946]: Failed password for invalid user admin from 20.85.226.10 port 53960 ssh2 Jan 20 01:20:48 host sshd[952]: Failed password for invalid user user from 20.85.226.10 port 54046 ssh2 Jan 20 01:20:48 host sshd[949]: Failed password for invalid user centos from 20.85.226.10 port 53908 ssh2 Jan 20 01:20:48 host sshd[944]: Failed password for invalid user root from 20.85.226.10 port 53836 ssh2 Jan 20 01:20:48 host sshd[951]: Failed password for invalid user root from 20.85.226.10 port 53776 ssh2 Jan 20 01:20:48 host sshd[961]: Failed password for invalid user ftpuser from 20.85.226.10 port 54054 ssh2 Jan 20 01:20:48 host sshd[948]: Failed password for invalid user mysql from 20.85.226.10 port 53774 ssh2 Jan 20 01:20:48 host sshd[957]: Failed password for invalid user admin from 20.85.226.10 port 54042 ssh2 Jan 20 01:20:48 host sshd[958]: Failed password for invalid user root from 20.85.226.10 port 53814 ssh2 Jan 20 01:20:48 host sshd[954]: Failed password for invalid user postgres from 20.85.226.10 port 53926 ssh2 Jan 20 01:20:48 host sshd[947]: Failed password for invalid user root from 20.85.226.10 port 53870 ssh2 Jan 20 01:20:48 host sshd[953]: Failed password for invalid user root from 20.85.226.10 port 53854 ssh2 Jan 20 01:20:48 host sshd[955]: Failed password for invalid user admin from 20.85.226.10 port 53788 ssh2 Jan 20 01:20:48 host sshd[963]: Failed password for invalid user root from 20.85.226.10 port 53824 ssh2 Jan 20 01:20:48 host sshd[960]: Failed password for invalid user root from 20.85.226.10 port 53996 ssh2 Jan 20 01:20:48 host sshd[965]: Failed password for invalid user centos from 20.85.226.10 port 53904 ssh2 Jan 20 01:20:48 host sshd[962]: Failed password for invalid user root from 20.85.226.10 port 53822 ssh2 Jan 20 01:20:48 host sshd[959]: Failed password for invalid user root from 20.85.226.10 port 54024 ssh2 Jan 20 01:20:48 host sshd[941]: Connection closed by 20.85.226.10 port 53816 [preauth] Jan 20 01:20:48 host sshd[943]: Connection closed by 20.85.226.10 port 53916 [preauth] Jan 20 01:20:48 host sshd[945]: Connection closed by 20.85.226.10 port 53968 [preauth] Jan 20 01:20:48 host sshd[942]: Connection closed by 20.85.226.10 port 54068 [preauth] Jan 20 01:20:48 host sshd[946]: Connection closed by 20.85.226.10 port 53960 [preauth] Jan 20 01:20:48 host sshd[944]: Connection closed by 20.85.226.10 port 53836 [preauth] Jan 20 01:20:48 host sshd[949]: Connection closed by 20.85.226.10 port 53908 [preauth] Jan 20 01:20:48 host sshd[952]: Connection closed by 20.85.226.10 port 54046 [preauth] Jan 20 01:20:48 host sshd[951]: Connection closed by 20.85.226.10 port 53776 [preauth] Jan 20 01:20:48 host sshd[961]: Connection closed by 20.85.226.10 port 54054 [preauth] Jan 20 01:20:48 host sshd[948]: Connection closed by 20.85.226.10 port 53774 [preauth] Jan 20 01:20:48 host sshd[957]: Connection closed by 20.85.226.10 port 54042 [preauth] Jan 20 01:20:48 host sshd[958]: Connection closed by 20.85.226.10 port 53814 [preauth] Jan 20 01:20:48 host sshd[954]: Connection closed by 20.85.226.10 port 53926 [preauth] Jan 20 01:20:48 host sshd[947]: Connection closed by 20.85.226.10 port 53870 [preauth] Jan 20 01:20:48 host sshd[953]: Connection closed by 20.85.226.10 port 53854 [preauth] Jan 20 01:20:48 host sshd[955]: Connection closed by 20.85.226.10 port 53788 [preauth] Jan 20 01:20:48 host sshd[963]: Connection closed by 20.85.226.10 port 53824 [preauth] Jan 20 01:20:48 host sshd[960]: Connection closed by 20.85.226.10 port 53996 [preauth] Jan 20 01:20:48 host sshd[965]: Connection closed by 20.85.226.10 port 53904 [preauth] Jan 20 01:20:48 host sshd[962]: Connection closed by 20.85.226.10 port 53822 [preauth] Jan 20 01:20:48 host sshd[959]: Connection closed by 20.85.226.10 port 54024 [preauth] Jan 20 01:20:49 host sshd[986]: Failed password for invalid user hadoop from 20.85.226.10 port 54088 ssh2 Jan 20 01:20:49 host sshd[989]: Failed password for invalid user git from 20.85.226.10 port 54112 ssh2 Jan 20 01:20:49 host sshd[987]: Failed password for invalid user ubuntu from 20.85.226.10 port 53894 ssh2 Jan 20 01:20:49 host sshd[988]: Failed password for invalid user pi from 20.85.226.10 port 53940 ssh2 Jan 20 01:20:49 host sshd[986]: Connection closed by 20.85.226.10 port 54088 [preauth] Jan 20 01:20:49 host sshd[989]: Connection closed by 20.85.226.10 port 54112 [preauth] Jan 20 01:20:49 host sshd[987]: Connection closed by 20.85.226.10 port 53894 [preauth] Jan 20 01:20:49 host sshd[988]: Connection closed by 20.85.226.10 port 53940 [preauth] Jan 20 01:20:50 host sshd[1009]: Invalid user oracle from 20.85.226.10 port 53980 Jan 20 01:20:50 host sshd[1009]: input_userauth_request: invalid user oracle [preauth] Jan 20 01:20:50 host sshd[1009]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:20:50 host sshd[1009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.85.226.10 Jan 20 01:20:52 host sshd[1009]: Failed password for invalid user oracle from 20.85.226.10 port 53980 ssh2 Jan 20 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=dartsimp user-2=a2zgroup user-3=laundryboniface user-4=cochintaxi user-5=wwwkaretakers user-6=travelboniface user-7=wwwrmswll user-8=wwwresourcehunte user-9=keralaholi user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=pmcresources user-16=disposeat user-17=wwwkmaorg user-18=remysagr user-19=wwwkapin user-20=woodpeck user-21=gifterman user-22=palco123 user-23=phmetals user-24=kottayamcalldriv user-25=wwwnexidigital user-26=mrsclean user-27=bonifacegroup user-28=wwwevmhonda user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 01:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fwBQsgyAtF4tn7Hy.~ Jan 20 01:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fwBQsgyAtF4tn7Hy.~' Jan 20 01:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fwBQsgyAtF4tn7Hy.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 01:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 01:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 01:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 01:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 01:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 01:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 01:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 01:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 01:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 01:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 01:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 01:24:36 host sshd[1758]: User root from 114.34.116.146 not allowed because not listed in AllowUsers Jan 20 01:24:36 host sshd[1758]: input_userauth_request: invalid user root [preauth] Jan 20 01:24:36 host unix_chkpwd[1766]: password check failed for user (root) Jan 20 01:24:36 host sshd[1758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.116.146 user=root Jan 20 01:24:36 host sshd[1758]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:24:37 host sshd[1758]: Failed password for invalid user root from 114.34.116.146 port 49262 ssh2 Jan 20 01:24:38 host unix_chkpwd[1771]: password check failed for user (root) Jan 20 01:24:38 host sshd[1758]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:24:39 host sshd[1758]: Failed password for invalid user root from 114.34.116.146 port 49262 ssh2 Jan 20 01:24:40 host unix_chkpwd[1787]: password check failed for user (root) Jan 20 01:24:40 host sshd[1758]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:24:42 host sshd[1758]: Failed password for invalid user root from 114.34.116.146 port 49262 ssh2 Jan 20 01:24:42 host unix_chkpwd[1790]: password check failed for user (root) Jan 20 01:24:42 host sshd[1758]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:24:44 host sshd[1758]: Failed password for invalid user root from 114.34.116.146 port 49262 ssh2 Jan 20 01:24:45 host unix_chkpwd[1799]: password check failed for user (root) Jan 20 01:24:45 host sshd[1758]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:24:47 host sshd[1758]: Failed password for invalid user root from 114.34.116.146 port 49262 ssh2 Jan 20 01:29:02 host sshd[2439]: Invalid user dnsekakf2$$ from 125.133.185.224 port 60374 Jan 20 01:29:02 host sshd[2439]: input_userauth_request: invalid user dnsekakf2$$ [preauth] Jan 20 01:29:02 host sshd[2439]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:29:02 host sshd[2439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.133.185.224 Jan 20 01:29:05 host sshd[2439]: Failed password for invalid user dnsekakf2$$ from 125.133.185.224 port 60374 ssh2 Jan 20 01:29:06 host sshd[2439]: Failed password for invalid user dnsekakf2$$ from 125.133.185.224 port 60374 ssh2 Jan 20 01:29:06 host sshd[2439]: Connection reset by 125.133.185.224 port 60374 [preauth] Jan 20 01:30:54 host sshd[2717]: Invalid user jeremy from 107.182.17.78 port 48718 Jan 20 01:30:54 host sshd[2717]: input_userauth_request: invalid user jeremy [preauth] Jan 20 01:30:54 host sshd[2717]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:30:54 host sshd[2717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.17.78 Jan 20 01:30:56 host sshd[2717]: Failed password for invalid user jeremy from 107.182.17.78 port 48718 ssh2 Jan 20 01:30:56 host sshd[2717]: Received disconnect from 107.182.17.78 port 48718:11: Bye Bye [preauth] Jan 20 01:30:56 host sshd[2717]: Disconnected from 107.182.17.78 port 48718 [preauth] Jan 20 01:32:39 host sshd[3087]: Invalid user techuser from 20.229.13.167 port 39398 Jan 20 01:32:39 host sshd[3087]: input_userauth_request: invalid user techuser [preauth] Jan 20 01:32:39 host sshd[3087]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:32:39 host sshd[3087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.229.13.167 Jan 20 01:32:41 host sshd[3087]: Failed password for invalid user techuser from 20.229.13.167 port 39398 ssh2 Jan 20 01:32:41 host sshd[3087]: Received disconnect from 20.229.13.167 port 39398:11: Bye Bye [preauth] Jan 20 01:32:41 host sshd[3087]: Disconnected from 20.229.13.167 port 39398 [preauth] Jan 20 01:34:25 host sshd[3282]: Invalid user john from 110.138.169.201 port 55502 Jan 20 01:34:25 host sshd[3282]: input_userauth_request: invalid user john [preauth] Jan 20 01:34:25 host sshd[3282]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:34:25 host sshd[3282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.138.169.201 Jan 20 01:34:27 host sshd[3282]: Failed password for invalid user john from 110.138.169.201 port 55502 ssh2 Jan 20 01:34:27 host sshd[3282]: Received disconnect from 110.138.169.201 port 55502:11: Bye Bye [preauth] Jan 20 01:34:27 host sshd[3282]: Disconnected from 110.138.169.201 port 55502 [preauth] Jan 20 01:35:05 host sshd[3388]: Invalid user wordpress from 35.226.64.200 port 47020 Jan 20 01:35:05 host sshd[3388]: input_userauth_request: invalid user wordpress [preauth] Jan 20 01:35:05 host sshd[3388]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:35:05 host sshd[3388]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.226.64.200 Jan 20 01:35:07 host sshd[3388]: Failed password for invalid user wordpress from 35.226.64.200 port 47020 ssh2 Jan 20 01:35:07 host sshd[3388]: Received disconnect from 35.226.64.200 port 47020:11: Bye Bye [preauth] Jan 20 01:35:07 host sshd[3388]: Disconnected from 35.226.64.200 port 47020 [preauth] Jan 20 01:35:20 host sshd[3430]: Invalid user esuser from 107.182.17.78 port 42000 Jan 20 01:35:20 host sshd[3430]: input_userauth_request: invalid user esuser [preauth] Jan 20 01:35:20 host sshd[3430]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:35:20 host sshd[3430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.17.78 Jan 20 01:35:21 host sshd[3433]: Invalid user gr from 194.110.203.109 port 50274 Jan 20 01:35:21 host sshd[3433]: input_userauth_request: invalid user gr [preauth] Jan 20 01:35:21 host sshd[3433]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:35:21 host sshd[3433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 01:35:22 host sshd[3430]: Failed password for invalid user esuser from 107.182.17.78 port 42000 ssh2 Jan 20 01:35:22 host sshd[3430]: Received disconnect from 107.182.17.78 port 42000:11: Bye Bye [preauth] Jan 20 01:35:22 host sshd[3430]: Disconnected from 107.182.17.78 port 42000 [preauth] Jan 20 01:35:23 host sshd[3433]: Failed password for invalid user gr from 194.110.203.109 port 50274 ssh2 Jan 20 01:35:26 host sshd[3433]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:35:28 host sshd[3433]: Failed password for invalid user gr from 194.110.203.109 port 50274 ssh2 Jan 20 01:35:31 host sshd[3433]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:35:33 host sshd[3433]: Failed password for invalid user gr from 194.110.203.109 port 50274 ssh2 Jan 20 01:35:36 host sshd[3433]: Connection closed by 194.110.203.109 port 50274 [preauth] Jan 20 01:35:36 host sshd[3433]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 01:35:46 host sshd[3478]: Invalid user master from 20.229.13.167 port 35750 Jan 20 01:35:46 host sshd[3478]: input_userauth_request: invalid user master [preauth] Jan 20 01:35:46 host sshd[3478]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:35:46 host sshd[3478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.229.13.167 Jan 20 01:35:48 host sshd[3478]: Failed password for invalid user master from 20.229.13.167 port 35750 ssh2 Jan 20 01:35:48 host sshd[3478]: Received disconnect from 20.229.13.167 port 35750:11: Bye Bye [preauth] Jan 20 01:35:48 host sshd[3478]: Disconnected from 20.229.13.167 port 35750 [preauth] Jan 20 01:36:45 host sshd[3696]: Invalid user import from 107.182.17.78 port 41120 Jan 20 01:36:45 host sshd[3696]: input_userauth_request: invalid user import [preauth] Jan 20 01:36:45 host sshd[3696]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:36:45 host sshd[3696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.182.17.78 Jan 20 01:36:47 host sshd[3696]: Failed password for invalid user import from 107.182.17.78 port 41120 ssh2 Jan 20 01:36:47 host sshd[3696]: Received disconnect from 107.182.17.78 port 41120:11: Bye Bye [preauth] Jan 20 01:36:47 host sshd[3696]: Disconnected from 107.182.17.78 port 41120 [preauth] Jan 20 01:36:55 host sshd[3743]: Invalid user dockeradmin from 20.229.13.167 port 54232 Jan 20 01:36:55 host sshd[3743]: input_userauth_request: invalid user dockeradmin [preauth] Jan 20 01:36:55 host sshd[3743]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:36:55 host sshd[3743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.229.13.167 Jan 20 01:36:57 host sshd[3743]: Failed password for invalid user dockeradmin from 20.229.13.167 port 54232 ssh2 Jan 20 01:37:07 host sshd[3795]: Invalid user debian from 195.226.194.142 port 40556 Jan 20 01:37:07 host sshd[3795]: input_userauth_request: invalid user debian [preauth] Jan 20 01:37:07 host sshd[3795]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:37:07 host sshd[3795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 20 01:37:09 host sshd[3795]: Failed password for invalid user debian from 195.226.194.142 port 40556 ssh2 Jan 20 01:37:09 host sshd[3795]: Received disconnect from 195.226.194.142 port 40556:11: Bye Bye [preauth] Jan 20 01:37:09 host sshd[3795]: Disconnected from 195.226.194.142 port 40556 [preauth] Jan 20 01:37:20 host sshd[3817]: Invalid user pi from 114.34.194.201 port 57512 Jan 20 01:37:20 host sshd[3817]: input_userauth_request: invalid user pi [preauth] Jan 20 01:37:20 host sshd[3817]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:37:20 host sshd[3817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.194.201 Jan 20 01:37:21 host sshd[3817]: Failed password for invalid user pi from 114.34.194.201 port 57512 ssh2 Jan 20 01:37:22 host sshd[3817]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:37:24 host sshd[3817]: Failed password for invalid user pi from 114.34.194.201 port 57512 ssh2 Jan 20 01:37:24 host sshd[3817]: Connection reset by 114.34.194.201 port 57512 [preauth] Jan 20 01:37:24 host sshd[3817]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.194.201 Jan 20 01:37:30 host sshd[3850]: Invalid user odoo from 110.138.169.201 port 57980 Jan 20 01:37:30 host sshd[3850]: input_userauth_request: invalid user odoo [preauth] Jan 20 01:37:30 host sshd[3850]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:37:30 host sshd[3850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.138.169.201 Jan 20 01:37:32 host sshd[3850]: Failed password for invalid user odoo from 110.138.169.201 port 57980 ssh2 Jan 20 01:37:32 host sshd[3850]: Received disconnect from 110.138.169.201 port 57980:11: Bye Bye [preauth] Jan 20 01:37:32 host sshd[3850]: Disconnected from 110.138.169.201 port 57980 [preauth] Jan 20 01:38:55 host sshd[3996]: Invalid user invoices from 110.138.169.201 port 53304 Jan 20 01:38:55 host sshd[3996]: input_userauth_request: invalid user invoices [preauth] Jan 20 01:38:55 host sshd[3996]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:38:55 host sshd[3996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.138.169.201 Jan 20 01:38:56 host sshd[3996]: Failed password for invalid user invoices from 110.138.169.201 port 53304 ssh2 Jan 20 01:39:33 host sshd[4120]: Invalid user drcomadmin from 35.226.64.200 port 43384 Jan 20 01:39:33 host sshd[4120]: input_userauth_request: invalid user drcomadmin [preauth] Jan 20 01:39:33 host sshd[4120]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:39:33 host sshd[4120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.226.64.200 Jan 20 01:39:35 host sshd[4120]: Failed password for invalid user drcomadmin from 35.226.64.200 port 43384 ssh2 Jan 20 01:39:35 host sshd[4120]: Received disconnect from 35.226.64.200 port 43384:11: Bye Bye [preauth] Jan 20 01:39:35 host sshd[4120]: Disconnected from 35.226.64.200 port 43384 [preauth] Jan 20 01:40:37 host sshd[4237]: Invalid user admin from 220.255.191.237 port 55603 Jan 20 01:40:37 host sshd[4237]: input_userauth_request: invalid user admin [preauth] Jan 20 01:40:37 host sshd[4237]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:40:37 host sshd[4237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.255.191.237 Jan 20 01:40:38 host sshd[4237]: Failed password for invalid user admin from 220.255.191.237 port 55603 ssh2 Jan 20 01:40:39 host sshd[4237]: Failed password for invalid user admin from 220.255.191.237 port 55603 ssh2 Jan 20 01:40:39 host sshd[4237]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:40:41 host sshd[4237]: Failed password for invalid user admin from 220.255.191.237 port 55603 ssh2 Jan 20 01:40:41 host sshd[4237]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:40:44 host sshd[4237]: Failed password for invalid user admin from 220.255.191.237 port 55603 ssh2 Jan 20 01:40:44 host sshd[4237]: Connection reset by 220.255.191.237 port 55603 [preauth] Jan 20 01:40:44 host sshd[4237]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.255.191.237 Jan 20 01:40:49 host sshd[4282]: Invalid user debian from 35.226.64.200 port 44350 Jan 20 01:40:49 host sshd[4282]: input_userauth_request: invalid user debian [preauth] Jan 20 01:40:49 host sshd[4282]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:40:49 host sshd[4282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.226.64.200 Jan 20 01:40:51 host sshd[4282]: Failed password for invalid user debian from 35.226.64.200 port 44350 ssh2 Jan 20 01:40:51 host sshd[4282]: Received disconnect from 35.226.64.200 port 44350:11: Bye Bye [preauth] Jan 20 01:40:51 host sshd[4282]: Disconnected from 35.226.64.200 port 44350 [preauth] Jan 20 01:41:10 host sshd[4347]: Invalid user admin from 123.22.224.12 port 44535 Jan 20 01:41:10 host sshd[4347]: input_userauth_request: invalid user admin [preauth] Jan 20 01:41:10 host sshd[4347]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:41:10 host sshd[4347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.22.224.12 Jan 20 01:41:13 host sshd[4347]: Failed password for invalid user admin from 123.22.224.12 port 44535 ssh2 Jan 20 01:41:13 host sshd[4347]: Failed password for invalid user admin from 123.22.224.12 port 44535 ssh2 Jan 20 01:41:14 host sshd[4347]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:41:15 host sshd[4347]: Failed password for invalid user admin from 123.22.224.12 port 44535 ssh2 Jan 20 01:41:16 host sshd[4347]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:41:18 host sshd[4360]: Did not receive identification string from 8.219.76.192 port 61000 Jan 20 01:41:18 host sshd[4347]: Failed password for invalid user admin from 123.22.224.12 port 44535 ssh2 Jan 20 01:41:18 host sshd[4347]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:41:20 host sshd[4347]: Failed password for invalid user admin from 123.22.224.12 port 44535 ssh2 Jan 20 01:41:20 host sshd[4347]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:41:22 host sshd[4347]: Failed password for invalid user admin from 123.22.224.12 port 44535 ssh2 Jan 20 01:41:22 host sshd[4347]: error: maximum authentication attempts exceeded for invalid user admin from 123.22.224.12 port 44535 ssh2 [preauth] Jan 20 01:41:22 host sshd[4347]: Disconnecting: Too many authentication failures [preauth] Jan 20 01:41:22 host sshd[4347]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.22.224.12 Jan 20 01:41:22 host sshd[4347]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 20 01:45:12 host sshd[5111]: User root from 122.116.46.241 not allowed because not listed in AllowUsers Jan 20 01:45:12 host sshd[5111]: input_userauth_request: invalid user root [preauth] Jan 20 01:45:12 host unix_chkpwd[5131]: password check failed for user (root) Jan 20 01:45:12 host sshd[5111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.46.241 user=root Jan 20 01:45:12 host sshd[5111]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:45:14 host sshd[5111]: Failed password for invalid user root from 122.116.46.241 port 60307 ssh2 Jan 20 01:45:14 host sshd[5111]: Connection reset by 122.116.46.241 port 60307 [preauth] Jan 20 01:48:14 host sshd[5810]: Connection reset by 216.181.145.144 port 59601 [preauth] Jan 20 01:49:41 host sshd[6019]: Invalid user pi from 211.105.122.81 port 60896 Jan 20 01:49:41 host sshd[6019]: input_userauth_request: invalid user pi [preauth] Jan 20 01:49:41 host sshd[6019]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:49:41 host sshd[6019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.105.122.81 Jan 20 01:49:42 host sshd[6019]: Failed password for invalid user pi from 211.105.122.81 port 60896 ssh2 Jan 20 01:49:43 host sshd[6019]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:49:45 host sshd[6019]: Failed password for invalid user pi from 211.105.122.81 port 60896 ssh2 Jan 20 01:49:46 host sshd[6019]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:49:48 host sshd[6019]: Failed password for invalid user pi from 211.105.122.81 port 60896 ssh2 Jan 20 01:49:49 host sshd[6019]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:49:50 host sshd[6019]: Failed password for invalid user pi from 211.105.122.81 port 60896 ssh2 Jan 20 01:49:51 host sshd[6019]: pam_unix(sshd:auth): check pass; user unknown Jan 20 01:49:52 host sshd[6019]: Failed password for invalid user pi from 211.105.122.81 port 60896 ssh2 Jan 20 01:50:25 host sshd[6163]: Connection closed by 198.199.101.225 port 59704 [preauth] Jan 20 01:51:47 host sshd[6365]: User root from 68.82.127.80 not allowed because not listed in AllowUsers Jan 20 01:51:47 host sshd[6365]: input_userauth_request: invalid user root [preauth] Jan 20 01:51:47 host unix_chkpwd[6371]: password check failed for user (root) Jan 20 01:51:47 host sshd[6365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.82.127.80 user=root Jan 20 01:51:47 host sshd[6365]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:51:49 host sshd[6365]: Failed password for invalid user root from 68.82.127.80 port 58810 ssh2 Jan 20 01:51:50 host unix_chkpwd[6375]: password check failed for user (root) Jan 20 01:51:50 host sshd[6365]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:51:52 host sshd[6365]: Failed password for invalid user root from 68.82.127.80 port 58810 ssh2 Jan 20 01:51:53 host unix_chkpwd[6378]: password check failed for user (root) Jan 20 01:51:53 host sshd[6365]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:51:54 host sshd[6365]: Failed password for invalid user root from 68.82.127.80 port 58810 ssh2 Jan 20 01:51:55 host unix_chkpwd[6381]: password check failed for user (root) Jan 20 01:51:55 host sshd[6365]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 01:51:56 host sshd[6365]: Failed password for invalid user root from 68.82.127.80 port 58810 ssh2 Jan 20 01:55:22 host sshd[6970]: Connection reset by 220.135.139.52 port 39312 [preauth] Jan 20 02:02:33 host sshd[7948]: Did not receive identification string from 82.156.169.242 port 56374 Jan 20 02:02:38 host sshd[7959]: User root from 82.156.169.242 not allowed because not listed in AllowUsers Jan 20 02:02:38 host sshd[7959]: input_userauth_request: invalid user root [preauth] Jan 20 02:02:38 host unix_chkpwd[7998]: password check failed for user (root) Jan 20 02:02:38 host sshd[7959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.156.169.242 user=root Jan 20 02:02:38 host sshd[7959]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 02:02:39 host sshd[7959]: Failed password for invalid user root from 82.156.169.242 port 59224 ssh2 Jan 20 02:02:40 host sshd[7959]: Connection closed by 82.156.169.242 port 59224 [preauth] Jan 20 02:06:37 host sshd[8562]: Invalid user sysop from 195.226.194.142 port 15438 Jan 20 02:06:37 host sshd[8562]: input_userauth_request: invalid user sysop [preauth] Jan 20 02:06:37 host sshd[8562]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:06:37 host sshd[8562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 20 02:06:39 host sshd[8562]: Failed password for invalid user sysop from 195.226.194.142 port 15438 ssh2 Jan 20 02:06:40 host sshd[8562]: Received disconnect from 195.226.194.142 port 15438:11: Bye Bye [preauth] Jan 20 02:06:40 host sshd[8562]: Disconnected from 195.226.194.142 port 15438 [preauth] Jan 20 02:06:52 host sshd[8588]: Did not receive identification string from 188.165.47.193 port 41148 Jan 20 02:07:24 host sshd[8679]: Invalid user admin from 188.165.47.193 port 38626 Jan 20 02:07:24 host sshd[8679]: input_userauth_request: invalid user admin [preauth] Jan 20 02:07:24 host sshd[8679]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:07:24 host sshd[8679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.47.193 Jan 20 02:07:26 host sshd[8679]: Failed password for invalid user admin from 188.165.47.193 port 38626 ssh2 Jan 20 02:07:26 host sshd[8679]: Connection closed by 188.165.47.193 port 38626 [preauth] Jan 20 02:09:23 host sshd[8968]: Invalid user ansible from 35.228.65.40 port 41220 Jan 20 02:09:23 host sshd[8968]: input_userauth_request: invalid user ansible [preauth] Jan 20 02:09:23 host sshd[8968]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:09:23 host sshd[8968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.228.65.40 Jan 20 02:09:25 host sshd[8968]: Failed password for invalid user ansible from 35.228.65.40 port 41220 ssh2 Jan 20 02:09:26 host sshd[8968]: Received disconnect from 35.228.65.40 port 41220:11: Bye Bye [preauth] Jan 20 02:09:26 host sshd[8968]: Disconnected from 35.228.65.40 port 41220 [preauth] Jan 20 02:09:29 host sshd[9001]: Invalid user admin from 188.165.47.193 port 40038 Jan 20 02:09:29 host sshd[9001]: input_userauth_request: invalid user admin [preauth] Jan 20 02:09:29 host sshd[9001]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:09:29 host sshd[9001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.47.193 Jan 20 02:09:31 host sshd[9001]: Failed password for invalid user admin from 188.165.47.193 port 40038 ssh2 Jan 20 02:09:31 host sshd[9001]: Connection closed by 188.165.47.193 port 40038 [preauth] Jan 20 02:10:31 host sshd[9285]: Invalid user halo from 162.19.66.82 port 43122 Jan 20 02:10:31 host sshd[9285]: input_userauth_request: invalid user halo [preauth] Jan 20 02:10:31 host sshd[9285]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:10:31 host sshd[9285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.19.66.82 Jan 20 02:10:33 host sshd[9285]: Failed password for invalid user halo from 162.19.66.82 port 43122 ssh2 Jan 20 02:10:33 host sshd[9285]: Received disconnect from 162.19.66.82 port 43122:11: Bye Bye [preauth] Jan 20 02:10:33 host sshd[9285]: Disconnected from 162.19.66.82 port 43122 [preauth] Jan 20 02:12:30 host sshd[9505]: Invalid user iodine from 104.244.74.6 port 39856 Jan 20 02:12:30 host sshd[9505]: input_userauth_request: invalid user iodine [preauth] Jan 20 02:12:30 host sshd[9505]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:12:30 host sshd[9505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 20 02:12:31 host sshd[9505]: Failed password for invalid user iodine from 104.244.74.6 port 39856 ssh2 Jan 20 02:12:31 host sshd[9505]: Connection closed by 104.244.74.6 port 39856 [preauth] Jan 20 02:15:03 host sshd[9770]: Invalid user debian from 35.228.65.40 port 60416 Jan 20 02:15:03 host sshd[9770]: input_userauth_request: invalid user debian [preauth] Jan 20 02:15:03 host sshd[9770]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:15:03 host sshd[9770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.228.65.40 Jan 20 02:15:05 host sshd[9770]: Failed password for invalid user debian from 35.228.65.40 port 60416 ssh2 Jan 20 02:15:05 host sshd[9770]: Received disconnect from 35.228.65.40 port 60416:11: Bye Bye [preauth] Jan 20 02:15:05 host sshd[9770]: Disconnected from 35.228.65.40 port 60416 [preauth] Jan 20 02:16:08 host sshd[9892]: Invalid user sysadmin from 162.19.66.82 port 47544 Jan 20 02:16:08 host sshd[9892]: input_userauth_request: invalid user sysadmin [preauth] Jan 20 02:16:08 host sshd[9892]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:16:08 host sshd[9892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.19.66.82 Jan 20 02:16:10 host sshd[9892]: Failed password for invalid user sysadmin from 162.19.66.82 port 47544 ssh2 Jan 20 02:16:10 host sshd[9895]: Invalid user web from 35.228.65.40 port 49974 Jan 20 02:16:10 host sshd[9895]: input_userauth_request: invalid user web [preauth] Jan 20 02:16:10 host sshd[9895]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:16:10 host sshd[9895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.228.65.40 Jan 20 02:16:10 host sshd[9892]: Received disconnect from 162.19.66.82 port 47544:11: Bye Bye [preauth] Jan 20 02:16:10 host sshd[9892]: Disconnected from 162.19.66.82 port 47544 [preauth] Jan 20 02:16:12 host sshd[9895]: Failed password for invalid user web from 35.228.65.40 port 49974 ssh2 Jan 20 02:16:12 host sshd[9895]: Received disconnect from 35.228.65.40 port 49974:11: Bye Bye [preauth] Jan 20 02:16:12 host sshd[9895]: Disconnected from 35.228.65.40 port 49974 [preauth] Jan 20 02:17:09 host sshd[10151]: Invalid user mark from 162.19.66.82 port 36474 Jan 20 02:17:09 host sshd[10151]: input_userauth_request: invalid user mark [preauth] Jan 20 02:17:09 host sshd[10151]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:17:09 host sshd[10151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.19.66.82 Jan 20 02:17:11 host sshd[10151]: Failed password for invalid user mark from 162.19.66.82 port 36474 ssh2 Jan 20 02:17:11 host sshd[10151]: Received disconnect from 162.19.66.82 port 36474:11: Bye Bye [preauth] Jan 20 02:17:11 host sshd[10151]: Disconnected from 162.19.66.82 port 36474 [preauth] Jan 20 02:19:39 host sshd[10455]: Invalid user asterisk from 138.2.72.124 port 53480 Jan 20 02:19:39 host sshd[10455]: input_userauth_request: invalid user asterisk [preauth] Jan 20 02:19:39 host sshd[10455]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:19:39 host sshd[10455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.72.124 Jan 20 02:19:41 host sshd[10455]: Failed password for invalid user asterisk from 138.2.72.124 port 53480 ssh2 Jan 20 02:19:41 host sshd[10455]: Received disconnect from 138.2.72.124 port 53480:11: Bye Bye [preauth] Jan 20 02:19:41 host sshd[10455]: Disconnected from 138.2.72.124 port 53480 [preauth] Jan 20 02:19:51 host sshd[10470]: Invalid user azureuser from 83.209.41.236 port 30312 Jan 20 02:19:51 host sshd[10470]: input_userauth_request: invalid user azureuser [preauth] Jan 20 02:19:51 host sshd[10470]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:19:51 host sshd[10470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.209.41.236 Jan 20 02:19:53 host sshd[10470]: Failed password for invalid user azureuser from 83.209.41.236 port 30312 ssh2 Jan 20 02:19:53 host sshd[10470]: Received disconnect from 83.209.41.236 port 30312:11: Bye Bye [preauth] Jan 20 02:19:53 host sshd[10470]: Disconnected from 83.209.41.236 port 30312 [preauth] Jan 20 02:20:45 host sshd[10621]: Invalid user admin from 165.227.222.54 port 52506 Jan 20 02:20:45 host sshd[10621]: input_userauth_request: invalid user admin [preauth] Jan 20 02:20:45 host sshd[10621]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:20:45 host sshd[10621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.222.54 Jan 20 02:20:48 host sshd[10621]: Failed password for invalid user admin from 165.227.222.54 port 52506 ssh2 Jan 20 02:20:48 host sshd[10621]: Received disconnect from 165.227.222.54 port 52506:11: Bye Bye [preauth] Jan 20 02:20:48 host sshd[10621]: Disconnected from 165.227.222.54 port 52506 [preauth] Jan 20 02:20:50 host sshd[10629]: Invalid user martin from 211.253.39.170 port 56220 Jan 20 02:20:50 host sshd[10629]: input_userauth_request: invalid user martin [preauth] Jan 20 02:20:50 host sshd[10629]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:20:50 host sshd[10629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.39.170 Jan 20 02:20:52 host sshd[10629]: Failed password for invalid user martin from 211.253.39.170 port 56220 ssh2 Jan 20 02:20:53 host sshd[10629]: Received disconnect from 211.253.39.170 port 56220:11: Bye Bye [preauth] Jan 20 02:20:53 host sshd[10629]: Disconnected from 211.253.39.170 port 56220 [preauth] Jan 20 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:03 host sshd[10660]: Invalid user csserver from 210.114.1.46 port 56568 Jan 20 02:21:03 host sshd[10660]: input_userauth_request: invalid user csserver [preauth] Jan 20 02:21:03 host sshd[10660]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:21:03 host sshd[10660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.114.1.46 Jan 20 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 02:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 02:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwresourcehunte user-4=keralaholi user-5=wwwrmswll user-6=ugotscom user-7=cochintaxi user-8=wwwkaretakers user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwletsstalkfood user-15=straightcurve user-16=palco123 user-17=gifterman user-18=kottayamcalldriv user-19=phmetals user-20=wwwnexidigital user-21=mrsclean user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=wwwkapin user-26=woodpeck user-27=vfmassets user-28=shalinijames user-29=wwwtestugo user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 02:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 02:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:05 host sshd[10660]: Failed password for invalid user csserver from 210.114.1.46 port 56568 ssh2 Jan 20 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 02:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sMH0eelC1j7BeVNi.~ Jan 20 02:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sMH0eelC1j7BeVNi.~' Jan 20 02:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sMH0eelC1j7BeVNi.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 02:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 02:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:05 host sshd[10660]: Received disconnect from 210.114.1.46 port 56568:11: Bye Bye [preauth] Jan 20 02:21:05 host sshd[10660]: Disconnected from 210.114.1.46 port 56568 [preauth] Jan 20 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 02:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 02:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 02:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 02:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 02:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 02:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 02:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 02:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:22:16 host sshd[11072]: Invalid user grid from 201.236.186.32 port 55154 Jan 20 02:22:16 host sshd[11072]: input_userauth_request: invalid user grid [preauth] Jan 20 02:22:16 host sshd[11072]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:22:16 host sshd[11072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.236.186.32 Jan 20 02:22:18 host sshd[11072]: Failed password for invalid user grid from 201.236.186.32 port 55154 ssh2 Jan 20 02:22:18 host sshd[11072]: Received disconnect from 201.236.186.32 port 55154:11: Bye Bye [preauth] Jan 20 02:22:18 host sshd[11072]: Disconnected from 201.236.186.32 port 55154 [preauth] Jan 20 02:22:58 host sshd[11132]: Connection reset by 118.91.39.54 port 36583 [preauth] Jan 20 02:23:11 host sshd[11157]: Invalid user ftpuser from 189.50.42.34 port 43267 Jan 20 02:23:11 host sshd[11157]: input_userauth_request: invalid user ftpuser [preauth] Jan 20 02:23:11 host sshd[11157]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:23:11 host sshd[11157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.42.34 Jan 20 02:23:13 host sshd[11157]: Failed password for invalid user ftpuser from 189.50.42.34 port 43267 ssh2 Jan 20 02:23:14 host sshd[11157]: Received disconnect from 189.50.42.34 port 43267:11: Bye Bye [preauth] Jan 20 02:23:14 host sshd[11157]: Disconnected from 189.50.42.34 port 43267 [preauth] Jan 20 02:23:20 host sshd[11175]: Invalid user ftpuser from 171.244.140.174 port 39904 Jan 20 02:23:20 host sshd[11175]: input_userauth_request: invalid user ftpuser [preauth] Jan 20 02:23:20 host sshd[11175]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:23:20 host sshd[11175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.140.174 Jan 20 02:23:21 host sshd[11179]: Invalid user grid from 165.154.240.15 port 30410 Jan 20 02:23:21 host sshd[11179]: input_userauth_request: invalid user grid [preauth] Jan 20 02:23:21 host sshd[11179]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:23:21 host sshd[11179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.240.15 Jan 20 02:23:22 host sshd[11175]: Failed password for invalid user ftpuser from 171.244.140.174 port 39904 ssh2 Jan 20 02:23:22 host sshd[11175]: Received disconnect from 171.244.140.174 port 39904:11: Bye Bye [preauth] Jan 20 02:23:22 host sshd[11175]: Disconnected from 171.244.140.174 port 39904 [preauth] Jan 20 02:23:23 host sshd[11179]: Failed password for invalid user grid from 165.154.240.15 port 30410 ssh2 Jan 20 02:23:23 host sshd[11179]: Received disconnect from 165.154.240.15 port 30410:11: Bye Bye [preauth] Jan 20 02:23:23 host sshd[11179]: Disconnected from 165.154.240.15 port 30410 [preauth] Jan 20 02:23:31 host sshd[11215]: Invalid user test2 from 83.209.41.236 port 42960 Jan 20 02:23:31 host sshd[11215]: input_userauth_request: invalid user test2 [preauth] Jan 20 02:23:31 host sshd[11215]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:23:31 host sshd[11215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.209.41.236 Jan 20 02:23:32 host sshd[11215]: Failed password for invalid user test2 from 83.209.41.236 port 42960 ssh2 Jan 20 02:23:33 host sshd[11215]: Received disconnect from 83.209.41.236 port 42960:11: Bye Bye [preauth] Jan 20 02:23:33 host sshd[11215]: Disconnected from 83.209.41.236 port 42960 [preauth] Jan 20 02:23:43 host sshd[11231]: Invalid user gmodserver from 165.227.222.54 port 50854 Jan 20 02:23:43 host sshd[11231]: input_userauth_request: invalid user gmodserver [preauth] Jan 20 02:23:43 host sshd[11231]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:23:43 host sshd[11231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.222.54 Jan 20 02:23:44 host sshd[11231]: Failed password for invalid user gmodserver from 165.227.222.54 port 50854 ssh2 Jan 20 02:23:44 host sshd[11231]: Received disconnect from 165.227.222.54 port 50854:11: Bye Bye [preauth] Jan 20 02:23:44 host sshd[11231]: Disconnected from 165.227.222.54 port 50854 [preauth] Jan 20 02:23:56 host sshd[11248]: Invalid user angel from 138.2.72.124 port 53676 Jan 20 02:23:56 host sshd[11248]: input_userauth_request: invalid user angel [preauth] Jan 20 02:23:56 host sshd[11248]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:23:56 host sshd[11248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.72.124 Jan 20 02:23:58 host sshd[11248]: Failed password for invalid user angel from 138.2.72.124 port 53676 ssh2 Jan 20 02:23:58 host sshd[11248]: Received disconnect from 138.2.72.124 port 53676:11: Bye Bye [preauth] Jan 20 02:23:58 host sshd[11248]: Disconnected from 138.2.72.124 port 53676 [preauth] Jan 20 02:24:13 host sshd[11278]: Invalid user csserver from 211.253.39.170 port 40154 Jan 20 02:24:13 host sshd[11278]: input_userauth_request: invalid user csserver [preauth] Jan 20 02:24:13 host sshd[11278]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:24:13 host sshd[11278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.39.170 Jan 20 02:24:14 host sshd[11278]: Failed password for invalid user csserver from 211.253.39.170 port 40154 ssh2 Jan 20 02:24:15 host sshd[11278]: Received disconnect from 211.253.39.170 port 40154:11: Bye Bye [preauth] Jan 20 02:24:15 host sshd[11278]: Disconnected from 211.253.39.170 port 40154 [preauth] Jan 20 02:24:43 host sshd[11339]: Invalid user bitnami from 83.209.41.236 port 56120 Jan 20 02:24:43 host sshd[11339]: input_userauth_request: invalid user bitnami [preauth] Jan 20 02:24:43 host sshd[11339]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:24:43 host sshd[11339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.209.41.236 Jan 20 02:24:45 host sshd[11339]: Failed password for invalid user bitnami from 83.209.41.236 port 56120 ssh2 Jan 20 02:24:45 host sshd[11339]: Received disconnect from 83.209.41.236 port 56120:11: Bye Bye [preauth] Jan 20 02:24:45 host sshd[11339]: Disconnected from 83.209.41.236 port 56120 [preauth] Jan 20 02:24:49 host sshd[11372]: Invalid user jboss from 165.227.222.54 port 35814 Jan 20 02:24:49 host sshd[11372]: input_userauth_request: invalid user jboss [preauth] Jan 20 02:24:49 host sshd[11372]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:24:49 host sshd[11372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.222.54 Jan 20 02:24:51 host sshd[11372]: Failed password for invalid user jboss from 165.227.222.54 port 35814 ssh2 Jan 20 02:24:51 host sshd[11372]: Received disconnect from 165.227.222.54 port 35814:11: Bye Bye [preauth] Jan 20 02:24:51 host sshd[11372]: Disconnected from 165.227.222.54 port 35814 [preauth] Jan 20 02:25:37 host sshd[11517]: Invalid user scan from 210.114.1.46 port 40722 Jan 20 02:25:37 host sshd[11517]: input_userauth_request: invalid user scan [preauth] Jan 20 02:25:37 host sshd[11517]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:25:37 host sshd[11517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.114.1.46 Jan 20 02:25:38 host sshd[11520]: Invalid user rustserver from 211.253.39.170 port 39094 Jan 20 02:25:38 host sshd[11520]: input_userauth_request: invalid user rustserver [preauth] Jan 20 02:25:38 host sshd[11520]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:25:38 host sshd[11520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.39.170 Jan 20 02:25:38 host sshd[11516]: Invalid user frappe from 189.50.42.34 port 58541 Jan 20 02:25:38 host sshd[11516]: input_userauth_request: invalid user frappe [preauth] Jan 20 02:25:38 host sshd[11516]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:25:38 host sshd[11516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.42.34 Jan 20 02:25:39 host sshd[11517]: Failed password for invalid user scan from 210.114.1.46 port 40722 ssh2 Jan 20 02:25:40 host sshd[11517]: Received disconnect from 210.114.1.46 port 40722:11: Bye Bye [preauth] Jan 20 02:25:40 host sshd[11517]: Disconnected from 210.114.1.46 port 40722 [preauth] Jan 20 02:25:40 host sshd[11520]: Failed password for invalid user rustserver from 211.253.39.170 port 39094 ssh2 Jan 20 02:25:40 host sshd[11516]: Failed password for invalid user frappe from 189.50.42.34 port 58541 ssh2 Jan 20 02:25:40 host sshd[11520]: Received disconnect from 211.253.39.170 port 39094:11: Bye Bye [preauth] Jan 20 02:25:40 host sshd[11520]: Disconnected from 211.253.39.170 port 39094 [preauth] Jan 20 02:25:40 host sshd[11516]: Received disconnect from 189.50.42.34 port 58541:11: Bye Bye [preauth] Jan 20 02:25:40 host sshd[11516]: Disconnected from 189.50.42.34 port 58541 [preauth] Jan 20 02:25:43 host sshd[11537]: Invalid user jeremy from 165.154.240.15 port 59472 Jan 20 02:25:43 host sshd[11537]: input_userauth_request: invalid user jeremy [preauth] Jan 20 02:25:43 host sshd[11537]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:25:43 host sshd[11537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.240.15 Jan 20 02:25:44 host sshd[11537]: Failed password for invalid user jeremy from 165.154.240.15 port 59472 ssh2 Jan 20 02:25:44 host sshd[11537]: Received disconnect from 165.154.240.15 port 59472:11: Bye Bye [preauth] Jan 20 02:25:44 host sshd[11537]: Disconnected from 165.154.240.15 port 59472 [preauth] Jan 20 02:26:21 host sshd[11630]: Invalid user deploy from 138.2.72.124 port 53784 Jan 20 02:26:21 host sshd[11630]: input_userauth_request: invalid user deploy [preauth] Jan 20 02:26:21 host sshd[11630]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:26:21 host sshd[11630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.2.72.124 Jan 20 02:26:23 host sshd[11630]: Failed password for invalid user deploy from 138.2.72.124 port 53784 ssh2 Jan 20 02:26:30 host sshd[11790]: Invalid user samba from 201.236.186.32 port 39743 Jan 20 02:26:30 host sshd[11790]: input_userauth_request: invalid user samba [preauth] Jan 20 02:26:30 host sshd[11790]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:26:30 host sshd[11790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.236.186.32 Jan 20 02:26:32 host sshd[11790]: Failed password for invalid user samba from 201.236.186.32 port 39743 ssh2 Jan 20 02:26:32 host sshd[11790]: Received disconnect from 201.236.186.32 port 39743:11: Bye Bye [preauth] Jan 20 02:26:32 host sshd[11790]: Disconnected from 201.236.186.32 port 39743 [preauth] Jan 20 02:27:03 host sshd[11828]: Invalid user admin1 from 210.114.1.46 port 35058 Jan 20 02:27:03 host sshd[11828]: input_userauth_request: invalid user admin1 [preauth] Jan 20 02:27:03 host sshd[11828]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:27:03 host sshd[11828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.114.1.46 Jan 20 02:27:04 host sshd[11842]: Invalid user csserver from 165.154.240.15 port 27080 Jan 20 02:27:04 host sshd[11842]: input_userauth_request: invalid user csserver [preauth] Jan 20 02:27:04 host sshd[11842]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:27:04 host sshd[11842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.240.15 Jan 20 02:27:04 host sshd[11828]: Failed password for invalid user admin1 from 210.114.1.46 port 35058 ssh2 Jan 20 02:27:04 host sshd[11828]: Received disconnect from 210.114.1.46 port 35058:11: Bye Bye [preauth] Jan 20 02:27:04 host sshd[11828]: Disconnected from 210.114.1.46 port 35058 [preauth] Jan 20 02:27:06 host sshd[11842]: Failed password for invalid user csserver from 165.154.240.15 port 27080 ssh2 Jan 20 02:27:06 host sshd[11842]: Received disconnect from 165.154.240.15 port 27080:11: Bye Bye [preauth] Jan 20 02:27:06 host sshd[11842]: Disconnected from 165.154.240.15 port 27080 [preauth] Jan 20 02:27:15 host sshd[11923]: Invalid user user8 from 171.244.140.174 port 17979 Jan 20 02:27:15 host sshd[11923]: input_userauth_request: invalid user user8 [preauth] Jan 20 02:27:15 host sshd[11923]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:27:15 host sshd[11923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.140.174 Jan 20 02:27:16 host sshd[11923]: Failed password for invalid user user8 from 171.244.140.174 port 17979 ssh2 Jan 20 02:27:17 host sshd[11923]: Received disconnect from 171.244.140.174 port 17979:11: Bye Bye [preauth] Jan 20 02:27:17 host sshd[11923]: Disconnected from 171.244.140.174 port 17979 [preauth] Jan 20 02:27:26 host sshd[11945]: Invalid user user7 from 189.50.42.34 port 43815 Jan 20 02:27:26 host sshd[11945]: input_userauth_request: invalid user user7 [preauth] Jan 20 02:27:26 host sshd[11945]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:27:26 host sshd[11945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.50.42.34 Jan 20 02:27:28 host sshd[11945]: Failed password for invalid user user7 from 189.50.42.34 port 43815 ssh2 Jan 20 02:28:23 host sshd[12119]: Invalid user splunk from 201.236.186.32 port 60647 Jan 20 02:28:23 host sshd[12119]: input_userauth_request: invalid user splunk [preauth] Jan 20 02:28:23 host sshd[12119]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:28:23 host sshd[12119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.236.186.32 Jan 20 02:28:25 host sshd[12119]: Failed password for invalid user splunk from 201.236.186.32 port 60647 ssh2 Jan 20 02:28:26 host sshd[12119]: Received disconnect from 201.236.186.32 port 60647:11: Bye Bye [preauth] Jan 20 02:28:26 host sshd[12119]: Disconnected from 201.236.186.32 port 60647 [preauth] Jan 20 02:28:49 host sshd[12230]: Invalid user csgoserver from 171.244.140.174 port 40439 Jan 20 02:28:49 host sshd[12230]: input_userauth_request: invalid user csgoserver [preauth] Jan 20 02:28:49 host sshd[12230]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:28:49 host sshd[12230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.140.174 Jan 20 02:28:50 host sshd[12230]: Failed password for invalid user csgoserver from 171.244.140.174 port 40439 ssh2 Jan 20 02:28:51 host sshd[12230]: Received disconnect from 171.244.140.174 port 40439:11: Bye Bye [preauth] Jan 20 02:28:51 host sshd[12230]: Disconnected from 171.244.140.174 port 40439 [preauth] Jan 20 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=wwwkapin user-5=woodpeck user-6=wwwtestugo user-7=shalinijames user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=wwwletsstalkfood user-13=straightcurve user-14=kottayamcalldriv user-15=phmetals user-16=gifterman user-17=palco123 user-18=wwwnexidigital user-19=mrsclean user-20=cochintaxi user-21=wwwkaretakers user-22=dartsimp user-23=a2zgroup user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=wwwrmswll user-29=keralaholi user-30=wwwresourcehunte feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 02:29:02 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Jan 20 02:29:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 20 02:29:10 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 20 02:29:10 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 20 02:29:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Jan 20 02:29:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Jan 20 02:29:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Jan 20 02:29:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 20 02:29:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 20 02:29:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 20 02:29:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Jan 20 02:29:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:25 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Jan 20 02:29:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Jan 20 02:29:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Jan 20 02:29:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Jan 20 02:29:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Jan 20 02:29:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:40 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Jan 20 02:29:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:44 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Jan 20 02:29:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Jan 20 02:29:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 20 02:29:45 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 20 02:29:45 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 20 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Jan 20 02:29:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 02:29:45 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 02:29:45 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 20 02:29:46 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 20 02:29:46 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 20 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Jan 20 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 20 02:29:54 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 20 02:29:54 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 20 02:29:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Jan 20 02:29:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Jan 20 02:29:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Jan 20 02:29:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:29:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:30:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Jan 20 02:30:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:30:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:30:06 host sshd[12986]: User ftp from 121.155.155.25 not allowed because not listed in AllowUsers Jan 20 02:30:06 host sshd[12986]: input_userauth_request: invalid user ftp [preauth] Jan 20 02:30:06 host unix_chkpwd[13079]: password check failed for user (ftp) Jan 20 02:30:06 host sshd[12986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.155.155.25 user=ftp Jan 20 02:30:06 host sshd[12986]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 20 02:30:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Jan 20 02:30:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:30:08 host sshd[12986]: Failed password for invalid user ftp from 121.155.155.25 port 53144 ssh2 Jan 20 02:30:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:30:09 host unix_chkpwd[13141]: password check failed for user (ftp) Jan 20 02:30:09 host sshd[12986]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 20 02:30:11 host sshd[12986]: Failed password for invalid user ftp from 121.155.155.25 port 53144 ssh2 Jan 20 02:30:12 host unix_chkpwd[13151]: password check failed for user (ftp) Jan 20 02:30:12 host sshd[12986]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 20 02:30:14 host sshd[12986]: Failed password for invalid user ftp from 121.155.155.25 port 53144 ssh2 Jan 20 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 20 02:30:14 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 20 02:30:14 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 20 02:30:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Jan 20 02:30:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:30:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:30:15 host sshd[12986]: Failed password for invalid user ftp from 121.155.155.25 port 53144 ssh2 Jan 20 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Jan 20 02:30:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:30:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Jan 20 02:30:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:30:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:30:15 host unix_chkpwd[13230]: password check failed for user (ftp) Jan 20 02:30:15 host sshd[12986]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 20 02:30:17 host sshd[12986]: Failed password for invalid user ftp from 121.155.155.25 port 53144 ssh2 Jan 20 02:30:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Jan 20 02:30:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:30:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 20 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 20 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 20 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Jan 20 02:30:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:30:37 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 20 02:30:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 20 02:30:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 20 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Jan 20 02:30:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:30:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Jan 20 02:30:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:30:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Jan 20 02:30:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:30:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Jan 20 02:30:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:30:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 20 02:30:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 02:30:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Jan 20 02:30:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:30:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 20 02:31:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 02:31:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Jan 20 02:31:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:31:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:31:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 20 02:31:22 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 02:31:22 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Jan 20 02:31:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:31:27 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:31:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Jan 20 02:31:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:31:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Jan 20 02:31:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:31:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Jan 20 02:31:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:31:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 20 02:31:31 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 20 02:31:31 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 20 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Jan 20 02:31:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:31:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Jan 20 02:31:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:31:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:31:34 host sshd[14536]: Invalid user admin from 1.33.123.220 port 56711 Jan 20 02:31:34 host sshd[14536]: input_userauth_request: invalid user admin [preauth] Jan 20 02:31:34 host sshd[14536]: Failed none for invalid user admin from 1.33.123.220 port 56711 ssh2 Jan 20 02:31:35 host sshd[14536]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:31:35 host sshd[14536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.33.123.220 Jan 20 02:31:37 host sshd[14536]: Failed password for invalid user admin from 1.33.123.220 port 56711 ssh2 Jan 20 02:31:37 host sshd[14536]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:31:39 host sshd[14536]: Failed password for invalid user admin from 1.33.123.220 port 56711 ssh2 Jan 20 02:31:39 host sshd[14536]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:31:41 host sshd[14536]: Failed password for invalid user admin from 1.33.123.220 port 56711 ssh2 Jan 20 02:31:41 host sshd[14536]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:31:44 host sshd[14536]: Failed password for invalid user admin from 1.33.123.220 port 56711 ssh2 Jan 20 02:31:44 host sshd[14536]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 20 02:31:45 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 20 02:31:45 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 20 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Jan 20 02:31:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:31:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:31:45 host sshd[14536]: Failed password for invalid user admin from 1.33.123.220 port 56711 ssh2 Jan 20 02:31:45 host sshd[14536]: error: maximum authentication attempts exceeded for invalid user admin from 1.33.123.220 port 56711 ssh2 [preauth] Jan 20 02:31:45 host sshd[14536]: Disconnecting: Too many authentication failures [preauth] Jan 20 02:31:46 host sshd[14536]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.33.123.220 Jan 20 02:31:46 host sshd[14536]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 20 02:31:46 host sshd[14695]: Connection closed by 1.33.123.220 port 56752 [preauth] Jan 20 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Jan 20 02:31:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:31:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Jan 20 02:31:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:31:47 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Jan 20 02:32:00 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Jan 20 02:32:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 20 02:32:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 20 02:32:12 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 20 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Jan 20 02:32:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Jan 20 02:32:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Jan 20 02:32:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Jan 20 02:32:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=disposeat WpToolkitNotification send_admin_auto_updates_notification 'available_updates_text=<br/><br/>Updates are available for the following items:<br/><br/>' 'available_updates_list=1. Website "Resource Hunters" (http://resourcehunters.com). Installed version: 4.2.34. Available version: 6.1.1.<br/><br/>' installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 Jan 20 02:32:22 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in Jan 20 02:32:22 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error Jan 20 02:32:22 host sudo: wp-toolkit : (command continued) establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: [error]FailedToExecuteWpCliCommand: chdir /home/woodpeck/public_html/wp: no such file or directory[/error]#012<br/><br/>' --output=json Jan 20 02:32:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Jan 20 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 20 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 20 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 20 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 20 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 20 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 20 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 20 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 20 02:32:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 20 02:32:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 20 02:32:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 20 02:32:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 20 02:32:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 20 02:32:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 02:32:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 02:33:58 host sshd[15749]: Connection reset by 221.164.91.188 port 55932 [preauth] Jan 20 02:35:57 host sshd[16051]: Invalid user debianuser from 195.226.194.142 port 62634 Jan 20 02:35:57 host sshd[16051]: input_userauth_request: invalid user debianuser [preauth] Jan 20 02:35:57 host sshd[16051]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:35:57 host sshd[16051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 Jan 20 02:35:59 host sshd[16051]: Failed password for invalid user debianuser from 195.226.194.142 port 62634 ssh2 Jan 20 02:50:23 host sshd[18167]: Invalid user deskres from 205.185.113.129 port 45720 Jan 20 02:50:23 host sshd[18167]: input_userauth_request: invalid user deskres [preauth] Jan 20 02:50:23 host sshd[18167]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:50:23 host sshd[18167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 20 02:50:26 host sshd[18167]: Failed password for invalid user deskres from 205.185.113.129 port 45720 ssh2 Jan 20 02:50:26 host sshd[18167]: Connection closed by 205.185.113.129 port 45720 [preauth] Jan 20 02:52:55 host sshd[18441]: Invalid user Admin from 189.223.49.131 port 55160 Jan 20 02:52:55 host sshd[18441]: input_userauth_request: invalid user Admin [preauth] Jan 20 02:52:55 host sshd[18441]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:52:55 host sshd[18441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.223.49.131 Jan 20 02:52:57 host sshd[18441]: Failed password for invalid user Admin from 189.223.49.131 port 55160 ssh2 Jan 20 02:52:58 host sshd[18441]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:52:59 host sshd[18441]: Failed password for invalid user Admin from 189.223.49.131 port 55160 ssh2 Jan 20 02:53:00 host sshd[18441]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:53:02 host sshd[18441]: Failed password for invalid user Admin from 189.223.49.131 port 55160 ssh2 Jan 20 02:53:03 host sshd[18441]: pam_unix(sshd:auth): check pass; user unknown Jan 20 02:53:04 host sshd[18441]: Failed password for invalid user Admin from 189.223.49.131 port 55160 ssh2 Jan 20 02:53:07 host sshd[18441]: Failed password for invalid user Admin from 189.223.49.131 port 55160 ssh2 Jan 20 02:53:08 host sshd[18441]: Connection reset by 189.223.49.131 port 55160 [preauth] Jan 20 02:53:08 host sshd[18441]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.223.49.131 Jan 20 02:53:08 host sshd[18441]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 20 03:06:31 host sshd[20702]: User root from 182.219.202.253 not allowed because not listed in AllowUsers Jan 20 03:06:31 host sshd[20702]: input_userauth_request: invalid user root [preauth] Jan 20 03:06:31 host unix_chkpwd[20705]: password check failed for user (root) Jan 20 03:06:31 host sshd[20702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.219.202.253 user=root Jan 20 03:06:31 host sshd[20702]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 03:06:33 host sshd[20702]: Failed password for invalid user root from 182.219.202.253 port 60770 ssh2 Jan 20 03:06:33 host unix_chkpwd[20715]: password check failed for user (root) Jan 20 03:06:33 host sshd[20702]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 03:06:35 host sshd[20702]: Failed password for invalid user root from 182.219.202.253 port 60770 ssh2 Jan 20 03:06:36 host unix_chkpwd[20719]: password check failed for user (root) Jan 20 03:06:36 host sshd[20702]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 03:06:38 host sshd[20702]: Failed password for invalid user root from 182.219.202.253 port 60770 ssh2 Jan 20 03:06:38 host sshd[20702]: Connection reset by 182.219.202.253 port 60770 [preauth] Jan 20 03:06:38 host sshd[20702]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.219.202.253 user=root Jan 20 03:16:27 host sshd[22230]: Invalid user uftp from 187.189.37.175 port 31329 Jan 20 03:16:27 host sshd[22230]: input_userauth_request: invalid user uftp [preauth] Jan 20 03:16:27 host sshd[22230]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:16:27 host sshd[22230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.37.175 Jan 20 03:16:28 host sshd[22230]: Failed password for invalid user uftp from 187.189.37.175 port 31329 ssh2 Jan 20 03:16:29 host sshd[22230]: Received disconnect from 187.189.37.175 port 31329:11: Bye Bye [preauth] Jan 20 03:16:29 host sshd[22230]: Disconnected from 187.189.37.175 port 31329 [preauth] Jan 20 03:18:03 host sshd[22458]: Invalid user stack from 103.208.137.90 port 49138 Jan 20 03:18:03 host sshd[22458]: input_userauth_request: invalid user stack [preauth] Jan 20 03:18:03 host sshd[22458]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:18:03 host sshd[22458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.208.137.90 Jan 20 03:18:05 host sshd[22458]: Failed password for invalid user stack from 103.208.137.90 port 49138 ssh2 Jan 20 03:18:05 host sshd[22458]: Received disconnect from 103.208.137.90 port 49138:11: Bye Bye [preauth] Jan 20 03:18:05 host sshd[22458]: Disconnected from 103.208.137.90 port 49138 [preauth] Jan 20 03:18:15 host sshd[22578]: Invalid user esuser from 104.168.68.119 port 58920 Jan 20 03:18:15 host sshd[22578]: input_userauth_request: invalid user esuser [preauth] Jan 20 03:18:15 host sshd[22578]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:18:15 host sshd[22578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.68.119 Jan 20 03:18:17 host sshd[22578]: Failed password for invalid user esuser from 104.168.68.119 port 58920 ssh2 Jan 20 03:18:17 host sshd[22578]: Received disconnect from 104.168.68.119 port 58920:11: Bye Bye [preauth] Jan 20 03:18:17 host sshd[22578]: Disconnected from 104.168.68.119 port 58920 [preauth] Jan 20 03:18:33 host sshd[22634]: Invalid user shadow from 122.154.253.5 port 50148 Jan 20 03:18:33 host sshd[22634]: input_userauth_request: invalid user shadow [preauth] Jan 20 03:18:33 host sshd[22634]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:18:33 host sshd[22634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.253.5 Jan 20 03:18:34 host sshd[22634]: Failed password for invalid user shadow from 122.154.253.5 port 50148 ssh2 Jan 20 03:18:34 host sshd[22634]: Received disconnect from 122.154.253.5 port 50148:11: Bye Bye [preauth] Jan 20 03:18:34 host sshd[22634]: Disconnected from 122.154.253.5 port 50148 [preauth] Jan 20 03:19:53 host sshd[22802]: Invalid user gs from 194.110.203.109 port 45544 Jan 20 03:19:53 host sshd[22802]: input_userauth_request: invalid user gs [preauth] Jan 20 03:19:53 host sshd[22802]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:19:53 host sshd[22802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 03:19:55 host sshd[22802]: Failed password for invalid user gs from 194.110.203.109 port 45544 ssh2 Jan 20 03:19:58 host sshd[22802]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:20:00 host sshd[22802]: Failed password for invalid user gs from 194.110.203.109 port 45544 ssh2 Jan 20 03:20:03 host sshd[22802]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:20:04 host sshd[22802]: Failed password for invalid user gs from 194.110.203.109 port 45544 ssh2 Jan 20 03:20:08 host sshd[22802]: Connection closed by 194.110.203.109 port 45544 [preauth] Jan 20 03:20:08 host sshd[22802]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 03:20:23 host sshd[22880]: Invalid user bot from 138.197.151.213 port 40200 Jan 20 03:20:23 host sshd[22880]: input_userauth_request: invalid user bot [preauth] Jan 20 03:20:23 host sshd[22880]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:20:23 host sshd[22880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.151.213 Jan 20 03:20:25 host sshd[22880]: Failed password for invalid user bot from 138.197.151.213 port 40200 ssh2 Jan 20 03:20:25 host sshd[22880]: Received disconnect from 138.197.151.213 port 40200:11: Bye Bye [preauth] Jan 20 03:20:25 host sshd[22880]: Disconnected from 138.197.151.213 port 40200 [preauth] Jan 20 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 03:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 03:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=cochintaxi user-5=wwwkaretakers user-6=wwwrmswll user-7=wwwresourcehunte user-8=keralaholi user-9=ugotscom user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=vfmassets user-14=wwwtestugo user-15=shalinijames user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=gifterman user-24=palco123 user-25=phmetals user-26=kottayamcalldriv user-27=wwwletsstalkfood user-28=straightcurve user-29=bonifacegroup user-30=wwwevmhonda feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 03:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 03:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 03:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3WgPHRYMwUTGSJoq.~ Jan 20 03:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3WgPHRYMwUTGSJoq.~' Jan 20 03:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3WgPHRYMwUTGSJoq.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 03:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 03:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 03:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 03:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 03:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 03:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 03:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 03:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 03:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 03:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 03:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 03:22:12 host sshd[23347]: Invalid user invoices from 68.168.141.140 port 48974 Jan 20 03:22:12 host sshd[23347]: input_userauth_request: invalid user invoices [preauth] Jan 20 03:22:12 host sshd[23347]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:22:12 host sshd[23347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.141.140 Jan 20 03:22:14 host sshd[23347]: Failed password for invalid user invoices from 68.168.141.140 port 48974 ssh2 Jan 20 03:22:14 host sshd[23347]: Received disconnect from 68.168.141.140 port 48974:11: Bye Bye [preauth] Jan 20 03:22:14 host sshd[23347]: Disconnected from 68.168.141.140 port 48974 [preauth] Jan 20 03:22:39 host sshd[23417]: Invalid user user1 from 138.197.151.213 port 46082 Jan 20 03:22:39 host sshd[23417]: input_userauth_request: invalid user user1 [preauth] Jan 20 03:22:39 host sshd[23417]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:22:39 host sshd[23417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.151.213 Jan 20 03:22:40 host sshd[23417]: Failed password for invalid user user1 from 138.197.151.213 port 46082 ssh2 Jan 20 03:22:41 host sshd[23417]: Received disconnect from 138.197.151.213 port 46082:11: Bye Bye [preauth] Jan 20 03:22:41 host sshd[23417]: Disconnected from 138.197.151.213 port 46082 [preauth] Jan 20 03:22:59 host sshd[23441]: Invalid user mike from 36.227.231.251 port 20762 Jan 20 03:22:59 host sshd[23441]: input_userauth_request: invalid user mike [preauth] Jan 20 03:22:59 host sshd[23441]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:22:59 host sshd[23441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.227.231.251 Jan 20 03:23:00 host sshd[23448]: Invalid user openbravo from 187.189.37.175 port 44865 Jan 20 03:23:00 host sshd[23448]: input_userauth_request: invalid user openbravo [preauth] Jan 20 03:23:00 host sshd[23448]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:23:00 host sshd[23448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.37.175 Jan 20 03:23:02 host sshd[23441]: Failed password for invalid user mike from 36.227.231.251 port 20762 ssh2 Jan 20 03:23:02 host sshd[23441]: Received disconnect from 36.227.231.251 port 20762:11: Bye Bye [preauth] Jan 20 03:23:02 host sshd[23441]: Disconnected from 36.227.231.251 port 20762 [preauth] Jan 20 03:23:03 host sshd[23448]: Failed password for invalid user openbravo from 187.189.37.175 port 44865 ssh2 Jan 20 03:23:03 host sshd[23448]: Received disconnect from 187.189.37.175 port 44865:11: Bye Bye [preauth] Jan 20 03:23:03 host sshd[23448]: Disconnected from 187.189.37.175 port 44865 [preauth] Jan 20 03:23:37 host sshd[23525]: Invalid user david from 104.168.68.119 port 53752 Jan 20 03:23:37 host sshd[23525]: input_userauth_request: invalid user david [preauth] Jan 20 03:23:37 host sshd[23525]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:23:37 host sshd[23525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.68.119 Jan 20 03:23:39 host sshd[23525]: Failed password for invalid user david from 104.168.68.119 port 53752 ssh2 Jan 20 03:23:40 host sshd[23525]: Received disconnect from 104.168.68.119 port 53752:11: Bye Bye [preauth] Jan 20 03:23:40 host sshd[23525]: Disconnected from 104.168.68.119 port 53752 [preauth] Jan 20 03:23:44 host sshd[23537]: Invalid user administrator from 122.154.253.5 port 45416 Jan 20 03:23:44 host sshd[23537]: input_userauth_request: invalid user administrator [preauth] Jan 20 03:23:44 host sshd[23537]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:23:44 host sshd[23537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.253.5 Jan 20 03:23:45 host sshd[23534]: Invalid user support from 138.197.151.213 port 44208 Jan 20 03:23:45 host sshd[23534]: input_userauth_request: invalid user support [preauth] Jan 20 03:23:45 host sshd[23534]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:23:45 host sshd[23534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.151.213 Jan 20 03:23:46 host sshd[23537]: Failed password for invalid user administrator from 122.154.253.5 port 45416 ssh2 Jan 20 03:23:46 host sshd[23537]: Received disconnect from 122.154.253.5 port 45416:11: Bye Bye [preauth] Jan 20 03:23:46 host sshd[23537]: Disconnected from 122.154.253.5 port 45416 [preauth] Jan 20 03:23:47 host sshd[23534]: Failed password for invalid user support from 138.197.151.213 port 44208 ssh2 Jan 20 03:23:47 host sshd[23534]: Received disconnect from 138.197.151.213 port 44208:11: Bye Bye [preauth] Jan 20 03:23:47 host sshd[23534]: Disconnected from 138.197.151.213 port 44208 [preauth] Jan 20 03:24:22 host sshd[23725]: Invalid user openbravo from 187.189.37.175 port 35937 Jan 20 03:24:22 host sshd[23725]: input_userauth_request: invalid user openbravo [preauth] Jan 20 03:24:22 host sshd[23725]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:24:22 host sshd[23725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.189.37.175 Jan 20 03:24:24 host sshd[23725]: Failed password for invalid user openbravo from 187.189.37.175 port 35937 ssh2 Jan 20 03:24:24 host sshd[23725]: Received disconnect from 187.189.37.175 port 35937:11: Bye Bye [preauth] Jan 20 03:24:24 host sshd[23725]: Disconnected from 187.189.37.175 port 35937 [preauth] Jan 20 03:24:26 host sshd[23761]: Invalid user gitlab-runner from 103.208.137.90 port 49458 Jan 20 03:24:26 host sshd[23761]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 20 03:24:26 host sshd[23761]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:24:26 host sshd[23761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.208.137.90 Jan 20 03:24:28 host sshd[23761]: Failed password for invalid user gitlab-runner from 103.208.137.90 port 49458 ssh2 Jan 20 03:24:28 host sshd[23761]: Received disconnect from 103.208.137.90 port 49458:11: Bye Bye [preauth] Jan 20 03:24:28 host sshd[23761]: Disconnected from 103.208.137.90 port 49458 [preauth] Jan 20 03:24:48 host sshd[23811]: Invalid user user01 from 104.168.68.119 port 48232 Jan 20 03:24:48 host sshd[23811]: input_userauth_request: invalid user user01 [preauth] Jan 20 03:24:48 host sshd[23811]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:24:48 host sshd[23811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.68.119 Jan 20 03:24:50 host sshd[23811]: Failed password for invalid user user01 from 104.168.68.119 port 48232 ssh2 Jan 20 03:25:09 host sshd[23897]: Invalid user import from 122.154.253.5 port 44196 Jan 20 03:25:09 host sshd[23897]: input_userauth_request: invalid user import [preauth] Jan 20 03:25:09 host sshd[23897]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:25:09 host sshd[23897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.253.5 Jan 20 03:25:11 host sshd[23897]: Failed password for invalid user import from 122.154.253.5 port 44196 ssh2 Jan 20 03:25:11 host sshd[23897]: Received disconnect from 122.154.253.5 port 44196:11: Bye Bye [preauth] Jan 20 03:25:11 host sshd[23897]: Disconnected from 122.154.253.5 port 44196 [preauth] Jan 20 03:25:24 host sshd[23904]: Invalid user mapr from 68.168.141.140 port 42436 Jan 20 03:25:24 host sshd[23904]: input_userauth_request: invalid user mapr [preauth] Jan 20 03:25:24 host sshd[23904]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:25:24 host sshd[23904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.141.140 Jan 20 03:25:26 host sshd[23904]: Failed password for invalid user mapr from 68.168.141.140 port 42436 ssh2 Jan 20 03:25:26 host sshd[23904]: Received disconnect from 68.168.141.140 port 42436:11: Bye Bye [preauth] Jan 20 03:25:26 host sshd[23904]: Disconnected from 68.168.141.140 port 42436 [preauth] Jan 20 03:25:59 host sshd[24025]: Invalid user vagrant from 36.227.231.251 port 41142 Jan 20 03:25:59 host sshd[24025]: input_userauth_request: invalid user vagrant [preauth] Jan 20 03:25:59 host sshd[24025]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:25:59 host sshd[24025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.227.231.251 Jan 20 03:26:01 host sshd[24025]: Failed password for invalid user vagrant from 36.227.231.251 port 41142 ssh2 Jan 20 03:26:01 host sshd[24025]: Received disconnect from 36.227.231.251 port 41142:11: Bye Bye [preauth] Jan 20 03:26:01 host sshd[24025]: Disconnected from 36.227.231.251 port 41142 [preauth] Jan 20 03:26:29 host sshd[24114]: Invalid user adam from 103.208.137.90 port 48150 Jan 20 03:26:29 host sshd[24114]: input_userauth_request: invalid user adam [preauth] Jan 20 03:26:29 host sshd[24114]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:26:29 host sshd[24114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.208.137.90 Jan 20 03:26:30 host sshd[24114]: Failed password for invalid user adam from 103.208.137.90 port 48150 ssh2 Jan 20 03:26:30 host sshd[24114]: Received disconnect from 103.208.137.90 port 48150:11: Bye Bye [preauth] Jan 20 03:26:30 host sshd[24114]: Disconnected from 103.208.137.90 port 48150 [preauth] Jan 20 03:27:25 host sshd[24251]: Invalid user admin from 49.213.248.195 port 49681 Jan 20 03:27:25 host sshd[24251]: input_userauth_request: invalid user admin [preauth] Jan 20 03:27:25 host sshd[24251]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:27:25 host sshd[24251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.213.248.195 Jan 20 03:27:27 host sshd[24251]: Failed password for invalid user admin from 49.213.248.195 port 49681 ssh2 Jan 20 03:27:29 host sshd[24251]: Failed password for invalid user admin from 49.213.248.195 port 49681 ssh2 Jan 20 03:27:30 host sshd[24251]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:27:33 host sshd[24251]: Failed password for invalid user admin from 49.213.248.195 port 49681 ssh2 Jan 20 03:27:34 host sshd[24251]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:27:36 host sshd[24251]: Failed password for invalid user admin from 49.213.248.195 port 49681 ssh2 Jan 20 03:27:36 host sshd[24251]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:27:39 host sshd[24251]: Failed password for invalid user admin from 49.213.248.195 port 49681 ssh2 Jan 20 03:27:52 host sshd[24333]: Invalid user client from 68.168.141.140 port 59300 Jan 20 03:27:52 host sshd[24333]: input_userauth_request: invalid user client [preauth] Jan 20 03:27:52 host sshd[24333]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:27:52 host sshd[24333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.141.140 Jan 20 03:27:53 host sshd[24333]: Failed password for invalid user client from 68.168.141.140 port 59300 ssh2 Jan 20 03:27:54 host sshd[24333]: Received disconnect from 68.168.141.140 port 59300:11: Bye Bye [preauth] Jan 20 03:27:54 host sshd[24333]: Disconnected from 68.168.141.140 port 59300 [preauth] Jan 20 03:27:59 host sshd[24373]: Invalid user ts from 36.227.231.251 port 60150 Jan 20 03:27:59 host sshd[24373]: input_userauth_request: invalid user ts [preauth] Jan 20 03:27:59 host sshd[24373]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:27:59 host sshd[24373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.227.231.251 Jan 20 03:28:01 host sshd[24373]: Failed password for invalid user ts from 36.227.231.251 port 60150 ssh2 Jan 20 03:31:55 host sshd[24976]: User root from 121.183.44.140 not allowed because not listed in AllowUsers Jan 20 03:31:55 host sshd[24976]: input_userauth_request: invalid user root [preauth] Jan 20 03:31:55 host unix_chkpwd[24980]: password check failed for user (root) Jan 20 03:31:55 host sshd[24976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.183.44.140 user=root Jan 20 03:31:55 host sshd[24976]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 03:31:57 host sshd[24976]: Failed password for invalid user root from 121.183.44.140 port 60180 ssh2 Jan 20 03:31:58 host unix_chkpwd[24984]: password check failed for user (root) Jan 20 03:31:58 host sshd[24976]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 03:32:00 host sshd[24976]: Failed password for invalid user root from 121.183.44.140 port 60180 ssh2 Jan 20 03:32:01 host unix_chkpwd[24987]: password check failed for user (root) Jan 20 03:32:01 host sshd[24976]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 03:32:03 host sshd[24976]: Failed password for invalid user root from 121.183.44.140 port 60180 ssh2 Jan 20 03:32:03 host unix_chkpwd[25001]: password check failed for user (root) Jan 20 03:32:03 host sshd[24976]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 03:32:05 host sshd[24976]: Failed password for invalid user root from 121.183.44.140 port 60180 ssh2 Jan 20 03:33:54 host sshd[25235]: Connection reset by 94.254.19.113 port 52657 [preauth] Jan 20 03:37:37 host sshd[25871]: User root from 59.24.127.242 not allowed because not listed in AllowUsers Jan 20 03:37:37 host sshd[25871]: input_userauth_request: invalid user root [preauth] Jan 20 03:37:37 host unix_chkpwd[25875]: password check failed for user (root) Jan 20 03:37:37 host sshd[25871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.24.127.242 user=root Jan 20 03:37:37 host sshd[25871]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 03:37:39 host sshd[25871]: Failed password for invalid user root from 59.24.127.242 port 60245 ssh2 Jan 20 03:37:39 host unix_chkpwd[25877]: password check failed for user (root) Jan 20 03:37:39 host sshd[25871]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 03:37:41 host sshd[25871]: Failed password for invalid user root from 59.24.127.242 port 60245 ssh2 Jan 20 03:37:41 host sshd[25871]: Connection reset by 59.24.127.242 port 60245 [preauth] Jan 20 03:37:41 host sshd[25871]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.24.127.242 user=root Jan 20 03:39:34 host sshd[26132]: User root from 112.120.121.112 not allowed because not listed in AllowUsers Jan 20 03:39:34 host sshd[26132]: input_userauth_request: invalid user root [preauth] Jan 20 03:39:34 host unix_chkpwd[26136]: password check failed for user (root) Jan 20 03:39:34 host sshd[26132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.120.121.112 user=root Jan 20 03:39:34 host sshd[26132]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 03:39:36 host sshd[26132]: Failed password for invalid user root from 112.120.121.112 port 52187 ssh2 Jan 20 03:39:36 host sshd[26132]: Connection reset by 112.120.121.112 port 52187 [preauth] Jan 20 03:40:28 host sshd[26349]: User root from 211.75.194.227 not allowed because not listed in AllowUsers Jan 20 03:40:28 host sshd[26349]: input_userauth_request: invalid user root [preauth] Jan 20 03:40:28 host unix_chkpwd[26395]: password check failed for user (root) Jan 20 03:40:28 host sshd[26349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.75.194.227 user=root Jan 20 03:40:28 host sshd[26349]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 03:40:30 host sshd[26349]: Failed password for invalid user root from 211.75.194.227 port 58062 ssh2 Jan 20 03:40:31 host unix_chkpwd[26404]: password check failed for user (root) Jan 20 03:40:31 host sshd[26349]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 03:40:32 host sshd[26349]: Failed password for invalid user root from 211.75.194.227 port 58062 ssh2 Jan 20 03:40:33 host sshd[26349]: Connection reset by 211.75.194.227 port 58062 [preauth] Jan 20 03:40:33 host sshd[26349]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.75.194.227 user=root Jan 20 03:52:40 host sshd[28147]: Invalid user oracle from 203.127.161.82 port 52718 Jan 20 03:52:40 host sshd[28147]: input_userauth_request: invalid user oracle [preauth] Jan 20 03:52:40 host sshd[28147]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:52:40 host sshd[28147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.127.161.82 Jan 20 03:52:42 host sshd[28147]: Failed password for invalid user oracle from 203.127.161.82 port 52718 ssh2 Jan 20 03:52:42 host sshd[28147]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:52:44 host sshd[28147]: Failed password for invalid user oracle from 203.127.161.82 port 52718 ssh2 Jan 20 03:52:44 host sshd[28147]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:52:46 host sshd[28147]: Failed password for invalid user oracle from 203.127.161.82 port 52718 ssh2 Jan 20 03:52:46 host sshd[28147]: Failed password for invalid user oracle from 203.127.161.82 port 52718 ssh2 Jan 20 03:52:47 host sshd[28147]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:52:49 host sshd[28147]: Failed password for invalid user oracle from 203.127.161.82 port 52718 ssh2 Jan 20 03:52:49 host sshd[28147]: pam_unix(sshd:auth): check pass; user unknown Jan 20 03:52:51 host sshd[28147]: Failed password for invalid user oracle from 203.127.161.82 port 52718 ssh2 Jan 20 03:52:51 host sshd[28147]: error: maximum authentication attempts exceeded for invalid user oracle from 203.127.161.82 port 52718 ssh2 [preauth] Jan 20 03:52:51 host sshd[28147]: Disconnecting: Too many authentication failures [preauth] Jan 20 03:52:51 host sshd[28147]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.127.161.82 Jan 20 03:52:51 host sshd[28147]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 20 04:00:26 host sshd[29357]: Invalid user zyfwp from 114.35.65.211 port 37109 Jan 20 04:00:26 host sshd[29357]: input_userauth_request: invalid user zyfwp [preauth] Jan 20 04:00:26 host sshd[29357]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:00:26 host sshd[29357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.65.211 Jan 20 04:00:28 host sshd[29357]: Failed password for invalid user zyfwp from 114.35.65.211 port 37109 ssh2 Jan 20 04:00:28 host sshd[29357]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:00:31 host sshd[29357]: Failed password for invalid user zyfwp from 114.35.65.211 port 37109 ssh2 Jan 20 04:00:32 host sshd[29357]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:00:34 host sshd[29357]: Failed password for invalid user zyfwp from 114.35.65.211 port 37109 ssh2 Jan 20 04:00:34 host sshd[29357]: Connection closed by 114.35.65.211 port 37109 [preauth] Jan 20 04:00:34 host sshd[29357]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.65.211 Jan 20 04:03:06 host sshd[29680]: Invalid user melvin from 107.189.30.59 port 34000 Jan 20 04:03:06 host sshd[29680]: input_userauth_request: invalid user melvin [preauth] Jan 20 04:03:06 host sshd[29680]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:03:06 host sshd[29680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 20 04:03:08 host sshd[29680]: Failed password for invalid user melvin from 107.189.30.59 port 34000 ssh2 Jan 20 04:03:09 host sshd[29680]: Connection closed by 107.189.30.59 port 34000 [preauth] Jan 20 04:07:44 host sshd[30331]: Invalid user chris from 188.166.14.99 port 38252 Jan 20 04:07:44 host sshd[30331]: input_userauth_request: invalid user chris [preauth] Jan 20 04:07:44 host sshd[30331]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:07:44 host sshd[30331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.14.99 Jan 20 04:07:46 host sshd[30331]: Failed password for invalid user chris from 188.166.14.99 port 38252 ssh2 Jan 20 04:07:46 host sshd[30331]: Received disconnect from 188.166.14.99 port 38252:11: Bye Bye [preauth] Jan 20 04:07:46 host sshd[30331]: Disconnected from 188.166.14.99 port 38252 [preauth] Jan 20 04:09:56 host sshd[30698]: Invalid user halo from 185.238.2.68 port 40326 Jan 20 04:09:56 host sshd[30698]: input_userauth_request: invalid user halo [preauth] Jan 20 04:09:56 host sshd[30698]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:09:56 host sshd[30698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.238.2.68 Jan 20 04:09:58 host sshd[30698]: Failed password for invalid user halo from 185.238.2.68 port 40326 ssh2 Jan 20 04:09:58 host sshd[30698]: Received disconnect from 185.238.2.68 port 40326:11: Bye Bye [preauth] Jan 20 04:09:58 host sshd[30698]: Disconnected from 185.238.2.68 port 40326 [preauth] Jan 20 04:10:40 host sshd[30918]: User root from 209.141.55.27 not allowed because not listed in AllowUsers Jan 20 04:10:40 host sshd[30918]: input_userauth_request: invalid user root [preauth] Jan 20 04:10:40 host unix_chkpwd[30921]: password check failed for user (root) Jan 20 04:10:40 host sshd[30918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 user=root Jan 20 04:10:40 host sshd[30918]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 04:10:42 host sshd[30918]: Failed password for invalid user root from 209.141.55.27 port 60594 ssh2 Jan 20 04:10:42 host sshd[30918]: Received disconnect from 209.141.55.27 port 60594:11: Normal Shutdown, Thank you for playing [preauth] Jan 20 04:10:42 host sshd[30918]: Disconnected from 209.141.55.27 port 60594 [preauth] Jan 20 04:11:52 host sshd[31041]: Invalid user user from 58.72.151.220 port 50471 Jan 20 04:11:52 host sshd[31041]: input_userauth_request: invalid user user [preauth] Jan 20 04:11:52 host sshd[31041]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:11:52 host sshd[31041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.72.151.220 Jan 20 04:11:53 host sshd[31041]: Failed password for invalid user user from 58.72.151.220 port 50471 ssh2 Jan 20 04:11:54 host sshd[31041]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:11:56 host sshd[31041]: Failed password for invalid user user from 58.72.151.220 port 50471 ssh2 Jan 20 04:11:57 host sshd[31041]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:11:58 host sshd[31041]: Failed password for invalid user user from 58.72.151.220 port 50471 ssh2 Jan 20 04:11:59 host sshd[31041]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:12:00 host sshd[31041]: Failed password for invalid user user from 58.72.151.220 port 50471 ssh2 Jan 20 04:12:01 host sshd[31041]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:12:04 host sshd[31041]: Failed password for invalid user user from 58.72.151.220 port 50471 ssh2 Jan 20 04:13:17 host sshd[31244]: Invalid user newadmin from 188.166.14.99 port 47808 Jan 20 04:13:17 host sshd[31244]: input_userauth_request: invalid user newadmin [preauth] Jan 20 04:13:17 host sshd[31244]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:13:17 host sshd[31244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.14.99 Jan 20 04:13:19 host sshd[31244]: Failed password for invalid user newadmin from 188.166.14.99 port 47808 ssh2 Jan 20 04:13:19 host sshd[31244]: Received disconnect from 188.166.14.99 port 47808:11: Bye Bye [preauth] Jan 20 04:13:19 host sshd[31244]: Disconnected from 188.166.14.99 port 47808 [preauth] Jan 20 04:14:04 host sshd[31180]: Connection closed by 111.161.125.133 port 34346 [preauth] Jan 20 04:14:08 host sshd[31386]: Invalid user teamspeak3 from 185.238.2.68 port 51318 Jan 20 04:14:08 host sshd[31386]: input_userauth_request: invalid user teamspeak3 [preauth] Jan 20 04:14:08 host sshd[31386]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:14:08 host sshd[31386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.238.2.68 Jan 20 04:14:10 host sshd[31386]: Failed password for invalid user teamspeak3 from 185.238.2.68 port 51318 ssh2 Jan 20 04:14:11 host sshd[31386]: Received disconnect from 185.238.2.68 port 51318:11: Bye Bye [preauth] Jan 20 04:14:11 host sshd[31386]: Disconnected from 185.238.2.68 port 51318 [preauth] Jan 20 04:14:25 host sshd[31528]: Invalid user oscar from 188.166.14.99 port 60870 Jan 20 04:14:25 host sshd[31528]: input_userauth_request: invalid user oscar [preauth] Jan 20 04:14:25 host sshd[31528]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:14:25 host sshd[31528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.14.99 Jan 20 04:14:28 host sshd[31528]: Failed password for invalid user oscar from 188.166.14.99 port 60870 ssh2 Jan 20 04:15:17 host sshd[31685]: Invalid user openbravo from 185.238.2.68 port 50610 Jan 20 04:15:17 host sshd[31685]: input_userauth_request: invalid user openbravo [preauth] Jan 20 04:15:17 host sshd[31685]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:15:17 host sshd[31685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.238.2.68 Jan 20 04:15:19 host sshd[31685]: Failed password for invalid user openbravo from 185.238.2.68 port 50610 ssh2 Jan 20 04:15:19 host sshd[31685]: Received disconnect from 185.238.2.68 port 50610:11: Bye Bye [preauth] Jan 20 04:15:19 host sshd[31685]: Disconnected from 185.238.2.68 port 50610 [preauth] Jan 20 04:15:59 host sshd[31813]: Invalid user oracle from 14.56.24.201 port 62753 Jan 20 04:15:59 host sshd[31813]: input_userauth_request: invalid user oracle [preauth] Jan 20 04:15:59 host sshd[31813]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:15:59 host sshd[31813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.56.24.201 Jan 20 04:16:02 host sshd[31813]: Failed password for invalid user oracle from 14.56.24.201 port 62753 ssh2 Jan 20 04:16:03 host sshd[31813]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:16:04 host sshd[31813]: Failed password for invalid user oracle from 14.56.24.201 port 62753 ssh2 Jan 20 04:16:05 host sshd[31813]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:16:06 host sshd[31813]: Failed password for invalid user oracle from 14.56.24.201 port 62753 ssh2 Jan 20 04:16:07 host sshd[31813]: Connection reset by 14.56.24.201 port 62753 [preauth] Jan 20 04:16:07 host sshd[31813]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.56.24.201 Jan 20 04:17:26 host sshd[32021]: Invalid user admin from 221.165.227.71 port 60803 Jan 20 04:17:26 host sshd[32021]: input_userauth_request: invalid user admin [preauth] Jan 20 04:17:26 host sshd[32021]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:17:26 host sshd[32021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.165.227.71 Jan 20 04:17:28 host sshd[32021]: Failed password for invalid user admin from 221.165.227.71 port 60803 ssh2 Jan 20 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 04:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 04:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwresourcehunte user-2=keralaholi user-3=wwwrmswll user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=wwwkaretakers user-11=cochintaxi user-12=mrsclean user-13=wwwnexidigital user-14=palco123 user-15=gifterman user-16=phmetals user-17=kottayamcalldriv user-18=wwwletsstalkfood user-19=straightcurve user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=shalinijames user-25=wwwtestugo user-26=wwwkapin user-27=woodpeck user-28=wwwkmaorg user-29=disposeat user-30=remysagr feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 04:21:13 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 04:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 04:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7CchUL21WdEvnhef.~ Jan 20 04:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7CchUL21WdEvnhef.~' Jan 20 04:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7CchUL21WdEvnhef.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 04:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 04:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 04:21:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 04:21:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 04:21:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 04:21:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 04:21:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 04:21:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 04:21:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:21:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 04:21:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 04:21:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 04:25:29 host sshd[1013]: Invalid user nexus from 179.145.31.70 port 46653 Jan 20 04:25:29 host sshd[1013]: input_userauth_request: invalid user nexus [preauth] Jan 20 04:25:29 host sshd[1013]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:25:29 host sshd[1013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.145.31.70 Jan 20 04:25:31 host sshd[1013]: Failed password for invalid user nexus from 179.145.31.70 port 46653 ssh2 Jan 20 04:25:31 host sshd[1013]: Received disconnect from 179.145.31.70 port 46653:11: Bye Bye [preauth] Jan 20 04:25:31 host sshd[1013]: Disconnected from 179.145.31.70 port 46653 [preauth] Jan 20 04:28:50 host sshd[1596]: Did not receive identification string from 217.115.58.242 port 37168 Jan 20 04:28:51 host sshd[1597]: Invalid user ftpuser from 217.115.58.242 port 37658 Jan 20 04:28:51 host sshd[1597]: input_userauth_request: invalid user ftpuser [preauth] Jan 20 04:28:51 host sshd[1598]: User centos from 217.115.58.242 not allowed because not listed in AllowUsers Jan 20 04:28:51 host sshd[1598]: input_userauth_request: invalid user centos [preauth] Jan 20 04:28:51 host sshd[1597]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:28:51 host sshd[1597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.115.58.242 Jan 20 04:28:51 host unix_chkpwd[1602]: password check failed for user (centos) Jan 20 04:28:51 host sshd[1598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.115.58.242 user=centos Jan 20 04:28:53 host sshd[1597]: Failed password for invalid user ftpuser from 217.115.58.242 port 37658 ssh2 Jan 20 04:28:54 host sshd[1598]: Failed password for invalid user centos from 217.115.58.242 port 37656 ssh2 Jan 20 04:28:54 host sshd[1597]: Connection closed by 217.115.58.242 port 37658 [preauth] Jan 20 04:28:54 host sshd[1598]: Connection closed by 217.115.58.242 port 37656 [preauth] Jan 20 04:34:18 host sshd[2541]: Invalid user csserver from 179.145.31.70 port 48380 Jan 20 04:34:18 host sshd[2541]: input_userauth_request: invalid user csserver [preauth] Jan 20 04:34:18 host sshd[2541]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:34:18 host sshd[2541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.145.31.70 Jan 20 04:34:21 host sshd[2541]: Failed password for invalid user csserver from 179.145.31.70 port 48380 ssh2 Jan 20 04:34:21 host sshd[2541]: Received disconnect from 179.145.31.70 port 48380:11: Bye Bye [preauth] Jan 20 04:34:21 host sshd[2541]: Disconnected from 179.145.31.70 port 48380 [preauth] Jan 20 04:36:43 host sshd[3071]: Invalid user testuser from 179.145.31.70 port 56320 Jan 20 04:36:43 host sshd[3071]: input_userauth_request: invalid user testuser [preauth] Jan 20 04:36:43 host sshd[3071]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:36:43 host sshd[3071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.145.31.70 Jan 20 04:36:45 host sshd[3071]: Failed password for invalid user testuser from 179.145.31.70 port 56320 ssh2 Jan 20 04:36:45 host sshd[3071]: Received disconnect from 179.145.31.70 port 56320:11: Bye Bye [preauth] Jan 20 04:36:45 host sshd[3071]: Disconnected from 179.145.31.70 port 56320 [preauth] Jan 20 04:49:22 host sshd[5738]: Invalid user max from 101.128.68.195 port 58146 Jan 20 04:49:22 host sshd[5738]: input_userauth_request: invalid user max [preauth] Jan 20 04:49:22 host sshd[5738]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:49:22 host sshd[5738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.128.68.195 Jan 20 04:49:24 host sshd[5738]: Failed password for invalid user max from 101.128.68.195 port 58146 ssh2 Jan 20 04:49:24 host sshd[5738]: Received disconnect from 101.128.68.195 port 58146:11: Bye Bye [preauth] Jan 20 04:49:24 host sshd[5738]: Disconnected from 101.128.68.195 port 58146 [preauth] Jan 20 04:50:14 host sshd[5908]: Invalid user iodine from 104.244.74.6 port 60660 Jan 20 04:50:14 host sshd[5908]: input_userauth_request: invalid user iodine [preauth] Jan 20 04:50:14 host sshd[5908]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:50:14 host sshd[5908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 20 04:50:16 host sshd[5908]: Failed password for invalid user iodine from 104.244.74.6 port 60660 ssh2 Jan 20 04:50:17 host sshd[5908]: Connection closed by 104.244.74.6 port 60660 [preauth] Jan 20 04:50:25 host sshd[5947]: Invalid user vbox from 1.235.216.34 port 45024 Jan 20 04:50:25 host sshd[5947]: input_userauth_request: invalid user vbox [preauth] Jan 20 04:50:25 host sshd[5947]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:50:25 host sshd[5947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.235.216.34 Jan 20 04:50:27 host sshd[5947]: Failed password for invalid user vbox from 1.235.216.34 port 45024 ssh2 Jan 20 04:50:27 host sshd[5947]: Received disconnect from 1.235.216.34 port 45024:11: Bye Bye [preauth] Jan 20 04:50:27 host sshd[5947]: Disconnected from 1.235.216.34 port 45024 [preauth] Jan 20 04:52:49 host sshd[6404]: Invalid user vpn from 142.93.8.99 port 53230 Jan 20 04:52:49 host sshd[6404]: input_userauth_request: invalid user vpn [preauth] Jan 20 04:52:49 host sshd[6404]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:52:49 host sshd[6404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.8.99 Jan 20 04:52:52 host sshd[6404]: Failed password for invalid user vpn from 142.93.8.99 port 53230 ssh2 Jan 20 04:52:54 host sshd[6404]: Received disconnect from 142.93.8.99 port 53230:11: Bye Bye [preauth] Jan 20 04:52:54 host sshd[6404]: Disconnected from 142.93.8.99 port 53230 [preauth] Jan 20 04:53:29 host sshd[6558]: Invalid user rsync from 139.59.37.86 port 58138 Jan 20 04:53:29 host sshd[6558]: input_userauth_request: invalid user rsync [preauth] Jan 20 04:53:29 host sshd[6558]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:53:29 host sshd[6558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.37.86 Jan 20 04:53:31 host sshd[6558]: Failed password for invalid user rsync from 139.59.37.86 port 58138 ssh2 Jan 20 04:53:31 host sshd[6558]: Received disconnect from 139.59.37.86 port 58138:11: Bye Bye [preauth] Jan 20 04:53:31 host sshd[6558]: Disconnected from 139.59.37.86 port 58138 [preauth] Jan 20 04:54:16 host sshd[6672]: Invalid user iodine from 104.244.74.6 port 45992 Jan 20 04:54:16 host sshd[6672]: input_userauth_request: invalid user iodine [preauth] Jan 20 04:54:16 host sshd[6672]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:54:16 host sshd[6672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 20 04:54:18 host sshd[6672]: Failed password for invalid user iodine from 104.244.74.6 port 45992 ssh2 Jan 20 04:54:18 host sshd[6672]: Connection closed by 104.244.74.6 port 45992 [preauth] Jan 20 04:54:49 host sshd[6762]: User root from 59.126.178.100 not allowed because not listed in AllowUsers Jan 20 04:54:49 host sshd[6762]: input_userauth_request: invalid user root [preauth] Jan 20 04:54:49 host unix_chkpwd[6766]: password check failed for user (root) Jan 20 04:54:49 host sshd[6762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.178.100 user=root Jan 20 04:54:49 host sshd[6762]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 04:54:51 host sshd[6762]: Failed password for invalid user root from 59.126.178.100 port 39006 ssh2 Jan 20 04:54:52 host sshd[6762]: Connection reset by 59.126.178.100 port 39006 [preauth] Jan 20 04:54:54 host sshd[6778]: Invalid user server from 20.189.74.132 port 53544 Jan 20 04:54:54 host sshd[6778]: input_userauth_request: invalid user server [preauth] Jan 20 04:54:54 host sshd[6778]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:54:54 host sshd[6778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.189.74.132 Jan 20 04:54:56 host sshd[6778]: Failed password for invalid user server from 20.189.74.132 port 53544 ssh2 Jan 20 04:54:56 host sshd[6778]: Received disconnect from 20.189.74.132 port 53544:11: Bye Bye [preauth] Jan 20 04:54:56 host sshd[6778]: Disconnected from 20.189.74.132 port 53544 [preauth] Jan 20 04:55:05 host sshd[6816]: Invalid user halo from 101.128.68.195 port 58330 Jan 20 04:55:05 host sshd[6816]: input_userauth_request: invalid user halo [preauth] Jan 20 04:55:05 host sshd[6816]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:55:05 host sshd[6816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.128.68.195 Jan 20 04:55:07 host sshd[6816]: Failed password for invalid user halo from 101.128.68.195 port 58330 ssh2 Jan 20 04:55:07 host sshd[6816]: Received disconnect from 101.128.68.195 port 58330:11: Bye Bye [preauth] Jan 20 04:55:07 host sshd[6816]: Disconnected from 101.128.68.195 port 58330 [preauth] Jan 20 04:55:40 host sshd[6907]: Invalid user mapr from 142.93.8.99 port 57580 Jan 20 04:55:40 host sshd[6907]: input_userauth_request: invalid user mapr [preauth] Jan 20 04:55:40 host sshd[6907]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:55:40 host sshd[6907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.8.99 Jan 20 04:55:41 host sshd[6907]: Failed password for invalid user mapr from 142.93.8.99 port 57580 ssh2 Jan 20 04:55:42 host sshd[6907]: Received disconnect from 142.93.8.99 port 57580:11: Bye Bye [preauth] Jan 20 04:55:42 host sshd[6907]: Disconnected from 142.93.8.99 port 57580 [preauth] Jan 20 04:56:00 host sshd[6934]: Invalid user mark from 139.59.37.86 port 35982 Jan 20 04:56:00 host sshd[6934]: input_userauth_request: invalid user mark [preauth] Jan 20 04:56:00 host sshd[6934]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:56:00 host sshd[6934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.37.86 Jan 20 04:56:02 host sshd[6934]: Failed password for invalid user mark from 139.59.37.86 port 35982 ssh2 Jan 20 04:56:02 host sshd[6934]: Received disconnect from 139.59.37.86 port 35982:11: Bye Bye [preauth] Jan 20 04:56:02 host sshd[6934]: Disconnected from 139.59.37.86 port 35982 [preauth] Jan 20 04:56:33 host sshd[7024]: Invalid user developer from 1.235.216.34 port 47146 Jan 20 04:56:33 host sshd[7024]: input_userauth_request: invalid user developer [preauth] Jan 20 04:56:33 host sshd[7024]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:56:33 host sshd[7024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.235.216.34 Jan 20 04:56:35 host sshd[7027]: User adm from 101.128.68.195 not allowed because not listed in AllowUsers Jan 20 04:56:35 host sshd[7027]: input_userauth_request: invalid user adm [preauth] Jan 20 04:56:35 host unix_chkpwd[7031]: password check failed for user (adm) Jan 20 04:56:35 host sshd[7027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.128.68.195 user=adm Jan 20 04:56:35 host sshd[7027]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "adm" Jan 20 04:56:35 host sshd[7024]: Failed password for invalid user developer from 1.235.216.34 port 47146 ssh2 Jan 20 04:56:35 host sshd[7024]: Received disconnect from 1.235.216.34 port 47146:11: Bye Bye [preauth] Jan 20 04:56:35 host sshd[7024]: Disconnected from 1.235.216.34 port 47146 [preauth] Jan 20 04:56:36 host sshd[7027]: Failed password for invalid user adm from 101.128.68.195 port 43715 ssh2 Jan 20 04:56:36 host sshd[7027]: Received disconnect from 101.128.68.195 port 43715:11: Bye Bye [preauth] Jan 20 04:56:36 host sshd[7027]: Disconnected from 101.128.68.195 port 43715 [preauth] Jan 20 04:56:44 host sshd[7069]: Invalid user ubnt from 113.169.100.59 port 34896 Jan 20 04:56:44 host sshd[7069]: input_userauth_request: invalid user ubnt [preauth] Jan 20 04:56:44 host sshd[7069]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:56:44 host sshd[7069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.169.100.59 Jan 20 04:56:47 host sshd[7069]: Failed password for invalid user ubnt from 113.169.100.59 port 34896 ssh2 Jan 20 04:56:49 host sshd[7069]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:56:51 host sshd[7069]: Failed password for invalid user ubnt from 113.169.100.59 port 34896 ssh2 Jan 20 04:56:51 host sshd[7069]: Failed password for invalid user ubnt from 113.169.100.59 port 34896 ssh2 Jan 20 04:56:53 host sshd[7069]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:56:54 host sshd[7069]: Failed password for invalid user ubnt from 113.169.100.59 port 34896 ssh2 Jan 20 04:56:55 host sshd[7069]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:56:58 host sshd[7069]: Failed password for invalid user ubnt from 113.169.100.59 port 34896 ssh2 Jan 20 04:56:58 host sshd[7069]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:57:00 host sshd[7069]: Failed password for invalid user ubnt from 113.169.100.59 port 34896 ssh2 Jan 20 04:57:00 host sshd[7069]: error: maximum authentication attempts exceeded for invalid user ubnt from 113.169.100.59 port 34896 ssh2 [preauth] Jan 20 04:57:00 host sshd[7069]: Disconnecting: Too many authentication failures [preauth] Jan 20 04:57:00 host sshd[7069]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.169.100.59 Jan 20 04:57:00 host sshd[7069]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 20 04:57:07 host sshd[7186]: Invalid user panda from 20.189.74.132 port 51060 Jan 20 04:57:07 host sshd[7186]: input_userauth_request: invalid user panda [preauth] Jan 20 04:57:07 host sshd[7186]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:57:07 host sshd[7186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.189.74.132 Jan 20 04:57:09 host sshd[7186]: Failed password for invalid user panda from 20.189.74.132 port 51060 ssh2 Jan 20 04:57:09 host sshd[7186]: Received disconnect from 20.189.74.132 port 51060:11: Bye Bye [preauth] Jan 20 04:57:09 host sshd[7186]: Disconnected from 20.189.74.132 port 51060 [preauth] Jan 20 04:57:19 host sshd[7222]: Invalid user nvidia from 139.59.37.86 port 34280 Jan 20 04:57:19 host sshd[7222]: input_userauth_request: invalid user nvidia [preauth] Jan 20 04:57:19 host sshd[7222]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:57:19 host sshd[7222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.37.86 Jan 20 04:57:21 host sshd[7222]: Failed password for invalid user nvidia from 139.59.37.86 port 34280 ssh2 Jan 20 04:57:21 host sshd[7222]: Received disconnect from 139.59.37.86 port 34280:11: Bye Bye [preauth] Jan 20 04:57:21 host sshd[7222]: Disconnected from 139.59.37.86 port 34280 [preauth] Jan 20 04:57:50 host sshd[7437]: Invalid user a from 142.93.8.99 port 52900 Jan 20 04:57:50 host sshd[7437]: input_userauth_request: invalid user a [preauth] Jan 20 04:57:50 host sshd[7437]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:57:50 host sshd[7437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.8.99 Jan 20 04:57:52 host sshd[7437]: Failed password for invalid user a from 142.93.8.99 port 52900 ssh2 Jan 20 04:57:53 host sshd[7437]: Received disconnect from 142.93.8.99 port 52900:11: Bye Bye [preauth] Jan 20 04:57:53 host sshd[7437]: Disconnected from 142.93.8.99 port 52900 [preauth] Jan 20 04:57:53 host sshd[7458]: Invalid user public from 1.235.216.34 port 59590 Jan 20 04:57:53 host sshd[7458]: input_userauth_request: invalid user public [preauth] Jan 20 04:57:53 host sshd[7458]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:57:53 host sshd[7458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.235.216.34 Jan 20 04:57:55 host sshd[7458]: Failed password for invalid user public from 1.235.216.34 port 59590 ssh2 Jan 20 04:57:56 host sshd[7458]: Received disconnect from 1.235.216.34 port 59590:11: Bye Bye [preauth] Jan 20 04:57:56 host sshd[7458]: Disconnected from 1.235.216.34 port 59590 [preauth] Jan 20 04:58:22 host sshd[7615]: Invalid user sam from 20.189.74.132 port 46680 Jan 20 04:58:22 host sshd[7615]: input_userauth_request: invalid user sam [preauth] Jan 20 04:58:22 host sshd[7615]: pam_unix(sshd:auth): check pass; user unknown Jan 20 04:58:22 host sshd[7615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.189.74.132 Jan 20 04:58:24 host sshd[7615]: Failed password for invalid user sam from 20.189.74.132 port 46680 ssh2 Jan 20 05:02:23 host sshd[8265]: Invalid user gt from 194.110.203.109 port 50586 Jan 20 05:02:23 host sshd[8265]: input_userauth_request: invalid user gt [preauth] Jan 20 05:02:23 host sshd[8265]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:02:23 host sshd[8265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 05:02:25 host sshd[8265]: Failed password for invalid user gt from 194.110.203.109 port 50586 ssh2 Jan 20 05:02:29 host sshd[8265]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:02:31 host sshd[8265]: Failed password for invalid user gt from 194.110.203.109 port 50586 ssh2 Jan 20 05:02:34 host sshd[8265]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:02:36 host sshd[8265]: Failed password for invalid user gt from 194.110.203.109 port 50586 ssh2 Jan 20 05:02:39 host sshd[8265]: Connection closed by 194.110.203.109 port 50586 [preauth] Jan 20 05:02:39 host sshd[8265]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 05:03:02 host sshd[8457]: Invalid user pdx from 176.214.78.72 port 55656 Jan 20 05:03:02 host sshd[8457]: input_userauth_request: invalid user pdx [preauth] Jan 20 05:03:02 host sshd[8457]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:03:02 host sshd[8457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.214.78.72 Jan 20 05:03:03 host sshd[8457]: Failed password for invalid user pdx from 176.214.78.72 port 55656 ssh2 Jan 20 05:03:04 host sshd[8457]: Received disconnect from 176.214.78.72 port 55656:11: Bye Bye [preauth] Jan 20 05:03:04 host sshd[8457]: Disconnected from 176.214.78.72 port 55656 [preauth] Jan 20 05:04:12 host sshd[8584]: Connection reset by 110.3.254.213 port 57703 [preauth] Jan 20 05:05:01 host sshd[8711]: Invalid user soporte from 107.172.99.124 port 54482 Jan 20 05:05:01 host sshd[8711]: input_userauth_request: invalid user soporte [preauth] Jan 20 05:05:01 host sshd[8711]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:05:01 host sshd[8711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.99.124 Jan 20 05:05:02 host sshd[8711]: Failed password for invalid user soporte from 107.172.99.124 port 54482 ssh2 Jan 20 05:05:03 host sshd[8711]: Received disconnect from 107.172.99.124 port 54482:11: Bye Bye [preauth] Jan 20 05:05:03 host sshd[8711]: Disconnected from 107.172.99.124 port 54482 [preauth] Jan 20 05:06:38 host sshd[9007]: Invalid user exx from 176.214.78.72 port 44308 Jan 20 05:06:38 host sshd[9007]: input_userauth_request: invalid user exx [preauth] Jan 20 05:06:38 host sshd[9007]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:06:38 host sshd[9007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.214.78.72 Jan 20 05:06:39 host sshd[9007]: Failed password for invalid user exx from 176.214.78.72 port 44308 ssh2 Jan 20 05:06:39 host sshd[9007]: Received disconnect from 176.214.78.72 port 44308:11: Bye Bye [preauth] Jan 20 05:06:39 host sshd[9007]: Disconnected from 176.214.78.72 port 44308 [preauth] Jan 20 05:07:46 host sshd[9204]: Invalid user mark from 176.214.78.72 port 59232 Jan 20 05:07:46 host sshd[9204]: input_userauth_request: invalid user mark [preauth] Jan 20 05:07:46 host sshd[9204]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:07:46 host sshd[9204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.214.78.72 Jan 20 05:07:47 host sshd[9204]: Failed password for invalid user mark from 176.214.78.72 port 59232 ssh2 Jan 20 05:07:48 host sshd[9204]: Received disconnect from 176.214.78.72 port 59232:11: Bye Bye [preauth] Jan 20 05:07:48 host sshd[9204]: Disconnected from 176.214.78.72 port 59232 [preauth] Jan 20 05:07:51 host sshd[9300]: Invalid user oracle from 107.172.99.124 port 34476 Jan 20 05:07:51 host sshd[9300]: input_userauth_request: invalid user oracle [preauth] Jan 20 05:07:51 host sshd[9300]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:07:51 host sshd[9300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.99.124 Jan 20 05:07:53 host sshd[9300]: Failed password for invalid user oracle from 107.172.99.124 port 34476 ssh2 Jan 20 05:07:53 host sshd[9300]: Received disconnect from 107.172.99.124 port 34476:11: Bye Bye [preauth] Jan 20 05:07:53 host sshd[9300]: Disconnected from 107.172.99.124 port 34476 [preauth] Jan 20 05:09:03 host sshd[9576]: Invalid user ftptest from 107.172.99.124 port 60932 Jan 20 05:09:03 host sshd[9576]: input_userauth_request: invalid user ftptest [preauth] Jan 20 05:09:03 host sshd[9576]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:09:03 host sshd[9576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.99.124 Jan 20 05:09:05 host sshd[9576]: Failed password for invalid user ftptest from 107.172.99.124 port 60932 ssh2 Jan 20 05:14:00 host sshd[10572]: Invalid user admin from 112.173.152.22 port 59357 Jan 20 05:14:00 host sshd[10572]: input_userauth_request: invalid user admin [preauth] Jan 20 05:14:00 host sshd[10572]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:14:00 host sshd[10572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.173.152.22 Jan 20 05:14:02 host sshd[10572]: Failed password for invalid user admin from 112.173.152.22 port 59357 ssh2 Jan 20 05:14:04 host sshd[10572]: Failed password for invalid user admin from 112.173.152.22 port 59357 ssh2 Jan 20 05:14:05 host sshd[10572]: Connection reset by 112.173.152.22 port 59357 [preauth] Jan 20 05:17:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 05:17:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:17:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:17:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 05:17:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:17:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:17:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 05:17:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:17:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:17:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 05:17:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:17:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:17:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 05:17:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:17:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:17:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 05:17:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:17:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:17:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 05:17:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:17:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:20:52 host sshd[11579]: Invalid user pi from 59.126.136.195 port 53218 Jan 20 05:20:52 host sshd[11579]: input_userauth_request: invalid user pi [preauth] Jan 20 05:20:52 host sshd[11579]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:20:52 host sshd[11579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.136.195 Jan 20 05:20:54 host sshd[11579]: Failed password for invalid user pi from 59.126.136.195 port 53218 ssh2 Jan 20 05:20:55 host sshd[11579]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:20:57 host sshd[11579]: Failed password for invalid user pi from 59.126.136.195 port 53218 ssh2 Jan 20 05:20:58 host sshd[11579]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:20:59 host sshd[11579]: Failed password for invalid user pi from 59.126.136.195 port 53218 ssh2 Jan 20 05:21:01 host sshd[11579]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 05:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 05:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 05:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:03 host sshd[11579]: Failed password for invalid user pi from 59.126.136.195 port 53218 ssh2 Jan 20 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:03 host sshd[11579]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:21:05 host sshd[11579]: Failed password for invalid user pi from 59.126.136.195 port 53218 ssh2 Jan 20 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=bonifacegroup user-4=wwwevmhonda user-5=wwwnexidigital user-6=mrsclean user-7=palco123 user-8=gifterman user-9=kottayamcalldriv user-10=phmetals user-11=woodpeck user-12=wwwkapin user-13=disposeat user-14=wwwkmaorg user-15=remysagr user-16=pmcresources user-17=vfmassets user-18=shalinijames user-19=wwwtestugo user-20=wwwpmcresource user-21=keralaholi user-22=wwwresourcehunte user-23=wwwrmswll user-24=ugotscom user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 05:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 05:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 05:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 20 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 20 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 20 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 20 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 20 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 20 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 20 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 20 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 20 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 20 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 20 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 20 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user straightcurve Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user gifterman Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user phmetals Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user disposeat Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user remysagr Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user pmcresources Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user vfmassets Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Jan 20 05:21:09 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Jan 20 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 20 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 20 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-Mv0J0cEZ3xIMuTax.wp-toolkit-identifier Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 20 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-Mv0J0cEZ3xIMuTax.wp-toolkit-identifier Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 20 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 20 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Jan 20 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user travelboniface Jan 20 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Jan 20 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Jan 20 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Jan 20 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Jan 20 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user dartsimp Jan 20 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 20 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 20 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-RhmTmhypebGSA7KC.wp-toolkit-identifier Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 20 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-RhmTmhypebGSA7KC.wp-toolkit-identifier Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 20 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0VLgSTzHFpUhbCmq.~ Jan 20 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0VLgSTzHFpUhbCmq.~' Jan 20 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-0VLgSTzHFpUhbCmq.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 05:21:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 05:21:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 05:21:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 05:21:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:21:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 05:21:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 05:21:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 05:24:01 host sshd[12776]: Invalid user iodine from 104.244.74.6 port 50836 Jan 20 05:24:01 host sshd[12776]: input_userauth_request: invalid user iodine [preauth] Jan 20 05:24:01 host sshd[12776]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:24:01 host sshd[12776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 20 05:24:04 host sshd[12776]: Failed password for invalid user iodine from 104.244.74.6 port 50836 ssh2 Jan 20 05:24:04 host sshd[12776]: Connection closed by 104.244.74.6 port 50836 [preauth] Jan 20 05:29:30 host sshd[13658]: invalid public DH value: >= p-1 [preauth] Jan 20 05:29:30 host sshd[13658]: ssh_dispatch_run_fatal: Connection from 150.116.101.214 port 46052: incomplete message [preauth] Jan 20 05:41:51 host sshd[15752]: Invalid user admin from 219.85.185.117 port 37813 Jan 20 05:41:51 host sshd[15752]: input_userauth_request: invalid user admin [preauth] Jan 20 05:41:51 host sshd[15752]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:41:51 host sshd[15752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.85.185.117 Jan 20 05:41:54 host sshd[15752]: Failed password for invalid user admin from 219.85.185.117 port 37813 ssh2 Jan 20 05:41:54 host sshd[15752]: Failed password for invalid user admin from 219.85.185.117 port 37813 ssh2 Jan 20 05:41:56 host sshd[15752]: Connection reset by 219.85.185.117 port 37813 [preauth] Jan 20 05:49:21 host sshd[16926]: Did not receive identification string from 92.255.85.115 port 44803 Jan 20 05:52:48 host sshd[17645]: Invalid user ariel from 122.169.53.234 port 38504 Jan 20 05:52:48 host sshd[17645]: input_userauth_request: invalid user ariel [preauth] Jan 20 05:52:48 host sshd[17645]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:52:48 host sshd[17645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.169.53.234 Jan 20 05:52:50 host sshd[17645]: Failed password for invalid user ariel from 122.169.53.234 port 38504 ssh2 Jan 20 05:52:50 host sshd[17645]: Received disconnect from 122.169.53.234 port 38504:11: Bye Bye [preauth] Jan 20 05:52:50 host sshd[17645]: Disconnected from 122.169.53.234 port 38504 [preauth] Jan 20 05:57:19 host sshd[18294]: Invalid user minecraft from 117.158.56.11 port 9571 Jan 20 05:57:19 host sshd[18294]: input_userauth_request: invalid user minecraft [preauth] Jan 20 05:57:19 host sshd[18294]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:57:19 host sshd[18294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.158.56.11 Jan 20 05:57:21 host sshd[18294]: Failed password for invalid user minecraft from 117.158.56.11 port 9571 ssh2 Jan 20 05:57:21 host sshd[18294]: Received disconnect from 117.158.56.11 port 9571:11: Bye Bye [preauth] Jan 20 05:57:21 host sshd[18294]: Disconnected from 117.158.56.11 port 9571 [preauth] Jan 20 05:58:45 host sshd[18477]: Invalid user joe from 45.189.223.71 port 43898 Jan 20 05:58:45 host sshd[18477]: input_userauth_request: invalid user joe [preauth] Jan 20 05:58:45 host sshd[18477]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:58:45 host sshd[18477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.189.223.71 Jan 20 05:58:47 host sshd[18477]: Failed password for invalid user joe from 45.189.223.71 port 43898 ssh2 Jan 20 05:58:47 host sshd[18477]: Received disconnect from 45.189.223.71 port 43898:11: Bye Bye [preauth] Jan 20 05:58:47 host sshd[18477]: Disconnected from 45.189.223.71 port 43898 [preauth] Jan 20 05:58:55 host sshd[18496]: Invalid user ariel from 122.169.53.234 port 56776 Jan 20 05:58:55 host sshd[18496]: input_userauth_request: invalid user ariel [preauth] Jan 20 05:58:55 host sshd[18496]: pam_unix(sshd:auth): check pass; user unknown Jan 20 05:58:55 host sshd[18496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.169.53.234 Jan 20 05:58:57 host sshd[18496]: Failed password for invalid user ariel from 122.169.53.234 port 56776 ssh2 Jan 20 05:58:57 host sshd[18496]: Received disconnect from 122.169.53.234 port 56776:11: Bye Bye [preauth] Jan 20 05:58:57 host sshd[18496]: Disconnected from 122.169.53.234 port 56776 [preauth] Jan 20 06:00:30 host sshd[18709]: Invalid user spark from 122.169.53.234 port 54012 Jan 20 06:00:30 host sshd[18709]: input_userauth_request: invalid user spark [preauth] Jan 20 06:00:30 host sshd[18709]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:00:30 host sshd[18709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.169.53.234 Jan 20 06:00:32 host sshd[18709]: Failed password for invalid user spark from 122.169.53.234 port 54012 ssh2 Jan 20 06:00:32 host sshd[18709]: Received disconnect from 122.169.53.234 port 54012:11: Bye Bye [preauth] Jan 20 06:00:32 host sshd[18709]: Disconnected from 122.169.53.234 port 54012 [preauth] Jan 20 06:01:23 host sshd[18834]: Invalid user chris from 45.189.223.71 port 47014 Jan 20 06:01:23 host sshd[18834]: input_userauth_request: invalid user chris [preauth] Jan 20 06:01:23 host sshd[18834]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:01:23 host sshd[18834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.189.223.71 Jan 20 06:01:25 host sshd[18834]: Failed password for invalid user chris from 45.189.223.71 port 47014 ssh2 Jan 20 06:01:25 host sshd[18834]: Received disconnect from 45.189.223.71 port 47014:11: Bye Bye [preauth] Jan 20 06:01:25 host sshd[18834]: Disconnected from 45.189.223.71 port 47014 [preauth] Jan 20 06:01:44 host sshd[18889]: Invalid user vadmin from 114.33.111.172 port 53716 Jan 20 06:01:44 host sshd[18889]: input_userauth_request: invalid user vadmin [preauth] Jan 20 06:01:44 host sshd[18889]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:01:44 host sshd[18889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.111.172 Jan 20 06:01:46 host sshd[18889]: Failed password for invalid user vadmin from 114.33.111.172 port 53716 ssh2 Jan 20 06:01:46 host sshd[18889]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:01:48 host sshd[18889]: Failed password for invalid user vadmin from 114.33.111.172 port 53716 ssh2 Jan 20 06:01:49 host sshd[18889]: Connection reset by 114.33.111.172 port 53716 [preauth] Jan 20 06:01:49 host sshd[18889]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.111.172 Jan 20 06:02:42 host sshd[19113]: Invalid user leo from 45.189.223.71 port 41722 Jan 20 06:02:42 host sshd[19113]: input_userauth_request: invalid user leo [preauth] Jan 20 06:02:42 host sshd[19113]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:02:42 host sshd[19113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.189.223.71 Jan 20 06:02:44 host sshd[19113]: Failed password for invalid user leo from 45.189.223.71 port 41722 ssh2 Jan 20 06:02:45 host sshd[19113]: Received disconnect from 45.189.223.71 port 41722:11: Bye Bye [preauth] Jan 20 06:02:45 host sshd[19113]: Disconnected from 45.189.223.71 port 41722 [preauth] Jan 20 06:03:51 host sshd[19367]: Bad protocol version identification '' from 223.112.131.34 port 42330 Jan 20 06:04:24 host sshd[19456]: Invalid user admin from 92.255.85.115 port 16112 Jan 20 06:04:24 host sshd[19456]: input_userauth_request: invalid user admin [preauth] Jan 20 06:04:24 host sshd[19456]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:04:24 host sshd[19456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 20 06:04:26 host sshd[19456]: Failed password for invalid user admin from 92.255.85.115 port 16112 ssh2 Jan 20 06:04:26 host sshd[19456]: Connection reset by 92.255.85.115 port 16112 [preauth] Jan 20 06:08:14 host sshd[20081]: Invalid user cesar from 117.158.56.11 port 58654 Jan 20 06:08:14 host sshd[20081]: input_userauth_request: invalid user cesar [preauth] Jan 20 06:08:14 host sshd[20081]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:08:14 host sshd[20081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.158.56.11 Jan 20 06:08:17 host sshd[20081]: Failed password for invalid user cesar from 117.158.56.11 port 58654 ssh2 Jan 20 06:08:17 host sshd[20081]: Received disconnect from 117.158.56.11 port 58654:11: Bye Bye [preauth] Jan 20 06:08:17 host sshd[20081]: Disconnected from 117.158.56.11 port 58654 [preauth] Jan 20 06:09:14 host sshd[20252]: Invalid user airflow from 117.158.56.11 port 1916 Jan 20 06:09:14 host sshd[20252]: input_userauth_request: invalid user airflow [preauth] Jan 20 06:09:14 host sshd[20252]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:09:14 host sshd[20252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.158.56.11 Jan 20 06:09:16 host sshd[20252]: Failed password for invalid user airflow from 117.158.56.11 port 1916 ssh2 Jan 20 06:10:26 host sshd[20468]: invalid public DH value: >= p-1 [preauth] Jan 20 06:10:26 host sshd[20468]: ssh_dispatch_run_fatal: Connection from 211.3.78.212 port 47641: incomplete message [preauth] Jan 20 06:10:56 host sshd[20548]: Invalid user support from 92.255.85.115 port 1135 Jan 20 06:10:56 host sshd[20548]: input_userauth_request: invalid user support [preauth] Jan 20 06:10:56 host sshd[20548]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:10:56 host sshd[20548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 20 06:10:58 host sshd[20548]: Failed password for invalid user support from 92.255.85.115 port 1135 ssh2 Jan 20 06:10:58 host sshd[20548]: Connection reset by 92.255.85.115 port 1135 [preauth] Jan 20 06:11:53 host sshd[20731]: Invalid user admin from 222.97.217.78 port 55581 Jan 20 06:11:53 host sshd[20731]: input_userauth_request: invalid user admin [preauth] Jan 20 06:11:53 host sshd[20731]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:11:53 host sshd[20731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.97.217.78 Jan 20 06:11:55 host sshd[20731]: Failed password for invalid user admin from 222.97.217.78 port 55581 ssh2 Jan 20 06:11:56 host sshd[20731]: Failed password for invalid user admin from 222.97.217.78 port 55581 ssh2 Jan 20 06:11:56 host sshd[20731]: Connection reset by 222.97.217.78 port 55581 [preauth] Jan 20 06:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 06:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 06:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 06:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 06:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 06:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=remysagr user-4=disposeat user-5=wwwkmaorg user-6=pmcresources user-7=wwwtestugo user-8=shalinijames user-9=vfmassets user-10=wwwletsstalkfood user-11=straightcurve user-12=wwwevmhonda user-13=bonifacegroup user-14=mrsclean user-15=wwwnexidigital user-16=kottayamcalldriv user-17=phmetals user-18=gifterman user-19=palco123 user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=ugotscom user-27=wwwrmswll user-28=wwwresourcehunte user-29=keralaholi user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 06:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 06:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 06:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-hdCeKSpbrH46YK9k.~ Jan 20 06:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-hdCeKSpbrH46YK9k.~' Jan 20 06:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-hdCeKSpbrH46YK9k.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 06:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 06:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 06:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 06:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 06:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 06:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 06:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 06:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 06:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 06:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 06:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 06:22:13 host sshd[23043]: User root from 220.132.113.133 not allowed because not listed in AllowUsers Jan 20 06:22:13 host sshd[23043]: input_userauth_request: invalid user root [preauth] Jan 20 06:22:14 host unix_chkpwd[23051]: password check failed for user (root) Jan 20 06:22:14 host sshd[23043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.113.133 user=root Jan 20 06:22:14 host sshd[23043]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 06:22:16 host sshd[23043]: Failed password for invalid user root from 220.132.113.133 port 53480 ssh2 Jan 20 06:22:16 host unix_chkpwd[23074]: password check failed for user (root) Jan 20 06:22:16 host sshd[23043]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 06:22:18 host sshd[23043]: Failed password for invalid user root from 220.132.113.133 port 53480 ssh2 Jan 20 06:22:19 host sshd[23043]: Connection reset by 220.132.113.133 port 53480 [preauth] Jan 20 06:22:19 host sshd[23043]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.113.133 user=root Jan 20 06:26:07 host sshd[23901]: Connection closed by 45.79.128.205 port 58542 [preauth] Jan 20 06:26:09 host sshd[23906]: Connection closed by 45.79.128.205 port 58548 [preauth] Jan 20 06:26:12 host sshd[23912]: Connection closed by 45.79.128.205 port 58550 [preauth] Jan 20 06:26:26 host sshd[23939]: Invalid user vadmin from 118.41.74.95 port 62226 Jan 20 06:26:26 host sshd[23939]: input_userauth_request: invalid user vadmin [preauth] Jan 20 06:26:26 host sshd[23939]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:26:26 host sshd[23939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.41.74.95 Jan 20 06:26:28 host sshd[23939]: Failed password for invalid user vadmin from 118.41.74.95 port 62226 ssh2 Jan 20 06:26:29 host sshd[23939]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:26:31 host sshd[23939]: Failed password for invalid user vadmin from 118.41.74.95 port 62226 ssh2 Jan 20 06:26:32 host sshd[23939]: Failed password for invalid user vadmin from 118.41.74.95 port 62226 ssh2 Jan 20 06:26:32 host sshd[23939]: Connection closed by 118.41.74.95 port 62226 [preauth] Jan 20 06:26:32 host sshd[23939]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.41.74.95 Jan 20 06:28:46 host sshd[24296]: Invalid user steam from 121.155.155.32 port 60588 Jan 20 06:28:46 host sshd[24296]: input_userauth_request: invalid user steam [preauth] Jan 20 06:28:46 host sshd[24296]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:28:46 host sshd[24296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.155.155.32 Jan 20 06:28:49 host sshd[24296]: Failed password for invalid user steam from 121.155.155.32 port 60588 ssh2 Jan 20 06:28:49 host sshd[24296]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:28:51 host sshd[24296]: Failed password for invalid user steam from 121.155.155.32 port 60588 ssh2 Jan 20 06:28:51 host sshd[24296]: Failed password for invalid user steam from 121.155.155.32 port 60588 ssh2 Jan 20 06:28:52 host sshd[24296]: Connection closed by 121.155.155.32 port 60588 [preauth] Jan 20 06:28:52 host sshd[24296]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.155.155.32 Jan 20 06:29:25 host sshd[24367]: Invalid user user from 59.126.44.87 port 48584 Jan 20 06:29:25 host sshd[24367]: input_userauth_request: invalid user user [preauth] Jan 20 06:29:25 host sshd[24367]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:29:25 host sshd[24367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.44.87 Jan 20 06:29:26 host sshd[24367]: Failed password for invalid user user from 59.126.44.87 port 48584 ssh2 Jan 20 06:29:27 host sshd[24367]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:29:29 host sshd[24367]: Failed password for invalid user user from 59.126.44.87 port 48584 ssh2 Jan 20 06:29:29 host sshd[24367]: Connection reset by 59.126.44.87 port 48584 [preauth] Jan 20 06:29:29 host sshd[24367]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.44.87 Jan 20 06:50:52 host sshd[28700]: Invalid user gu from 194.110.203.109 port 57520 Jan 20 06:50:52 host sshd[28700]: input_userauth_request: invalid user gu [preauth] Jan 20 06:50:52 host sshd[28700]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:50:52 host sshd[28700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 06:50:53 host sshd[28700]: Failed password for invalid user gu from 194.110.203.109 port 57520 ssh2 Jan 20 06:50:57 host sshd[28700]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:50:59 host sshd[28700]: Failed password for invalid user gu from 194.110.203.109 port 57520 ssh2 Jan 20 06:51:02 host sshd[28700]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:51:04 host sshd[28700]: Failed password for invalid user gu from 194.110.203.109 port 57520 ssh2 Jan 20 06:51:07 host sshd[28700]: Connection closed by 194.110.203.109 port 57520 [preauth] Jan 20 06:51:07 host sshd[28700]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 06:53:06 host sshd[29093]: User sshd from 194.169.175.102 not allowed because not listed in AllowUsers Jan 20 06:53:06 host sshd[29093]: input_userauth_request: invalid user sshd [preauth] Jan 20 06:53:06 host unix_chkpwd[29096]: password check failed for user (sshd) Jan 20 06:53:06 host sshd[29093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=sshd Jan 20 06:53:06 host sshd[29093]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sshd" Jan 20 06:53:08 host sshd[29093]: Failed password for invalid user sshd from 194.169.175.102 port 52160 ssh2 Jan 20 06:53:08 host sshd[29093]: Received disconnect from 194.169.175.102 port 52160:11: Client disconnecting normally [preauth] Jan 20 06:53:08 host sshd[29093]: Disconnected from 194.169.175.102 port 52160 [preauth] Jan 20 06:53:42 host sshd[29161]: invalid public DH value: >= p-1 [preauth] Jan 20 06:53:42 host sshd[29161]: ssh_dispatch_run_fatal: Connection from 123.142.34.62 port 50238: incomplete message [preauth] Jan 20 06:55:13 host sshd[29362]: Invalid user dnsmasq from 205.185.113.129 port 60412 Jan 20 06:55:13 host sshd[29362]: input_userauth_request: invalid user dnsmasq [preauth] Jan 20 06:55:13 host sshd[29362]: pam_unix(sshd:auth): check pass; user unknown Jan 20 06:55:13 host sshd[29362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 20 06:55:15 host sshd[29362]: Failed password for invalid user dnsmasq from 205.185.113.129 port 60412 ssh2 Jan 20 06:55:16 host sshd[29362]: Connection closed by 205.185.113.129 port 60412 [preauth] Jan 20 06:58:04 host sshd[29806]: User root from 77.22.0.212 not allowed because not listed in AllowUsers Jan 20 06:58:04 host sshd[29806]: input_userauth_request: invalid user root [preauth] Jan 20 06:58:04 host unix_chkpwd[29826]: password check failed for user (root) Jan 20 06:58:04 host sshd[29806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.22.0.212 user=root Jan 20 06:58:04 host sshd[29806]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 06:58:06 host sshd[29806]: Failed password for invalid user root from 77.22.0.212 port 47366 ssh2 Jan 20 06:58:07 host unix_chkpwd[29830]: password check failed for user (root) Jan 20 06:58:07 host sshd[29806]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 06:58:09 host sshd[29806]: Failed password for invalid user root from 77.22.0.212 port 47366 ssh2 Jan 20 06:58:09 host sshd[29806]: Connection closed by 77.22.0.212 port 47366 [preauth] Jan 20 06:58:09 host sshd[29806]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.22.0.212 user=root Jan 20 07:07:16 host sshd[31238]: User root from 122.116.130.164 not allowed because not listed in AllowUsers Jan 20 07:07:16 host sshd[31238]: input_userauth_request: invalid user root [preauth] Jan 20 07:07:16 host unix_chkpwd[31245]: password check failed for user (root) Jan 20 07:07:16 host sshd[31238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.130.164 user=root Jan 20 07:07:16 host sshd[31238]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 07:07:17 host sshd[31238]: Failed password for invalid user root from 122.116.130.164 port 44726 ssh2 Jan 20 07:07:18 host unix_chkpwd[31250]: password check failed for user (root) Jan 20 07:07:18 host sshd[31238]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 07:07:20 host sshd[31238]: Failed password for invalid user root from 122.116.130.164 port 44726 ssh2 Jan 20 07:07:21 host unix_chkpwd[31257]: password check failed for user (root) Jan 20 07:07:21 host sshd[31238]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 07:07:23 host sshd[31238]: Failed password for invalid user root from 122.116.130.164 port 44726 ssh2 Jan 20 07:07:25 host unix_chkpwd[31270]: password check failed for user (root) Jan 20 07:07:25 host sshd[31238]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 07:07:27 host sshd[31238]: Failed password for invalid user root from 122.116.130.164 port 44726 ssh2 Jan 20 07:07:28 host unix_chkpwd[31278]: password check failed for user (root) Jan 20 07:07:28 host sshd[31238]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 07:07:29 host sshd[31238]: Failed password for invalid user root from 122.116.130.164 port 44726 ssh2 Jan 20 07:17:12 host sshd[738]: Invalid user admin from 121.191.9.204 port 58924 Jan 20 07:17:12 host sshd[738]: input_userauth_request: invalid user admin [preauth] Jan 20 07:17:12 host sshd[738]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:17:12 host sshd[738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.191.9.204 Jan 20 07:17:14 host sshd[738]: Failed password for invalid user admin from 121.191.9.204 port 58924 ssh2 Jan 20 07:17:15 host sshd[738]: Failed password for invalid user admin from 121.191.9.204 port 58924 ssh2 Jan 20 07:17:15 host sshd[738]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:17:17 host sshd[738]: Failed password for invalid user admin from 121.191.9.204 port 58924 ssh2 Jan 20 07:17:17 host sshd[738]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:17:19 host sshd[738]: Failed password for invalid user admin from 121.191.9.204 port 58924 ssh2 Jan 20 07:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 07:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 07:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 07:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 07:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=wwwrmswll user-4=keralaholi user-5=wwwresourcehunte user-6=ugotscom user-7=wwwkaretakers user-8=cochintaxi user-9=dartsimp user-10=a2zgroup user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwletsstalkfood user-15=straightcurve user-16=gifterman user-17=palco123 user-18=kottayamcalldriv user-19=phmetals user-20=wwwnexidigital user-21=mrsclean user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=wwwkapin user-26=woodpeck user-27=vfmassets user-28=wwwtestugo user-29=shalinijames user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 07:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 07:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 07:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sX56DdjtdKwCEZ1g.~ Jan 20 07:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sX56DdjtdKwCEZ1g.~' Jan 20 07:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-sX56DdjtdKwCEZ1g.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 07:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 07:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 07:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 07:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 07:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 07:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 07:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 07:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 07:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 07:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 07:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 07:24:00 host sshd[2127]: Connection reset by 124.84.240.252 port 61865 [preauth] Jan 20 07:30:35 host sshd[3049]: User root from 123.240.190.58 not allowed because not listed in AllowUsers Jan 20 07:30:35 host sshd[3049]: input_userauth_request: invalid user root [preauth] Jan 20 07:30:35 host unix_chkpwd[3052]: password check failed for user (root) Jan 20 07:30:35 host sshd[3049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.240.190.58 user=root Jan 20 07:30:35 host sshd[3049]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 07:30:37 host sshd[3049]: Failed password for invalid user root from 123.240.190.58 port 36925 ssh2 Jan 20 07:30:37 host sshd[3049]: Connection reset by 123.240.190.58 port 36925 [preauth] Jan 20 07:31:00 host sshd[3083]: Invalid user it from 79.66.75.35 port 36790 Jan 20 07:31:00 host sshd[3083]: input_userauth_request: invalid user it [preauth] Jan 20 07:31:00 host sshd[3083]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:31:00 host sshd[3083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.66.75.35 Jan 20 07:31:02 host sshd[3083]: Failed password for invalid user it from 79.66.75.35 port 36790 ssh2 Jan 20 07:31:03 host sshd[3083]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:31:05 host sshd[3083]: Failed password for invalid user it from 79.66.75.35 port 36790 ssh2 Jan 20 07:31:06 host sshd[3083]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:31:08 host sshd[3083]: Failed password for invalid user it from 79.66.75.35 port 36790 ssh2 Jan 20 07:31:08 host sshd[3083]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:31:11 host sshd[3083]: Failed password for invalid user it from 79.66.75.35 port 36790 ssh2 Jan 20 07:31:11 host sshd[3083]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:31:14 host sshd[3083]: Failed password for invalid user it from 79.66.75.35 port 36790 ssh2 Jan 20 07:31:14 host sshd[3083]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:31:17 host sshd[3083]: Failed password for invalid user it from 79.66.75.35 port 36790 ssh2 Jan 20 07:31:17 host sshd[3083]: error: maximum authentication attempts exceeded for invalid user it from 79.66.75.35 port 36790 ssh2 [preauth] Jan 20 07:31:17 host sshd[3083]: Disconnecting: Too many authentication failures [preauth] Jan 20 07:31:17 host sshd[3083]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.66.75.35 Jan 20 07:31:17 host sshd[3083]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 20 07:33:37 host sshd[3659]: Invalid user gitlab-runner from 54.38.156.147 port 47174 Jan 20 07:33:37 host sshd[3659]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 20 07:33:37 host sshd[3659]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:33:37 host sshd[3659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.156.147 Jan 20 07:33:39 host sshd[3659]: Failed password for invalid user gitlab-runner from 54.38.156.147 port 47174 ssh2 Jan 20 07:33:39 host sshd[3659]: Received disconnect from 54.38.156.147 port 47174:11: Bye Bye [preauth] Jan 20 07:33:39 host sshd[3659]: Disconnected from 54.38.156.147 port 47174 [preauth] Jan 20 07:35:17 host sshd[3835]: Invalid user sammy from 206.189.38.110 port 49072 Jan 20 07:35:17 host sshd[3835]: input_userauth_request: invalid user sammy [preauth] Jan 20 07:35:17 host sshd[3835]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:35:17 host sshd[3835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.38.110 Jan 20 07:35:19 host sshd[3835]: Failed password for invalid user sammy from 206.189.38.110 port 49072 ssh2 Jan 20 07:35:19 host sshd[3835]: Received disconnect from 206.189.38.110 port 49072:11: Bye Bye [preauth] Jan 20 07:35:19 host sshd[3835]: Disconnected from 206.189.38.110 port 49072 [preauth] Jan 20 07:36:36 host sshd[4111]: Invalid user default from 59.24.127.242 port 62454 Jan 20 07:36:36 host sshd[4111]: input_userauth_request: invalid user default [preauth] Jan 20 07:36:36 host sshd[4111]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:36:36 host sshd[4111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.24.127.242 Jan 20 07:36:38 host sshd[4111]: Failed password for invalid user default from 59.24.127.242 port 62454 ssh2 Jan 20 07:36:39 host sshd[4111]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:36:41 host sshd[4111]: Failed password for invalid user default from 59.24.127.242 port 62454 ssh2 Jan 20 07:36:43 host sshd[4111]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:36:45 host sshd[4111]: Failed password for invalid user default from 59.24.127.242 port 62454 ssh2 Jan 20 07:36:46 host sshd[4111]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:36:48 host sshd[4111]: Failed password for invalid user default from 59.24.127.242 port 62454 ssh2 Jan 20 07:36:48 host sshd[4111]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:36:50 host sshd[4111]: Failed password for invalid user default from 59.24.127.242 port 62454 ssh2 Jan 20 07:37:58 host sshd[4293]: Invalid user system from 47.157.173.196 port 59020 Jan 20 07:37:58 host sshd[4293]: input_userauth_request: invalid user system [preauth] Jan 20 07:37:58 host sshd[4293]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:37:58 host sshd[4293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.157.173.196 Jan 20 07:37:59 host sshd[4293]: Failed password for invalid user system from 47.157.173.196 port 59020 ssh2 Jan 20 07:38:00 host sshd[4293]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:38:02 host sshd[4293]: Failed password for invalid user system from 47.157.173.196 port 59020 ssh2 Jan 20 07:38:03 host sshd[4293]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:38:06 host sshd[4293]: Failed password for invalid user system from 47.157.173.196 port 59020 ssh2 Jan 20 07:38:08 host sshd[4293]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:38:10 host sshd[4293]: Failed password for invalid user system from 47.157.173.196 port 59020 ssh2 Jan 20 07:38:13 host sshd[4293]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:38:15 host sshd[4293]: Failed password for invalid user system from 47.157.173.196 port 59020 ssh2 Jan 20 07:38:35 host sshd[4404]: Invalid user usr from 118.41.245.98 port 62613 Jan 20 07:38:35 host sshd[4404]: input_userauth_request: invalid user usr [preauth] Jan 20 07:38:35 host sshd[4404]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:38:35 host sshd[4404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.41.245.98 Jan 20 07:38:37 host sshd[4404]: Failed password for invalid user usr from 118.41.245.98 port 62613 ssh2 Jan 20 07:38:38 host sshd[4404]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:38:40 host sshd[4404]: Failed password for invalid user usr from 118.41.245.98 port 62613 ssh2 Jan 20 07:38:41 host sshd[4404]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:38:42 host sshd[4404]: Failed password for invalid user usr from 118.41.245.98 port 62613 ssh2 Jan 20 07:38:44 host sshd[4404]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:38:46 host sshd[4404]: Failed password for invalid user usr from 118.41.245.98 port 62613 ssh2 Jan 20 07:38:46 host sshd[4404]: Connection reset by 118.41.245.98 port 62613 [preauth] Jan 20 07:38:46 host sshd[4404]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.41.245.98 Jan 20 07:38:46 host sshd[4404]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 20 07:38:47 host sshd[4426]: Invalid user shiny from 147.182.188.81 port 57502 Jan 20 07:38:47 host sshd[4426]: input_userauth_request: invalid user shiny [preauth] Jan 20 07:38:47 host sshd[4426]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:38:47 host sshd[4426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.188.81 Jan 20 07:38:49 host sshd[4426]: Failed password for invalid user shiny from 147.182.188.81 port 57502 ssh2 Jan 20 07:38:49 host sshd[4426]: Received disconnect from 147.182.188.81 port 57502:11: Bye Bye [preauth] Jan 20 07:38:49 host sshd[4426]: Disconnected from 147.182.188.81 port 57502 [preauth] Jan 20 07:38:59 host sshd[4480]: Invalid user test from 54.38.156.147 port 57756 Jan 20 07:38:59 host sshd[4480]: input_userauth_request: invalid user test [preauth] Jan 20 07:38:59 host sshd[4480]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:38:59 host sshd[4480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.156.147 Jan 20 07:39:01 host sshd[4480]: Failed password for invalid user test from 54.38.156.147 port 57756 ssh2 Jan 20 07:39:01 host sshd[4480]: Received disconnect from 54.38.156.147 port 57756:11: Bye Bye [preauth] Jan 20 07:39:01 host sshd[4480]: Disconnected from 54.38.156.147 port 57756 [preauth] Jan 20 07:39:04 host sshd[4512]: Invalid user ONTUSER from 59.126.160.245 port 55210 Jan 20 07:39:04 host sshd[4512]: input_userauth_request: invalid user ONTUSER [preauth] Jan 20 07:39:04 host sshd[4512]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:39:04 host sshd[4512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.160.245 Jan 20 07:39:06 host sshd[4512]: Failed password for invalid user ONTUSER from 59.126.160.245 port 55210 ssh2 Jan 20 07:39:06 host sshd[4512]: Connection reset by 59.126.160.245 port 55210 [preauth] Jan 20 07:39:20 host sshd[4574]: Did not receive identification string from 171.235.243.122 port 40679 Jan 20 07:39:57 host sshd[4650]: Invalid user scan from 147.182.188.81 port 56642 Jan 20 07:39:57 host sshd[4650]: input_userauth_request: invalid user scan [preauth] Jan 20 07:39:57 host sshd[4650]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:39:57 host sshd[4650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.188.81 Jan 20 07:40:00 host sshd[4650]: Failed password for invalid user scan from 147.182.188.81 port 56642 ssh2 Jan 20 07:40:00 host sshd[4650]: Received disconnect from 147.182.188.81 port 56642:11: Bye Bye [preauth] Jan 20 07:40:00 host sshd[4650]: Disconnected from 147.182.188.81 port 56642 [preauth] Jan 20 07:40:05 host sshd[4690]: Invalid user vpn from 54.38.156.147 port 34614 Jan 20 07:40:05 host sshd[4690]: input_userauth_request: invalid user vpn [preauth] Jan 20 07:40:05 host sshd[4690]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:40:05 host sshd[4690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.156.147 Jan 20 07:40:06 host sshd[4693]: Invalid user prueba from 143.244.130.229 port 46142 Jan 20 07:40:06 host sshd[4693]: input_userauth_request: invalid user prueba [preauth] Jan 20 07:40:06 host sshd[4693]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:40:06 host sshd[4693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.130.229 Jan 20 07:40:07 host sshd[4690]: Failed password for invalid user vpn from 54.38.156.147 port 34614 ssh2 Jan 20 07:40:07 host sshd[4690]: Received disconnect from 54.38.156.147 port 34614:11: Bye Bye [preauth] Jan 20 07:40:07 host sshd[4690]: Disconnected from 54.38.156.147 port 34614 [preauth] Jan 20 07:40:08 host sshd[4693]: Failed password for invalid user prueba from 143.244.130.229 port 46142 ssh2 Jan 20 07:40:08 host sshd[4693]: Received disconnect from 143.244.130.229 port 46142:11: Bye Bye [preauth] Jan 20 07:40:08 host sshd[4693]: Disconnected from 143.244.130.229 port 46142 [preauth] Jan 20 07:40:36 host sshd[4783]: Invalid user gerrit from 206.189.38.110 port 49332 Jan 20 07:40:36 host sshd[4783]: input_userauth_request: invalid user gerrit [preauth] Jan 20 07:40:36 host sshd[4783]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:40:36 host sshd[4783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.38.110 Jan 20 07:40:37 host sshd[4783]: Failed password for invalid user gerrit from 206.189.38.110 port 49332 ssh2 Jan 20 07:40:37 host sshd[4783]: Received disconnect from 206.189.38.110 port 49332:11: Bye Bye [preauth] Jan 20 07:40:37 host sshd[4783]: Disconnected from 206.189.38.110 port 49332 [preauth] Jan 20 07:41:04 host sshd[4830]: Invalid user angelica from 147.182.188.81 port 55622 Jan 20 07:41:04 host sshd[4830]: input_userauth_request: invalid user angelica [preauth] Jan 20 07:41:04 host sshd[4830]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:41:04 host sshd[4830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.182.188.81 Jan 20 07:41:06 host sshd[4830]: Failed password for invalid user angelica from 147.182.188.81 port 55622 ssh2 Jan 20 07:41:30 host sshd[5012]: Invalid user vbox from 143.244.130.229 port 45750 Jan 20 07:41:30 host sshd[5012]: input_userauth_request: invalid user vbox [preauth] Jan 20 07:41:30 host sshd[5012]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:41:30 host sshd[5012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.130.229 Jan 20 07:41:32 host sshd[5012]: Failed password for invalid user vbox from 143.244.130.229 port 45750 ssh2 Jan 20 07:41:32 host sshd[5012]: Received disconnect from 143.244.130.229 port 45750:11: Bye Bye [preauth] Jan 20 07:41:32 host sshd[5012]: Disconnected from 143.244.130.229 port 45750 [preauth] Jan 20 07:41:49 host sshd[5036]: User adm from 206.189.38.110 not allowed because not listed in AllowUsers Jan 20 07:41:49 host sshd[5036]: input_userauth_request: invalid user adm [preauth] Jan 20 07:41:49 host unix_chkpwd[5038]: password check failed for user (adm) Jan 20 07:41:49 host sshd[5036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.38.110 user=adm Jan 20 07:41:49 host sshd[5036]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "adm" Jan 20 07:41:51 host sshd[5036]: Failed password for invalid user adm from 206.189.38.110 port 38118 ssh2 Jan 20 07:41:51 host sshd[5036]: Received disconnect from 206.189.38.110 port 38118:11: Bye Bye [preauth] Jan 20 07:41:51 host sshd[5036]: Disconnected from 206.189.38.110 port 38118 [preauth] Jan 20 07:42:52 host sshd[5191]: Invalid user monitor from 143.244.130.229 port 53304 Jan 20 07:42:52 host sshd[5191]: input_userauth_request: invalid user monitor [preauth] Jan 20 07:42:52 host sshd[5191]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:42:52 host sshd[5191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.244.130.229 Jan 20 07:42:53 host sshd[5191]: Failed password for invalid user monitor from 143.244.130.229 port 53304 ssh2 Jan 20 07:42:53 host sshd[5191]: Received disconnect from 143.244.130.229 port 53304:11: Bye Bye [preauth] Jan 20 07:42:53 host sshd[5191]: Disconnected from 143.244.130.229 port 53304 [preauth] Jan 20 07:44:30 host sshd[5554]: Did not receive identification string from 104.152.52.227 port 40668 Jan 20 07:54:47 host sshd[7326]: Connection reset by 59.4.109.72 port 63769 [preauth] Jan 20 07:56:52 host sshd[7704]: User root from 59.28.194.230 not allowed because not listed in AllowUsers Jan 20 07:56:52 host sshd[7704]: input_userauth_request: invalid user root [preauth] Jan 20 07:56:52 host unix_chkpwd[7710]: password check failed for user (root) Jan 20 07:56:52 host sshd[7704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.28.194.230 user=root Jan 20 07:56:52 host sshd[7704]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 07:56:54 host sshd[7704]: Failed password for invalid user root from 59.28.194.230 port 60395 ssh2 Jan 20 07:57:04 host sshd[7740]: Invalid user steam from 221.155.248.14 port 62971 Jan 20 07:57:04 host sshd[7740]: input_userauth_request: invalid user steam [preauth] Jan 20 07:57:04 host sshd[7740]: pam_unix(sshd:auth): check pass; user unknown Jan 20 07:57:04 host sshd[7740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.155.248.14 Jan 20 07:57:06 host sshd[7740]: Failed password for invalid user steam from 221.155.248.14 port 62971 ssh2 Jan 20 08:05:00 host sshd[9132]: Invalid user from 64.62.197.99 port 37817 Jan 20 08:05:00 host sshd[9132]: input_userauth_request: invalid user [preauth] Jan 20 08:05:03 host sshd[9132]: Connection closed by 64.62.197.99 port 37817 [preauth] Jan 20 08:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 08:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=straightcurve user-2=wwwletsstalkfood user-3=bonifacegroup user-4=wwwevmhonda user-5=wwwnexidigital user-6=mrsclean user-7=gifterman user-8=palco123 user-9=kottayamcalldriv user-10=phmetals user-11=wwwkapin user-12=woodpeck user-13=wwwkmaorg user-14=disposeat user-15=remysagr user-16=pmcresources user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=wwwpmcresource user-21=wwwrmswll user-22=keralaholi user-23=wwwresourcehunte user-24=ugotscom user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 08:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-yBMOJ9TQT4kxYg4R.~ Jan 20 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-yBMOJ9TQT4kxYg4R.~' Jan 20 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-yBMOJ9TQT4kxYg4R.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 08:21:12 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 08:21:12 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 08:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 08:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 08:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 08:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 08:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:21:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 08:21:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 08:21:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 08:23:52 host sshd[12148]: invalid public DH value: >= p-1 [preauth] Jan 20 08:23:52 host sshd[12148]: ssh_dispatch_run_fatal: Connection from 112.158.159.107 port 57664: incomplete message [preauth] Jan 20 08:31:25 host sshd[13325]: Invalid user ubuntu from 210.91.8.155 port 63191 Jan 20 08:31:25 host sshd[13325]: input_userauth_request: invalid user ubuntu [preauth] Jan 20 08:31:25 host sshd[13325]: pam_unix(sshd:auth): check pass; user unknown Jan 20 08:31:25 host sshd[13325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.91.8.155 Jan 20 08:31:27 host sshd[13325]: Failed password for invalid user ubuntu from 210.91.8.155 port 63191 ssh2 Jan 20 08:31:28 host sshd[13325]: pam_unix(sshd:auth): check pass; user unknown Jan 20 08:31:30 host sshd[13325]: Failed password for invalid user ubuntu from 210.91.8.155 port 63191 ssh2 Jan 20 08:31:31 host sshd[13325]: pam_unix(sshd:auth): check pass; user unknown Jan 20 08:31:32 host sshd[13325]: Failed password for invalid user ubuntu from 210.91.8.155 port 63191 ssh2 Jan 20 08:31:33 host sshd[13325]: Connection reset by 210.91.8.155 port 63191 [preauth] Jan 20 08:31:33 host sshd[13325]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.91.8.155 Jan 20 08:35:44 host sshd[13937]: Invalid user gv from 194.110.203.109 port 46676 Jan 20 08:35:44 host sshd[13937]: input_userauth_request: invalid user gv [preauth] Jan 20 08:35:44 host sshd[13937]: pam_unix(sshd:auth): check pass; user unknown Jan 20 08:35:44 host sshd[13937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 08:35:46 host sshd[13937]: Failed password for invalid user gv from 194.110.203.109 port 46676 ssh2 Jan 20 08:35:49 host sshd[13937]: pam_unix(sshd:auth): check pass; user unknown Jan 20 08:35:51 host sshd[13937]: Failed password for invalid user gv from 194.110.203.109 port 46676 ssh2 Jan 20 08:35:55 host sshd[13937]: pam_unix(sshd:auth): check pass; user unknown Jan 20 08:35:57 host sshd[13937]: Failed password for invalid user gv from 194.110.203.109 port 46676 ssh2 Jan 20 08:36:00 host sshd[13937]: Connection closed by 194.110.203.109 port 46676 [preauth] Jan 20 08:36:00 host sshd[13937]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 08:36:49 host sshd[14051]: Invalid user telnet from 107.10.173.228 port 49736 Jan 20 08:36:49 host sshd[14051]: input_userauth_request: invalid user telnet [preauth] Jan 20 08:36:49 host sshd[14051]: pam_unix(sshd:auth): check pass; user unknown Jan 20 08:36:49 host sshd[14051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.10.173.228 Jan 20 08:36:50 host sshd[14051]: Failed password for invalid user telnet from 107.10.173.228 port 49736 ssh2 Jan 20 08:36:51 host sshd[14051]: pam_unix(sshd:auth): check pass; user unknown Jan 20 08:36:53 host sshd[14051]: Failed password for invalid user telnet from 107.10.173.228 port 49736 ssh2 Jan 20 08:36:53 host sshd[14051]: pam_unix(sshd:auth): check pass; user unknown Jan 20 08:36:55 host sshd[14051]: Failed password for invalid user telnet from 107.10.173.228 port 49736 ssh2 Jan 20 08:36:56 host sshd[14051]: Failed password for invalid user telnet from 107.10.173.228 port 49736 ssh2 Jan 20 08:36:57 host sshd[14051]: pam_unix(sshd:auth): check pass; user unknown Jan 20 08:36:59 host sshd[14051]: Failed password for invalid user telnet from 107.10.173.228 port 49736 ssh2 Jan 20 08:57:36 host sshd[17730]: Invalid user alfred from 107.189.30.59 port 48692 Jan 20 08:57:36 host sshd[17730]: input_userauth_request: invalid user alfred [preauth] Jan 20 08:57:36 host sshd[17730]: pam_unix(sshd:auth): check pass; user unknown Jan 20 08:57:36 host sshd[17730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 20 08:57:38 host sshd[17730]: Failed password for invalid user alfred from 107.189.30.59 port 48692 ssh2 Jan 20 08:57:39 host sshd[17730]: Connection closed by 107.189.30.59 port 48692 [preauth] Jan 20 09:16:14 host sshd[20864]: User root from 31.41.244.124 not allowed because not listed in AllowUsers Jan 20 09:16:14 host sshd[20864]: input_userauth_request: invalid user root [preauth] Jan 20 09:16:14 host unix_chkpwd[20867]: password check failed for user (root) Jan 20 09:16:14 host sshd[20864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 user=root Jan 20 09:16:14 host sshd[20864]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 09:16:16 host sshd[20864]: Failed password for invalid user root from 31.41.244.124 port 21400 ssh2 Jan 20 09:16:16 host sshd[20864]: Received disconnect from 31.41.244.124 port 21400:11: Client disconnecting normally [preauth] Jan 20 09:16:16 host sshd[20864]: Disconnected from 31.41.244.124 port 21400 [preauth] Jan 20 09:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 09:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:06 host sshd[21622]: Invalid user oracle from 59.126.250.219 port 37046 Jan 20 09:21:06 host sshd[21622]: input_userauth_request: invalid user oracle [preauth] Jan 20 09:21:06 host sshd[21622]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:21:06 host sshd[21622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.250.219 Jan 20 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=bonifacegroup user-2=wwwevmhonda user-3=wwwletsstalkfood user-4=straightcurve user-5=gifterman user-6=palco123 user-7=phmetals user-8=kottayamcalldriv user-9=mrsclean user-10=wwwnexidigital user-11=disposeat user-12=wwwkmaorg user-13=remysagr user-14=woodpeck user-15=wwwkapin user-16=vfmassets user-17=wwwtestugo user-18=shalinijames user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=wwwrmswll user-23=wwwresourcehunte user-24=keralaholi user-25=ugotscom user-26=wwwkaretakers user-27=cochintaxi user-28=dartsimp user-29=a2zgroup user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 09:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZSDBsTk1CoeGZJq1.~ Jan 20 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZSDBsTk1CoeGZJq1.~' Jan 20 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-ZSDBsTk1CoeGZJq1.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 09:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 09:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 09:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 09:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 09:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 09:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 09:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:07 host sshd[21622]: Failed password for invalid user oracle from 59.126.250.219 port 37046 ssh2 Jan 20 09:21:08 host sshd[21622]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 09:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 09:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 09:21:10 host sshd[21622]: Failed password for invalid user oracle from 59.126.250.219 port 37046 ssh2 Jan 20 09:21:11 host sshd[21622]: Connection reset by 59.126.250.219 port 37046 [preauth] Jan 20 09:21:11 host sshd[21622]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.250.219 Jan 20 09:23:49 host sshd[22170]: Invalid user admin from 135.181.45.135 port 37428 Jan 20 09:23:49 host sshd[22170]: input_userauth_request: invalid user admin [preauth] Jan 20 09:23:49 host sshd[22170]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:23:49 host sshd[22170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.181.45.135 Jan 20 09:23:51 host sshd[22170]: Failed password for invalid user admin from 135.181.45.135 port 37428 ssh2 Jan 20 09:23:51 host sshd[22170]: Received disconnect from 135.181.45.135 port 37428:11: Bye Bye [preauth] Jan 20 09:23:51 host sshd[22170]: Disconnected from 135.181.45.135 port 37428 [preauth] Jan 20 09:24:13 host sshd[22203]: Invalid user sahil from 143.255.141.251 port 45162 Jan 20 09:24:13 host sshd[22203]: input_userauth_request: invalid user sahil [preauth] Jan 20 09:24:13 host sshd[22203]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:24:13 host sshd[22203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.141.251 Jan 20 09:24:15 host sshd[22203]: Failed password for invalid user sahil from 143.255.141.251 port 45162 ssh2 Jan 20 09:24:15 host sshd[22203]: Received disconnect from 143.255.141.251 port 45162:11: Bye Bye [preauth] Jan 20 09:24:15 host sshd[22203]: Disconnected from 143.255.141.251 port 45162 [preauth] Jan 20 09:25:56 host sshd[22528]: Invalid user sqladmin from 139.59.70.64 port 53982 Jan 20 09:25:56 host sshd[22528]: input_userauth_request: invalid user sqladmin [preauth] Jan 20 09:25:56 host sshd[22528]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:25:56 host sshd[22528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.70.64 Jan 20 09:25:59 host sshd[22528]: Failed password for invalid user sqladmin from 139.59.70.64 port 53982 ssh2 Jan 20 09:25:59 host sshd[22528]: Received disconnect from 139.59.70.64 port 53982:11: Bye Bye [preauth] Jan 20 09:25:59 host sshd[22528]: Disconnected from 139.59.70.64 port 53982 [preauth] Jan 20 09:27:17 host sshd[22704]: Invalid user oracleadmin from 178.62.8.163 port 35832 Jan 20 09:27:17 host sshd[22704]: input_userauth_request: invalid user oracleadmin [preauth] Jan 20 09:27:17 host sshd[22704]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:27:17 host sshd[22704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.8.163 Jan 20 09:27:19 host sshd[22704]: Failed password for invalid user oracleadmin from 178.62.8.163 port 35832 ssh2 Jan 20 09:27:19 host sshd[22704]: Received disconnect from 178.62.8.163 port 35832:11: Bye Bye [preauth] Jan 20 09:27:19 host sshd[22704]: Disconnected from 178.62.8.163 port 35832 [preauth] Jan 20 09:27:22 host sshd[22711]: Invalid user sqladmin from 34.122.221.254 port 14750 Jan 20 09:27:22 host sshd[22711]: input_userauth_request: invalid user sqladmin [preauth] Jan 20 09:27:22 host sshd[22711]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:27:22 host sshd[22711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.122.221.254 Jan 20 09:27:23 host sshd[22711]: Failed password for invalid user sqladmin from 34.122.221.254 port 14750 ssh2 Jan 20 09:27:24 host sshd[22711]: Received disconnect from 34.122.221.254 port 14750:11: Bye Bye [preauth] Jan 20 09:27:24 host sshd[22711]: Disconnected from 34.122.221.254 port 14750 [preauth] Jan 20 09:28:08 host sshd[22798]: Invalid user deploy from 34.132.47.136 port 47042 Jan 20 09:28:08 host sshd[22798]: input_userauth_request: invalid user deploy [preauth] Jan 20 09:28:08 host sshd[22798]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:28:08 host sshd[22798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.132.47.136 Jan 20 09:28:10 host sshd[22798]: Failed password for invalid user deploy from 34.132.47.136 port 47042 ssh2 Jan 20 09:28:10 host sshd[22798]: Received disconnect from 34.132.47.136 port 47042:11: Bye Bye [preauth] Jan 20 09:28:10 host sshd[22798]: Disconnected from 34.132.47.136 port 47042 [preauth] Jan 20 09:29:59 host sshd[23108]: Invalid user bitnami from 135.181.45.135 port 41424 Jan 20 09:29:59 host sshd[23108]: input_userauth_request: invalid user bitnami [preauth] Jan 20 09:29:59 host sshd[23108]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:29:59 host sshd[23108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.181.45.135 Jan 20 09:30:00 host sshd[23108]: Failed password for invalid user bitnami from 135.181.45.135 port 41424 ssh2 Jan 20 09:30:01 host sshd[23108]: Received disconnect from 135.181.45.135 port 41424:11: Bye Bye [preauth] Jan 20 09:30:01 host sshd[23108]: Disconnected from 135.181.45.135 port 41424 [preauth] Jan 20 09:30:27 host sshd[23165]: Invalid user admin from 118.97.212.14 port 43234 Jan 20 09:30:27 host sshd[23165]: input_userauth_request: invalid user admin [preauth] Jan 20 09:30:27 host sshd[23165]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:30:27 host sshd[23165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.212.14 Jan 20 09:30:28 host sshd[23165]: Failed password for invalid user admin from 118.97.212.14 port 43234 ssh2 Jan 20 09:30:29 host sshd[23165]: Received disconnect from 118.97.212.14 port 43234:11: Bye Bye [preauth] Jan 20 09:30:29 host sshd[23165]: Disconnected from 118.97.212.14 port 43234 [preauth] Jan 20 09:30:30 host sshd[23202]: Invalid user administrador from 34.122.221.254 port 60892 Jan 20 09:30:30 host sshd[23202]: input_userauth_request: invalid user administrador [preauth] Jan 20 09:30:30 host sshd[23202]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:30:30 host sshd[23202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.122.221.254 Jan 20 09:30:32 host sshd[23202]: Failed password for invalid user administrador from 34.122.221.254 port 60892 ssh2 Jan 20 09:30:33 host sshd[23202]: Received disconnect from 34.122.221.254 port 60892:11: Bye Bye [preauth] Jan 20 09:30:33 host sshd[23202]: Disconnected from 34.122.221.254 port 60892 [preauth] Jan 20 09:30:49 host sshd[23230]: Invalid user birgit from 178.62.8.163 port 36024 Jan 20 09:30:49 host sshd[23230]: input_userauth_request: invalid user birgit [preauth] Jan 20 09:30:49 host sshd[23230]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:30:49 host sshd[23230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.8.163 Jan 20 09:30:51 host sshd[23230]: Failed password for invalid user birgit from 178.62.8.163 port 36024 ssh2 Jan 20 09:30:52 host sshd[23230]: Received disconnect from 178.62.8.163 port 36024:11: Bye Bye [preauth] Jan 20 09:30:52 host sshd[23230]: Disconnected from 178.62.8.163 port 36024 [preauth] Jan 20 09:31:02 host sshd[23245]: Invalid user anaconda from 150.109.205.234 port 43184 Jan 20 09:31:02 host sshd[23245]: input_userauth_request: invalid user anaconda [preauth] Jan 20 09:31:02 host sshd[23245]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:31:02 host sshd[23245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.205.234 Jan 20 09:31:04 host sshd[23245]: Failed password for invalid user anaconda from 150.109.205.234 port 43184 ssh2 Jan 20 09:31:04 host sshd[23245]: Received disconnect from 150.109.205.234 port 43184:11: Bye Bye [preauth] Jan 20 09:31:04 host sshd[23245]: Disconnected from 150.109.205.234 port 43184 [preauth] Jan 20 09:31:06 host sshd[23261]: Invalid user csgoserver from 143.255.141.251 port 60062 Jan 20 09:31:06 host sshd[23261]: input_userauth_request: invalid user csgoserver [preauth] Jan 20 09:31:06 host sshd[23261]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:31:06 host sshd[23261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.141.251 Jan 20 09:31:07 host sshd[23264]: Invalid user scan from 135.181.45.135 port 42938 Jan 20 09:31:07 host sshd[23264]: input_userauth_request: invalid user scan [preauth] Jan 20 09:31:07 host sshd[23264]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:31:07 host sshd[23264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=135.181.45.135 Jan 20 09:31:08 host sshd[23261]: Failed password for invalid user csgoserver from 143.255.141.251 port 60062 ssh2 Jan 20 09:31:08 host sshd[23261]: Received disconnect from 143.255.141.251 port 60062:11: Bye Bye [preauth] Jan 20 09:31:08 host sshd[23261]: Disconnected from 143.255.141.251 port 60062 [preauth] Jan 20 09:31:09 host sshd[23264]: Failed password for invalid user scan from 135.181.45.135 port 42938 ssh2 Jan 20 09:31:09 host sshd[23264]: Received disconnect from 135.181.45.135 port 42938:11: Bye Bye [preauth] Jan 20 09:31:09 host sshd[23264]: Disconnected from 135.181.45.135 port 42938 [preauth] Jan 20 09:31:31 host sshd[23365]: Invalid user tcadmin from 34.132.47.136 port 33682 Jan 20 09:31:31 host sshd[23365]: input_userauth_request: invalid user tcadmin [preauth] Jan 20 09:31:31 host sshd[23365]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:31:31 host sshd[23365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.132.47.136 Jan 20 09:31:33 host sshd[23365]: Failed password for invalid user tcadmin from 34.132.47.136 port 33682 ssh2 Jan 20 09:31:34 host sshd[23365]: Received disconnect from 34.132.47.136 port 33682:11: Bye Bye [preauth] Jan 20 09:31:34 host sshd[23365]: Disconnected from 34.132.47.136 port 33682 [preauth] Jan 20 09:31:35 host sshd[23376]: Invalid user sftpuser from 139.59.70.64 port 48412 Jan 20 09:31:35 host sshd[23376]: input_userauth_request: invalid user sftpuser [preauth] Jan 20 09:31:35 host sshd[23376]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:31:35 host sshd[23376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.70.64 Jan 20 09:31:37 host sshd[23376]: Failed password for invalid user sftpuser from 139.59.70.64 port 48412 ssh2 Jan 20 09:31:37 host sshd[23376]: Received disconnect from 139.59.70.64 port 48412:11: Bye Bye [preauth] Jan 20 09:31:37 host sshd[23376]: Disconnected from 139.59.70.64 port 48412 [preauth] Jan 20 09:31:39 host sshd[23380]: Invalid user test from 34.122.221.254 port 26197 Jan 20 09:31:39 host sshd[23380]: input_userauth_request: invalid user test [preauth] Jan 20 09:31:39 host sshd[23380]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:31:39 host sshd[23380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.122.221.254 Jan 20 09:31:41 host sshd[23380]: Failed password for invalid user test from 34.122.221.254 port 26197 ssh2 Jan 20 09:31:41 host sshd[23380]: Received disconnect from 34.122.221.254 port 26197:11: Bye Bye [preauth] Jan 20 09:31:41 host sshd[23380]: Disconnected from 34.122.221.254 port 26197 [preauth] Jan 20 09:31:58 host sshd[23429]: Invalid user openbravo from 178.62.8.163 port 36144 Jan 20 09:31:58 host sshd[23429]: input_userauth_request: invalid user openbravo [preauth] Jan 20 09:31:58 host sshd[23429]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:31:58 host sshd[23429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.8.163 Jan 20 09:32:00 host sshd[23429]: Failed password for invalid user openbravo from 178.62.8.163 port 36144 ssh2 Jan 20 09:32:29 host sshd[23502]: Invalid user scpuser from 143.255.141.251 port 46018 Jan 20 09:32:29 host sshd[23502]: input_userauth_request: invalid user scpuser [preauth] Jan 20 09:32:29 host sshd[23502]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:32:29 host sshd[23502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.255.141.251 Jan 20 09:32:32 host sshd[23502]: Failed password for invalid user scpuser from 143.255.141.251 port 46018 ssh2 Jan 20 09:32:32 host sshd[23502]: Received disconnect from 143.255.141.251 port 46018:11: Bye Bye [preauth] Jan 20 09:32:32 host sshd[23502]: Disconnected from 143.255.141.251 port 46018 [preauth] Jan 20 09:32:49 host sshd[23581]: Invalid user usuario from 34.132.47.136 port 40368 Jan 20 09:32:49 host sshd[23581]: input_userauth_request: invalid user usuario [preauth] Jan 20 09:32:49 host sshd[23581]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:32:49 host sshd[23581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.132.47.136 Jan 20 09:32:50 host sshd[23581]: Failed password for invalid user usuario from 34.132.47.136 port 40368 ssh2 Jan 20 09:32:51 host sshd[23616]: Invalid user administrator from 139.59.70.64 port 42418 Jan 20 09:32:51 host sshd[23616]: input_userauth_request: invalid user administrator [preauth] Jan 20 09:32:51 host sshd[23616]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:32:51 host sshd[23616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.70.64 Jan 20 09:32:54 host sshd[23616]: Failed password for invalid user administrator from 139.59.70.64 port 42418 ssh2 Jan 20 09:32:54 host sshd[23616]: Received disconnect from 139.59.70.64 port 42418:11: Bye Bye [preauth] Jan 20 09:32:54 host sshd[23616]: Disconnected from 139.59.70.64 port 42418 [preauth] Jan 20 09:33:28 host sshd[23699]: Invalid user esbuser from 118.97.212.14 port 33592 Jan 20 09:33:28 host sshd[23699]: input_userauth_request: invalid user esbuser [preauth] Jan 20 09:33:28 host sshd[23699]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:33:28 host sshd[23699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.212.14 Jan 20 09:33:30 host sshd[23699]: Failed password for invalid user esbuser from 118.97.212.14 port 33592 ssh2 Jan 20 09:33:31 host sshd[23699]: Received disconnect from 118.97.212.14 port 33592:11: Bye Bye [preauth] Jan 20 09:33:31 host sshd[23699]: Disconnected from 118.97.212.14 port 33592 [preauth] Jan 20 09:33:41 host sshd[23780]: Invalid user ftpuser from 150.109.205.234 port 45556 Jan 20 09:33:41 host sshd[23780]: input_userauth_request: invalid user ftpuser [preauth] Jan 20 09:33:41 host sshd[23780]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:33:41 host sshd[23780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.205.234 Jan 20 09:33:43 host sshd[23780]: Failed password for invalid user ftpuser from 150.109.205.234 port 45556 ssh2 Jan 20 09:33:43 host sshd[23780]: Received disconnect from 150.109.205.234 port 45556:11: Bye Bye [preauth] Jan 20 09:33:43 host sshd[23780]: Disconnected from 150.109.205.234 port 45556 [preauth] Jan 20 09:35:00 host sshd[24050]: Invalid user asterisk from 150.109.205.234 port 40664 Jan 20 09:35:00 host sshd[24050]: input_userauth_request: invalid user asterisk [preauth] Jan 20 09:35:00 host sshd[24050]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:35:00 host sshd[24050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.205.234 Jan 20 09:35:02 host sshd[24050]: Failed password for invalid user asterisk from 150.109.205.234 port 40664 ssh2 Jan 20 09:35:02 host sshd[24050]: Received disconnect from 150.109.205.234 port 40664:11: Bye Bye [preauth] Jan 20 09:35:02 host sshd[24050]: Disconnected from 150.109.205.234 port 40664 [preauth] Jan 20 09:35:14 host sshd[24131]: Invalid user user4 from 118.97.212.14 port 55058 Jan 20 09:35:14 host sshd[24131]: input_userauth_request: invalid user user4 [preauth] Jan 20 09:35:14 host sshd[24131]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:35:14 host sshd[24131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.212.14 Jan 20 09:35:16 host sshd[24131]: Failed password for invalid user user4 from 118.97.212.14 port 55058 ssh2 Jan 20 09:35:16 host sshd[24131]: Received disconnect from 118.97.212.14 port 55058:11: Bye Bye [preauth] Jan 20 09:35:16 host sshd[24131]: Disconnected from 118.97.212.14 port 55058 [preauth] Jan 20 09:35:46 host sshd[24252]: Did not receive identification string from 8.219.76.192 port 61000 Jan 20 09:37:59 host sshd[24507]: Invalid user oracle from 119.207.40.166 port 60680 Jan 20 09:37:59 host sshd[24507]: input_userauth_request: invalid user oracle [preauth] Jan 20 09:37:59 host sshd[24507]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:37:59 host sshd[24507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.207.40.166 Jan 20 09:38:01 host sshd[24507]: Failed password for invalid user oracle from 119.207.40.166 port 60680 ssh2 Jan 20 09:38:02 host sshd[24507]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:38:05 host sshd[24507]: Failed password for invalid user oracle from 119.207.40.166 port 60680 ssh2 Jan 20 09:41:11 host sshd[25243]: invalid public DH value: >= p-1 [preauth] Jan 20 09:41:11 host sshd[25243]: ssh_dispatch_run_fatal: Connection from 89.234.212.55 port 53115: incomplete message [preauth] Jan 20 09:49:46 host sshd[26464]: Did not receive identification string from 114.96.95.21 port 44368 Jan 20 09:49:49 host sshd[26465]: User centos from 114.96.95.21 not allowed because not listed in AllowUsers Jan 20 09:49:49 host sshd[26467]: Invalid user esuser from 114.96.95.21 port 44720 Jan 20 09:49:49 host sshd[26465]: input_userauth_request: invalid user centos [preauth] Jan 20 09:49:49 host sshd[26467]: input_userauth_request: invalid user esuser [preauth] Jan 20 09:49:49 host sshd[26469]: User centos from 114.96.95.21 not allowed because not listed in AllowUsers Jan 20 09:49:49 host sshd[26469]: input_userauth_request: invalid user centos [preauth] Jan 20 09:49:49 host sshd[26467]: pam_unix(sshd:auth): check pass; user unknown Jan 20 09:49:49 host sshd[26467]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.96.95.21 Jan 20 09:49:49 host unix_chkpwd[26477]: password check failed for user (centos) Jan 20 09:49:49 host sshd[26465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.96.95.21 user=centos Jan 20 09:49:49 host unix_chkpwd[26478]: password check failed for user (centos) Jan 20 09:49:49 host sshd[26469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.96.95.21 user=centos Jan 20 09:49:51 host sshd[26467]: Failed password for invalid user esuser from 114.96.95.21 port 44720 ssh2 Jan 20 09:49:51 host sshd[26465]: Failed password for invalid user centos from 114.96.95.21 port 44716 ssh2 Jan 20 09:49:51 host sshd[26469]: Failed password for invalid user centos from 114.96.95.21 port 44726 ssh2 Jan 20 09:51:22 host sshd[26837]: Did not receive identification string from 117.50.66.128 port 56946 Jan 20 10:06:42 host sshd[29090]: Connection closed by 192.241.221.20 port 56420 [preauth] Jan 20 10:20:24 host sshd[31277]: Invalid user gw from 194.110.203.109 port 38264 Jan 20 10:20:24 host sshd[31277]: input_userauth_request: invalid user gw [preauth] Jan 20 10:20:24 host sshd[31277]: pam_unix(sshd:auth): check pass; user unknown Jan 20 10:20:24 host sshd[31277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 10:20:26 host sshd[31277]: Failed password for invalid user gw from 194.110.203.109 port 38264 ssh2 Jan 20 10:20:29 host sshd[31277]: pam_unix(sshd:auth): check pass; user unknown Jan 20 10:20:30 host sshd[31277]: Failed password for invalid user gw from 194.110.203.109 port 38264 ssh2 Jan 20 10:20:34 host sshd[31277]: pam_unix(sshd:auth): check pass; user unknown Jan 20 10:20:35 host sshd[31277]: Failed password for invalid user gw from 194.110.203.109 port 38264 ssh2 Jan 20 10:20:38 host sshd[31277]: Connection closed by 194.110.203.109 port 38264 [preauth] Jan 20 10:20:38 host sshd[31277]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=wwwevmhonda user-4=bonifacegroup user-5=wwwnexidigital user-6=mrsclean user-7=phmetals user-8=kottayamcalldriv user-9=palco123 user-10=gifterman user-11=wwwkapin user-12=woodpeck user-13=disposeat user-14=wwwkmaorg user-15=remysagr user-16=pmcresources user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=wwwpmcresource user-21=ugotscom user-22=keralaholi user-23=wwwresourcehunte user-24=wwwrmswll user-25=travelboniface user-26=wwwkaretakers user-27=cochintaxi user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 10:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GIivlyhKE14RUi0l.~ Jan 20 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GIivlyhKE14RUi0l.~' Jan 20 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GIivlyhKE14RUi0l.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 10:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 10:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 10:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 10:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 10:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 10:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 10:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 10:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 10:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 10:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 10:35:48 host sshd[1755]: User root from 59.31.128.84 not allowed because not listed in AllowUsers Jan 20 10:35:48 host sshd[1755]: input_userauth_request: invalid user root [preauth] Jan 20 10:35:48 host unix_chkpwd[1760]: password check failed for user (root) Jan 20 10:35:48 host sshd[1755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.31.128.84 user=root Jan 20 10:35:48 host sshd[1755]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 10:35:50 host sshd[1755]: Failed password for invalid user root from 59.31.128.84 port 63670 ssh2 Jan 20 10:35:51 host unix_chkpwd[1763]: password check failed for user (root) Jan 20 10:35:51 host sshd[1755]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 10:35:53 host sshd[1755]: Failed password for invalid user root from 59.31.128.84 port 63670 ssh2 Jan 20 10:35:54 host sshd[1755]: Connection reset by 59.31.128.84 port 63670 [preauth] Jan 20 10:35:54 host sshd[1755]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.31.128.84 user=root Jan 20 10:49:41 host sshd[3961]: Invalid user userx from 128.199.111.126 port 57578 Jan 20 10:49:41 host sshd[3961]: input_userauth_request: invalid user userx [preauth] Jan 20 10:49:41 host sshd[3961]: pam_unix(sshd:auth): check pass; user unknown Jan 20 10:49:41 host sshd[3961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.111.126 Jan 20 10:49:43 host sshd[3961]: Failed password for invalid user userx from 128.199.111.126 port 57578 ssh2 Jan 20 10:49:44 host sshd[3961]: Received disconnect from 128.199.111.126 port 57578:11: Bye Bye [preauth] Jan 20 10:49:44 host sshd[3961]: Disconnected from 128.199.111.126 port 57578 [preauth] Jan 20 10:50:25 host sshd[4067]: Invalid user ghost from 213.87.101.176 port 49894 Jan 20 10:50:25 host sshd[4067]: input_userauth_request: invalid user ghost [preauth] Jan 20 10:50:25 host sshd[4067]: pam_unix(sshd:auth): check pass; user unknown Jan 20 10:50:25 host sshd[4067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.87.101.176 Jan 20 10:50:27 host sshd[4067]: Failed password for invalid user ghost from 213.87.101.176 port 49894 ssh2 Jan 20 10:50:27 host sshd[4067]: Received disconnect from 213.87.101.176 port 49894:11: Bye Bye [preauth] Jan 20 10:50:27 host sshd[4067]: Disconnected from 213.87.101.176 port 49894 [preauth] Jan 20 10:51:29 host sshd[4331]: Invalid user jenkins2 from 125.163.160.229 port 49360 Jan 20 10:51:29 host sshd[4331]: input_userauth_request: invalid user jenkins2 [preauth] Jan 20 10:51:29 host sshd[4331]: pam_unix(sshd:auth): check pass; user unknown Jan 20 10:51:29 host sshd[4331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.163.160.229 Jan 20 10:51:31 host sshd[4331]: Failed password for invalid user jenkins2 from 125.163.160.229 port 49360 ssh2 Jan 20 10:51:31 host sshd[4331]: Received disconnect from 125.163.160.229 port 49360:11: Bye Bye [preauth] Jan 20 10:51:31 host sshd[4331]: Disconnected from 125.163.160.229 port 49360 [preauth] Jan 20 10:52:40 host sshd[4465]: Invalid user userx from 159.223.80.140 port 56812 Jan 20 10:52:40 host sshd[4465]: input_userauth_request: invalid user userx [preauth] Jan 20 10:52:40 host sshd[4465]: pam_unix(sshd:auth): check pass; user unknown Jan 20 10:52:40 host sshd[4465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.80.140 Jan 20 10:52:42 host sshd[4465]: Failed password for invalid user userx from 159.223.80.140 port 56812 ssh2 Jan 20 10:52:42 host sshd[4465]: Received disconnect from 159.223.80.140 port 56812:11: Bye Bye [preauth] Jan 20 10:52:42 host sshd[4465]: Disconnected from 159.223.80.140 port 56812 [preauth] Jan 20 10:53:01 host sshd[4497]: Invalid user steven from 210.183.21.48 port 5857 Jan 20 10:53:01 host sshd[4497]: input_userauth_request: invalid user steven [preauth] Jan 20 10:53:01 host sshd[4497]: pam_unix(sshd:auth): check pass; user unknown Jan 20 10:53:01 host sshd[4497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.183.21.48 Jan 20 10:53:03 host sshd[4497]: Failed password for invalid user steven from 210.183.21.48 port 5857 ssh2 Jan 20 10:53:03 host sshd[4497]: Received disconnect from 210.183.21.48 port 5857:11: Bye Bye [preauth] Jan 20 10:53:03 host sshd[4497]: Disconnected from 210.183.21.48 port 5857 [preauth] Jan 20 10:54:42 host sshd[4767]: Invalid user sysop from 128.199.111.126 port 44916 Jan 20 10:54:42 host sshd[4767]: input_userauth_request: invalid user sysop [preauth] Jan 20 10:54:42 host sshd[4767]: pam_unix(sshd:auth): check pass; user unknown Jan 20 10:54:42 host sshd[4767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.111.126 Jan 20 10:54:45 host sshd[4767]: Failed password for invalid user sysop from 128.199.111.126 port 44916 ssh2 Jan 20 10:54:45 host sshd[4767]: Received disconnect from 128.199.111.126 port 44916:11: Bye Bye [preauth] Jan 20 10:54:45 host sshd[4767]: Disconnected from 128.199.111.126 port 44916 [preauth] Jan 20 10:55:29 host sshd[4877]: Invalid user sqladmin from 213.87.101.176 port 44444 Jan 20 10:55:29 host sshd[4877]: input_userauth_request: invalid user sqladmin [preauth] Jan 20 10:55:29 host sshd[4877]: pam_unix(sshd:auth): check pass; user unknown Jan 20 10:55:29 host sshd[4877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.87.101.176 Jan 20 10:55:31 host sshd[4877]: Failed password for invalid user sqladmin from 213.87.101.176 port 44444 ssh2 Jan 20 10:55:31 host sshd[4877]: Received disconnect from 213.87.101.176 port 44444:11: Bye Bye [preauth] Jan 20 10:55:31 host sshd[4877]: Disconnected from 213.87.101.176 port 44444 [preauth] Jan 20 10:55:42 host sshd[4932]: Invalid user testappl from 159.223.80.140 port 44090 Jan 20 10:55:42 host sshd[4932]: input_userauth_request: invalid user testappl [preauth] Jan 20 10:55:42 host sshd[4932]: pam_unix(sshd:auth): check pass; user unknown Jan 20 10:55:42 host sshd[4932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.80.140 Jan 20 10:55:42 host sshd[4934]: Invalid user steven from 125.163.160.229 port 36002 Jan 20 10:55:42 host sshd[4934]: input_userauth_request: invalid user steven [preauth] Jan 20 10:55:42 host sshd[4934]: pam_unix(sshd:auth): check pass; user unknown Jan 20 10:55:42 host sshd[4934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.163.160.229 Jan 20 10:55:43 host sshd[4932]: Failed password for invalid user testappl from 159.223.80.140 port 44090 ssh2 Jan 20 10:55:43 host sshd[4932]: Received disconnect from 159.223.80.140 port 44090:11: Bye Bye [preauth] Jan 20 10:55:43 host sshd[4932]: Disconnected from 159.223.80.140 port 44090 [preauth] Jan 20 10:55:44 host sshd[4934]: Failed password for invalid user steven from 125.163.160.229 port 36002 ssh2 Jan 20 10:55:44 host sshd[4934]: Received disconnect from 125.163.160.229 port 36002:11: Bye Bye [preauth] Jan 20 10:55:44 host sshd[4934]: Disconnected from 125.163.160.229 port 36002 [preauth] Jan 20 10:55:59 host sshd[4958]: Invalid user testemail from 128.199.111.126 port 56620 Jan 20 10:55:59 host sshd[4958]: input_userauth_request: invalid user testemail [preauth] Jan 20 10:55:59 host sshd[4958]: pam_unix(sshd:auth): check pass; user unknown Jan 20 10:55:59 host sshd[4958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.111.126 Jan 20 10:56:01 host sshd[4958]: Failed password for invalid user testemail from 128.199.111.126 port 56620 ssh2 Jan 20 10:56:01 host sshd[4958]: Received disconnect from 128.199.111.126 port 56620:11: Bye Bye [preauth] Jan 20 10:56:01 host sshd[4958]: Disconnected from 128.199.111.126 port 56620 [preauth] Jan 20 10:56:09 host sshd[4666]: Connection closed by 112.28.209.66 port 51303 [preauth] Jan 20 10:56:31 host sshd[5161]: User root from 210.183.21.48 not allowed because not listed in AllowUsers Jan 20 10:56:31 host sshd[5161]: input_userauth_request: invalid user root [preauth] Jan 20 10:56:31 host unix_chkpwd[5164]: password check failed for user (root) Jan 20 10:56:31 host sshd[5161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.183.21.48 user=root Jan 20 10:56:31 host sshd[5161]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 10:56:34 host sshd[5161]: Failed password for invalid user root from 210.183.21.48 port 9291 ssh2 Jan 20 10:56:34 host sshd[5161]: Received disconnect from 210.183.21.48 port 9291:11: Bye Bye [preauth] Jan 20 10:56:34 host sshd[5161]: Disconnected from 210.183.21.48 port 9291 [preauth] Jan 20 10:56:51 host sshd[5232]: Invalid user Ubuntu from 213.87.101.176 port 43096 Jan 20 10:56:51 host sshd[5232]: input_userauth_request: invalid user Ubuntu [preauth] Jan 20 10:56:51 host sshd[5232]: pam_unix(sshd:auth): check pass; user unknown Jan 20 10:56:51 host sshd[5232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.87.101.176 Jan 20 10:56:53 host sshd[5232]: Failed password for invalid user Ubuntu from 213.87.101.176 port 43096 ssh2 Jan 20 10:57:01 host sshd[5288]: Invalid user ts3user from 159.223.80.140 port 59918 Jan 20 10:57:01 host sshd[5288]: input_userauth_request: invalid user ts3user [preauth] Jan 20 10:57:01 host sshd[5288]: pam_unix(sshd:auth): check pass; user unknown Jan 20 10:57:01 host sshd[5288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.223.80.140 Jan 20 10:57:03 host sshd[5288]: Failed password for invalid user ts3user from 159.223.80.140 port 59918 ssh2 Jan 20 10:57:03 host sshd[5288]: Received disconnect from 159.223.80.140 port 59918:11: Bye Bye [preauth] Jan 20 10:57:03 host sshd[5288]: Disconnected from 159.223.80.140 port 59918 [preauth] Jan 20 10:57:32 host sshd[5407]: Invalid user cuser from 125.163.160.229 port 34654 Jan 20 10:57:32 host sshd[5407]: input_userauth_request: invalid user cuser [preauth] Jan 20 10:57:32 host sshd[5407]: pam_unix(sshd:auth): check pass; user unknown Jan 20 10:57:32 host sshd[5407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.163.160.229 Jan 20 10:57:35 host sshd[5407]: Failed password for invalid user cuser from 125.163.160.229 port 34654 ssh2 Jan 20 10:57:35 host sshd[5407]: Received disconnect from 125.163.160.229 port 34654:11: Bye Bye [preauth] Jan 20 10:57:35 host sshd[5407]: Disconnected from 125.163.160.229 port 34654 [preauth] Jan 20 11:00:39 host sshd[5928]: Invalid user admin from 62.233.50.248 port 34129 Jan 20 11:00:39 host sshd[5928]: input_userauth_request: invalid user admin [preauth] Jan 20 11:00:39 host sshd[5928]: pam_unix(sshd:auth): check pass; user unknown Jan 20 11:00:39 host sshd[5928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 20 11:00:41 host sshd[5928]: Failed password for invalid user admin from 62.233.50.248 port 34129 ssh2 Jan 20 11:00:41 host sshd[5928]: Received disconnect from 62.233.50.248 port 34129:11: Client disconnecting normally [preauth] Jan 20 11:00:41 host sshd[5928]: Disconnected from 62.233.50.248 port 34129 [preauth] Jan 20 11:02:11 host sshd[6239]: Invalid user willie from 209.141.56.48 port 33124 Jan 20 11:02:11 host sshd[6239]: input_userauth_request: invalid user willie [preauth] Jan 20 11:02:11 host sshd[6239]: pam_unix(sshd:auth): check pass; user unknown Jan 20 11:02:11 host sshd[6239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 20 11:02:13 host sshd[6239]: Failed password for invalid user willie from 209.141.56.48 port 33124 ssh2 Jan 20 11:02:14 host sshd[6239]: Connection closed by 209.141.56.48 port 33124 [preauth] Jan 20 11:08:06 host sshd[7028]: Invalid user sys from 205.185.113.129 port 46872 Jan 20 11:08:06 host sshd[7028]: input_userauth_request: invalid user sys [preauth] Jan 20 11:08:06 host sshd[7028]: pam_unix(sshd:auth): check pass; user unknown Jan 20 11:08:06 host sshd[7028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 20 11:08:08 host sshd[7028]: Failed password for invalid user sys from 205.185.113.129 port 46872 ssh2 Jan 20 11:08:08 host sshd[7028]: Connection closed by 205.185.113.129 port 46872 [preauth] Jan 20 11:08:21 host sshd[7048]: Connection reset by 24.70.218.159 port 60916 [preauth] Jan 20 11:19:23 host sshd[8754]: Invalid user admin from 121.152.79.3 port 62556 Jan 20 11:19:23 host sshd[8754]: input_userauth_request: invalid user admin [preauth] Jan 20 11:19:23 host sshd[8754]: pam_unix(sshd:auth): check pass; user unknown Jan 20 11:19:23 host sshd[8754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.152.79.3 Jan 20 11:19:25 host sshd[8754]: Failed password for invalid user admin from 121.152.79.3 port 62556 ssh2 Jan 20 11:19:26 host sshd[8754]: Connection reset by 121.152.79.3 port 62556 [preauth] Jan 20 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=shalinijames user-3=wwwtestugo user-4=pmcresources user-5=wwwkmaorg user-6=disposeat user-7=remysagr user-8=woodpeck user-9=wwwkapin user-10=palco123 user-11=gifterman user-12=phmetals user-13=kottayamcalldriv user-14=wwwnexidigital user-15=mrsclean user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 11:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OxS0ASw7Xn6XdaKC.~ Jan 20 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OxS0ASw7Xn6XdaKC.~' Jan 20 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OxS0ASw7Xn6XdaKC.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 11:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 11:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 11:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 11:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 11:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 11:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 11:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 11:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 11:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 11:21:36 host sshd[9399]: Invalid user support from 175.202.151.115 port 63761 Jan 20 11:21:36 host sshd[9399]: input_userauth_request: invalid user support [preauth] Jan 20 11:21:36 host sshd[9399]: pam_unix(sshd:auth): check pass; user unknown Jan 20 11:21:36 host sshd[9399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.202.151.115 Jan 20 11:21:37 host sshd[9399]: Failed password for invalid user support from 175.202.151.115 port 63761 ssh2 Jan 20 11:21:38 host sshd[9399]: Connection reset by 175.202.151.115 port 63761 [preauth] Jan 20 11:28:20 host sshd[10459]: invalid public DH value: >= p-1 [preauth] Jan 20 11:28:20 host sshd[10459]: ssh_dispatch_run_fatal: Connection from 202.59.126.6 port 47198: incomplete message [preauth] Jan 20 11:44:50 host sshd[12814]: Invalid user admin from 114.34.253.61 port 33754 Jan 20 11:44:50 host sshd[12814]: input_userauth_request: invalid user admin [preauth] Jan 20 11:44:50 host sshd[12814]: pam_unix(sshd:auth): check pass; user unknown Jan 20 11:44:50 host sshd[12814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.253.61 Jan 20 11:44:52 host sshd[12814]: Failed password for invalid user admin from 114.34.253.61 port 33754 ssh2 Jan 20 11:44:54 host sshd[12814]: Failed password for invalid user admin from 114.34.253.61 port 33754 ssh2 Jan 20 11:44:54 host sshd[12814]: Connection reset by 114.34.253.61 port 33754 [preauth] Jan 20 11:54:56 host sshd[14195]: Bad protocol version identification 'MGLNDD_167.71.234.10_22' from 192.241.199.52 port 57776 Jan 20 12:03:21 host sshd[15464]: Invalid user super from 122.116.170.221 port 42004 Jan 20 12:03:21 host sshd[15464]: input_userauth_request: invalid user super [preauth] Jan 20 12:03:21 host sshd[15464]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:03:21 host sshd[15464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.170.221 Jan 20 12:03:23 host sshd[15464]: Failed password for invalid user super from 122.116.170.221 port 42004 ssh2 Jan 20 12:03:24 host sshd[15464]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:03:26 host sshd[15464]: Failed password for invalid user super from 122.116.170.221 port 42004 ssh2 Jan 20 12:03:28 host sshd[15464]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:03:30 host sshd[15464]: Failed password for invalid user super from 122.116.170.221 port 42004 ssh2 Jan 20 12:03:31 host sshd[15464]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:03:33 host sshd[15464]: Failed password for invalid user super from 122.116.170.221 port 42004 ssh2 Jan 20 12:03:34 host sshd[15464]: Failed password for invalid user super from 122.116.170.221 port 42004 ssh2 Jan 20 12:03:35 host sshd[15464]: Connection closed by 122.116.170.221 port 42004 [preauth] Jan 20 12:03:35 host sshd[15464]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.170.221 Jan 20 12:03:35 host sshd[15464]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 20 12:08:29 host sshd[16866]: Invalid user cloudadmin from 103.134.113.78 port 34332 Jan 20 12:08:29 host sshd[16866]: input_userauth_request: invalid user cloudadmin [preauth] Jan 20 12:08:29 host sshd[16866]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:08:29 host sshd[16866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.134.113.78 Jan 20 12:08:31 host sshd[16866]: Failed password for invalid user cloudadmin from 103.134.113.78 port 34332 ssh2 Jan 20 12:08:31 host sshd[16866]: Received disconnect from 103.134.113.78 port 34332:11: Bye Bye [preauth] Jan 20 12:08:31 host sshd[16866]: Disconnected from 103.134.113.78 port 34332 [preauth] Jan 20 12:09:35 host sshd[17189]: Invalid user cuser from 84.201.158.231 port 56324 Jan 20 12:09:35 host sshd[17189]: input_userauth_request: invalid user cuser [preauth] Jan 20 12:09:35 host sshd[17189]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:09:35 host sshd[17189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.158.231 Jan 20 12:09:37 host sshd[17189]: Failed password for invalid user cuser from 84.201.158.231 port 56324 ssh2 Jan 20 12:09:37 host sshd[17189]: Received disconnect from 84.201.158.231 port 56324:11: Bye Bye [preauth] Jan 20 12:09:37 host sshd[17189]: Disconnected from 84.201.158.231 port 56324 [preauth] Jan 20 12:10:33 host sshd[17406]: Invalid user gx from 194.110.203.109 port 33900 Jan 20 12:10:33 host sshd[17406]: input_userauth_request: invalid user gx [preauth] Jan 20 12:10:33 host sshd[17406]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:10:33 host sshd[17406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 12:10:34 host sshd[17406]: Failed password for invalid user gx from 194.110.203.109 port 33900 ssh2 Jan 20 12:10:38 host sshd[17406]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:10:40 host sshd[17406]: Failed password for invalid user gx from 194.110.203.109 port 33900 ssh2 Jan 20 12:10:43 host sshd[17406]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:10:45 host sshd[17406]: Failed password for invalid user gx from 194.110.203.109 port 33900 ssh2 Jan 20 12:10:46 host sshd[17465]: Invalid user apiadmin from 45.127.88.139 port 45616 Jan 20 12:10:46 host sshd[17465]: input_userauth_request: invalid user apiadmin [preauth] Jan 20 12:10:46 host sshd[17465]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:10:46 host sshd[17465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.127.88.139 Jan 20 12:10:48 host sshd[17465]: Failed password for invalid user apiadmin from 45.127.88.139 port 45616 ssh2 Jan 20 12:10:48 host sshd[17465]: Received disconnect from 45.127.88.139 port 45616:11: Bye Bye [preauth] Jan 20 12:10:48 host sshd[17465]: Disconnected from 45.127.88.139 port 45616 [preauth] Jan 20 12:10:49 host sshd[17406]: Connection closed by 194.110.203.109 port 33900 [preauth] Jan 20 12:10:49 host sshd[17406]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 12:12:10 host sshd[17854]: Invalid user vncuser from 51.89.88.86 port 43754 Jan 20 12:12:10 host sshd[17854]: input_userauth_request: invalid user vncuser [preauth] Jan 20 12:12:10 host sshd[17854]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:12:10 host sshd[17854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.88.86 Jan 20 12:12:12 host sshd[17854]: Failed password for invalid user vncuser from 51.89.88.86 port 43754 ssh2 Jan 20 12:12:12 host sshd[17854]: Received disconnect from 51.89.88.86 port 43754:11: Bye Bye [preauth] Jan 20 12:12:12 host sshd[17854]: Disconnected from 51.89.88.86 port 43754 [preauth] Jan 20 12:12:13 host sshd[17892]: Invalid user cpadmin from 144.48.8.118 port 60616 Jan 20 12:12:13 host sshd[17892]: input_userauth_request: invalid user cpadmin [preauth] Jan 20 12:12:13 host sshd[17892]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:12:13 host sshd[17892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.8.118 Jan 20 12:12:15 host sshd[17892]: Failed password for invalid user cpadmin from 144.48.8.118 port 60616 ssh2 Jan 20 12:12:15 host sshd[17892]: Received disconnect from 144.48.8.118 port 60616:11: Bye Bye [preauth] Jan 20 12:12:15 host sshd[17892]: Disconnected from 144.48.8.118 port 60616 [preauth] Jan 20 12:12:22 host sshd[17919]: Invalid user user from 96.67.59.65 port 59951 Jan 20 12:12:22 host sshd[17919]: input_userauth_request: invalid user user [preauth] Jan 20 12:12:22 host sshd[17919]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:12:22 host sshd[17919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.67.59.65 Jan 20 12:12:25 host sshd[17919]: Failed password for invalid user user from 96.67.59.65 port 59951 ssh2 Jan 20 12:12:25 host sshd[17919]: Received disconnect from 96.67.59.65 port 59951:11: Bye Bye [preauth] Jan 20 12:12:25 host sshd[17919]: Disconnected from 96.67.59.65 port 59951 [preauth] Jan 20 12:12:40 host sshd[17998]: Invalid user anaconda from 134.209.159.210 port 52082 Jan 20 12:12:40 host sshd[17998]: input_userauth_request: invalid user anaconda [preauth] Jan 20 12:12:40 host sshd[17998]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:12:40 host sshd[17998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.159.210 Jan 20 12:12:42 host sshd[17998]: Failed password for invalid user anaconda from 134.209.159.210 port 52082 ssh2 Jan 20 12:12:42 host sshd[17998]: Received disconnect from 134.209.159.210 port 52082:11: Bye Bye [preauth] Jan 20 12:12:42 host sshd[17998]: Disconnected from 134.209.159.210 port 52082 [preauth] Jan 20 12:12:44 host sshd[18005]: Invalid user user1 from 192.241.154.229 port 52418 Jan 20 12:12:44 host sshd[18005]: input_userauth_request: invalid user user1 [preauth] Jan 20 12:12:44 host sshd[18005]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:12:44 host sshd[18005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.154.229 Jan 20 12:12:46 host sshd[18005]: Failed password for invalid user user1 from 192.241.154.229 port 52418 ssh2 Jan 20 12:12:46 host sshd[18005]: Received disconnect from 192.241.154.229 port 52418:11: Bye Bye [preauth] Jan 20 12:12:46 host sshd[18005]: Disconnected from 192.241.154.229 port 52418 [preauth] Jan 20 12:13:07 host sshd[18082]: Invalid user willie from 209.141.56.48 port 36856 Jan 20 12:13:07 host sshd[18082]: input_userauth_request: invalid user willie [preauth] Jan 20 12:13:07 host sshd[18082]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:13:07 host sshd[18082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 20 12:13:08 host sshd[18082]: Failed password for invalid user willie from 209.141.56.48 port 36856 ssh2 Jan 20 12:13:09 host sshd[18082]: Connection closed by 209.141.56.48 port 36856 [preauth] Jan 20 12:14:23 host sshd[18399]: Invalid user ubuntu from 119.92.56.77 port 33042 Jan 20 12:14:23 host sshd[18399]: input_userauth_request: invalid user ubuntu [preauth] Jan 20 12:14:23 host sshd[18399]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:14:23 host sshd[18399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.92.56.77 Jan 20 12:14:25 host sshd[18399]: Failed password for invalid user ubuntu from 119.92.56.77 port 33042 ssh2 Jan 20 12:14:25 host sshd[18399]: Received disconnect from 119.92.56.77 port 33042:11: Bye Bye [preauth] Jan 20 12:14:25 host sshd[18399]: Disconnected from 119.92.56.77 port 33042 [preauth] Jan 20 12:15:12 host sshd[18559]: Invalid user test from 45.127.88.139 port 36098 Jan 20 12:15:12 host sshd[18559]: input_userauth_request: invalid user test [preauth] Jan 20 12:15:12 host sshd[18559]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:15:12 host sshd[18559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.127.88.139 Jan 20 12:15:13 host sshd[18559]: Failed password for invalid user test from 45.127.88.139 port 36098 ssh2 Jan 20 12:15:14 host sshd[18559]: Received disconnect from 45.127.88.139 port 36098:11: Bye Bye [preauth] Jan 20 12:15:14 host sshd[18559]: Disconnected from 45.127.88.139 port 36098 [preauth] Jan 20 12:15:15 host sshd[18568]: Invalid user adminuser from 103.134.113.78 port 37094 Jan 20 12:15:15 host sshd[18568]: input_userauth_request: invalid user adminuser [preauth] Jan 20 12:15:15 host sshd[18568]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:15:15 host sshd[18568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.134.113.78 Jan 20 12:15:18 host sshd[18568]: Failed password for invalid user adminuser from 103.134.113.78 port 37094 ssh2 Jan 20 12:15:18 host sshd[18568]: Received disconnect from 103.134.113.78 port 37094:11: Bye Bye [preauth] Jan 20 12:15:18 host sshd[18568]: Disconnected from 103.134.113.78 port 37094 [preauth] Jan 20 12:15:26 host sshd[18587]: Invalid user catadmin from 84.201.158.231 port 34522 Jan 20 12:15:26 host sshd[18587]: input_userauth_request: invalid user catadmin [preauth] Jan 20 12:15:26 host sshd[18587]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:15:26 host sshd[18587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.158.231 Jan 20 12:15:28 host sshd[18587]: Failed password for invalid user catadmin from 84.201.158.231 port 34522 ssh2 Jan 20 12:15:28 host sshd[18587]: Received disconnect from 84.201.158.231 port 34522:11: Bye Bye [preauth] Jan 20 12:15:28 host sshd[18587]: Disconnected from 84.201.158.231 port 34522 [preauth] Jan 20 12:15:58 host sshd[18691]: Invalid user bitrix from 144.48.8.118 port 44216 Jan 20 12:15:58 host sshd[18691]: input_userauth_request: invalid user bitrix [preauth] Jan 20 12:15:58 host sshd[18691]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:15:58 host sshd[18691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.8.118 Jan 20 12:16:00 host sshd[18691]: Failed password for invalid user bitrix from 144.48.8.118 port 44216 ssh2 Jan 20 12:16:00 host sshd[18691]: Received disconnect from 144.48.8.118 port 44216:11: Bye Bye [preauth] Jan 20 12:16:00 host sshd[18691]: Disconnected from 144.48.8.118 port 44216 [preauth] Jan 20 12:16:06 host sshd[18719]: Invalid user vnc from 45.152.67.253 port 52586 Jan 20 12:16:06 host sshd[18719]: input_userauth_request: invalid user vnc [preauth] Jan 20 12:16:06 host sshd[18719]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:16:06 host sshd[18719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.152.67.253 Jan 20 12:16:08 host sshd[18719]: Failed password for invalid user vnc from 45.152.67.253 port 52586 ssh2 Jan 20 12:16:08 host sshd[18719]: Received disconnect from 45.152.67.253 port 52586:11: Bye Bye [preauth] Jan 20 12:16:08 host sshd[18719]: Disconnected from 45.152.67.253 port 52586 [preauth] Jan 20 12:16:20 host sshd[18752]: Did not receive identification string from 58.72.18.130 port 16067 Jan 20 12:16:25 host sshd[18763]: Invalid user postgres from 45.127.88.139 port 44400 Jan 20 12:16:25 host sshd[18763]: input_userauth_request: invalid user postgres [preauth] Jan 20 12:16:25 host sshd[18763]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:16:25 host sshd[18763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.127.88.139 Jan 20 12:16:28 host sshd[18763]: Failed password for invalid user postgres from 45.127.88.139 port 44400 ssh2 Jan 20 12:16:36 host sshd[18839]: Invalid user vpntest from 84.201.158.231 port 59222 Jan 20 12:16:36 host sshd[18839]: input_userauth_request: invalid user vpntest [preauth] Jan 20 12:16:36 host sshd[18839]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:16:36 host sshd[18839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.158.231 Jan 20 12:16:38 host sshd[18839]: Failed password for invalid user vpntest from 84.201.158.231 port 59222 ssh2 Jan 20 12:16:39 host sshd[18839]: Received disconnect from 84.201.158.231 port 59222:11: Bye Bye [preauth] Jan 20 12:16:39 host sshd[18839]: Disconnected from 84.201.158.231 port 59222 [preauth] Jan 20 12:16:57 host sshd[18926]: Invalid user testuser from 192.241.154.229 port 52178 Jan 20 12:16:57 host sshd[18926]: input_userauth_request: invalid user testuser [preauth] Jan 20 12:16:57 host sshd[18926]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:16:57 host sshd[18926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.154.229 Jan 20 12:16:59 host sshd[18926]: Failed password for invalid user testuser from 192.241.154.229 port 52178 ssh2 Jan 20 12:17:00 host sshd[18926]: Received disconnect from 192.241.154.229 port 52178:11: Bye Bye [preauth] Jan 20 12:17:00 host sshd[18926]: Disconnected from 192.241.154.229 port 52178 [preauth] Jan 20 12:17:02 host sshd[18945]: Invalid user internet from 51.89.88.86 port 38340 Jan 20 12:17:02 host sshd[18945]: input_userauth_request: invalid user internet [preauth] Jan 20 12:17:02 host sshd[18945]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:17:02 host sshd[18945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.88.86 Jan 20 12:17:04 host sshd[18945]: Failed password for invalid user internet from 51.89.88.86 port 38340 ssh2 Jan 20 12:17:04 host sshd[18945]: Received disconnect from 51.89.88.86 port 38340:11: Bye Bye [preauth] Jan 20 12:17:04 host sshd[18945]: Disconnected from 51.89.88.86 port 38340 [preauth] Jan 20 12:17:05 host sshd[18962]: Invalid user esuser from 144.48.8.118 port 38780 Jan 20 12:17:05 host sshd[18962]: input_userauth_request: invalid user esuser [preauth] Jan 20 12:17:05 host sshd[18962]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:17:05 host sshd[18962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.48.8.118 Jan 20 12:17:07 host sshd[18962]: Failed password for invalid user esuser from 144.48.8.118 port 38780 ssh2 Jan 20 12:17:09 host sshd[19002]: Invalid user weblogic from 103.134.113.78 port 36112 Jan 20 12:17:09 host sshd[19002]: input_userauth_request: invalid user weblogic [preauth] Jan 20 12:17:09 host sshd[19002]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:17:09 host sshd[19002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.134.113.78 Jan 20 12:17:11 host sshd[19002]: Failed password for invalid user weblogic from 103.134.113.78 port 36112 ssh2 Jan 20 12:17:11 host sshd[19002]: Received disconnect from 103.134.113.78 port 36112:11: Bye Bye [preauth] Jan 20 12:17:11 host sshd[19002]: Disconnected from 103.134.113.78 port 36112 [preauth] Jan 20 12:17:17 host sshd[19071]: Invalid user internet from 119.92.56.77 port 63568 Jan 20 12:17:17 host sshd[19071]: input_userauth_request: invalid user internet [preauth] Jan 20 12:17:17 host sshd[19071]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:17:17 host sshd[19071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.92.56.77 Jan 20 12:17:17 host sshd[19078]: Invalid user gitlab-psql from 134.209.159.210 port 43982 Jan 20 12:17:17 host sshd[19078]: input_userauth_request: invalid user gitlab-psql [preauth] Jan 20 12:17:17 host sshd[19078]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:17:17 host sshd[19078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.159.210 Jan 20 12:17:18 host sshd[19071]: Failed password for invalid user internet from 119.92.56.77 port 63568 ssh2 Jan 20 12:17:19 host sshd[19071]: Received disconnect from 119.92.56.77 port 63568:11: Bye Bye [preauth] Jan 20 12:17:19 host sshd[19071]: Disconnected from 119.92.56.77 port 63568 [preauth] Jan 20 12:17:19 host sshd[19078]: Failed password for invalid user gitlab-psql from 134.209.159.210 port 43982 ssh2 Jan 20 12:17:19 host sshd[19078]: Received disconnect from 134.209.159.210 port 43982:11: Bye Bye [preauth] Jan 20 12:17:19 host sshd[19078]: Disconnected from 134.209.159.210 port 43982 [preauth] Jan 20 12:18:05 host sshd[19193]: Invalid user admin2 from 192.241.154.229 port 56944 Jan 20 12:18:05 host sshd[19193]: input_userauth_request: invalid user admin2 [preauth] Jan 20 12:18:05 host sshd[19193]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:18:05 host sshd[19193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.154.229 Jan 20 12:18:07 host sshd[19193]: Failed password for invalid user admin2 from 192.241.154.229 port 56944 ssh2 Jan 20 12:18:11 host sshd[19237]: Invalid user host from 45.152.67.253 port 56538 Jan 20 12:18:11 host sshd[19237]: input_userauth_request: invalid user host [preauth] Jan 20 12:18:11 host sshd[19237]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:18:11 host sshd[19237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.152.67.253 Jan 20 12:18:12 host sshd[19237]: Failed password for invalid user host from 45.152.67.253 port 56538 ssh2 Jan 20 12:18:12 host sshd[19237]: Received disconnect from 45.152.67.253 port 56538:11: Bye Bye [preauth] Jan 20 12:18:12 host sshd[19237]: Disconnected from 45.152.67.253 port 56538 [preauth] Jan 20 12:18:15 host sshd[19243]: User root from 134.17.24.54 not allowed because not listed in AllowUsers Jan 20 12:18:15 host sshd[19243]: input_userauth_request: invalid user root [preauth] Jan 20 12:18:15 host unix_chkpwd[19254]: password check failed for user (root) Jan 20 12:18:15 host sshd[19243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.24.54 user=root Jan 20 12:18:15 host sshd[19243]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 12:18:16 host sshd[19251]: Invalid user redis from 96.67.59.65 port 56475 Jan 20 12:18:16 host sshd[19251]: input_userauth_request: invalid user redis [preauth] Jan 20 12:18:16 host sshd[19251]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:18:16 host sshd[19251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.67.59.65 Jan 20 12:18:18 host sshd[19243]: Failed password for invalid user root from 134.17.24.54 port 45590 ssh2 Jan 20 12:18:18 host sshd[19251]: Failed password for invalid user redis from 96.67.59.65 port 56475 ssh2 Jan 20 12:18:18 host unix_chkpwd[19263]: password check failed for user (root) Jan 20 12:18:18 host sshd[19243]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 12:18:18 host sshd[19251]: Received disconnect from 96.67.59.65 port 56475:11: Bye Bye [preauth] Jan 20 12:18:18 host sshd[19251]: Disconnected from 96.67.59.65 port 56475 [preauth] Jan 20 12:18:20 host sshd[19243]: Failed password for invalid user root from 134.17.24.54 port 45590 ssh2 Jan 20 12:18:22 host unix_chkpwd[19268]: password check failed for user (root) Jan 20 12:18:22 host sshd[19243]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 12:18:24 host sshd[19243]: Failed password for invalid user root from 134.17.24.54 port 45590 ssh2 Jan 20 12:18:24 host unix_chkpwd[19279]: password check failed for user (root) Jan 20 12:18:24 host sshd[19243]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 12:18:27 host sshd[19243]: Failed password for invalid user root from 134.17.24.54 port 45590 ssh2 Jan 20 12:18:39 host sshd[19453]: Invalid user developer from 134.209.159.210 port 42084 Jan 20 12:18:39 host sshd[19453]: input_userauth_request: invalid user developer [preauth] Jan 20 12:18:39 host sshd[19453]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:18:39 host sshd[19453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.159.210 Jan 20 12:18:40 host sshd[19455]: Invalid user mapadmin from 51.89.88.86 port 37590 Jan 20 12:18:40 host sshd[19455]: input_userauth_request: invalid user mapadmin [preauth] Jan 20 12:18:40 host sshd[19455]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:18:40 host sshd[19455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.88.86 Jan 20 12:18:42 host sshd[19453]: Failed password for invalid user developer from 134.209.159.210 port 42084 ssh2 Jan 20 12:18:42 host sshd[19455]: Failed password for invalid user mapadmin from 51.89.88.86 port 37590 ssh2 Jan 20 12:19:04 host sshd[19559]: Invalid user otrs from 119.92.56.77 port 32580 Jan 20 12:19:04 host sshd[19559]: input_userauth_request: invalid user otrs [preauth] Jan 20 12:19:04 host sshd[19559]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:19:04 host sshd[19559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.92.56.77 Jan 20 12:19:06 host sshd[19559]: Failed password for invalid user otrs from 119.92.56.77 port 32580 ssh2 Jan 20 12:19:06 host sshd[19559]: Received disconnect from 119.92.56.77 port 32580:11: Bye Bye [preauth] Jan 20 12:19:06 host sshd[19559]: Disconnected from 119.92.56.77 port 32580 [preauth] Jan 20 12:19:21 host sshd[19631]: Invalid user admin from 1.34.4.10 port 51189 Jan 20 12:19:21 host sshd[19631]: input_userauth_request: invalid user admin [preauth] Jan 20 12:19:21 host sshd[19631]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:19:21 host sshd[19631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.4.10 Jan 20 12:19:23 host sshd[19631]: Failed password for invalid user admin from 1.34.4.10 port 51189 ssh2 Jan 20 12:19:23 host sshd[19631]: Failed password for invalid user admin from 1.34.4.10 port 51189 ssh2 Jan 20 12:19:24 host sshd[19631]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:19:26 host sshd[19631]: Failed password for invalid user admin from 1.34.4.10 port 51189 ssh2 Jan 20 12:19:26 host sshd[19631]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:19:28 host sshd[19631]: Failed password for invalid user admin from 1.34.4.10 port 51189 ssh2 Jan 20 12:19:29 host sshd[19631]: Connection reset by 1.34.4.10 port 51189 [preauth] Jan 20 12:19:29 host sshd[19631]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.4.10 Jan 20 12:19:34 host sshd[19698]: Invalid user info from 96.67.59.65 port 54671 Jan 20 12:19:34 host sshd[19698]: input_userauth_request: invalid user info [preauth] Jan 20 12:19:34 host sshd[19698]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:19:34 host sshd[19698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.67.59.65 Jan 20 12:19:34 host sshd[19703]: Invalid user linuxacademy from 45.152.67.253 port 55852 Jan 20 12:19:34 host sshd[19703]: input_userauth_request: invalid user linuxacademy [preauth] Jan 20 12:19:34 host sshd[19703]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:19:34 host sshd[19703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.152.67.253 Jan 20 12:19:35 host sshd[19698]: Failed password for invalid user info from 96.67.59.65 port 54671 ssh2 Jan 20 12:19:35 host sshd[19698]: Received disconnect from 96.67.59.65 port 54671:11: Bye Bye [preauth] Jan 20 12:19:35 host sshd[19698]: Disconnected from 96.67.59.65 port 54671 [preauth] Jan 20 12:19:36 host sshd[19703]: Failed password for invalid user linuxacademy from 45.152.67.253 port 55852 ssh2 Jan 20 12:19:36 host sshd[19703]: Received disconnect from 45.152.67.253 port 55852:11: Bye Bye [preauth] Jan 20 12:19:36 host sshd[19703]: Disconnected from 45.152.67.253 port 55852 [preauth] Jan 20 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=kottayamcalldriv user-4=phmetals user-5=gifterman user-6=palco123 user-7=wwwletsstalkfood user-8=straightcurve user-9=wwwevmhonda user-10=bonifacegroup user-11=pmcresources user-12=wwwtestugo user-13=shalinijames user-14=vfmassets user-15=woodpeck user-16=wwwkapin user-17=remysagr user-18=disposeat user-19=wwwkmaorg user-20=ugotscom user-21=wwwrmswll user-22=wwwresourcehunte user-23=keralaholi user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 12:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-pHDcgmcHAPKL4ZJk.~ Jan 20 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-pHDcgmcHAPKL4ZJk.~' Jan 20 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-pHDcgmcHAPKL4ZJk.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 12:21:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 12:21:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 12:21:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 12:21:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 12:21:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 12:21:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 12:21:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:21:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 12:21:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 12:21:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 12:25:08 host sshd[20828]: Invalid user super from 151.73.220.142 port 45463 Jan 20 12:25:08 host sshd[20828]: input_userauth_request: invalid user super [preauth] Jan 20 12:25:08 host sshd[20828]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:25:08 host sshd[20828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.73.220.142 Jan 20 12:25:11 host sshd[20828]: Failed password for invalid user super from 151.73.220.142 port 45463 ssh2 Jan 20 12:25:15 host sshd[20828]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:25:17 host sshd[20828]: Failed password for invalid user super from 151.73.220.142 port 45463 ssh2 Jan 20 12:25:22 host sshd[20828]: Connection reset by 151.73.220.142 port 45463 [preauth] Jan 20 12:25:22 host sshd[20828]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.73.220.142 Jan 20 12:28:27 host sshd[21246]: Connection closed by 172.105.128.11 port 63426 [preauth] Jan 20 12:28:30 host sshd[21255]: Connection closed by 172.105.128.11 port 63442 [preauth] Jan 20 12:28:33 host sshd[21280]: Connection closed by 172.105.128.11 port 63458 [preauth] Jan 20 12:39:12 host sshd[22716]: Invalid user willie from 209.141.56.48 port 55752 Jan 20 12:39:12 host sshd[22716]: input_userauth_request: invalid user willie [preauth] Jan 20 12:39:12 host sshd[22716]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:39:12 host sshd[22716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 20 12:39:14 host sshd[22716]: Failed password for invalid user willie from 209.141.56.48 port 55752 ssh2 Jan 20 12:39:14 host sshd[22716]: Connection closed by 209.141.56.48 port 55752 [preauth] Jan 20 12:40:07 host sshd[22842]: Invalid user user from 195.226.194.242 port 48236 Jan 20 12:40:07 host sshd[22842]: input_userauth_request: invalid user user [preauth] Jan 20 12:40:07 host sshd[22842]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:40:07 host sshd[22842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 20 12:40:09 host sshd[22842]: Failed password for invalid user user from 195.226.194.242 port 48236 ssh2 Jan 20 12:40:09 host sshd[22842]: Received disconnect from 195.226.194.242 port 48236:11: Bye Bye [preauth] Jan 20 12:40:09 host sshd[22842]: Disconnected from 195.226.194.242 port 48236 [preauth] Jan 20 12:40:50 host sshd[23030]: Invalid user support from 223.72.43.35 port 17490 Jan 20 12:40:50 host sshd[23030]: input_userauth_request: invalid user support [preauth] Jan 20 12:40:50 host sshd[23030]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:40:50 host sshd[23030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.72.43.35 Jan 20 12:40:52 host sshd[23030]: Failed password for invalid user support from 223.72.43.35 port 17490 ssh2 Jan 20 12:40:52 host sshd[23030]: Received disconnect from 223.72.43.35 port 17490:11: Bye Bye [preauth] Jan 20 12:40:52 host sshd[23030]: Disconnected from 223.72.43.35 port 17490 [preauth] Jan 20 12:41:29 host sshd[23094]: Invalid user zyfwp from 114.33.122.156 port 57338 Jan 20 12:41:29 host sshd[23094]: input_userauth_request: invalid user zyfwp [preauth] Jan 20 12:41:29 host sshd[23094]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:41:29 host sshd[23094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.122.156 Jan 20 12:41:30 host sshd[23118]: Invalid user willie from 209.141.56.48 port 59382 Jan 20 12:41:30 host sshd[23118]: input_userauth_request: invalid user willie [preauth] Jan 20 12:41:30 host sshd[23118]: pam_unix(sshd:auth): check pass; user unknown Jan 20 12:41:30 host sshd[23118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 20 12:41:31 host sshd[23094]: Failed password for invalid user zyfwp from 114.33.122.156 port 57338 ssh2 Jan 20 12:41:31 host sshd[23094]: Connection reset by 114.33.122.156 port 57338 [preauth] Jan 20 12:41:32 host sshd[23118]: Failed password for invalid user willie from 209.141.56.48 port 59382 ssh2 Jan 20 12:41:32 host sshd[23118]: Connection closed by 209.141.56.48 port 59382 [preauth] Jan 20 12:55:05 host sshd[25153]: User root from 125.228.161.61 not allowed because not listed in AllowUsers Jan 20 12:55:05 host sshd[25153]: input_userauth_request: invalid user root [preauth] Jan 20 12:55:05 host unix_chkpwd[25159]: password check failed for user (root) Jan 20 12:55:05 host sshd[25153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.161.61 user=root Jan 20 12:55:05 host sshd[25153]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 12:55:07 host sshd[25153]: Failed password for invalid user root from 125.228.161.61 port 43127 ssh2 Jan 20 12:55:08 host unix_chkpwd[25163]: password check failed for user (root) Jan 20 12:55:08 host sshd[25153]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 12:55:10 host sshd[25153]: Failed password for invalid user root from 125.228.161.61 port 43127 ssh2 Jan 20 12:55:10 host sshd[25153]: Connection reset by 125.228.161.61 port 43127 [preauth] Jan 20 12:55:10 host sshd[25153]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.161.61 user=root Jan 20 13:00:49 host sshd[26046]: Invalid user myappuser from 189.182.191.236 port 31604 Jan 20 13:00:49 host sshd[26046]: input_userauth_request: invalid user myappuser [preauth] Jan 20 13:00:49 host sshd[26046]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:00:49 host sshd[26046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.182.191.236 Jan 20 13:00:51 host sshd[26046]: Failed password for invalid user myappuser from 189.182.191.236 port 31604 ssh2 Jan 20 13:00:51 host sshd[26046]: Received disconnect from 189.182.191.236 port 31604:11: Bye Bye [preauth] Jan 20 13:00:51 host sshd[26046]: Disconnected from 189.182.191.236 port 31604 [preauth] Jan 20 13:02:18 host sshd[26208]: Invalid user albert from 134.209.153.189 port 44192 Jan 20 13:02:18 host sshd[26208]: input_userauth_request: invalid user albert [preauth] Jan 20 13:02:18 host sshd[26208]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:02:18 host sshd[26208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.153.189 Jan 20 13:02:20 host sshd[26208]: Failed password for invalid user albert from 134.209.153.189 port 44192 ssh2 Jan 20 13:02:20 host sshd[26208]: Received disconnect from 134.209.153.189 port 44192:11: Bye Bye [preauth] Jan 20 13:02:20 host sshd[26208]: Disconnected from 134.209.153.189 port 44192 [preauth] Jan 20 13:02:38 host sshd[26256]: Invalid user ftpuser from 223.72.43.35 port 17853 Jan 20 13:02:38 host sshd[26256]: input_userauth_request: invalid user ftpuser [preauth] Jan 20 13:02:38 host sshd[26256]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:02:38 host sshd[26256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.72.43.35 Jan 20 13:02:40 host sshd[26256]: Failed password for invalid user ftpuser from 223.72.43.35 port 17853 ssh2 Jan 20 13:02:40 host sshd[26256]: Received disconnect from 223.72.43.35 port 17853:11: Bye Bye [preauth] Jan 20 13:02:40 host sshd[26256]: Disconnected from 223.72.43.35 port 17853 [preauth] Jan 20 13:02:50 host sshd[26280]: Invalid user postgres from 128.199.138.145 port 60608 Jan 20 13:02:50 host sshd[26280]: input_userauth_request: invalid user postgres [preauth] Jan 20 13:02:50 host sshd[26280]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:02:50 host sshd[26280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.138.145 Jan 20 13:02:53 host sshd[26280]: Failed password for invalid user postgres from 128.199.138.145 port 60608 ssh2 Jan 20 13:02:53 host sshd[26280]: Received disconnect from 128.199.138.145 port 60608:11: Bye Bye [preauth] Jan 20 13:02:53 host sshd[26280]: Disconnected from 128.199.138.145 port 60608 [preauth] Jan 20 13:02:56 host sshd[26288]: Invalid user git from 189.182.191.236 port 41490 Jan 20 13:02:56 host sshd[26288]: input_userauth_request: invalid user git [preauth] Jan 20 13:02:56 host sshd[26288]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:02:56 host sshd[26288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.182.191.236 Jan 20 13:02:58 host sshd[26288]: Failed password for invalid user git from 189.182.191.236 port 41490 ssh2 Jan 20 13:02:59 host sshd[26288]: Received disconnect from 189.182.191.236 port 41490:11: Bye Bye [preauth] Jan 20 13:02:59 host sshd[26288]: Disconnected from 189.182.191.236 port 41490 [preauth] Jan 20 13:03:37 host sshd[26369]: Invalid user adminuser from 189.182.191.236 port 48398 Jan 20 13:03:37 host sshd[26369]: input_userauth_request: invalid user adminuser [preauth] Jan 20 13:03:37 host sshd[26369]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:03:37 host sshd[26369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.182.191.236 Jan 20 13:03:39 host sshd[26369]: Failed password for invalid user adminuser from 189.182.191.236 port 48398 ssh2 Jan 20 13:05:31 host sshd[26759]: Invalid user albert from 143.198.58.89 port 42408 Jan 20 13:05:31 host sshd[26759]: input_userauth_request: invalid user albert [preauth] Jan 20 13:05:31 host sshd[26759]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:05:31 host sshd[26759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.58.89 Jan 20 13:05:32 host sshd[26759]: Failed password for invalid user albert from 143.198.58.89 port 42408 ssh2 Jan 20 13:05:33 host sshd[26759]: Received disconnect from 143.198.58.89 port 42408:11: Bye Bye [preauth] Jan 20 13:05:33 host sshd[26759]: Disconnected from 143.198.58.89 port 42408 [preauth] Jan 20 13:05:47 host sshd[26797]: Invalid user soksuser from 128.199.68.220 port 48222 Jan 20 13:05:47 host sshd[26797]: input_userauth_request: invalid user soksuser [preauth] Jan 20 13:05:47 host sshd[26797]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:05:47 host sshd[26797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.68.220 Jan 20 13:05:49 host sshd[26797]: Failed password for invalid user soksuser from 128.199.68.220 port 48222 ssh2 Jan 20 13:05:49 host sshd[26797]: Received disconnect from 128.199.68.220 port 48222:11: Bye Bye [preauth] Jan 20 13:05:49 host sshd[26797]: Disconnected from 128.199.68.220 port 48222 [preauth] Jan 20 13:06:48 host sshd[26893]: Invalid user adminweb from 134.209.153.189 port 58102 Jan 20 13:06:48 host sshd[26893]: input_userauth_request: invalid user adminweb [preauth] Jan 20 13:06:48 host sshd[26893]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:06:48 host sshd[26893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.153.189 Jan 20 13:06:51 host sshd[26893]: Failed password for invalid user adminweb from 134.209.153.189 port 58102 ssh2 Jan 20 13:06:51 host sshd[26893]: Received disconnect from 134.209.153.189 port 58102:11: Bye Bye [preauth] Jan 20 13:06:51 host sshd[26893]: Disconnected from 134.209.153.189 port 58102 [preauth] Jan 20 13:07:54 host sshd[27003]: Invalid user ubuntu from 128.199.68.220 port 50772 Jan 20 13:07:54 host sshd[27003]: input_userauth_request: invalid user ubuntu [preauth] Jan 20 13:07:54 host sshd[27003]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:07:54 host sshd[27003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.68.220 Jan 20 13:07:56 host sshd[27003]: Failed password for invalid user ubuntu from 128.199.68.220 port 50772 ssh2 Jan 20 13:07:56 host sshd[27003]: Received disconnect from 128.199.68.220 port 50772:11: Bye Bye [preauth] Jan 20 13:07:56 host sshd[27003]: Disconnected from 128.199.68.220 port 50772 [preauth] Jan 20 13:08:07 host sshd[27031]: Invalid user test from 134.209.153.189 port 53114 Jan 20 13:08:07 host sshd[27031]: input_userauth_request: invalid user test [preauth] Jan 20 13:08:07 host sshd[27031]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:08:07 host sshd[27031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.153.189 Jan 20 13:08:09 host sshd[27031]: Failed password for invalid user test from 134.209.153.189 port 53114 ssh2 Jan 20 13:08:13 host sshd[27075]: Invalid user devops from 128.199.138.145 port 53372 Jan 20 13:08:13 host sshd[27075]: input_userauth_request: invalid user devops [preauth] Jan 20 13:08:13 host sshd[27075]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:08:13 host sshd[27075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.138.145 Jan 20 13:08:16 host sshd[27075]: Failed password for invalid user devops from 128.199.138.145 port 53372 ssh2 Jan 20 13:08:16 host sshd[27075]: Received disconnect from 128.199.138.145 port 53372:11: Bye Bye [preauth] Jan 20 13:08:16 host sshd[27075]: Disconnected from 128.199.138.145 port 53372 [preauth] Jan 20 13:08:34 host sshd[27120]: Invalid user catadmin from 143.198.58.89 port 60934 Jan 20 13:08:34 host sshd[27120]: input_userauth_request: invalid user catadmin [preauth] Jan 20 13:08:34 host sshd[27120]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:08:34 host sshd[27120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.58.89 Jan 20 13:08:36 host sshd[27120]: Failed password for invalid user catadmin from 143.198.58.89 port 60934 ssh2 Jan 20 13:08:36 host sshd[27120]: Received disconnect from 143.198.58.89 port 60934:11: Bye Bye [preauth] Jan 20 13:08:36 host sshd[27120]: Disconnected from 143.198.58.89 port 60934 [preauth] Jan 20 13:09:12 host sshd[27200]: Invalid user tsuser from 128.199.68.220 port 48120 Jan 20 13:09:12 host sshd[27200]: input_userauth_request: invalid user tsuser [preauth] Jan 20 13:09:12 host sshd[27200]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:09:12 host sshd[27200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.68.220 Jan 20 13:09:15 host sshd[27200]: Failed password for invalid user tsuser from 128.199.68.220 port 48120 ssh2 Jan 20 13:09:28 host sshd[27270]: Invalid user qauser from 128.199.138.145 port 47452 Jan 20 13:09:28 host sshd[27270]: input_userauth_request: invalid user qauser [preauth] Jan 20 13:09:28 host sshd[27270]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:09:28 host sshd[27270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.138.145 Jan 20 13:09:30 host sshd[27270]: Failed password for invalid user qauser from 128.199.138.145 port 47452 ssh2 Jan 20 13:09:30 host sshd[27270]: Received disconnect from 128.199.138.145 port 47452:11: Bye Bye [preauth] Jan 20 13:09:30 host sshd[27270]: Disconnected from 128.199.138.145 port 47452 [preauth] Jan 20 13:09:36 host sshd[27316]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 20 13:09:36 host sshd[27316]: input_userauth_request: invalid user root [preauth] Jan 20 13:09:37 host unix_chkpwd[27323]: password check failed for user (root) Jan 20 13:09:37 host sshd[27316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 20 13:09:37 host sshd[27316]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 13:09:37 host sshd[27320]: Invalid user nodeuser from 143.198.58.89 port 38606 Jan 20 13:09:37 host sshd[27320]: input_userauth_request: invalid user nodeuser [preauth] Jan 20 13:09:37 host sshd[27320]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:09:37 host sshd[27320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.58.89 Jan 20 13:09:38 host sshd[27316]: Failed password for invalid user root from 195.226.194.242 port 27802 ssh2 Jan 20 13:09:38 host sshd[27316]: Received disconnect from 195.226.194.242 port 27802:11: Bye Bye [preauth] Jan 20 13:09:38 host sshd[27316]: Disconnected from 195.226.194.242 port 27802 [preauth] Jan 20 13:09:39 host sshd[27320]: Failed password for invalid user nodeuser from 143.198.58.89 port 38606 ssh2 Jan 20 13:16:28 host sshd[28580]: Connection reset by 130.25.138.153 port 51695 [preauth] Jan 20 13:17:20 host sshd[28709]: Connection reset by 221.144.48.195 port 61985 [preauth] Jan 20 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=bonifacegroup user-4=wwwevmhonda user-5=wwwnexidigital user-6=mrsclean user-7=palco123 user-8=gifterman user-9=phmetals user-10=kottayamcalldriv user-11=wwwkapin user-12=woodpeck user-13=wwwkmaorg user-14=disposeat user-15=remysagr user-16=pmcresources user-17=vfmassets user-18=shalinijames user-19=wwwtestugo user-20=wwwpmcresource user-21=wwwresourcehunte user-22=keralaholi user-23=wwwrmswll user-24=ugotscom user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=a2zgroup user-30=dartsimp feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 13:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zQ1Jquewqc9dUkIg.~ Jan 20 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zQ1Jquewqc9dUkIg.~' Jan 20 13:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-zQ1Jquewqc9dUkIg.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 13:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 13:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 13:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 13:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 13:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 13:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 13:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 13:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 13:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 13:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 13:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 13:25:05 host sshd[30066]: Invalid user pi from 223.72.43.35 port 17765 Jan 20 13:25:05 host sshd[30066]: input_userauth_request: invalid user pi [preauth] Jan 20 13:25:06 host sshd[30066]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:25:06 host sshd[30066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.72.43.35 Jan 20 13:25:07 host sshd[30066]: Failed password for invalid user pi from 223.72.43.35 port 17765 ssh2 Jan 20 13:25:08 host sshd[30066]: Received disconnect from 223.72.43.35 port 17765:11: Bye Bye [preauth] Jan 20 13:25:08 host sshd[30066]: Disconnected from 223.72.43.35 port 17765 [preauth] Jan 20 13:30:09 host sshd[30794]: Invalid user nisuser from 146.190.121.89 port 35560 Jan 20 13:30:09 host sshd[30794]: input_userauth_request: invalid user nisuser [preauth] Jan 20 13:30:09 host sshd[30794]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:30:09 host sshd[30794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.121.89 Jan 20 13:30:11 host sshd[30794]: Failed password for invalid user nisuser from 146.190.121.89 port 35560 ssh2 Jan 20 13:30:11 host sshd[30794]: Received disconnect from 146.190.121.89 port 35560:11: Bye Bye [preauth] Jan 20 13:30:11 host sshd[30794]: Disconnected from 146.190.121.89 port 35560 [preauth] Jan 20 13:30:44 host sshd[30876]: Invalid user administrator from 148.153.110.76 port 33522 Jan 20 13:30:44 host sshd[30876]: input_userauth_request: invalid user administrator [preauth] Jan 20 13:30:44 host sshd[30876]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:30:44 host sshd[30876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.153.110.76 Jan 20 13:30:46 host sshd[30876]: Failed password for invalid user administrator from 148.153.110.76 port 33522 ssh2 Jan 20 13:30:46 host sshd[30876]: Received disconnect from 148.153.110.76 port 33522:11: Bye Bye [preauth] Jan 20 13:30:46 host sshd[30876]: Disconnected from 148.153.110.76 port 33522 [preauth] Jan 20 13:33:28 host sshd[31189]: Invalid user adminn from 43.153.84.59 port 47748 Jan 20 13:33:28 host sshd[31189]: input_userauth_request: invalid user adminn [preauth] Jan 20 13:33:28 host sshd[31189]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:33:28 host sshd[31189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.84.59 Jan 20 13:33:30 host sshd[31189]: Failed password for invalid user adminn from 43.153.84.59 port 47748 ssh2 Jan 20 13:33:30 host sshd[31189]: Received disconnect from 43.153.84.59 port 47748:11: Bye Bye [preauth] Jan 20 13:33:30 host sshd[31189]: Disconnected from 43.153.84.59 port 47748 [preauth] Jan 20 13:34:24 host sshd[31291]: Invalid user client from 187.149.126.170 port 32089 Jan 20 13:34:24 host sshd[31291]: input_userauth_request: invalid user client [preauth] Jan 20 13:34:24 host sshd[31291]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:34:24 host sshd[31291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.149.126.170 Jan 20 13:34:27 host sshd[31291]: Failed password for invalid user client from 187.149.126.170 port 32089 ssh2 Jan 20 13:34:27 host sshd[31291]: Received disconnect from 187.149.126.170 port 32089:11: Bye Bye [preauth] Jan 20 13:34:27 host sshd[31291]: Disconnected from 187.149.126.170 port 32089 [preauth] Jan 20 13:34:40 host sshd[31339]: Invalid user wduser from 146.190.121.89 port 36254 Jan 20 13:34:40 host sshd[31339]: input_userauth_request: invalid user wduser [preauth] Jan 20 13:34:40 host sshd[31339]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:34:40 host sshd[31339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.121.89 Jan 20 13:34:42 host sshd[31339]: Failed password for invalid user wduser from 146.190.121.89 port 36254 ssh2 Jan 20 13:34:43 host sshd[31339]: Received disconnect from 146.190.121.89 port 36254:11: Bye Bye [preauth] Jan 20 13:34:43 host sshd[31339]: Disconnected from 146.190.121.89 port 36254 [preauth] Jan 20 13:35:41 host sshd[31589]: Invalid user ubuntu from 148.153.110.76 port 48626 Jan 20 13:35:41 host sshd[31589]: input_userauth_request: invalid user ubuntu [preauth] Jan 20 13:35:41 host sshd[31589]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:35:41 host sshd[31589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.153.110.76 Jan 20 13:35:43 host sshd[31589]: Failed password for invalid user ubuntu from 148.153.110.76 port 48626 ssh2 Jan 20 13:35:43 host sshd[31589]: Received disconnect from 148.153.110.76 port 48626:11: Bye Bye [preauth] Jan 20 13:35:43 host sshd[31589]: Disconnected from 148.153.110.76 port 48626 [preauth] Jan 20 13:35:49 host sshd[31597]: Invalid user ubadmin from 146.190.121.89 port 50504 Jan 20 13:35:49 host sshd[31597]: input_userauth_request: invalid user ubadmin [preauth] Jan 20 13:35:49 host sshd[31597]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:35:49 host sshd[31597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.121.89 Jan 20 13:35:50 host sshd[31597]: Failed password for invalid user ubadmin from 146.190.121.89 port 50504 ssh2 Jan 20 13:35:50 host sshd[31597]: Received disconnect from 146.190.121.89 port 50504:11: Bye Bye [preauth] Jan 20 13:35:50 host sshd[31597]: Disconnected from 146.190.121.89 port 50504 [preauth] Jan 20 13:36:25 host sshd[31685]: Invalid user wduser from 43.153.84.59 port 49758 Jan 20 13:36:25 host sshd[31685]: input_userauth_request: invalid user wduser [preauth] Jan 20 13:36:25 host sshd[31685]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:36:25 host sshd[31685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.84.59 Jan 20 13:36:27 host sshd[31685]: Failed password for invalid user wduser from 43.153.84.59 port 49758 ssh2 Jan 20 13:36:27 host sshd[31685]: Received disconnect from 43.153.84.59 port 49758:11: Bye Bye [preauth] Jan 20 13:36:27 host sshd[31685]: Disconnected from 43.153.84.59 port 49758 [preauth] Jan 20 13:36:38 host sshd[31723]: Invalid user backupadmin from 106.241.143.74 port 34632 Jan 20 13:36:38 host sshd[31723]: input_userauth_request: invalid user backupadmin [preauth] Jan 20 13:36:38 host sshd[31723]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:36:38 host sshd[31723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.241.143.74 Jan 20 13:36:40 host sshd[31723]: Failed password for invalid user backupadmin from 106.241.143.74 port 34632 ssh2 Jan 20 13:36:41 host sshd[31723]: Received disconnect from 106.241.143.74 port 34632:11: Bye Bye [preauth] Jan 20 13:36:41 host sshd[31723]: Disconnected from 106.241.143.74 port 34632 [preauth] Jan 20 13:36:54 host sshd[31754]: Invalid user admin from 148.153.110.76 port 43166 Jan 20 13:36:54 host sshd[31754]: input_userauth_request: invalid user admin [preauth] Jan 20 13:36:54 host sshd[31754]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:36:54 host sshd[31754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.153.110.76 Jan 20 13:36:56 host sshd[31754]: Failed password for invalid user admin from 148.153.110.76 port 43166 ssh2 Jan 20 13:37:22 host sshd[31840]: Invalid user webadmin from 51.15.204.199 port 45926 Jan 20 13:37:22 host sshd[31840]: input_userauth_request: invalid user webadmin [preauth] Jan 20 13:37:22 host sshd[31840]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:37:22 host sshd[31840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.204.199 Jan 20 13:37:24 host sshd[31840]: Failed password for invalid user webadmin from 51.15.204.199 port 45926 ssh2 Jan 20 13:37:24 host sshd[31840]: Received disconnect from 51.15.204.199 port 45926:11: Bye Bye [preauth] Jan 20 13:37:24 host sshd[31840]: Disconnected from 51.15.204.199 port 45926 [preauth] Jan 20 13:37:32 host sshd[31872]: Invalid user siteadmin from 187.149.126.170 port 17876 Jan 20 13:37:32 host sshd[31872]: input_userauth_request: invalid user siteadmin [preauth] Jan 20 13:37:32 host sshd[31872]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:37:32 host sshd[31872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.149.126.170 Jan 20 13:37:34 host sshd[31872]: Failed password for invalid user siteadmin from 187.149.126.170 port 17876 ssh2 Jan 20 13:37:34 host sshd[31872]: Received disconnect from 187.149.126.170 port 17876:11: Bye Bye [preauth] Jan 20 13:37:34 host sshd[31872]: Disconnected from 187.149.126.170 port 17876 [preauth] Jan 20 13:38:53 host sshd[32042]: Invalid user postgres from 59.126.47.168 port 51634 Jan 20 13:38:53 host sshd[32042]: input_userauth_request: invalid user postgres [preauth] Jan 20 13:38:53 host sshd[32042]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:38:53 host sshd[32042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.47.168 Jan 20 13:38:55 host sshd[32042]: Failed password for invalid user postgres from 59.126.47.168 port 51634 ssh2 Jan 20 13:38:55 host sshd[32042]: Connection reset by 59.126.47.168 port 51634 [preauth] Jan 20 13:39:07 host sshd[32079]: Invalid user admin from 51.15.204.199 port 59592 Jan 20 13:39:07 host sshd[32079]: input_userauth_request: invalid user admin [preauth] Jan 20 13:39:07 host sshd[32079]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:39:07 host sshd[32079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.204.199 Jan 20 13:39:09 host sshd[32079]: Failed password for invalid user admin from 51.15.204.199 port 59592 ssh2 Jan 20 13:39:09 host sshd[32079]: Received disconnect from 51.15.204.199 port 59592:11: Bye Bye [preauth] Jan 20 13:39:09 host sshd[32079]: Disconnected from 51.15.204.199 port 59592 [preauth] Jan 20 13:39:43 host sshd[32149]: Invalid user birgitta from 43.153.84.59 port 46282 Jan 20 13:39:43 host sshd[32149]: input_userauth_request: invalid user birgitta [preauth] Jan 20 13:39:43 host sshd[32149]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:39:43 host sshd[32149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.84.59 Jan 20 13:39:44 host sshd[32149]: Failed password for invalid user birgitta from 43.153.84.59 port 46282 ssh2 Jan 20 13:39:45 host sshd[32149]: Received disconnect from 43.153.84.59 port 46282:11: Bye Bye [preauth] Jan 20 13:39:45 host sshd[32149]: Disconnected from 43.153.84.59 port 46282 [preauth] Jan 20 13:40:01 host sshd[32207]: Invalid user ubadmin from 187.149.126.170 port 13477 Jan 20 13:40:01 host sshd[32207]: input_userauth_request: invalid user ubadmin [preauth] Jan 20 13:40:01 host sshd[32207]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:40:01 host sshd[32207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.149.126.170 Jan 20 13:40:03 host sshd[32207]: Failed password for invalid user ubadmin from 187.149.126.170 port 13477 ssh2 Jan 20 13:40:04 host sshd[32207]: Received disconnect from 187.149.126.170 port 13477:11: Bye Bye [preauth] Jan 20 13:40:04 host sshd[32207]: Disconnected from 187.149.126.170 port 13477 [preauth] Jan 20 13:40:08 host sshd[32332]: Invalid user gpadmin from 51.15.204.199 port 42750 Jan 20 13:40:08 host sshd[32332]: input_userauth_request: invalid user gpadmin [preauth] Jan 20 13:40:08 host sshd[32332]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:40:08 host sshd[32332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.204.199 Jan 20 13:40:10 host sshd[32332]: Failed password for invalid user gpadmin from 51.15.204.199 port 42750 ssh2 Jan 20 13:40:18 host sshd[32416]: Invalid user mqm from 106.241.143.74 port 43704 Jan 20 13:40:18 host sshd[32416]: input_userauth_request: invalid user mqm [preauth] Jan 20 13:40:18 host sshd[32416]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:40:18 host sshd[32416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.241.143.74 Jan 20 13:40:20 host sshd[32416]: Failed password for invalid user mqm from 106.241.143.74 port 43704 ssh2 Jan 20 13:40:20 host sshd[32416]: Received disconnect from 106.241.143.74 port 43704:11: Bye Bye [preauth] Jan 20 13:40:20 host sshd[32416]: Disconnected from 106.241.143.74 port 43704 [preauth] Jan 20 13:41:47 host sshd[32609]: Invalid user test12345 from 106.241.143.74 port 38408 Jan 20 13:41:47 host sshd[32609]: input_userauth_request: invalid user test12345 [preauth] Jan 20 13:41:47 host sshd[32609]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:41:47 host sshd[32609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.241.143.74 Jan 20 13:41:48 host sshd[32609]: Failed password for invalid user test12345 from 106.241.143.74 port 38408 ssh2 Jan 20 13:41:48 host sshd[32609]: Received disconnect from 106.241.143.74 port 38408:11: Bye Bye [preauth] Jan 20 13:41:48 host sshd[32609]: Disconnected from 106.241.143.74 port 38408 [preauth] Jan 20 13:52:56 host sshd[2085]: Invalid user kyle from 107.189.30.59 port 35152 Jan 20 13:52:56 host sshd[2085]: input_userauth_request: invalid user kyle [preauth] Jan 20 13:52:56 host sshd[2085]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:52:56 host sshd[2085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 20 13:52:58 host sshd[2085]: Failed password for invalid user kyle from 107.189.30.59 port 35152 ssh2 Jan 20 13:52:59 host sshd[2085]: Connection closed by 107.189.30.59 port 35152 [preauth] Jan 20 13:59:27 host sshd[2975]: Invalid user gy from 194.110.203.109 port 38226 Jan 20 13:59:27 host sshd[2975]: input_userauth_request: invalid user gy [preauth] Jan 20 13:59:27 host sshd[2975]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:59:27 host sshd[2975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 13:59:29 host sshd[2975]: Failed password for invalid user gy from 194.110.203.109 port 38226 ssh2 Jan 20 13:59:32 host sshd[2975]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:59:34 host sshd[2975]: Failed password for invalid user gy from 194.110.203.109 port 38226 ssh2 Jan 20 13:59:37 host sshd[2975]: pam_unix(sshd:auth): check pass; user unknown Jan 20 13:59:39 host sshd[2975]: Failed password for invalid user gy from 194.110.203.109 port 38226 ssh2 Jan 20 13:59:42 host sshd[2975]: Connection closed by 194.110.203.109 port 38226 [preauth] Jan 20 13:59:42 host sshd[2975]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 14:01:41 host sshd[3279]: Invalid user admin from 125.228.24.60 port 46325 Jan 20 14:01:41 host sshd[3279]: input_userauth_request: invalid user admin [preauth] Jan 20 14:01:41 host sshd[3279]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:01:41 host sshd[3279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.24.60 Jan 20 14:01:43 host sshd[3279]: Failed password for invalid user admin from 125.228.24.60 port 46325 ssh2 Jan 20 14:01:44 host sshd[3279]: Failed password for invalid user admin from 125.228.24.60 port 46325 ssh2 Jan 20 14:01:44 host sshd[3279]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:01:46 host sshd[3279]: Failed password for invalid user admin from 125.228.24.60 port 46325 ssh2 Jan 20 14:01:47 host sshd[3279]: Connection reset by 125.228.24.60 port 46325 [preauth] Jan 20 14:01:47 host sshd[3279]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.24.60 Jan 20 14:08:08 host sshd[4161]: Invalid user sshvpn from 188.250.172.49 port 35589 Jan 20 14:08:08 host sshd[4161]: input_userauth_request: invalid user sshvpn [preauth] Jan 20 14:08:08 host sshd[4161]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:08:08 host sshd[4161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.250.172.49 Jan 20 14:08:10 host sshd[4161]: Failed password for invalid user sshvpn from 188.250.172.49 port 35589 ssh2 Jan 20 14:08:10 host sshd[4161]: Received disconnect from 188.250.172.49 port 35589:11: Bye Bye [preauth] Jan 20 14:08:10 host sshd[4161]: Disconnected from 188.250.172.49 port 35589 [preauth] Jan 20 14:13:33 host sshd[5279]: Invalid user testappl from 188.250.172.49 port 46094 Jan 20 14:13:33 host sshd[5279]: input_userauth_request: invalid user testappl [preauth] Jan 20 14:13:33 host sshd[5279]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:13:33 host sshd[5279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.250.172.49 Jan 20 14:13:35 host sshd[5279]: Failed password for invalid user testappl from 188.250.172.49 port 46094 ssh2 Jan 20 14:13:35 host sshd[5279]: Received disconnect from 188.250.172.49 port 46094:11: Bye Bye [preauth] Jan 20 14:13:35 host sshd[5279]: Disconnected from 188.250.172.49 port 46094 [preauth] Jan 20 14:14:35 host sshd[5574]: Invalid user pdx from 188.250.172.49 port 63113 Jan 20 14:14:35 host sshd[5574]: input_userauth_request: invalid user pdx [preauth] Jan 20 14:14:35 host sshd[5574]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:14:35 host sshd[5574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.250.172.49 Jan 20 14:14:36 host sshd[5574]: Failed password for invalid user pdx from 188.250.172.49 port 63113 ssh2 Jan 20 14:16:44 host sshd[5938]: Invalid user admin from 210.97.106.213 port 62220 Jan 20 14:16:44 host sshd[5938]: input_userauth_request: invalid user admin [preauth] Jan 20 14:16:44 host sshd[5938]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:16:44 host sshd[5938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.97.106.213 Jan 20 14:16:45 host sshd[5938]: Failed password for invalid user admin from 210.97.106.213 port 62220 ssh2 Jan 20 14:16:46 host sshd[5938]: Failed password for invalid user admin from 210.97.106.213 port 62220 ssh2 Jan 20 14:16:46 host sshd[5938]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:16:48 host sshd[5938]: Failed password for invalid user admin from 210.97.106.213 port 62220 ssh2 Jan 20 14:16:49 host sshd[5938]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:16:50 host sshd[5938]: Failed password for invalid user admin from 210.97.106.213 port 62220 ssh2 Jan 20 14:16:50 host sshd[5938]: Connection reset by 210.97.106.213 port 62220 [preauth] Jan 20 14:16:50 host sshd[5938]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.97.106.213 Jan 20 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=a2zgroup user-5=dartsimp user-6=wwwpmcresource user-7=ugotscom user-8=keralaholi user-9=wwwresourcehunte user-10=wwwrmswll user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=disposeat user-15=wwwkmaorg user-16=remysagr user-17=pmcresources user-18=shalinijames user-19=wwwtestugo user-20=vfmassets user-21=wwwletsstalkfood user-22=straightcurve user-23=wwwevmhonda user-24=bonifacegroup user-25=wwwnexidigital user-26=mrsclean user-27=kottayamcalldriv user-28=phmetals user-29=palco123 user-30=gifterman feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 14:21:07 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 14:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 14:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-P0KMZiyzEixEJG2x.~ Jan 20 14:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-P0KMZiyzEixEJG2x.~' Jan 20 14:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-P0KMZiyzEixEJG2x.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 14:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 14:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 14:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 14:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 14:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 14:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 14:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 14:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 14:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 14:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 14:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 14:21:29 host sshd[6711]: invalid public DH value: >= p-1 [preauth] Jan 20 14:21:29 host sshd[6711]: ssh_dispatch_run_fatal: Connection from 185.164.212.57 port 58908: incomplete message [preauth] Jan 20 14:21:34 host sshd[6739]: Invalid user db2inst1 from 143.198.143.233 port 37262 Jan 20 14:21:34 host sshd[6739]: input_userauth_request: invalid user db2inst1 [preauth] Jan 20 14:21:34 host sshd[6739]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:21:34 host sshd[6739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.143.233 Jan 20 14:21:36 host sshd[6739]: Failed password for invalid user db2inst1 from 143.198.143.233 port 37262 ssh2 Jan 20 14:21:36 host sshd[6739]: Received disconnect from 143.198.143.233 port 37262:11: Bye Bye [preauth] Jan 20 14:21:36 host sshd[6739]: Disconnected from 143.198.143.233 port 37262 [preauth] Jan 20 14:21:52 host sshd[6765]: Invalid user user from 187.243.248.114 port 41498 Jan 20 14:21:52 host sshd[6765]: input_userauth_request: invalid user user [preauth] Jan 20 14:21:52 host sshd[6765]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:21:52 host sshd[6765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.243.248.114 Jan 20 14:21:54 host sshd[6765]: Failed password for invalid user user from 187.243.248.114 port 41498 ssh2 Jan 20 14:21:54 host sshd[6765]: Received disconnect from 187.243.248.114 port 41498:11: Bye Bye [preauth] Jan 20 14:21:54 host sshd[6765]: Disconnected from 187.243.248.114 port 41498 [preauth] Jan 20 14:21:58 host sshd[6774]: Invalid user phpmyadmin from 43.134.78.43 port 40824 Jan 20 14:21:58 host sshd[6774]: input_userauth_request: invalid user phpmyadmin [preauth] Jan 20 14:21:58 host sshd[6774]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:21:58 host sshd[6774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.78.43 Jan 20 14:22:00 host sshd[6777]: Invalid user default from 117.209.104.148 port 33616 Jan 20 14:22:00 host sshd[6777]: input_userauth_request: invalid user default [preauth] Jan 20 14:22:00 host sshd[6777]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:22:00 host sshd[6777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.209.104.148 Jan 20 14:22:00 host sshd[6774]: Failed password for invalid user phpmyadmin from 43.134.78.43 port 40824 ssh2 Jan 20 14:22:00 host sshd[6774]: Received disconnect from 43.134.78.43 port 40824:11: Bye Bye [preauth] Jan 20 14:22:00 host sshd[6774]: Disconnected from 43.134.78.43 port 40824 [preauth] Jan 20 14:22:01 host sshd[6777]: Failed password for invalid user default from 117.209.104.148 port 33616 ssh2 Jan 20 14:22:01 host sshd[6777]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:22:03 host sshd[6792]: Invalid user diradmin from 178.220.122.156 port 51795 Jan 20 14:22:03 host sshd[6792]: input_userauth_request: invalid user diradmin [preauth] Jan 20 14:22:03 host sshd[6792]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:22:03 host sshd[6792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.220.122.156 Jan 20 14:22:04 host sshd[6777]: Failed password for invalid user default from 117.209.104.148 port 33616 ssh2 Jan 20 14:22:04 host sshd[6777]: Connection reset by 117.209.104.148 port 33616 [preauth] Jan 20 14:22:04 host sshd[6777]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.209.104.148 Jan 20 14:22:06 host sshd[6792]: Failed password for invalid user diradmin from 178.220.122.156 port 51795 ssh2 Jan 20 14:22:06 host sshd[6792]: Received disconnect from 178.220.122.156 port 51795:11: Bye Bye [preauth] Jan 20 14:22:06 host sshd[6792]: Disconnected from 178.220.122.156 port 51795 [preauth] Jan 20 14:22:14 host sshd[6805]: Invalid user usertest from 167.172.194.232 port 49968 Jan 20 14:22:14 host sshd[6805]: input_userauth_request: invalid user usertest [preauth] Jan 20 14:22:14 host sshd[6805]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:22:14 host sshd[6805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.194.232 Jan 20 14:22:16 host sshd[6805]: Failed password for invalid user usertest from 167.172.194.232 port 49968 ssh2 Jan 20 14:22:17 host sshd[6805]: Received disconnect from 167.172.194.232 port 49968:11: Bye Bye [preauth] Jan 20 14:22:17 host sshd[6805]: Disconnected from 167.172.194.232 port 49968 [preauth] Jan 20 14:22:25 host sshd[6814]: Invalid user stuser from 201.6.107.69 port 52392 Jan 20 14:22:25 host sshd[6814]: input_userauth_request: invalid user stuser [preauth] Jan 20 14:22:25 host sshd[6814]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:22:25 host sshd[6814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.107.69 Jan 20 14:22:27 host sshd[6814]: Failed password for invalid user stuser from 201.6.107.69 port 52392 ssh2 Jan 20 14:22:27 host sshd[6814]: Received disconnect from 201.6.107.69 port 52392:11: Bye Bye [preauth] Jan 20 14:22:27 host sshd[6814]: Disconnected from 201.6.107.69 port 52392 [preauth] Jan 20 14:23:33 host sshd[6956]: Invalid user usertest from 178.220.122.156 port 41601 Jan 20 14:23:33 host sshd[6956]: input_userauth_request: invalid user usertest [preauth] Jan 20 14:23:33 host sshd[6956]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:23:33 host sshd[6956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.220.122.156 Jan 20 14:23:35 host sshd[6956]: Failed password for invalid user usertest from 178.220.122.156 port 41601 ssh2 Jan 20 14:23:35 host sshd[6956]: Received disconnect from 178.220.122.156 port 41601:11: Bye Bye [preauth] Jan 20 14:23:35 host sshd[6956]: Disconnected from 178.220.122.156 port 41601 [preauth] Jan 20 14:23:42 host sshd[6982]: Invalid user linuxadmin from 198.27.67.44 port 50492 Jan 20 14:23:42 host sshd[6982]: input_userauth_request: invalid user linuxadmin [preauth] Jan 20 14:23:42 host sshd[6982]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:23:42 host sshd[6982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.67.44 Jan 20 14:23:44 host sshd[6982]: Failed password for invalid user linuxadmin from 198.27.67.44 port 50492 ssh2 Jan 20 14:23:44 host sshd[6982]: Received disconnect from 198.27.67.44 port 50492:11: Bye Bye [preauth] Jan 20 14:23:44 host sshd[6982]: Disconnected from 198.27.67.44 port 50492 [preauth] Jan 20 14:24:06 host sshd[7039]: Invalid user nuser from 181.176.145.114 port 55840 Jan 20 14:24:06 host sshd[7039]: input_userauth_request: invalid user nuser [preauth] Jan 20 14:24:06 host sshd[7039]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:24:06 host sshd[7039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.176.145.114 Jan 20 14:24:08 host sshd[7039]: Failed password for invalid user nuser from 181.176.145.114 port 55840 ssh2 Jan 20 14:24:09 host sshd[7039]: Received disconnect from 181.176.145.114 port 55840:11: Bye Bye [preauth] Jan 20 14:24:09 host sshd[7039]: Disconnected from 181.176.145.114 port 55840 [preauth] Jan 20 14:24:16 host sshd[7051]: Invalid user FTPUser from 178.220.122.156 port 50378 Jan 20 14:24:16 host sshd[7051]: input_userauth_request: invalid user FTPUser [preauth] Jan 20 14:24:16 host sshd[7051]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:24:16 host sshd[7051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.220.122.156 Jan 20 14:24:19 host sshd[7051]: Failed password for invalid user FTPUser from 178.220.122.156 port 50378 ssh2 Jan 20 14:24:19 host sshd[7051]: Received disconnect from 178.220.122.156 port 50378:11: Bye Bye [preauth] Jan 20 14:24:19 host sshd[7051]: Disconnected from 178.220.122.156 port 50378 [preauth] Jan 20 14:24:47 host sshd[7249]: Invalid user ftpuser from 188.166.240.186 port 57304 Jan 20 14:24:47 host sshd[7249]: input_userauth_request: invalid user ftpuser [preauth] Jan 20 14:24:47 host sshd[7249]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:24:47 host sshd[7249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.240.186 Jan 20 14:24:48 host sshd[7247]: Invalid user postgres from 110.136.247.180 port 56228 Jan 20 14:24:48 host sshd[7247]: input_userauth_request: invalid user postgres [preauth] Jan 20 14:24:48 host sshd[7247]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:24:48 host sshd[7247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.136.247.180 Jan 20 14:24:49 host sshd[7249]: Failed password for invalid user ftpuser from 188.166.240.186 port 57304 ssh2 Jan 20 14:24:49 host sshd[7249]: Received disconnect from 188.166.240.186 port 57304:11: Bye Bye [preauth] Jan 20 14:24:49 host sshd[7249]: Disconnected from 188.166.240.186 port 57304 [preauth] Jan 20 14:24:50 host sshd[7247]: Failed password for invalid user postgres from 110.136.247.180 port 56228 ssh2 Jan 20 14:24:50 host sshd[7247]: Received disconnect from 110.136.247.180 port 56228:11: Bye Bye [preauth] Jan 20 14:24:50 host sshd[7247]: Disconnected from 110.136.247.180 port 56228 [preauth] Jan 20 14:25:16 host sshd[7313]: Invalid user nagiosuser from 157.230.6.213 port 60566 Jan 20 14:25:16 host sshd[7313]: input_userauth_request: invalid user nagiosuser [preauth] Jan 20 14:25:16 host sshd[7313]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:25:16 host sshd[7313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.6.213 Jan 20 14:25:18 host sshd[7313]: Failed password for invalid user nagiosuser from 157.230.6.213 port 60566 ssh2 Jan 20 14:25:18 host sshd[7313]: Received disconnect from 157.230.6.213 port 60566:11: Bye Bye [preauth] Jan 20 14:25:18 host sshd[7313]: Disconnected from 157.230.6.213 port 60566 [preauth] Jan 20 14:25:44 host sshd[7373]: Invalid user temp from 137.184.112.37 port 38574 Jan 20 14:25:44 host sshd[7373]: input_userauth_request: invalid user temp [preauth] Jan 20 14:25:44 host sshd[7373]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:25:44 host sshd[7373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.112.37 Jan 20 14:25:46 host sshd[7373]: Failed password for invalid user temp from 137.184.112.37 port 38574 ssh2 Jan 20 14:25:46 host sshd[7373]: Received disconnect from 137.184.112.37 port 38574:11: Bye Bye [preauth] Jan 20 14:25:46 host sshd[7373]: Disconnected from 137.184.112.37 port 38574 [preauth] Jan 20 14:26:34 host sshd[7485]: Invalid user jenkins from 112.78.136.204 port 34400 Jan 20 14:26:34 host sshd[7485]: input_userauth_request: invalid user jenkins [preauth] Jan 20 14:26:34 host sshd[7485]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:26:34 host sshd[7485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.78.136.204 Jan 20 14:26:37 host sshd[7485]: Failed password for invalid user jenkins from 112.78.136.204 port 34400 ssh2 Jan 20 14:26:37 host sshd[7485]: Received disconnect from 112.78.136.204 port 34400:11: Bye Bye [preauth] Jan 20 14:26:37 host sshd[7485]: Disconnected from 112.78.136.204 port 34400 [preauth] Jan 20 14:26:57 host sshd[7514]: Invalid user myappuser from 198.27.67.44 port 45504 Jan 20 14:26:57 host sshd[7514]: input_userauth_request: invalid user myappuser [preauth] Jan 20 14:26:57 host sshd[7514]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:26:57 host sshd[7514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.67.44 Jan 20 14:26:59 host sshd[7514]: Failed password for invalid user myappuser from 198.27.67.44 port 45504 ssh2 Jan 20 14:26:59 host sshd[7517]: Invalid user jenkins from 190.64.68.178 port 29305 Jan 20 14:26:59 host sshd[7517]: input_userauth_request: invalid user jenkins [preauth] Jan 20 14:26:59 host sshd[7517]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:26:59 host sshd[7517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.68.178 Jan 20 14:26:59 host sshd[7514]: Received disconnect from 198.27.67.44 port 45504:11: Bye Bye [preauth] Jan 20 14:26:59 host sshd[7514]: Disconnected from 198.27.67.44 port 45504 [preauth] Jan 20 14:27:01 host sshd[7517]: Failed password for invalid user jenkins from 190.64.68.178 port 29305 ssh2 Jan 20 14:27:01 host sshd[7517]: Received disconnect from 190.64.68.178 port 29305:11: Bye Bye [preauth] Jan 20 14:27:01 host sshd[7517]: Disconnected from 190.64.68.178 port 29305 [preauth] Jan 20 14:27:02 host sshd[7521]: Invalid user eacsaci from 187.243.248.114 port 43282 Jan 20 14:27:02 host sshd[7521]: input_userauth_request: invalid user eacsaci [preauth] Jan 20 14:27:02 host sshd[7521]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:27:02 host sshd[7521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.243.248.114 Jan 20 14:27:04 host sshd[7521]: Failed password for invalid user eacsaci from 187.243.248.114 port 43282 ssh2 Jan 20 14:27:04 host sshd[7521]: Received disconnect from 187.243.248.114 port 43282:11: Bye Bye [preauth] Jan 20 14:27:04 host sshd[7521]: Disconnected from 187.243.248.114 port 43282 [preauth] Jan 20 14:27:05 host sshd[7536]: Invalid user admin from 143.198.143.233 port 37760 Jan 20 14:27:05 host sshd[7536]: input_userauth_request: invalid user admin [preauth] Jan 20 14:27:05 host sshd[7536]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:27:05 host sshd[7536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.143.233 Jan 20 14:27:07 host sshd[7536]: Failed password for invalid user admin from 143.198.143.233 port 37760 ssh2 Jan 20 14:27:07 host sshd[7536]: Received disconnect from 143.198.143.233 port 37760:11: Bye Bye [preauth] Jan 20 14:27:07 host sshd[7536]: Disconnected from 143.198.143.233 port 37760 [preauth] Jan 20 14:27:49 host sshd[7610]: Invalid user ubuntu from 137.184.112.37 port 54722 Jan 20 14:27:49 host sshd[7610]: input_userauth_request: invalid user ubuntu [preauth] Jan 20 14:27:49 host sshd[7610]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:27:49 host sshd[7610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.112.37 Jan 20 14:27:51 host sshd[7610]: Failed password for invalid user ubuntu from 137.184.112.37 port 54722 ssh2 Jan 20 14:27:51 host sshd[7610]: Received disconnect from 137.184.112.37 port 54722:11: Bye Bye [preauth] Jan 20 14:27:51 host sshd[7610]: Disconnected from 137.184.112.37 port 54722 [preauth] Jan 20 14:28:01 host sshd[7629]: Invalid user administrator from 198.27.67.44 port 42962 Jan 20 14:28:01 host sshd[7629]: input_userauth_request: invalid user administrator [preauth] Jan 20 14:28:01 host sshd[7629]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:28:01 host sshd[7629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.67.44 Jan 20 14:28:03 host sshd[7629]: Failed password for invalid user administrator from 198.27.67.44 port 42962 ssh2 Jan 20 14:28:03 host sshd[7629]: Received disconnect from 198.27.67.44 port 42962:11: Bye Bye [preauth] Jan 20 14:28:03 host sshd[7629]: Disconnected from 198.27.67.44 port 42962 [preauth] Jan 20 14:28:05 host sshd[7656]: Invalid user git from 157.230.6.213 port 38384 Jan 20 14:28:05 host sshd[7656]: input_userauth_request: invalid user git [preauth] Jan 20 14:28:05 host sshd[7656]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:28:05 host sshd[7656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.6.213 Jan 20 14:28:07 host sshd[7656]: Failed password for invalid user git from 157.230.6.213 port 38384 ssh2 Jan 20 14:28:07 host sshd[7656]: Received disconnect from 157.230.6.213 port 38384:11: Bye Bye [preauth] Jan 20 14:28:07 host sshd[7656]: Disconnected from 157.230.6.213 port 38384 [preauth] Jan 20 14:28:10 host sshd[7695]: Invalid user julie from 143.198.143.233 port 36468 Jan 20 14:28:10 host sshd[7695]: input_userauth_request: invalid user julie [preauth] Jan 20 14:28:10 host sshd[7695]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:28:10 host sshd[7695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.143.233 Jan 20 14:28:12 host sshd[7695]: Failed password for invalid user julie from 143.198.143.233 port 36468 ssh2 Jan 20 14:28:18 host sshd[7738]: Invalid user internet from 43.134.78.43 port 41148 Jan 20 14:28:18 host sshd[7738]: input_userauth_request: invalid user internet [preauth] Jan 20 14:28:18 host sshd[7738]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:28:18 host sshd[7738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.78.43 Jan 20 14:28:18 host sshd[7740]: Invalid user safeuser from 188.166.240.186 port 42058 Jan 20 14:28:18 host sshd[7740]: input_userauth_request: invalid user safeuser [preauth] Jan 20 14:28:18 host sshd[7740]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:28:18 host sshd[7740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.240.186 Jan 20 14:28:20 host sshd[7738]: Failed password for invalid user internet from 43.134.78.43 port 41148 ssh2 Jan 20 14:28:20 host sshd[7740]: Failed password for invalid user safeuser from 188.166.240.186 port 42058 ssh2 Jan 20 14:28:20 host sshd[7738]: Received disconnect from 43.134.78.43 port 41148:11: Bye Bye [preauth] Jan 20 14:28:20 host sshd[7738]: Disconnected from 43.134.78.43 port 41148 [preauth] Jan 20 14:28:20 host sshd[7740]: Received disconnect from 188.166.240.186 port 42058:11: Bye Bye [preauth] Jan 20 14:28:20 host sshd[7740]: Disconnected from 188.166.240.186 port 42058 [preauth] Jan 20 14:28:24 host sshd[7746]: Invalid user rtest from 201.6.107.69 port 60886 Jan 20 14:28:24 host sshd[7746]: input_userauth_request: invalid user rtest [preauth] Jan 20 14:28:24 host sshd[7746]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:28:24 host sshd[7746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.107.69 Jan 20 14:28:26 host sshd[7746]: Failed password for invalid user rtest from 201.6.107.69 port 60886 ssh2 Jan 20 14:28:26 host sshd[7746]: Received disconnect from 201.6.107.69 port 60886:11: Bye Bye [preauth] Jan 20 14:28:26 host sshd[7746]: Disconnected from 201.6.107.69 port 60886 [preauth] Jan 20 14:28:27 host sshd[7751]: Invalid user admin from 112.78.136.204 port 36664 Jan 20 14:28:27 host sshd[7751]: input_userauth_request: invalid user admin [preauth] Jan 20 14:28:27 host sshd[7751]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:28:27 host sshd[7751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.78.136.204 Jan 20 14:28:29 host sshd[7751]: Failed password for invalid user admin from 112.78.136.204 port 36664 ssh2 Jan 20 14:28:29 host sshd[7751]: Received disconnect from 112.78.136.204 port 36664:11: Bye Bye [preauth] Jan 20 14:28:29 host sshd[7751]: Disconnected from 112.78.136.204 port 36664 [preauth] Jan 20 14:28:35 host sshd[7781]: Invalid user user2 from 181.176.145.114 port 44644 Jan 20 14:28:35 host sshd[7781]: input_userauth_request: invalid user user2 [preauth] Jan 20 14:28:35 host sshd[7781]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:28:35 host sshd[7781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.176.145.114 Jan 20 14:28:37 host sshd[7781]: Failed password for invalid user user2 from 181.176.145.114 port 44644 ssh2 Jan 20 14:28:37 host sshd[7781]: Received disconnect from 181.176.145.114 port 44644:11: Bye Bye [preauth] Jan 20 14:28:37 host sshd[7781]: Disconnected from 181.176.145.114 port 44644 [preauth] Jan 20 14:28:51 host sshd[7812]: Invalid user nvidia from 167.172.194.232 port 40160 Jan 20 14:28:51 host sshd[7812]: input_userauth_request: invalid user nvidia [preauth] Jan 20 14:28:51 host sshd[7812]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:28:51 host sshd[7812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.194.232 Jan 20 14:28:52 host sshd[7815]: Invalid user josh from 187.243.248.114 port 40800 Jan 20 14:28:52 host sshd[7815]: input_userauth_request: invalid user josh [preauth] Jan 20 14:28:52 host sshd[7815]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:28:52 host sshd[7815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.243.248.114 Jan 20 14:28:54 host sshd[7812]: Failed password for invalid user nvidia from 167.172.194.232 port 40160 ssh2 Jan 20 14:28:54 host sshd[7812]: Received disconnect from 167.172.194.232 port 40160:11: Bye Bye [preauth] Jan 20 14:28:54 host sshd[7812]: Disconnected from 167.172.194.232 port 40160 [preauth] Jan 20 14:28:54 host sshd[7815]: Failed password for invalid user josh from 187.243.248.114 port 40800 ssh2 Jan 20 14:28:54 host sshd[7815]: Received disconnect from 187.243.248.114 port 40800:11: Bye Bye [preauth] Jan 20 14:28:54 host sshd[7815]: Disconnected from 187.243.248.114 port 40800 [preauth] Jan 20 14:29:01 host sshd[7858]: Invalid user nexus from 137.184.112.37 port 56794 Jan 20 14:29:01 host sshd[7858]: input_userauth_request: invalid user nexus [preauth] Jan 20 14:29:01 host sshd[7858]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:29:01 host sshd[7858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.112.37 Jan 20 14:29:03 host sshd[7858]: Failed password for invalid user nexus from 137.184.112.37 port 56794 ssh2 Jan 20 14:29:04 host sshd[7858]: Received disconnect from 137.184.112.37 port 56794:11: Bye Bye [preauth] Jan 20 14:29:04 host sshd[7858]: Disconnected from 137.184.112.37 port 56794 [preauth] Jan 20 14:29:04 host sshd[7875]: Invalid user ubuntu from 157.230.6.213 port 32868 Jan 20 14:29:04 host sshd[7875]: input_userauth_request: invalid user ubuntu [preauth] Jan 20 14:29:04 host sshd[7875]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:29:04 host sshd[7875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.6.213 Jan 20 14:29:05 host sshd[7877]: User root from 31.41.244.124 not allowed because not listed in AllowUsers Jan 20 14:29:05 host sshd[7877]: input_userauth_request: invalid user root [preauth] Jan 20 14:29:05 host unix_chkpwd[7880]: password check failed for user (root) Jan 20 14:29:05 host sshd[7877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 user=root Jan 20 14:29:05 host sshd[7877]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 14:29:06 host sshd[7875]: Failed password for invalid user ubuntu from 157.230.6.213 port 32868 ssh2 Jan 20 14:29:06 host sshd[7877]: Failed password for invalid user root from 31.41.244.124 port 25753 ssh2 Jan 20 14:29:07 host sshd[7877]: Received disconnect from 31.41.244.124 port 25753:11: Client disconnecting normally [preauth] Jan 20 14:29:07 host sshd[7877]: Disconnected from 31.41.244.124 port 25753 [preauth] Jan 20 14:29:31 host sshd[7991]: Invalid user elena from 110.136.247.180 port 36624 Jan 20 14:29:31 host sshd[7991]: input_userauth_request: invalid user elena [preauth] Jan 20 14:29:31 host sshd[7991]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:29:31 host sshd[7991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.136.247.180 Jan 20 14:29:33 host sshd[7991]: Failed password for invalid user elena from 110.136.247.180 port 36624 ssh2 Jan 20 14:29:33 host sshd[7991]: Received disconnect from 110.136.247.180 port 36624:11: Bye Bye [preauth] Jan 20 14:29:33 host sshd[7991]: Disconnected from 110.136.247.180 port 36624 [preauth] Jan 20 14:29:40 host sshd[8005]: Invalid user sftp_user from 188.166.240.186 port 40638 Jan 20 14:29:40 host sshd[8005]: input_userauth_request: invalid user sftp_user [preauth] Jan 20 14:29:40 host sshd[8005]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:29:40 host sshd[8005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.240.186 Jan 20 14:29:42 host sshd[8005]: Failed password for invalid user sftp_user from 188.166.240.186 port 40638 ssh2 Jan 20 14:29:44 host sshd[8106]: Invalid user florian from 43.134.78.43 port 39710 Jan 20 14:29:44 host sshd[8106]: input_userauth_request: invalid user florian [preauth] Jan 20 14:29:44 host sshd[8106]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:29:44 host sshd[8106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.78.43 Jan 20 14:29:46 host sshd[8106]: Failed password for invalid user florian from 43.134.78.43 port 39710 ssh2 Jan 20 14:29:50 host sshd[8183]: Invalid user service from 181.176.145.114 port 58120 Jan 20 14:29:50 host sshd[8183]: input_userauth_request: invalid user service [preauth] Jan 20 14:29:50 host sshd[8183]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:29:50 host sshd[8183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.176.145.114 Jan 20 14:29:52 host sshd[8188]: Invalid user admin from 112.78.136.204 port 35654 Jan 20 14:29:52 host sshd[8188]: input_userauth_request: invalid user admin [preauth] Jan 20 14:29:52 host sshd[8188]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:29:52 host sshd[8188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.78.136.204 Jan 20 14:29:52 host sshd[8183]: Failed password for invalid user service from 181.176.145.114 port 58120 ssh2 Jan 20 14:29:54 host sshd[8188]: Failed password for invalid user admin from 112.78.136.204 port 35654 ssh2 Jan 20 14:29:54 host sshd[8188]: Received disconnect from 112.78.136.204 port 35654:11: Bye Bye [preauth] Jan 20 14:29:54 host sshd[8188]: Disconnected from 112.78.136.204 port 35654 [preauth] Jan 20 14:30:07 host sshd[8290]: Invalid user dbfenc from 167.172.194.232 port 46378 Jan 20 14:30:07 host sshd[8290]: input_userauth_request: invalid user dbfenc [preauth] Jan 20 14:30:07 host sshd[8290]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:30:07 host sshd[8290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.194.232 Jan 20 14:30:09 host sshd[8290]: Failed password for invalid user dbfenc from 167.172.194.232 port 46378 ssh2 Jan 20 14:30:09 host sshd[8290]: Received disconnect from 167.172.194.232 port 46378:11: Bye Bye [preauth] Jan 20 14:30:09 host sshd[8290]: Disconnected from 167.172.194.232 port 46378 [preauth] Jan 20 14:30:13 host sshd[8318]: Invalid user internet from 201.6.107.69 port 49778 Jan 20 14:30:13 host sshd[8318]: input_userauth_request: invalid user internet [preauth] Jan 20 14:30:13 host sshd[8318]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:30:13 host sshd[8318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.107.69 Jan 20 14:30:15 host sshd[8318]: Failed password for invalid user internet from 201.6.107.69 port 49778 ssh2 Jan 20 14:30:16 host sshd[7968]: Invalid user dnsekakf2$$ from 218.150.144.219 port 63658 Jan 20 14:30:16 host sshd[7968]: input_userauth_request: invalid user dnsekakf2$$ [preauth] Jan 20 14:30:16 host sshd[7968]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:30:16 host sshd[7968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.150.144.219 Jan 20 14:30:16 host sshd[8318]: Received disconnect from 201.6.107.69 port 49778:11: Bye Bye [preauth] Jan 20 14:30:16 host sshd[8318]: Disconnected from 201.6.107.69 port 49778 [preauth] Jan 20 14:30:16 host sshd[8334]: Invalid user sammy from 190.64.68.178 port 29306 Jan 20 14:30:16 host sshd[8334]: input_userauth_request: invalid user sammy [preauth] Jan 20 14:30:16 host sshd[8334]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:30:16 host sshd[8334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.68.178 Jan 20 14:30:18 host sshd[7968]: Failed password for invalid user dnsekakf2$$ from 218.150.144.219 port 63658 ssh2 Jan 20 14:30:18 host sshd[8334]: Failed password for invalid user sammy from 190.64.68.178 port 29306 ssh2 Jan 20 14:30:18 host sshd[8334]: Received disconnect from 190.64.68.178 port 29306:11: Bye Bye [preauth] Jan 20 14:30:18 host sshd[8334]: Disconnected from 190.64.68.178 port 29306 [preauth] Jan 20 14:30:19 host sshd[7968]: Failed password for invalid user dnsekakf2$$ from 218.150.144.219 port 63658 ssh2 Jan 20 14:30:20 host sshd[7968]: Connection closed by 218.150.144.219 port 63658 [preauth] Jan 20 14:31:34 host sshd[8513]: Invalid user dev from 110.136.247.180 port 54522 Jan 20 14:31:34 host sshd[8513]: input_userauth_request: invalid user dev [preauth] Jan 20 14:31:34 host sshd[8513]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:31:34 host sshd[8513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.136.247.180 Jan 20 14:31:36 host sshd[8513]: Failed password for invalid user dev from 110.136.247.180 port 54522 ssh2 Jan 20 14:31:36 host sshd[8513]: Received disconnect from 110.136.247.180 port 54522:11: Bye Bye [preauth] Jan 20 14:31:36 host sshd[8513]: Disconnected from 110.136.247.180 port 54522 [preauth] Jan 20 14:31:46 host sshd[8566]: Invalid user admin from 190.64.68.178 port 29307 Jan 20 14:31:46 host sshd[8566]: input_userauth_request: invalid user admin [preauth] Jan 20 14:31:46 host sshd[8566]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:31:46 host sshd[8566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.68.178 Jan 20 14:31:47 host sshd[8566]: Failed password for invalid user admin from 190.64.68.178 port 29307 ssh2 Jan 20 14:34:36 host sshd[8901]: Connection reset by 220.88.129.239 port 63916 [preauth] Jan 20 14:40:14 host sshd[9650]: Invalid user default from 220.89.127.53 port 62761 Jan 20 14:40:14 host sshd[9650]: input_userauth_request: invalid user default [preauth] Jan 20 14:40:14 host sshd[9650]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:40:14 host sshd[9650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.89.127.53 Jan 20 14:40:17 host sshd[9650]: Failed password for invalid user default from 220.89.127.53 port 62761 ssh2 Jan 20 14:40:17 host sshd[9650]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:40:19 host sshd[9650]: Failed password for invalid user default from 220.89.127.53 port 62761 ssh2 Jan 20 14:40:19 host sshd[9650]: Connection reset by 220.89.127.53 port 62761 [preauth] Jan 20 14:40:19 host sshd[9650]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.89.127.53 Jan 20 14:40:29 host sshd[9664]: Invalid user leo from 68.190.197.250 port 55799 Jan 20 14:40:29 host sshd[9664]: input_userauth_request: invalid user leo [preauth] Jan 20 14:40:30 host sshd[9664]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:40:30 host sshd[9664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.190.197.250 Jan 20 14:40:31 host sshd[9664]: Failed password for invalid user leo from 68.190.197.250 port 55799 ssh2 Jan 20 14:40:31 host sshd[9664]: Received disconnect from 68.190.197.250 port 55799:11: Bye Bye [preauth] Jan 20 14:40:31 host sshd[9664]: Disconnected from 68.190.197.250 port 55799 [preauth] Jan 20 14:40:33 host sshd[9690]: User root from 68.190.197.250 not allowed because not listed in AllowUsers Jan 20 14:40:33 host sshd[9690]: input_userauth_request: invalid user root [preauth] Jan 20 14:40:34 host unix_chkpwd[9694]: password check failed for user (root) Jan 20 14:40:34 host sshd[9690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.190.197.250 user=root Jan 20 14:40:34 host sshd[9690]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 14:40:36 host sshd[9690]: Failed password for invalid user root from 68.190.197.250 port 55946 ssh2 Jan 20 14:40:36 host sshd[9690]: Received disconnect from 68.190.197.250 port 55946:11: Bye Bye [preauth] Jan 20 14:40:36 host sshd[9690]: Disconnected from 68.190.197.250 port 55946 [preauth] Jan 20 14:45:31 host sshd[10441]: Invalid user dnsekakf2$$ from 93.51.122.254 port 55413 Jan 20 14:45:31 host sshd[10441]: input_userauth_request: invalid user dnsekakf2$$ [preauth] Jan 20 14:45:31 host sshd[10441]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:45:31 host sshd[10441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.51.122.254 Jan 20 14:45:33 host sshd[10441]: Failed password for invalid user dnsekakf2$$ from 93.51.122.254 port 55413 ssh2 Jan 20 14:45:34 host sshd[10441]: Connection reset by 93.51.122.254 port 55413 [preauth] Jan 20 14:49:28 host sshd[10886]: Invalid user monitor from 209.141.55.27 port 54042 Jan 20 14:49:28 host sshd[10886]: input_userauth_request: invalid user monitor [preauth] Jan 20 14:49:28 host sshd[10886]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:49:28 host sshd[10886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 Jan 20 14:49:31 host sshd[10886]: Failed password for invalid user monitor from 209.141.55.27 port 54042 ssh2 Jan 20 14:49:31 host sshd[10886]: Received disconnect from 209.141.55.27 port 54042:11: Normal Shutdown, Thank you for playing [preauth] Jan 20 14:49:31 host sshd[10886]: Disconnected from 209.141.55.27 port 54042 [preauth] Jan 20 14:51:22 host sshd[11257]: Invalid user user from 59.24.2.176 port 43032 Jan 20 14:51:22 host sshd[11257]: input_userauth_request: invalid user user [preauth] Jan 20 14:51:22 host sshd[11257]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:51:22 host sshd[11257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.24.2.176 Jan 20 14:51:24 host sshd[11257]: Failed password for invalid user user from 59.24.2.176 port 43032 ssh2 Jan 20 14:51:26 host sshd[11257]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:51:27 host sshd[11257]: Failed password for invalid user user from 59.24.2.176 port 43032 ssh2 Jan 20 14:51:28 host sshd[11257]: pam_unix(sshd:auth): check pass; user unknown Jan 20 14:51:30 host sshd[11257]: Failed password for invalid user user from 59.24.2.176 port 43032 ssh2 Jan 20 14:51:32 host sshd[11257]: Connection reset by 59.24.2.176 port 43032 [preauth] Jan 20 14:51:32 host sshd[11257]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.24.2.176 Jan 20 15:14:27 host sshd[14833]: Invalid user admin from 114.32.60.242 port 47612 Jan 20 15:14:27 host sshd[14833]: input_userauth_request: invalid user admin [preauth] Jan 20 15:14:27 host sshd[14833]: pam_unix(sshd:auth): check pass; user unknown Jan 20 15:14:27 host sshd[14833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.60.242 Jan 20 15:14:29 host sshd[14833]: Failed password for invalid user admin from 114.32.60.242 port 47612 ssh2 Jan 20 15:14:30 host sshd[14833]: Failed password for invalid user admin from 114.32.60.242 port 47612 ssh2 Jan 20 15:14:31 host sshd[14833]: pam_unix(sshd:auth): check pass; user unknown Jan 20 15:14:33 host sshd[14833]: Failed password for invalid user admin from 114.32.60.242 port 47612 ssh2 Jan 20 15:14:33 host sshd[14833]: pam_unix(sshd:auth): check pass; user unknown Jan 20 15:14:35 host sshd[14833]: Failed password for invalid user admin from 114.32.60.242 port 47612 ssh2 Jan 20 15:14:36 host sshd[14833]: pam_unix(sshd:auth): check pass; user unknown Jan 20 15:14:37 host sshd[14833]: Failed password for invalid user admin from 114.32.60.242 port 47612 ssh2 Jan 20 15:15:43 host sshd[15028]: Invalid user admin from 183.107.205.177 port 54382 Jan 20 15:15:43 host sshd[15028]: input_userauth_request: invalid user admin [preauth] Jan 20 15:15:43 host sshd[15028]: pam_unix(sshd:auth): check pass; user unknown Jan 20 15:15:43 host sshd[15028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.107.205.177 Jan 20 15:15:45 host sshd[15028]: Failed password for invalid user admin from 183.107.205.177 port 54382 ssh2 Jan 20 15:15:45 host sshd[15028]: Connection closed by 183.107.205.177 port 54382 [preauth] Jan 20 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 15:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=gifterman user-4=palco123 user-5=kottayamcalldriv user-6=phmetals user-7=straightcurve user-8=wwwletsstalkfood user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=wwwkapin user-16=woodpeck user-17=disposeat user-18=wwwkmaorg user-19=remysagr user-20=wwwrmswll user-21=wwwresourcehunte user-22=keralaholi user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 15:21:07 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 15:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 15:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LIk41dpvsdWnaTCM.~ Jan 20 15:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LIk41dpvsdWnaTCM.~' Jan 20 15:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LIk41dpvsdWnaTCM.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 15:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 15:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 15:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 15:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 15:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 15:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 15:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 15:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 15:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 15:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 15:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 15:22:26 host sshd[16296]: User root from 203.229.158.149 not allowed because not listed in AllowUsers Jan 20 15:22:26 host sshd[16296]: input_userauth_request: invalid user root [preauth] Jan 20 15:22:26 host unix_chkpwd[16302]: password check failed for user (root) Jan 20 15:22:26 host sshd[16296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.229.158.149 user=root Jan 20 15:22:26 host sshd[16296]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 15:22:28 host sshd[16296]: Failed password for invalid user root from 203.229.158.149 port 61768 ssh2 Jan 20 15:22:29 host unix_chkpwd[16329]: password check failed for user (root) Jan 20 15:22:29 host sshd[16296]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 15:22:30 host sshd[16296]: Failed password for invalid user root from 203.229.158.149 port 61768 ssh2 Jan 20 15:22:31 host unix_chkpwd[16335]: password check failed for user (root) Jan 20 15:22:31 host sshd[16296]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 15:22:33 host sshd[16296]: Failed password for invalid user root from 203.229.158.149 port 61768 ssh2 Jan 20 15:22:34 host sshd[16296]: Connection reset by 203.229.158.149 port 61768 [preauth] Jan 20 15:22:34 host sshd[16296]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.229.158.149 user=root Jan 20 15:28:30 host sshd[17295]: Invalid user maint1 from 205.185.113.129 port 33332 Jan 20 15:28:30 host sshd[17295]: input_userauth_request: invalid user maint1 [preauth] Jan 20 15:28:30 host sshd[17295]: pam_unix(sshd:auth): check pass; user unknown Jan 20 15:28:30 host sshd[17295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 20 15:28:32 host sshd[17295]: Failed password for invalid user maint1 from 205.185.113.129 port 33332 ssh2 Jan 20 15:28:33 host sshd[17295]: Connection closed by 205.185.113.129 port 33332 [preauth] Jan 20 15:29:12 host sshd[17412]: Did not receive identification string from 110.77.223.119 port 60029 Jan 20 15:42:38 host sshd[19355]: Invalid user gz from 194.110.203.109 port 55882 Jan 20 15:42:38 host sshd[19355]: input_userauth_request: invalid user gz [preauth] Jan 20 15:42:38 host sshd[19355]: pam_unix(sshd:auth): check pass; user unknown Jan 20 15:42:38 host sshd[19355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 15:42:40 host sshd[19355]: Failed password for invalid user gz from 194.110.203.109 port 55882 ssh2 Jan 20 15:42:44 host sshd[19355]: pam_unix(sshd:auth): check pass; user unknown Jan 20 15:42:45 host sshd[19355]: Failed password for invalid user gz from 194.110.203.109 port 55882 ssh2 Jan 20 15:42:48 host sshd[19355]: pam_unix(sshd:auth): check pass; user unknown Jan 20 15:42:50 host sshd[19355]: Failed password for invalid user gz from 194.110.203.109 port 55882 ssh2 Jan 20 15:42:54 host sshd[19355]: Connection closed by 194.110.203.109 port 55882 [preauth] Jan 20 15:42:54 host sshd[19355]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 15:53:29 host sshd[20877]: Invalid user vagrant from 118.163.95.168 port 58962 Jan 20 15:53:29 host sshd[20877]: input_userauth_request: invalid user vagrant [preauth] Jan 20 15:53:29 host sshd[20877]: pam_unix(sshd:auth): check pass; user unknown Jan 20 15:53:29 host sshd[20877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.95.168 Jan 20 15:53:31 host sshd[20877]: Failed password for invalid user vagrant from 118.163.95.168 port 58962 ssh2 Jan 20 15:53:32 host sshd[20877]: Failed password for invalid user vagrant from 118.163.95.168 port 58962 ssh2 Jan 20 15:53:33 host sshd[20877]: Connection closed by 118.163.95.168 port 58962 [preauth] Jan 20 16:18:08 host sshd[24268]: Invalid user monitor from 62.233.50.248 port 41528 Jan 20 16:18:08 host sshd[24268]: input_userauth_request: invalid user monitor [preauth] Jan 20 16:18:08 host sshd[24268]: pam_unix(sshd:auth): check pass; user unknown Jan 20 16:18:08 host sshd[24268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 20 16:18:10 host sshd[24268]: Failed password for invalid user monitor from 62.233.50.248 port 41528 ssh2 Jan 20 16:18:10 host sshd[24268]: Received disconnect from 62.233.50.248 port 41528:11: Client disconnecting normally [preauth] Jan 20 16:18:10 host sshd[24268]: Disconnected from 62.233.50.248 port 41528 [preauth] Jan 20 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=ugotscom user-4=keralaholi user-5=wwwresourcehunte user-6=wwwrmswll user-7=wwwkaretakers user-8=cochintaxi user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwletsstalkfood user-15=straightcurve user-16=phmetals user-17=kottayamcalldriv user-18=palco123 user-19=gifterman user-20=wwwnexidigital user-21=mrsclean user-22=wwwkmaorg user-23=disposeat user-24=remysagr user-25=woodpeck user-26=wwwkapin user-27=shalinijames user-28=wwwtestugo user-29=vfmassets user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 16:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 16:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CX5zD3PAJmeq30z9.~ Jan 20 16:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CX5zD3PAJmeq30z9.~' Jan 20 16:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-CX5zD3PAJmeq30z9.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 16:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 16:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 16:21:14 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 16:21:14 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 16:21:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 16:21:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 16:21:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 16:21:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 16:21:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:21:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 16:21:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 16:21:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 16:40:15 host sshd[27625]: Invalid user pi from 220.94.9.7 port 45304 Jan 20 16:40:15 host sshd[27625]: input_userauth_request: invalid user pi [preauth] Jan 20 16:40:15 host sshd[27625]: pam_unix(sshd:auth): check pass; user unknown Jan 20 16:40:15 host sshd[27625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.94.9.7 Jan 20 16:40:17 host sshd[27625]: Failed password for invalid user pi from 220.94.9.7 port 45304 ssh2 Jan 20 16:40:17 host sshd[27625]: pam_unix(sshd:auth): check pass; user unknown Jan 20 16:40:20 host sshd[27625]: Failed password for invalid user pi from 220.94.9.7 port 45304 ssh2 Jan 20 16:40:20 host sshd[27625]: pam_unix(sshd:auth): check pass; user unknown Jan 20 16:40:22 host sshd[27625]: Failed password for invalid user pi from 220.94.9.7 port 45304 ssh2 Jan 20 16:40:23 host sshd[27625]: pam_unix(sshd:auth): check pass; user unknown Jan 20 16:40:25 host sshd[27625]: Failed password for invalid user pi from 220.94.9.7 port 45304 ssh2 Jan 20 16:40:26 host sshd[27625]: pam_unix(sshd:auth): check pass; user unknown Jan 20 16:40:27 host sshd[27625]: Failed password for invalid user pi from 220.94.9.7 port 45304 ssh2 Jan 20 16:40:41 host sshd[27735]: Connection reset by 122.116.80.142 port 56798 [preauth] Jan 20 16:41:19 host sshd[27835]: Bad protocol version identification 'GET / HTTP/1.1' from 167.71.233.165 port 39334 Jan 20 16:41:37 host sshd[27906]: User root from 167.71.233.165 not allowed because not listed in AllowUsers Jan 20 16:41:37 host sshd[27906]: input_userauth_request: invalid user root [preauth] Jan 20 16:41:37 host unix_chkpwd[27908]: password check failed for user (root) Jan 20 16:41:37 host sshd[27906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.233.165 user=root Jan 20 16:41:37 host sshd[27906]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 16:41:39 host sshd[27906]: Failed password for invalid user root from 167.71.233.165 port 33724 ssh2 Jan 20 16:41:39 host sshd[27906]: Connection closed by 167.71.233.165 port 33724 [preauth] Jan 20 16:41:40 host sshd[27915]: User root from 167.71.233.165 not allowed because not listed in AllowUsers Jan 20 16:41:40 host sshd[27915]: input_userauth_request: invalid user root [preauth] Jan 20 16:41:40 host unix_chkpwd[27917]: password check failed for user (root) Jan 20 16:41:40 host sshd[27915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.233.165 user=root Jan 20 16:41:40 host sshd[27915]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 16:41:42 host sshd[27915]: Failed password for invalid user root from 167.71.233.165 port 33732 ssh2 Jan 20 16:46:10 host sshd[28685]: User root from 108.230.75.54 not allowed because not listed in AllowUsers Jan 20 16:46:10 host sshd[28685]: input_userauth_request: invalid user root [preauth] Jan 20 16:46:11 host unix_chkpwd[28688]: password check failed for user (root) Jan 20 16:46:11 host sshd[28685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.230.75.54 user=root Jan 20 16:46:11 host sshd[28685]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 16:46:13 host sshd[28685]: Failed password for invalid user root from 108.230.75.54 port 61300 ssh2 Jan 20 16:46:14 host unix_chkpwd[28694]: password check failed for user (root) Jan 20 16:46:14 host sshd[28685]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 16:46:16 host sshd[28685]: Failed password for invalid user root from 108.230.75.54 port 61300 ssh2 Jan 20 16:46:16 host unix_chkpwd[28698]: password check failed for user (root) Jan 20 16:46:16 host sshd[28685]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 16:46:18 host sshd[28685]: Failed password for invalid user root from 108.230.75.54 port 61300 ssh2 Jan 20 16:46:19 host unix_chkpwd[28701]: password check failed for user (root) Jan 20 16:46:19 host sshd[28685]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 16:46:20 host sshd[28685]: Failed password for invalid user root from 108.230.75.54 port 61300 ssh2 Jan 20 16:46:21 host unix_chkpwd[28711]: password check failed for user (root) Jan 20 16:46:21 host sshd[28685]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 16:46:23 host sshd[28685]: Failed password for invalid user root from 108.230.75.54 port 61300 ssh2 Jan 20 16:53:31 host sshd[29958]: Connection closed by 60.119.64.113 port 51246 [preauth] Jan 20 17:11:12 host sshd[882]: User ftp from 211.248.1.26 not allowed because not listed in AllowUsers Jan 20 17:11:12 host sshd[882]: input_userauth_request: invalid user ftp [preauth] Jan 20 17:11:12 host unix_chkpwd[889]: password check failed for user (ftp) Jan 20 17:11:12 host sshd[882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.248.1.26 user=ftp Jan 20 17:11:12 host sshd[882]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 20 17:11:15 host sshd[882]: Failed password for invalid user ftp from 211.248.1.26 port 50139 ssh2 Jan 20 17:11:16 host unix_chkpwd[895]: password check failed for user (ftp) Jan 20 17:11:16 host sshd[882]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 20 17:11:17 host sshd[882]: Failed password for invalid user ftp from 211.248.1.26 port 50139 ssh2 Jan 20 17:11:18 host unix_chkpwd[904]: password check failed for user (ftp) Jan 20 17:11:18 host sshd[882]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 20 17:11:20 host sshd[882]: Failed password for invalid user ftp from 211.248.1.26 port 50139 ssh2 Jan 20 17:11:21 host sshd[882]: Failed password for invalid user ftp from 211.248.1.26 port 50139 ssh2 Jan 20 17:11:22 host unix_chkpwd[921]: password check failed for user (ftp) Jan 20 17:11:22 host sshd[882]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 20 17:11:24 host sshd[882]: Failed password for invalid user ftp from 211.248.1.26 port 50139 ssh2 Jan 20 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=phmetals user-2=kottayamcalldriv user-3=palco123 user-4=gifterman user-5=wwwnexidigital user-6=mrsclean user-7=wwwevmhonda user-8=bonifacegroup user-9=wwwletsstalkfood user-10=straightcurve user-11=shalinijames user-12=wwwtestugo user-13=vfmassets user-14=pmcresources user-15=disposeat user-16=remysagr user-17=wwwkmaorg user-18=wwwkapin user-19=woodpeck user-20=travelboniface user-21=ugotscom user-22=wwwresourcehunte user-23=keralaholi user-24=wwwrmswll user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 17:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 17:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-400QzAm2gJQLjaJR.~ Jan 20 17:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-400QzAm2gJQLjaJR.~' Jan 20 17:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-400QzAm2gJQLjaJR.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 17:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 17:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 17:21:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 17:21:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 17:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 17:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 17:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 17:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 17:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 17:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 17:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 17:23:41 host sshd[3566]: Connection reset by 114.33.61.109 port 56964 [preauth] Jan 20 17:29:49 host sshd[4695]: Invalid user zyfwp from 125.135.227.101 port 63506 Jan 20 17:29:49 host sshd[4695]: input_userauth_request: invalid user zyfwp [preauth] Jan 20 17:29:49 host sshd[4695]: pam_unix(sshd:auth): check pass; user unknown Jan 20 17:29:49 host sshd[4695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.135.227.101 Jan 20 17:29:51 host sshd[4695]: Failed password for invalid user zyfwp from 125.135.227.101 port 63506 ssh2 Jan 20 17:29:51 host sshd[4695]: pam_unix(sshd:auth): check pass; user unknown Jan 20 17:29:53 host sshd[4695]: Failed password for invalid user zyfwp from 125.135.227.101 port 63506 ssh2 Jan 20 17:29:54 host sshd[4695]: pam_unix(sshd:auth): check pass; user unknown Jan 20 17:29:56 host sshd[4695]: Failed password for invalid user zyfwp from 125.135.227.101 port 63506 ssh2 Jan 20 17:29:58 host sshd[4728]: Did not receive identification string from 46.101.97.107 port 61000 Jan 20 17:31:17 host sshd[4969]: Invalid user h from 194.110.203.109 port 50170 Jan 20 17:31:17 host sshd[4969]: input_userauth_request: invalid user h [preauth] Jan 20 17:31:17 host sshd[4969]: pam_unix(sshd:auth): check pass; user unknown Jan 20 17:31:17 host sshd[4969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 17:31:19 host sshd[4969]: Failed password for invalid user h from 194.110.203.109 port 50170 ssh2 Jan 20 17:31:22 host sshd[4969]: pam_unix(sshd:auth): check pass; user unknown Jan 20 17:31:24 host sshd[4969]: Failed password for invalid user h from 194.110.203.109 port 50170 ssh2 Jan 20 17:31:27 host sshd[4969]: pam_unix(sshd:auth): check pass; user unknown Jan 20 17:31:29 host sshd[4969]: Failed password for invalid user h from 194.110.203.109 port 50170 ssh2 Jan 20 17:31:32 host sshd[4969]: Connection closed by 194.110.203.109 port 50170 [preauth] Jan 20 17:31:32 host sshd[4969]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 18:03:13 host sshd[11428]: User root from 121.254.106.72 not allowed because not listed in AllowUsers Jan 20 18:03:13 host sshd[11428]: input_userauth_request: invalid user root [preauth] Jan 20 18:03:13 host unix_chkpwd[11439]: password check failed for user (root) Jan 20 18:03:13 host sshd[11428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.254.106.72 user=root Jan 20 18:03:13 host sshd[11428]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 18:03:13 host sshd[11434]: Invalid user pi from 121.254.106.72 port 52082 Jan 20 18:03:13 host sshd[11434]: input_userauth_request: invalid user pi [preauth] Jan 20 18:03:13 host sshd[11434]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:03:13 host sshd[11434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.254.106.72 Jan 20 18:03:14 host sshd[11429]: Invalid user usr from 121.254.106.72 port 52060 Jan 20 18:03:14 host sshd[11429]: input_userauth_request: invalid user usr [preauth] Jan 20 18:03:14 host sshd[11429]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:03:14 host sshd[11429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.254.106.72 Jan 20 18:03:15 host sshd[11428]: Failed password for invalid user root from 121.254.106.72 port 52042 ssh2 Jan 20 18:03:15 host sshd[11434]: Failed password for invalid user pi from 121.254.106.72 port 52082 ssh2 Jan 20 18:03:15 host sshd[11429]: Failed password for invalid user usr from 121.254.106.72 port 52060 ssh2 Jan 20 18:03:16 host unix_chkpwd[11442]: password check failed for user (root) Jan 20 18:03:16 host sshd[11428]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 18:03:16 host sshd[11429]: Connection reset by 121.254.106.72 port 52060 [preauth] Jan 20 18:03:17 host sshd[11434]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:03:18 host sshd[11428]: Failed password for invalid user root from 121.254.106.72 port 52042 ssh2 Jan 20 18:03:19 host unix_chkpwd[11457]: password check failed for user (root) Jan 20 18:03:19 host sshd[11428]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 18:03:19 host sshd[11434]: Failed password for invalid user pi from 121.254.106.72 port 52082 ssh2 Jan 20 18:03:21 host sshd[11428]: Failed password for invalid user root from 121.254.106.72 port 52042 ssh2 Jan 20 18:12:22 host sshd[13156]: Invalid user tu from 165.227.182.136 port 41290 Jan 20 18:12:22 host sshd[13156]: input_userauth_request: invalid user tu [preauth] Jan 20 18:12:22 host sshd[13156]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:12:22 host sshd[13156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.182.136 Jan 20 18:12:24 host sshd[13156]: Failed password for invalid user tu from 165.227.182.136 port 41290 ssh2 Jan 20 18:12:24 host sshd[13156]: Received disconnect from 165.227.182.136 port 41290:11: Bye Bye [preauth] Jan 20 18:12:24 host sshd[13156]: Disconnected from 165.227.182.136 port 41290 [preauth] Jan 20 18:12:25 host sshd[13167]: User sshd from 194.169.175.102 not allowed because not listed in AllowUsers Jan 20 18:12:25 host sshd[13167]: input_userauth_request: invalid user sshd [preauth] Jan 20 18:12:25 host unix_chkpwd[13170]: password check failed for user (sshd) Jan 20 18:12:25 host sshd[13167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=sshd Jan 20 18:12:25 host sshd[13167]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sshd" Jan 20 18:12:27 host sshd[13167]: Failed password for invalid user sshd from 194.169.175.102 port 49407 ssh2 Jan 20 18:12:27 host sshd[13167]: Received disconnect from 194.169.175.102 port 49407:11: Client disconnecting normally [preauth] Jan 20 18:12:27 host sshd[13167]: Disconnected from 194.169.175.102 port 49407 [preauth] Jan 20 18:12:46 host sshd[13237]: Invalid user labuser from 103.242.199.129 port 38334 Jan 20 18:12:46 host sshd[13237]: input_userauth_request: invalid user labuser [preauth] Jan 20 18:12:46 host sshd[13237]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:12:46 host sshd[13237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.242.199.129 Jan 20 18:12:48 host sshd[13237]: Failed password for invalid user labuser from 103.242.199.129 port 38334 ssh2 Jan 20 18:12:48 host sshd[13237]: Received disconnect from 103.242.199.129 port 38334:11: Bye Bye [preauth] Jan 20 18:12:48 host sshd[13237]: Disconnected from 103.242.199.129 port 38334 [preauth] Jan 20 18:12:58 host sshd[13377]: Invalid user elk from 143.198.77.231 port 51286 Jan 20 18:12:58 host sshd[13377]: input_userauth_request: invalid user elk [preauth] Jan 20 18:12:58 host sshd[13377]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:12:58 host sshd[13377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.77.231 Jan 20 18:13:00 host sshd[13377]: Failed password for invalid user elk from 143.198.77.231 port 51286 ssh2 Jan 20 18:13:00 host sshd[13377]: Received disconnect from 143.198.77.231 port 51286:11: Bye Bye [preauth] Jan 20 18:13:00 host sshd[13377]: Disconnected from 143.198.77.231 port 51286 [preauth] Jan 20 18:14:10 host sshd[13615]: Invalid user testman from 114.205.54.184 port 43800 Jan 20 18:14:10 host sshd[13615]: input_userauth_request: invalid user testman [preauth] Jan 20 18:14:10 host sshd[13615]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:14:10 host sshd[13615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.205.54.184 Jan 20 18:14:10 host sshd[13612]: Invalid user postmaster from 107.173.86.225 port 48624 Jan 20 18:14:10 host sshd[13612]: input_userauth_request: invalid user postmaster [preauth] Jan 20 18:14:10 host sshd[13612]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:14:10 host sshd[13612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.86.225 Jan 20 18:14:12 host sshd[13615]: Failed password for invalid user testman from 114.205.54.184 port 43800 ssh2 Jan 20 18:14:12 host sshd[13612]: Failed password for invalid user postmaster from 107.173.86.225 port 48624 ssh2 Jan 20 18:14:12 host sshd[13615]: Received disconnect from 114.205.54.184 port 43800:11: Bye Bye [preauth] Jan 20 18:14:12 host sshd[13615]: Disconnected from 114.205.54.184 port 43800 [preauth] Jan 20 18:14:13 host sshd[13612]: Received disconnect from 107.173.86.225 port 48624:11: Bye Bye [preauth] Jan 20 18:14:13 host sshd[13612]: Disconnected from 107.173.86.225 port 48624 [preauth] Jan 20 18:16:08 host sshd[14027]: Invalid user admin from 157.245.107.128 port 64621 Jan 20 18:16:08 host sshd[14027]: input_userauth_request: invalid user admin [preauth] Jan 20 18:16:08 host sshd[14027]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:16:08 host sshd[14027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.107.128 Jan 20 18:16:10 host sshd[14027]: Failed password for invalid user admin from 157.245.107.128 port 64621 ssh2 Jan 20 18:16:10 host sshd[14027]: Received disconnect from 157.245.107.128 port 64621:11: Bye Bye [preauth] Jan 20 18:16:10 host sshd[14027]: Disconnected from 157.245.107.128 port 64621 [preauth] Jan 20 18:17:38 host sshd[14286]: Invalid user otrs from 139.99.237.82 port 53330 Jan 20 18:17:38 host sshd[14286]: input_userauth_request: invalid user otrs [preauth] Jan 20 18:17:38 host sshd[14286]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:17:38 host sshd[14286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.237.82 Jan 20 18:17:40 host sshd[14286]: Failed password for invalid user otrs from 139.99.237.82 port 53330 ssh2 Jan 20 18:17:40 host sshd[14286]: Received disconnect from 139.99.237.82 port 53330:11: Bye Bye [preauth] Jan 20 18:17:40 host sshd[14286]: Disconnected from 139.99.237.82 port 53330 [preauth] Jan 20 18:18:03 host sshd[14355]: Invalid user tom from 165.227.182.136 port 43344 Jan 20 18:18:03 host sshd[14355]: input_userauth_request: invalid user tom [preauth] Jan 20 18:18:03 host sshd[14355]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:18:03 host sshd[14355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.182.136 Jan 20 18:18:04 host sshd[14355]: Failed password for invalid user tom from 165.227.182.136 port 43344 ssh2 Jan 20 18:18:04 host sshd[14355]: Received disconnect from 165.227.182.136 port 43344:11: Bye Bye [preauth] Jan 20 18:18:04 host sshd[14355]: Disconnected from 165.227.182.136 port 43344 [preauth] Jan 20 18:18:07 host sshd[14371]: Invalid user admin from 103.242.199.129 port 36590 Jan 20 18:18:07 host sshd[14371]: input_userauth_request: invalid user admin [preauth] Jan 20 18:18:07 host sshd[14371]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:18:07 host sshd[14371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.242.199.129 Jan 20 18:18:10 host sshd[14371]: Failed password for invalid user admin from 103.242.199.129 port 36590 ssh2 Jan 20 18:18:10 host sshd[14371]: Received disconnect from 103.242.199.129 port 36590:11: Bye Bye [preauth] Jan 20 18:18:10 host sshd[14371]: Disconnected from 103.242.199.129 port 36590 [preauth] Jan 20 18:18:58 host sshd[14491]: Invalid user alpine from 107.173.86.225 port 39520 Jan 20 18:18:58 host sshd[14491]: input_userauth_request: invalid user alpine [preauth] Jan 20 18:18:58 host sshd[14491]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:18:58 host sshd[14491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.86.225 Jan 20 18:19:00 host sshd[14491]: Failed password for invalid user alpine from 107.173.86.225 port 39520 ssh2 Jan 20 18:19:00 host sshd[14491]: Received disconnect from 107.173.86.225 port 39520:11: Bye Bye [preauth] Jan 20 18:19:00 host sshd[14491]: Disconnected from 107.173.86.225 port 39520 [preauth] Jan 20 18:19:07 host sshd[14521]: Invalid user julian from 185.182.105.17 port 29966 Jan 20 18:19:07 host sshd[14521]: input_userauth_request: invalid user julian [preauth] Jan 20 18:19:07 host sshd[14521]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:19:07 host sshd[14521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.182.105.17 Jan 20 18:19:07 host sshd[14519]: Invalid user user13 from 165.227.182.136 port 41996 Jan 20 18:19:07 host sshd[14519]: input_userauth_request: invalid user user13 [preauth] Jan 20 18:19:07 host sshd[14519]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:19:07 host sshd[14519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.182.136 Jan 20 18:19:09 host sshd[14521]: Failed password for invalid user julian from 185.182.105.17 port 29966 ssh2 Jan 20 18:19:09 host sshd[14519]: Failed password for invalid user user13 from 165.227.182.136 port 41996 ssh2 Jan 20 18:19:09 host sshd[14521]: Received disconnect from 185.182.105.17 port 29966:11: Bye Bye [preauth] Jan 20 18:19:09 host sshd[14521]: Disconnected from 185.182.105.17 port 29966 [preauth] Jan 20 18:19:09 host sshd[14519]: Received disconnect from 165.227.182.136 port 41996:11: Bye Bye [preauth] Jan 20 18:19:09 host sshd[14519]: Disconnected from 165.227.182.136 port 41996 [preauth] Jan 20 18:19:41 host sshd[14757]: Invalid user testsite from 103.242.199.129 port 36636 Jan 20 18:19:41 host sshd[14757]: input_userauth_request: invalid user testsite [preauth] Jan 20 18:19:41 host sshd[14757]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:19:41 host sshd[14757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.242.199.129 Jan 20 18:19:41 host sshd[14755]: Invalid user eric from 114.205.54.184 port 35470 Jan 20 18:19:41 host sshd[14755]: input_userauth_request: invalid user eric [preauth] Jan 20 18:19:41 host sshd[14755]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:19:41 host sshd[14755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.205.54.184 Jan 20 18:19:43 host sshd[14757]: Failed password for invalid user testsite from 103.242.199.129 port 36636 ssh2 Jan 20 18:19:43 host sshd[14757]: Received disconnect from 103.242.199.129 port 36636:11: Bye Bye [preauth] Jan 20 18:19:43 host sshd[14757]: Disconnected from 103.242.199.129 port 36636 [preauth] Jan 20 18:19:43 host sshd[14755]: Failed password for invalid user eric from 114.205.54.184 port 35470 ssh2 Jan 20 18:19:43 host sshd[14755]: Received disconnect from 114.205.54.184 port 35470:11: Bye Bye [preauth] Jan 20 18:19:43 host sshd[14755]: Disconnected from 114.205.54.184 port 35470 [preauth] Jan 20 18:19:54 host sshd[14822]: Invalid user gitlab-psql from 157.245.107.128 port 47010 Jan 20 18:19:54 host sshd[14822]: input_userauth_request: invalid user gitlab-psql [preauth] Jan 20 18:19:54 host sshd[14822]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:19:54 host sshd[14822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.107.128 Jan 20 18:19:56 host sshd[14822]: Failed password for invalid user gitlab-psql from 157.245.107.128 port 47010 ssh2 Jan 20 18:19:56 host sshd[14822]: Received disconnect from 157.245.107.128 port 47010:11: Bye Bye [preauth] Jan 20 18:19:56 host sshd[14822]: Disconnected from 157.245.107.128 port 47010 [preauth] Jan 20 18:19:59 host sshd[14831]: Invalid user ftpadmin from 139.99.237.82 port 60324 Jan 20 18:19:59 host sshd[14831]: input_userauth_request: invalid user ftpadmin [preauth] Jan 20 18:19:59 host sshd[14831]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:19:59 host sshd[14831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.237.82 Jan 20 18:20:02 host sshd[14831]: Failed password for invalid user ftpadmin from 139.99.237.82 port 60324 ssh2 Jan 20 18:20:02 host sshd[14831]: Received disconnect from 139.99.237.82 port 60324:11: Bye Bye [preauth] Jan 20 18:20:02 host sshd[14831]: Disconnected from 139.99.237.82 port 60324 [preauth] Jan 20 18:20:05 host sshd[14871]: Invalid user trojanuser from 107.173.86.225 port 34338 Jan 20 18:20:05 host sshd[14871]: input_userauth_request: invalid user trojanuser [preauth] Jan 20 18:20:05 host sshd[14871]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:20:05 host sshd[14871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.86.225 Jan 20 18:20:07 host sshd[14871]: Failed password for invalid user trojanuser from 107.173.86.225 port 34338 ssh2 Jan 20 18:20:07 host sshd[14871]: Received disconnect from 107.173.86.225 port 34338:11: Bye Bye [preauth] Jan 20 18:20:07 host sshd[14871]: Disconnected from 107.173.86.225 port 34338 [preauth] Jan 20 18:20:47 host sshd[15019]: Invalid user ubuntu from 143.198.77.231 port 49492 Jan 20 18:20:47 host sshd[15019]: input_userauth_request: invalid user ubuntu [preauth] Jan 20 18:20:47 host sshd[15019]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:20:47 host sshd[15019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.77.231 Jan 20 18:20:49 host sshd[15019]: Failed password for invalid user ubuntu from 143.198.77.231 port 49492 ssh2 Jan 20 18:20:49 host sshd[15019]: Received disconnect from 143.198.77.231 port 49492:11: Bye Bye [preauth] Jan 20 18:20:49 host sshd[15019]: Disconnected from 143.198.77.231 port 49492 [preauth] Jan 20 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 18:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=wwwletsstalkfood user-4=straightcurve user-5=kottayamcalldriv user-6=phmetals user-7=palco123 user-8=gifterman user-9=mrsclean user-10=wwwnexidigital user-11=wwwkmaorg user-12=disposeat user-13=remysagr user-14=woodpeck user-15=wwwkapin user-16=shalinijames user-17=wwwtestugo user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=keralaholi user-24=wwwresourcehunte user-25=wwwrmswll user-26=cochintaxi user-27=wwwkaretakers user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 18:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1HJNzAa3cOpY0e1U.~ Jan 20 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1HJNzAa3cOpY0e1U.~' Jan 20 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-1HJNzAa3cOpY0e1U.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 18:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 18:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 18:21:07 host sshd[15194]: Invalid user ftpuser from 114.205.54.184 port 58874 Jan 20 18:21:07 host sshd[15194]: input_userauth_request: invalid user ftpuser [preauth] Jan 20 18:21:07 host sshd[15194]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:21:07 host sshd[15194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.205.54.184 Jan 20 18:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 18:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 18:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 18:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 18:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:09 host sshd[15194]: Failed password for invalid user ftpuser from 114.205.54.184 port 58874 ssh2 Jan 20 18:21:09 host sshd[15194]: Received disconnect from 114.205.54.184 port 58874:11: Bye Bye [preauth] Jan 20 18:21:09 host sshd[15194]: Disconnected from 114.205.54.184 port 58874 [preauth] Jan 20 18:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 18:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 18:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 18:21:18 host sshd[15351]: Invalid user trojanuser from 157.245.107.128 port 13639 Jan 20 18:21:18 host sshd[15351]: input_userauth_request: invalid user trojanuser [preauth] Jan 20 18:21:18 host sshd[15351]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:21:18 host sshd[15351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.107.128 Jan 20 18:21:19 host sshd[15351]: Failed password for invalid user trojanuser from 157.245.107.128 port 13639 ssh2 Jan 20 18:21:19 host sshd[15351]: Received disconnect from 157.245.107.128 port 13639:11: Bye Bye [preauth] Jan 20 18:21:19 host sshd[15351]: Disconnected from 157.245.107.128 port 13639 [preauth] Jan 20 18:21:30 host sshd[15455]: Invalid user pos from 139.99.237.82 port 43978 Jan 20 18:21:30 host sshd[15455]: input_userauth_request: invalid user pos [preauth] Jan 20 18:21:30 host sshd[15455]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:21:30 host sshd[15455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.237.82 Jan 20 18:21:31 host sshd[15455]: Failed password for invalid user pos from 139.99.237.82 port 43978 ssh2 Jan 20 18:21:32 host sshd[15455]: Received disconnect from 139.99.237.82 port 43978:11: Bye Bye [preauth] Jan 20 18:21:32 host sshd[15455]: Disconnected from 139.99.237.82 port 43978 [preauth] Jan 20 18:21:51 host sshd[15529]: Invalid user faxadmin from 185.182.105.17 port 58144 Jan 20 18:21:51 host sshd[15529]: input_userauth_request: invalid user faxadmin [preauth] Jan 20 18:21:51 host sshd[15529]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:21:51 host sshd[15529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.182.105.17 Jan 20 18:21:52 host sshd[15529]: Failed password for invalid user faxadmin from 185.182.105.17 port 58144 ssh2 Jan 20 18:21:53 host sshd[15529]: Received disconnect from 185.182.105.17 port 58144:11: Bye Bye [preauth] Jan 20 18:21:53 host sshd[15529]: Disconnected from 185.182.105.17 port 58144 [preauth] Jan 20 18:21:59 host sshd[15543]: Invalid user zope from 134.17.89.182 port 50714 Jan 20 18:21:59 host sshd[15543]: input_userauth_request: invalid user zope [preauth] Jan 20 18:21:59 host sshd[15543]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:21:59 host sshd[15543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.89.182 Jan 20 18:22:01 host sshd[15543]: Failed password for invalid user zope from 134.17.89.182 port 50714 ssh2 Jan 20 18:22:01 host sshd[15543]: Received disconnect from 134.17.89.182 port 50714:11: Bye Bye [preauth] Jan 20 18:22:01 host sshd[15543]: Disconnected from 134.17.89.182 port 50714 [preauth] Jan 20 18:22:05 host sshd[15572]: Invalid user dockeruser from 165.154.242.88 port 46218 Jan 20 18:22:05 host sshd[15572]: input_userauth_request: invalid user dockeruser [preauth] Jan 20 18:22:05 host sshd[15572]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:22:05 host sshd[15572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.242.88 Jan 20 18:22:07 host sshd[15572]: Failed password for invalid user dockeruser from 165.154.242.88 port 46218 ssh2 Jan 20 18:22:07 host sshd[15572]: Received disconnect from 165.154.242.88 port 46218:11: Bye Bye [preauth] Jan 20 18:22:07 host sshd[15572]: Disconnected from 165.154.242.88 port 46218 [preauth] Jan 20 18:22:20 host sshd[15599]: Invalid user postgres from 178.161.243.41 port 59288 Jan 20 18:22:20 host sshd[15599]: input_userauth_request: invalid user postgres [preauth] Jan 20 18:22:20 host sshd[15599]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:22:20 host sshd[15599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.161.243.41 Jan 20 18:22:22 host sshd[15599]: Failed password for invalid user postgres from 178.161.243.41 port 59288 ssh2 Jan 20 18:22:22 host sshd[15599]: Received disconnect from 178.161.243.41 port 59288:11: Bye Bye [preauth] Jan 20 18:22:22 host sshd[15599]: Disconnected from 178.161.243.41 port 59288 [preauth] Jan 20 18:22:55 host sshd[15686]: Invalid user test from 143.198.77.231 port 38852 Jan 20 18:22:55 host sshd[15686]: input_userauth_request: invalid user test [preauth] Jan 20 18:22:55 host sshd[15686]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:22:55 host sshd[15686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.77.231 Jan 20 18:22:57 host sshd[15686]: Failed password for invalid user test from 143.198.77.231 port 38852 ssh2 Jan 20 18:22:57 host sshd[15686]: Received disconnect from 143.198.77.231 port 38852:11: Bye Bye [preauth] Jan 20 18:22:57 host sshd[15686]: Disconnected from 143.198.77.231 port 38852 [preauth] Jan 20 18:23:27 host sshd[15794]: Invalid user ftpadmin from 185.182.105.17 port 25172 Jan 20 18:23:27 host sshd[15794]: input_userauth_request: invalid user ftpadmin [preauth] Jan 20 18:23:27 host sshd[15794]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:23:27 host sshd[15794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.182.105.17 Jan 20 18:23:28 host sshd[15794]: Failed password for invalid user ftpadmin from 185.182.105.17 port 25172 ssh2 Jan 20 18:23:29 host sshd[15794]: Received disconnect from 185.182.105.17 port 25172:11: Bye Bye [preauth] Jan 20 18:23:29 host sshd[15794]: Disconnected from 185.182.105.17 port 25172 [preauth] Jan 20 18:24:01 host sshd[15935]: Invalid user user from 94.110.124.21 port 37878 Jan 20 18:24:01 host sshd[15935]: input_userauth_request: invalid user user [preauth] Jan 20 18:24:01 host sshd[15935]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:24:01 host sshd[15935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.110.124.21 Jan 20 18:24:04 host sshd[15935]: Failed password for invalid user user from 94.110.124.21 port 37878 ssh2 Jan 20 18:24:04 host sshd[15935]: Received disconnect from 94.110.124.21 port 37878:11: Bye Bye [preauth] Jan 20 18:24:04 host sshd[15935]: Disconnected from 94.110.124.21 port 37878 [preauth] Jan 20 18:24:33 host sshd[16126]: Invalid user pi from 60.249.7.81 port 55102 Jan 20 18:24:33 host sshd[16126]: input_userauth_request: invalid user pi [preauth] Jan 20 18:24:33 host sshd[16126]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:24:33 host sshd[16126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.249.7.81 Jan 20 18:24:35 host sshd[16126]: Failed password for invalid user pi from 60.249.7.81 port 55102 ssh2 Jan 20 18:24:35 host sshd[16126]: Connection reset by 60.249.7.81 port 55102 [preauth] Jan 20 18:26:48 host sshd[16501]: Invalid user euser from 94.110.124.21 port 46966 Jan 20 18:26:48 host sshd[16501]: input_userauth_request: invalid user euser [preauth] Jan 20 18:26:48 host sshd[16501]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:26:48 host sshd[16501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.110.124.21 Jan 20 18:26:50 host sshd[16501]: Failed password for invalid user euser from 94.110.124.21 port 46966 ssh2 Jan 20 18:26:51 host sshd[16501]: Received disconnect from 94.110.124.21 port 46966:11: Bye Bye [preauth] Jan 20 18:26:51 host sshd[16501]: Disconnected from 94.110.124.21 port 46966 [preauth] Jan 20 18:27:07 host sshd[16553]: Invalid user ubuntu from 178.161.243.41 port 47413 Jan 20 18:27:07 host sshd[16553]: input_userauth_request: invalid user ubuntu [preauth] Jan 20 18:27:07 host sshd[16553]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:27:07 host sshd[16553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.161.243.41 Jan 20 18:27:09 host sshd[16553]: Failed password for invalid user ubuntu from 178.161.243.41 port 47413 ssh2 Jan 20 18:27:09 host sshd[16553]: Received disconnect from 178.161.243.41 port 47413:11: Bye Bye [preauth] Jan 20 18:27:09 host sshd[16553]: Disconnected from 178.161.243.41 port 47413 [preauth] Jan 20 18:27:13 host sshd[16566]: Did not receive identification string from 45.33.80.243 port 35550 Jan 20 18:27:16 host sshd[16568]: Connection closed by 45.33.80.243 port 18022 [preauth] Jan 20 18:27:17 host sshd[16579]: Did not receive identification string from 45.33.80.243 port 18030 Jan 20 18:27:53 host sshd[16686]: Invalid user itmuser from 134.17.89.182 port 44480 Jan 20 18:27:53 host sshd[16686]: input_userauth_request: invalid user itmuser [preauth] Jan 20 18:27:53 host sshd[16686]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:27:53 host sshd[16686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.89.182 Jan 20 18:27:54 host sshd[16686]: Failed password for invalid user itmuser from 134.17.89.182 port 44480 ssh2 Jan 20 18:27:55 host sshd[16686]: Received disconnect from 134.17.89.182 port 44480:11: Bye Bye [preauth] Jan 20 18:27:55 host sshd[16686]: Disconnected from 134.17.89.182 port 44480 [preauth] Jan 20 18:28:03 host sshd[16733]: Invalid user hpcadmin from 94.110.124.21 port 45978 Jan 20 18:28:03 host sshd[16733]: input_userauth_request: invalid user hpcadmin [preauth] Jan 20 18:28:03 host sshd[16733]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:28:03 host sshd[16733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.110.124.21 Jan 20 18:28:05 host sshd[16733]: Failed password for invalid user hpcadmin from 94.110.124.21 port 45978 ssh2 Jan 20 18:28:05 host sshd[16733]: Received disconnect from 94.110.124.21 port 45978:11: Bye Bye [preauth] Jan 20 18:28:05 host sshd[16733]: Disconnected from 94.110.124.21 port 45978 [preauth] Jan 20 18:28:07 host sshd[16776]: Invalid user frank from 165.154.242.88 port 44552 Jan 20 18:28:07 host sshd[16776]: input_userauth_request: invalid user frank [preauth] Jan 20 18:28:07 host sshd[16776]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:28:07 host sshd[16776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.242.88 Jan 20 18:28:09 host sshd[16776]: Failed password for invalid user frank from 165.154.242.88 port 44552 ssh2 Jan 20 18:28:09 host sshd[16776]: Received disconnect from 165.154.242.88 port 44552:11: Bye Bye [preauth] Jan 20 18:28:09 host sshd[16776]: Disconnected from 165.154.242.88 port 44552 [preauth] Jan 20 18:28:21 host sshd[16823]: Invalid user tempadmin from 178.161.243.41 port 54268 Jan 20 18:28:21 host sshd[16823]: input_userauth_request: invalid user tempadmin [preauth] Jan 20 18:28:21 host sshd[16823]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:28:21 host sshd[16823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.161.243.41 Jan 20 18:28:24 host sshd[16823]: Failed password for invalid user tempadmin from 178.161.243.41 port 54268 ssh2 Jan 20 18:28:24 host sshd[16823]: Received disconnect from 178.161.243.41 port 54268:11: Bye Bye [preauth] Jan 20 18:28:24 host sshd[16823]: Disconnected from 178.161.243.41 port 54268 [preauth] Jan 20 18:29:14 host sshd[17002]: Invalid user devadmin from 134.17.89.182 port 38908 Jan 20 18:29:14 host sshd[17002]: input_userauth_request: invalid user devadmin [preauth] Jan 20 18:29:14 host sshd[17002]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:29:14 host sshd[17002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.89.182 Jan 20 18:29:16 host sshd[17002]: Failed password for invalid user devadmin from 134.17.89.182 port 38908 ssh2 Jan 20 18:29:25 host sshd[17061]: Invalid user testuser from 165.154.242.88 port 11980 Jan 20 18:29:25 host sshd[17061]: input_userauth_request: invalid user testuser [preauth] Jan 20 18:29:25 host sshd[17061]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:29:25 host sshd[17061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.154.242.88 Jan 20 18:29:27 host sshd[17061]: Failed password for invalid user testuser from 165.154.242.88 port 11980 ssh2 Jan 20 18:29:27 host sshd[17061]: Received disconnect from 165.154.242.88 port 11980:11: Bye Bye [preauth] Jan 20 18:29:27 host sshd[17061]: Disconnected from 165.154.242.88 port 11980 [preauth] Jan 20 18:31:21 host sshd[17555]: Invalid user administrator from 103.179.56.43 port 50416 Jan 20 18:31:21 host sshd[17555]: input_userauth_request: invalid user administrator [preauth] Jan 20 18:31:21 host sshd[17555]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:31:21 host sshd[17555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.179.56.43 Jan 20 18:31:22 host sshd[17555]: Failed password for invalid user administrator from 103.179.56.43 port 50416 ssh2 Jan 20 18:31:22 host sshd[17555]: Received disconnect from 103.179.56.43 port 50416:11: Bye Bye [preauth] Jan 20 18:31:22 host sshd[17555]: Disconnected from 103.179.56.43 port 50416 [preauth] Jan 20 18:32:20 host sshd[17747]: Invalid user cumulus from 212.83.144.11 port 47612 Jan 20 18:32:20 host sshd[17747]: input_userauth_request: invalid user cumulus [preauth] Jan 20 18:32:20 host sshd[17747]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:32:20 host sshd[17747]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.83.144.11 Jan 20 18:32:23 host sshd[17747]: Failed password for invalid user cumulus from 212.83.144.11 port 47612 ssh2 Jan 20 18:32:23 host sshd[17747]: Received disconnect from 212.83.144.11 port 47612:11: Bye Bye [preauth] Jan 20 18:32:23 host sshd[17747]: Disconnected from 212.83.144.11 port 47612 [preauth] Jan 20 18:32:48 host sshd[17829]: Invalid user cpd from 49.236.204.16 port 40277 Jan 20 18:32:48 host sshd[17829]: input_userauth_request: invalid user cpd [preauth] Jan 20 18:32:48 host sshd[17829]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:32:48 host sshd[17829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.236.204.16 Jan 20 18:32:50 host sshd[17829]: Failed password for invalid user cpd from 49.236.204.16 port 40277 ssh2 Jan 20 18:32:50 host sshd[17829]: Received disconnect from 49.236.204.16 port 40277:11: Bye Bye [preauth] Jan 20 18:32:50 host sshd[17829]: Disconnected from 49.236.204.16 port 40277 [preauth] Jan 20 18:33:53 host sshd[18037]: Invalid user testik from 58.186.85.94 port 56436 Jan 20 18:33:53 host sshd[18037]: input_userauth_request: invalid user testik [preauth] Jan 20 18:33:53 host sshd[18037]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:33:53 host sshd[18037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.186.85.94 Jan 20 18:33:55 host sshd[18037]: Failed password for invalid user testik from 58.186.85.94 port 56436 ssh2 Jan 20 18:33:56 host sshd[18037]: Received disconnect from 58.186.85.94 port 56436:11: Bye Bye [preauth] Jan 20 18:33:56 host sshd[18037]: Disconnected from 58.186.85.94 port 56436 [preauth] Jan 20 18:37:05 host sshd[18706]: Invalid user jan from 103.179.56.43 port 49314 Jan 20 18:37:05 host sshd[18706]: input_userauth_request: invalid user jan [preauth] Jan 20 18:37:05 host sshd[18706]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:37:05 host sshd[18706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.179.56.43 Jan 20 18:37:07 host sshd[18706]: Failed password for invalid user jan from 103.179.56.43 port 49314 ssh2 Jan 20 18:37:08 host sshd[18706]: Received disconnect from 103.179.56.43 port 49314:11: Bye Bye [preauth] Jan 20 18:37:08 host sshd[18706]: Disconnected from 103.179.56.43 port 49314 [preauth] Jan 20 18:37:43 host sshd[18805]: Invalid user srvadmin from 49.236.204.16 port 35507 Jan 20 18:37:43 host sshd[18805]: input_userauth_request: invalid user srvadmin [preauth] Jan 20 18:37:43 host sshd[18805]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:37:43 host sshd[18805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.236.204.16 Jan 20 18:37:45 host sshd[18805]: Failed password for invalid user srvadmin from 49.236.204.16 port 35507 ssh2 Jan 20 18:37:45 host sshd[18805]: Received disconnect from 49.236.204.16 port 35507:11: Bye Bye [preauth] Jan 20 18:37:45 host sshd[18805]: Disconnected from 49.236.204.16 port 35507 [preauth] Jan 20 18:38:02 host sshd[18840]: Invalid user sFTPUser from 175.200.90.176 port 62980 Jan 20 18:38:02 host sshd[18840]: input_userauth_request: invalid user sFTPUser [preauth] Jan 20 18:38:02 host sshd[18840]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:38:02 host sshd[18840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.200.90.176 Jan 20 18:38:04 host sshd[18840]: Failed password for invalid user sFTPUser from 175.200.90.176 port 62980 ssh2 Jan 20 18:38:04 host sshd[18840]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:38:06 host sshd[18840]: Failed password for invalid user sFTPUser from 175.200.90.176 port 62980 ssh2 Jan 20 18:38:07 host sshd[18840]: Connection reset by 175.200.90.176 port 62980 [preauth] Jan 20 18:38:07 host sshd[18840]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.200.90.176 Jan 20 18:38:37 host sshd[18950]: Invalid user tester1 from 103.179.56.43 port 48236 Jan 20 18:38:37 host sshd[18950]: input_userauth_request: invalid user tester1 [preauth] Jan 20 18:38:37 host sshd[18950]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:38:37 host sshd[18950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.179.56.43 Jan 20 18:38:38 host sshd[18950]: Failed password for invalid user tester1 from 103.179.56.43 port 48236 ssh2 Jan 20 18:38:39 host sshd[18950]: Received disconnect from 103.179.56.43 port 48236:11: Bye Bye [preauth] Jan 20 18:38:39 host sshd[18950]: Disconnected from 103.179.56.43 port 48236 [preauth] Jan 20 18:39:04 host sshd[19050]: Invalid user hadoopuser from 49.236.204.16 port 46828 Jan 20 18:39:04 host sshd[19050]: input_userauth_request: invalid user hadoopuser [preauth] Jan 20 18:39:04 host sshd[19050]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:39:04 host sshd[19050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.236.204.16 Jan 20 18:39:06 host sshd[19050]: Failed password for invalid user hadoopuser from 49.236.204.16 port 46828 ssh2 Jan 20 18:39:15 host sshd[19100]: Invalid user administrator from 58.186.85.94 port 43524 Jan 20 18:39:15 host sshd[19100]: input_userauth_request: invalid user administrator [preauth] Jan 20 18:39:15 host sshd[19100]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:39:15 host sshd[19100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.186.85.94 Jan 20 18:39:17 host sshd[19100]: Failed password for invalid user administrator from 58.186.85.94 port 43524 ssh2 Jan 20 18:39:17 host sshd[19100]: Received disconnect from 58.186.85.94 port 43524:11: Bye Bye [preauth] Jan 20 18:39:17 host sshd[19100]: Disconnected from 58.186.85.94 port 43524 [preauth] Jan 20 18:39:47 host sshd[19210]: Invalid user myusertest from 212.83.144.11 port 42138 Jan 20 18:39:47 host sshd[19210]: input_userauth_request: invalid user myusertest [preauth] Jan 20 18:39:47 host sshd[19210]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:39:47 host sshd[19210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.83.144.11 Jan 20 18:39:49 host sshd[19210]: Failed password for invalid user myusertest from 212.83.144.11 port 42138 ssh2 Jan 20 18:39:50 host sshd[19210]: Received disconnect from 212.83.144.11 port 42138:11: Bye Bye [preauth] Jan 20 18:39:50 host sshd[19210]: Disconnected from 212.83.144.11 port 42138 [preauth] Jan 20 18:40:55 host sshd[19484]: Invalid user backup from 58.186.85.94 port 37816 Jan 20 18:40:55 host sshd[19484]: input_userauth_request: invalid user backup [preauth] Jan 20 18:40:55 host sshd[19484]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:40:55 host sshd[19484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.186.85.94 Jan 20 18:40:57 host sshd[19484]: Failed password for invalid user backup from 58.186.85.94 port 37816 ssh2 Jan 20 18:40:57 host sshd[19484]: Received disconnect from 58.186.85.94 port 37816:11: Bye Bye [preauth] Jan 20 18:40:57 host sshd[19484]: Disconnected from 58.186.85.94 port 37816 [preauth] Jan 20 18:41:10 host sshd[19556]: Invalid user admin from 212.83.144.11 port 36734 Jan 20 18:41:10 host sshd[19556]: input_userauth_request: invalid user admin [preauth] Jan 20 18:41:10 host sshd[19556]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:41:10 host sshd[19556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.83.144.11 Jan 20 18:41:12 host sshd[19556]: Failed password for invalid user admin from 212.83.144.11 port 36734 ssh2 Jan 20 18:41:12 host sshd[19556]: Received disconnect from 212.83.144.11 port 36734:11: Bye Bye [preauth] Jan 20 18:41:12 host sshd[19556]: Disconnected from 212.83.144.11 port 36734 [preauth] Jan 20 18:42:21 host sshd[19760]: User root from 59.126.150.225 not allowed because not listed in AllowUsers Jan 20 18:42:21 host sshd[19760]: input_userauth_request: invalid user root [preauth] Jan 20 18:42:21 host unix_chkpwd[19768]: password check failed for user (root) Jan 20 18:42:21 host sshd[19760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.150.225 user=root Jan 20 18:42:21 host sshd[19760]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 18:42:23 host sshd[19760]: Failed password for invalid user root from 59.126.150.225 port 53067 ssh2 Jan 20 18:42:24 host unix_chkpwd[19774]: password check failed for user (root) Jan 20 18:42:24 host sshd[19760]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 18:42:26 host sshd[19760]: Failed password for invalid user root from 59.126.150.225 port 53067 ssh2 Jan 20 18:42:27 host unix_chkpwd[19785]: password check failed for user (root) Jan 20 18:42:27 host sshd[19760]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 18:42:29 host sshd[19760]: Failed password for invalid user root from 59.126.150.225 port 53067 ssh2 Jan 20 18:42:30 host unix_chkpwd[19832]: password check failed for user (root) Jan 20 18:42:30 host sshd[19760]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 18:42:32 host sshd[19760]: Failed password for invalid user root from 59.126.150.225 port 53067 ssh2 Jan 20 18:42:40 host sshd[19875]: Did not receive identification string from 109.244.96.74 port 56542 Jan 20 18:49:06 host sshd[21081]: ssh_dispatch_run_fatal: Connection from 182.217.1.210 port 38361: bignum is negative [preauth] Jan 20 18:50:40 host sshd[21433]: Connection reset by 1.34.170.9 port 51025 [preauth] Jan 20 18:51:46 host sshd[21743]: User root from 183.62.183.14 not allowed because not listed in AllowUsers Jan 20 18:51:46 host sshd[21743]: input_userauth_request: invalid user root [preauth] Jan 20 18:51:47 host unix_chkpwd[21753]: password check failed for user (root) Jan 20 18:51:47 host sshd[21743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.62.183.14 user=root Jan 20 18:51:47 host sshd[21743]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 18:51:49 host sshd[21743]: Failed password for invalid user root from 183.62.183.14 port 50401 ssh2 Jan 20 18:51:50 host unix_chkpwd[21761]: password check failed for user (root) Jan 20 18:51:50 host sshd[21743]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 18:51:52 host sshd[21743]: Failed password for invalid user root from 183.62.183.14 port 50401 ssh2 Jan 20 18:51:52 host unix_chkpwd[21772]: password check failed for user (root) Jan 20 18:51:52 host sshd[21743]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 18:51:55 host sshd[21743]: Failed password for invalid user root from 183.62.183.14 port 50401 ssh2 Jan 20 18:51:55 host unix_chkpwd[21779]: password check failed for user (root) Jan 20 18:51:55 host sshd[21743]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 18:51:57 host sshd[21743]: Failed password for invalid user root from 183.62.183.14 port 50401 ssh2 Jan 20 18:54:17 host sshd[22207]: Invalid user vagrant from 125.228.183.102 port 56175 Jan 20 18:54:17 host sshd[22207]: input_userauth_request: invalid user vagrant [preauth] Jan 20 18:54:17 host sshd[22207]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:54:17 host sshd[22207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.183.102 Jan 20 18:54:19 host sshd[22207]: Failed password for invalid user vagrant from 125.228.183.102 port 56175 ssh2 Jan 20 18:54:20 host sshd[22207]: Failed password for invalid user vagrant from 125.228.183.102 port 56175 ssh2 Jan 20 18:54:20 host sshd[22207]: Connection closed by 125.228.183.102 port 56175 [preauth] Jan 20 18:55:00 host sshd[22344]: Invalid user francis from 107.189.30.59 port 49844 Jan 20 18:55:00 host sshd[22344]: input_userauth_request: invalid user francis [preauth] Jan 20 18:55:00 host sshd[22344]: pam_unix(sshd:auth): check pass; user unknown Jan 20 18:55:00 host sshd[22344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 20 18:55:02 host sshd[22344]: Failed password for invalid user francis from 107.189.30.59 port 49844 ssh2 Jan 20 18:55:03 host sshd[22344]: Connection closed by 107.189.30.59 port 49844 [preauth] Jan 20 18:56:20 host sshd[22622]: User root from 174.45.113.182 not allowed because not listed in AllowUsers Jan 20 18:56:20 host sshd[22622]: input_userauth_request: invalid user root [preauth] Jan 20 18:56:20 host unix_chkpwd[22627]: password check failed for user (root) Jan 20 18:56:20 host sshd[22622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.45.113.182 user=root Jan 20 18:56:20 host sshd[22622]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 18:56:22 host sshd[22622]: Failed password for invalid user root from 174.45.113.182 port 63551 ssh2 Jan 20 18:56:23 host unix_chkpwd[22699]: password check failed for user (root) Jan 20 18:56:23 host sshd[22622]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 18:56:25 host sshd[22622]: Failed password for invalid user root from 174.45.113.182 port 63551 ssh2 Jan 20 18:56:34 host sshd[22622]: Connection reset by 174.45.113.182 port 63551 [preauth] Jan 20 18:56:34 host sshd[22622]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.45.113.182 user=root Jan 20 19:09:47 host sshd[25520]: Invalid user admin from 59.28.237.64 port 51042 Jan 20 19:09:47 host sshd[25520]: input_userauth_request: invalid user admin [preauth] Jan 20 19:09:47 host sshd[25520]: pam_unix(sshd:auth): check pass; user unknown Jan 20 19:09:47 host sshd[25520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.28.237.64 Jan 20 19:09:49 host sshd[25520]: Failed password for invalid user admin from 59.28.237.64 port 51042 ssh2 Jan 20 19:09:50 host sshd[25520]: Failed password for invalid user admin from 59.28.237.64 port 51042 ssh2 Jan 20 19:09:51 host sshd[25520]: pam_unix(sshd:auth): check pass; user unknown Jan 20 19:09:53 host sshd[25520]: Failed password for invalid user admin from 59.28.237.64 port 51042 ssh2 Jan 20 19:09:54 host sshd[25520]: pam_unix(sshd:auth): check pass; user unknown Jan 20 19:09:55 host sshd[25520]: Failed password for invalid user admin from 59.28.237.64 port 51042 ssh2 Jan 20 19:09:56 host sshd[25520]: pam_unix(sshd:auth): check pass; user unknown Jan 20 19:09:58 host sshd[25520]: Failed password for invalid user admin from 59.28.237.64 port 51042 ssh2 Jan 20 19:10:25 host sshd[25651]: Invalid user admin from 41.224.246.247 port 56181 Jan 20 19:10:25 host sshd[25651]: input_userauth_request: invalid user admin [preauth] Jan 20 19:10:25 host sshd[25651]: pam_unix(sshd:auth): check pass; user unknown Jan 20 19:10:25 host sshd[25651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.224.246.247 Jan 20 19:10:27 host sshd[25651]: Failed password for invalid user admin from 41.224.246.247 port 56181 ssh2 Jan 20 19:10:29 host sshd[25651]: Failed password for invalid user admin from 41.224.246.247 port 56181 ssh2 Jan 20 19:10:30 host sshd[25651]: pam_unix(sshd:auth): check pass; user unknown Jan 20 19:10:32 host sshd[25651]: Failed password for invalid user admin from 41.224.246.247 port 56181 ssh2 Jan 20 19:10:34 host sshd[25651]: Connection reset by 41.224.246.247 port 56181 [preauth] Jan 20 19:10:34 host sshd[25651]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.224.246.247 Jan 20 19:18:06 host sshd[27056]: Invalid user zyfwp from 76.20.95.10 port 60130 Jan 20 19:18:06 host sshd[27056]: input_userauth_request: invalid user zyfwp [preauth] Jan 20 19:18:06 host sshd[27056]: pam_unix(sshd:auth): check pass; user unknown Jan 20 19:18:06 host sshd[27056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.20.95.10 Jan 20 19:18:07 host sshd[27061]: Connection reset by 76.20.95.10 port 60142 [preauth] Jan 20 19:18:09 host sshd[27056]: Failed password for invalid user zyfwp from 76.20.95.10 port 60130 ssh2 Jan 20 19:18:13 host sshd[27056]: pam_unix(sshd:auth): check pass; user unknown Jan 20 19:18:15 host sshd[27056]: Failed password for invalid user zyfwp from 76.20.95.10 port 60130 ssh2 Jan 20 19:18:17 host sshd[27056]: pam_unix(sshd:auth): check pass; user unknown Jan 20 19:18:19 host sshd[27056]: Failed password for invalid user zyfwp from 76.20.95.10 port 60130 ssh2 Jan 20 19:18:21 host sshd[27056]: Connection closed by 76.20.95.10 port 60130 [preauth] Jan 20 19:18:21 host sshd[27056]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.20.95.10 Jan 20 19:19:31 host sshd[27495]: Invalid user ha from 194.110.203.109 port 39386 Jan 20 19:19:31 host sshd[27495]: input_userauth_request: invalid user ha [preauth] Jan 20 19:19:31 host sshd[27495]: pam_unix(sshd:auth): check pass; user unknown Jan 20 19:19:31 host sshd[27495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 19:19:32 host sshd[27495]: Failed password for invalid user ha from 194.110.203.109 port 39386 ssh2 Jan 20 19:19:36 host sshd[27495]: pam_unix(sshd:auth): check pass; user unknown Jan 20 19:19:37 host sshd[27495]: Failed password for invalid user ha from 194.110.203.109 port 39386 ssh2 Jan 20 19:19:40 host sshd[27495]: pam_unix(sshd:auth): check pass; user unknown Jan 20 19:19:42 host sshd[27495]: Failed password for invalid user ha from 194.110.203.109 port 39386 ssh2 Jan 20 19:19:45 host sshd[27495]: Connection closed by 194.110.203.109 port 39386 [preauth] Jan 20 19:19:45 host sshd[27495]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 19:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=pmcresources user-2=vfmassets user-3=wwwtestugo user-4=shalinijames user-5=wwwkapin user-6=woodpeck user-7=remysagr user-8=disposeat user-9=wwwkmaorg user-10=wwwnexidigital user-11=mrsclean user-12=gifterman user-13=palco123 user-14=kottayamcalldriv user-15=phmetals user-16=wwwletsstalkfood user-17=straightcurve user-18=bonifacegroup user-19=wwwevmhonda user-20=laundryboniface user-21=dartsimp user-22=a2zgroup user-23=wwwkaretakers user-24=cochintaxi user-25=wwwrmswll user-26=keralaholi user-27=wwwresourcehunte user-28=ugotscom user-29=travelboniface user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 19:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 19:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iIdqD21m08ZPwyTd.~ Jan 20 19:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iIdqD21m08ZPwyTd.~' Jan 20 19:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iIdqD21m08ZPwyTd.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 19:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 19:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 19:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 19:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 19:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 19:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 19:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 19:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 19:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 19:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 19:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 19:30:00 host sshd[29432]: User chrony from 205.185.113.129 not allowed because not listed in AllowUsers Jan 20 19:30:00 host sshd[29432]: input_userauth_request: invalid user chrony [preauth] Jan 20 19:30:00 host unix_chkpwd[29437]: password check failed for user (chrony) Jan 20 19:30:00 host sshd[29432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 user=chrony Jan 20 19:30:00 host sshd[29432]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "chrony" Jan 20 19:30:03 host sshd[29432]: Failed password for invalid user chrony from 205.185.113.129 port 48024 ssh2 Jan 20 19:30:03 host sshd[29432]: Connection closed by 205.185.113.129 port 48024 [preauth] Jan 20 19:35:22 host sshd[30153]: Did not receive identification string from 109.244.96.74 port 41320 Jan 20 19:38:29 host sshd[30595]: Connection reset by 105.184.50.227 port 59800 [preauth] Jan 20 19:38:30 host sshd[30597]: User ftp from 105.184.50.227 not allowed because not listed in AllowUsers Jan 20 19:38:30 host sshd[30597]: input_userauth_request: invalid user ftp [preauth] Jan 20 19:38:30 host unix_chkpwd[30623]: password check failed for user (ftp) Jan 20 19:38:30 host sshd[30597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.184.50.227 user=ftp Jan 20 19:38:30 host sshd[30597]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 20 19:38:32 host sshd[30597]: Failed password for invalid user ftp from 105.184.50.227 port 59822 ssh2 Jan 20 19:38:33 host unix_chkpwd[30629]: password check failed for user (ftp) Jan 20 19:38:33 host sshd[30597]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 20 19:38:35 host sshd[30597]: Failed password for invalid user ftp from 105.184.50.227 port 59822 ssh2 Jan 20 19:38:37 host unix_chkpwd[30632]: password check failed for user (ftp) Jan 20 19:38:37 host sshd[30597]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 20 19:38:39 host sshd[30597]: Failed password for invalid user ftp from 105.184.50.227 port 59822 ssh2 Jan 20 19:38:40 host sshd[30597]: Failed password for invalid user ftp from 105.184.50.227 port 59822 ssh2 Jan 20 19:38:41 host sshd[30597]: Connection reset by 105.184.50.227 port 59822 [preauth] Jan 20 19:38:41 host sshd[30597]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.184.50.227 user=ftp Jan 20 19:45:19 host sshd[31951]: Invalid user scanner from 31.41.244.124 port 37629 Jan 20 19:45:19 host sshd[31951]: input_userauth_request: invalid user scanner [preauth] Jan 20 19:45:19 host sshd[31951]: pam_unix(sshd:auth): check pass; user unknown Jan 20 19:45:19 host sshd[31951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 20 19:45:21 host sshd[31951]: Failed password for invalid user scanner from 31.41.244.124 port 37629 ssh2 Jan 20 19:45:21 host sshd[31951]: Received disconnect from 31.41.244.124 port 37629:11: Client disconnecting normally [preauth] Jan 20 19:45:21 host sshd[31951]: Disconnected from 31.41.244.124 port 37629 [preauth] Jan 20 19:54:44 host sshd[1231]: Invalid user admin from 221.160.19.77 port 63743 Jan 20 19:54:44 host sshd[1231]: input_userauth_request: invalid user admin [preauth] Jan 20 19:54:44 host sshd[1231]: pam_unix(sshd:auth): check pass; user unknown Jan 20 19:54:44 host sshd[1231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.160.19.77 Jan 20 19:54:46 host sshd[1231]: Failed password for invalid user admin from 221.160.19.77 port 63743 ssh2 Jan 20 19:54:47 host sshd[1231]: Connection reset by 221.160.19.77 port 63743 [preauth] Jan 20 20:03:48 host sshd[2456]: Invalid user hduser from 92.205.104.173 port 55256 Jan 20 20:03:48 host sshd[2456]: input_userauth_request: invalid user hduser [preauth] Jan 20 20:03:48 host sshd[2456]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:03:48 host sshd[2456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.205.104.173 Jan 20 20:03:50 host sshd[2456]: Failed password for invalid user hduser from 92.205.104.173 port 55256 ssh2 Jan 20 20:03:50 host sshd[2456]: Received disconnect from 92.205.104.173 port 55256:11: Bye Bye [preauth] Jan 20 20:03:50 host sshd[2456]: Disconnected from 92.205.104.173 port 55256 [preauth] Jan 20 20:03:55 host sshd[2477]: Invalid user tadmin from 194.152.206.17 port 15856 Jan 20 20:03:55 host sshd[2477]: input_userauth_request: invalid user tadmin [preauth] Jan 20 20:03:55 host sshd[2477]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:03:55 host sshd[2477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.17 Jan 20 20:03:57 host sshd[2477]: Failed password for invalid user tadmin from 194.152.206.17 port 15856 ssh2 Jan 20 20:03:57 host sshd[2477]: Received disconnect from 194.152.206.17 port 15856:11: Bye Bye [preauth] Jan 20 20:03:57 host sshd[2477]: Disconnected from 194.152.206.17 port 15856 [preauth] Jan 20 20:04:47 host sshd[2589]: Invalid user cistest from 34.126.78.62 port 55678 Jan 20 20:04:47 host sshd[2589]: input_userauth_request: invalid user cistest [preauth] Jan 20 20:04:47 host sshd[2589]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:04:47 host sshd[2589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.126.78.62 Jan 20 20:04:48 host sshd[2589]: Failed password for invalid user cistest from 34.126.78.62 port 55678 ssh2 Jan 20 20:04:48 host sshd[2589]: Received disconnect from 34.126.78.62 port 55678:11: Bye Bye [preauth] Jan 20 20:04:48 host sshd[2589]: Disconnected from 34.126.78.62 port 55678 [preauth] Jan 20 20:06:39 host sshd[2945]: Invalid user cistest from 156.251.130.170 port 45878 Jan 20 20:06:39 host sshd[2945]: input_userauth_request: invalid user cistest [preauth] Jan 20 20:06:39 host sshd[2945]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:06:39 host sshd[2945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.251.130.170 Jan 20 20:06:41 host sshd[2945]: Failed password for invalid user cistest from 156.251.130.170 port 45878 ssh2 Jan 20 20:06:41 host sshd[2945]: Received disconnect from 156.251.130.170 port 45878:11: Bye Bye [preauth] Jan 20 20:06:41 host sshd[2945]: Disconnected from 156.251.130.170 port 45878 [preauth] Jan 20 20:07:01 host sshd[2975]: Invalid user ubuntu from 190.64.136.124 port 30139 Jan 20 20:07:01 host sshd[2975]: input_userauth_request: invalid user ubuntu [preauth] Jan 20 20:07:01 host sshd[2975]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:07:01 host sshd[2975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.136.124 Jan 20 20:07:03 host sshd[2975]: Failed password for invalid user ubuntu from 190.64.136.124 port 30139 ssh2 Jan 20 20:07:03 host sshd[2975]: Received disconnect from 190.64.136.124 port 30139:11: Bye Bye [preauth] Jan 20 20:07:03 host sshd[2975]: Disconnected from 190.64.136.124 port 30139 [preauth] Jan 20 20:07:05 host sshd[2992]: Invalid user bob from 46.8.19.64 port 51858 Jan 20 20:07:05 host sshd[2992]: input_userauth_request: invalid user bob [preauth] Jan 20 20:07:05 host sshd[2992]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:07:05 host sshd[2992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.8.19.64 Jan 20 20:07:08 host sshd[2992]: Failed password for invalid user bob from 46.8.19.64 port 51858 ssh2 Jan 20 20:07:08 host sshd[2992]: Received disconnect from 46.8.19.64 port 51858:11: Bye Bye [preauth] Jan 20 20:07:08 host sshd[2992]: Disconnected from 46.8.19.64 port 51858 [preauth] Jan 20 20:07:09 host sshd[2998]: Invalid user ubuntu from 182.23.111.74 port 46568 Jan 20 20:07:09 host sshd[2998]: input_userauth_request: invalid user ubuntu [preauth] Jan 20 20:07:09 host sshd[2998]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:07:09 host sshd[2998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.23.111.74 Jan 20 20:07:11 host sshd[2998]: Failed password for invalid user ubuntu from 182.23.111.74 port 46568 ssh2 Jan 20 20:07:11 host sshd[2998]: Received disconnect from 182.23.111.74 port 46568:11: Bye Bye [preauth] Jan 20 20:07:11 host sshd[2998]: Disconnected from 182.23.111.74 port 46568 [preauth] Jan 20 20:07:59 host sshd[3082]: Invalid user martin from 181.191.9.163 port 41110 Jan 20 20:07:59 host sshd[3082]: input_userauth_request: invalid user martin [preauth] Jan 20 20:07:59 host sshd[3082]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:07:59 host sshd[3082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.191.9.163 Jan 20 20:08:02 host sshd[3082]: Failed password for invalid user martin from 181.191.9.163 port 41110 ssh2 Jan 20 20:08:02 host sshd[3082]: Received disconnect from 181.191.9.163 port 41110:11: Bye Bye [preauth] Jan 20 20:08:02 host sshd[3082]: Disconnected from 181.191.9.163 port 41110 [preauth] Jan 20 20:08:43 host sshd[3169]: Did not receive identification string from 63.250.59.203 port 33746 Jan 20 20:08:50 host sshd[3173]: User root from 63.250.59.203 not allowed because not listed in AllowUsers Jan 20 20:08:50 host sshd[3173]: input_userauth_request: invalid user root [preauth] Jan 20 20:08:50 host sshd[3178]: User root from 63.250.59.203 not allowed because not listed in AllowUsers Jan 20 20:08:50 host sshd[3176]: Invalid user ubnt from 63.250.59.203 port 33872 Jan 20 20:08:50 host sshd[3178]: input_userauth_request: invalid user root [preauth] Jan 20 20:08:50 host sshd[3179]: Invalid user admin from 63.250.59.203 port 33818 Jan 20 20:08:50 host sshd[3172]: Invalid user admin from 63.250.59.203 port 33946 Jan 20 20:08:50 host sshd[3187]: User root from 63.250.59.203 not allowed because not listed in AllowUsers Jan 20 20:08:50 host sshd[3183]: Invalid user guest from 63.250.59.203 port 33960 Jan 20 20:08:50 host sshd[3182]: Invalid user steam from 63.250.59.203 port 34030 Jan 20 20:08:50 host sshd[3174]: Invalid user admin from 63.250.59.203 port 34046 Jan 20 20:08:50 host sshd[3184]: Invalid user testuser from 63.250.59.203 port 33830 Jan 20 20:08:50 host sshd[3170]: User root from 63.250.59.203 not allowed because not listed in AllowUsers Jan 20 20:08:50 host sshd[3172]: input_userauth_request: invalid user admin [preauth] Jan 20 20:08:50 host sshd[3171]: Invalid user vagrant from 63.250.59.203 port 33782 Jan 20 20:08:50 host sshd[3187]: input_userauth_request: invalid user root [preauth] Jan 20 20:08:50 host sshd[3177]: Invalid user es from 63.250.59.203 port 33780 Jan 20 20:08:50 host sshd[3170]: input_userauth_request: invalid user root [preauth] Jan 20 20:08:50 host sshd[3176]: input_userauth_request: invalid user ubnt [preauth] Jan 20 20:08:50 host sshd[3189]: User root from 63.250.59.203 not allowed because not listed in AllowUsers Jan 20 20:08:50 host sshd[3180]: Invalid user pi from 63.250.59.203 port 33858 Jan 20 20:08:50 host sshd[3181]: Invalid user esuser from 63.250.59.203 port 33878 Jan 20 20:08:50 host sshd[3174]: input_userauth_request: invalid user admin [preauth] Jan 20 20:08:50 host sshd[3182]: input_userauth_request: invalid user steam [preauth] Jan 20 20:08:50 host sshd[3175]: Invalid user vagrant from 63.250.59.203 port 33894 Jan 20 20:08:50 host sshd[3177]: input_userauth_request: invalid user es [preauth] Jan 20 20:08:50 host sshd[3190]: Invalid user zjw from 63.250.59.203 port 33748 Jan 20 20:08:50 host sshd[3185]: Invalid user pi from 63.250.59.203 port 33766 Jan 20 20:08:50 host sshd[3179]: input_userauth_request: invalid user admin [preauth] Jan 20 20:08:50 host sshd[3191]: Invalid user devops from 63.250.59.203 port 33856 Jan 20 20:08:50 host sshd[3189]: input_userauth_request: invalid user root [preauth] Jan 20 20:08:50 host sshd[3185]: input_userauth_request: invalid user pi [preauth] Jan 20 20:08:50 host sshd[3171]: input_userauth_request: invalid user vagrant [preauth] Jan 20 20:08:50 host sshd[3183]: input_userauth_request: invalid user guest [preauth] Jan 20 20:08:50 host sshd[3191]: input_userauth_request: invalid user devops [preauth] Jan 20 20:08:50 host sshd[3188]: Invalid user ftpuser from 63.250.59.203 port 34050 Jan 20 20:08:50 host sshd[3193]: Invalid user pi from 63.250.59.203 port 33982 Jan 20 20:08:50 host sshd[3188]: input_userauth_request: invalid user ftpuser [preauth] Jan 20 20:08:50 host sshd[3193]: input_userauth_request: invalid user pi [preauth] Jan 20 20:08:50 host sshd[3181]: input_userauth_request: invalid user esuser [preauth] Jan 20 20:08:50 host sshd[3184]: input_userauth_request: invalid user testuser [preauth] Jan 20 20:08:50 host sshd[3175]: input_userauth_request: invalid user vagrant [preauth] Jan 20 20:08:50 host sshd[3194]: Invalid user ansible from 63.250.59.203 port 33770 Jan 20 20:08:50 host sshd[3194]: input_userauth_request: invalid user ansible [preauth] Jan 20 20:08:50 host sshd[3180]: input_userauth_request: invalid user pi [preauth] Jan 20 20:08:50 host sshd[3190]: input_userauth_request: invalid user zjw [preauth] Jan 20 20:08:50 host sshd[3192]: Invalid user guest from 63.250.59.203 port 33986 Jan 20 20:08:50 host sshd[3192]: input_userauth_request: invalid user guest [preauth] Jan 20 20:08:50 host sshd[3195]: User root from 63.250.59.203 not allowed because not listed in AllowUsers Jan 20 20:08:50 host sshd[3195]: input_userauth_request: invalid user root [preauth] Jan 20 20:08:52 host sshd[3179]: Connection closed by 63.250.59.203 port 33818 [preauth] Jan 20 20:08:52 host sshd[3177]: Connection closed by 63.250.59.203 port 33780 [preauth] Jan 20 20:08:52 host sshd[3170]: Connection closed by 63.250.59.203 port 33774 [preauth] Jan 20 20:08:52 host sshd[3171]: Connection closed by 63.250.59.203 port 33782 [preauth] Jan 20 20:08:52 host sshd[3174]: Connection closed by 63.250.59.203 port 34046 [preauth] Jan 20 20:08:52 host sshd[3173]: Connection closed by 63.250.59.203 port 34006 [preauth] Jan 20 20:08:52 host sshd[3183]: Connection closed by 63.250.59.203 port 33960 [preauth] Jan 20 20:08:52 host sshd[3187]: Connection closed by 63.250.59.203 port 33926 [preauth] Jan 20 20:08:52 host sshd[3175]: Connection closed by 63.250.59.203 port 33894 [preauth] Jan 20 20:08:52 host sshd[3181]: Connection closed by 63.250.59.203 port 33878 [preauth] Jan 20 20:08:52 host sshd[3189]: Connection closed by 63.250.59.203 port 34018 [preauth] Jan 20 20:08:52 host sshd[3184]: Connection closed by 63.250.59.203 port 33830 [preauth] Jan 20 20:08:52 host sshd[3188]: Connection closed by 63.250.59.203 port 34050 [preauth] Jan 20 20:08:52 host sshd[3191]: Connection closed by 63.250.59.203 port 33856 [preauth] Jan 20 20:08:52 host sshd[3190]: Connection closed by 63.250.59.203 port 33748 [preauth] Jan 20 20:08:52 host sshd[3182]: Connection closed by 63.250.59.203 port 34030 [preauth] Jan 20 20:08:52 host sshd[3172]: Connection closed by 63.250.59.203 port 33946 [preauth] Jan 20 20:08:52 host sshd[3192]: Connection closed by 63.250.59.203 port 33986 [preauth] Jan 20 20:08:52 host sshd[3185]: Connection closed by 63.250.59.203 port 33766 [preauth] Jan 20 20:08:52 host sshd[3180]: Connection closed by 63.250.59.203 port 33858 [preauth] Jan 20 20:08:52 host sshd[3193]: Connection closed by 63.250.59.203 port 33982 [preauth] Jan 20 20:08:52 host sshd[3176]: Connection closed by 63.250.59.203 port 33872 [preauth] Jan 20 20:08:52 host sshd[3194]: Connection closed by 63.250.59.203 port 33770 [preauth] Jan 20 20:08:52 host sshd[3195]: Connection closed by 63.250.59.203 port 33966 [preauth] Jan 20 20:08:52 host sshd[3178]: Connection closed by 63.250.59.203 port 34002 [preauth] Jan 20 20:09:17 host sshd[3307]: Invalid user vadmin from 92.205.104.173 port 55492 Jan 20 20:09:17 host sshd[3307]: input_userauth_request: invalid user vadmin [preauth] Jan 20 20:09:17 host sshd[3307]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:09:17 host sshd[3307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.205.104.173 Jan 20 20:09:19 host sshd[3307]: Failed password for invalid user vadmin from 92.205.104.173 port 55492 ssh2 Jan 20 20:09:19 host sshd[3307]: Received disconnect from 92.205.104.173 port 55492:11: Bye Bye [preauth] Jan 20 20:09:19 host sshd[3307]: Disconnected from 92.205.104.173 port 55492 [preauth] Jan 20 20:09:30 host sshd[3347]: Invalid user bkpuser from 194.152.206.17 port 62858 Jan 20 20:09:30 host sshd[3347]: input_userauth_request: invalid user bkpuser [preauth] Jan 20 20:09:30 host sshd[3347]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:09:30 host sshd[3347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.17 Jan 20 20:09:31 host sshd[3347]: Failed password for invalid user bkpuser from 194.152.206.17 port 62858 ssh2 Jan 20 20:09:32 host sshd[3347]: Received disconnect from 194.152.206.17 port 62858:11: Bye Bye [preauth] Jan 20 20:09:32 host sshd[3347]: Disconnected from 194.152.206.17 port 62858 [preauth] Jan 20 20:09:52 host sshd[3381]: Invalid user steam from 128.199.234.147 port 45534 Jan 20 20:09:52 host sshd[3381]: input_userauth_request: invalid user steam [preauth] Jan 20 20:09:52 host sshd[3381]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:09:52 host sshd[3381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.234.147 Jan 20 20:09:53 host sshd[3381]: Failed password for invalid user steam from 128.199.234.147 port 45534 ssh2 Jan 20 20:09:53 host sshd[3381]: Received disconnect from 128.199.234.147 port 45534:11: Bye Bye [preauth] Jan 20 20:09:53 host sshd[3381]: Disconnected from 128.199.234.147 port 45534 [preauth] Jan 20 20:10:22 host sshd[3462]: Invalid user tadmin from 92.205.104.173 port 55592 Jan 20 20:10:22 host sshd[3462]: input_userauth_request: invalid user tadmin [preauth] Jan 20 20:10:22 host sshd[3462]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:10:22 host sshd[3462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.205.104.173 Jan 20 20:10:25 host sshd[3462]: Failed password for invalid user tadmin from 92.205.104.173 port 55592 ssh2 Jan 20 20:10:29 host sshd[3502]: Invalid user admin from 182.23.111.74 port 46740 Jan 20 20:10:29 host sshd[3502]: input_userauth_request: invalid user admin [preauth] Jan 20 20:10:29 host sshd[3502]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:10:29 host sshd[3502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.23.111.74 Jan 20 20:10:31 host sshd[3502]: Failed password for invalid user admin from 182.23.111.74 port 46740 ssh2 Jan 20 20:10:31 host sshd[3502]: Received disconnect from 182.23.111.74 port 46740:11: Bye Bye [preauth] Jan 20 20:10:31 host sshd[3502]: Disconnected from 182.23.111.74 port 46740 [preauth] Jan 20 20:10:33 host sshd[3531]: Invalid user admin from 34.126.78.62 port 50180 Jan 20 20:10:33 host sshd[3531]: input_userauth_request: invalid user admin [preauth] Jan 20 20:10:33 host sshd[3531]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:10:33 host sshd[3531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.126.78.62 Jan 20 20:10:35 host sshd[3531]: Failed password for invalid user admin from 34.126.78.62 port 50180 ssh2 Jan 20 20:10:36 host sshd[3531]: Received disconnect from 34.126.78.62 port 50180:11: Bye Bye [preauth] Jan 20 20:10:36 host sshd[3531]: Disconnected from 34.126.78.62 port 50180 [preauth] Jan 20 20:10:36 host sshd[3541]: Invalid user maurice from 194.152.206.17 port 22296 Jan 20 20:10:36 host sshd[3541]: input_userauth_request: invalid user maurice [preauth] Jan 20 20:10:36 host sshd[3541]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:10:36 host sshd[3541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.17 Jan 20 20:10:38 host sshd[3541]: Failed password for invalid user maurice from 194.152.206.17 port 22296 ssh2 Jan 20 20:10:39 host sshd[3541]: Received disconnect from 194.152.206.17 port 22296:11: Bye Bye [preauth] Jan 20 20:10:39 host sshd[3541]: Disconnected from 194.152.206.17 port 22296 [preauth] Jan 20 20:10:49 host sshd[3590]: Connection reset by 49.213.216.230 port 55285 [preauth] Jan 20 20:10:56 host sshd[3611]: Invalid user esadmin from 46.8.19.64 port 59142 Jan 20 20:10:56 host sshd[3611]: input_userauth_request: invalid user esadmin [preauth] Jan 20 20:10:56 host sshd[3611]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:10:56 host sshd[3611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.8.19.64 Jan 20 20:10:58 host sshd[3611]: Failed password for invalid user esadmin from 46.8.19.64 port 59142 ssh2 Jan 20 20:10:58 host sshd[3611]: Received disconnect from 46.8.19.64 port 59142:11: Bye Bye [preauth] Jan 20 20:10:58 host sshd[3611]: Disconnected from 46.8.19.64 port 59142 [preauth] Jan 20 20:11:00 host sshd[3619]: Invalid user webuser from 156.251.130.170 port 35282 Jan 20 20:11:00 host sshd[3619]: input_userauth_request: invalid user webuser [preauth] Jan 20 20:11:00 host sshd[3619]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:11:00 host sshd[3619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.251.130.170 Jan 20 20:11:00 host sshd[3617]: Invalid user tadmin from 190.64.136.124 port 4345 Jan 20 20:11:00 host sshd[3617]: input_userauth_request: invalid user tadmin [preauth] Jan 20 20:11:00 host sshd[3617]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:11:00 host sshd[3617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.136.124 Jan 20 20:11:03 host sshd[3619]: Failed password for invalid user webuser from 156.251.130.170 port 35282 ssh2 Jan 20 20:11:03 host sshd[3617]: Failed password for invalid user tadmin from 190.64.136.124 port 4345 ssh2 Jan 20 20:11:03 host sshd[3619]: Received disconnect from 156.251.130.170 port 35282:11: Bye Bye [preauth] Jan 20 20:11:03 host sshd[3619]: Disconnected from 156.251.130.170 port 35282 [preauth] Jan 20 20:11:03 host sshd[3617]: Received disconnect from 190.64.136.124 port 4345:11: Bye Bye [preauth] Jan 20 20:11:03 host sshd[3617]: Disconnected from 190.64.136.124 port 4345 [preauth] Jan 20 20:11:57 host sshd[3828]: Invalid user bitrix from 34.126.78.62 port 44492 Jan 20 20:11:57 host sshd[3828]: input_userauth_request: invalid user bitrix [preauth] Jan 20 20:11:57 host sshd[3828]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:11:57 host sshd[3828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.126.78.62 Jan 20 20:11:58 host sshd[3832]: User centos from 128.199.234.147 not allowed because not listed in AllowUsers Jan 20 20:11:58 host sshd[3832]: input_userauth_request: invalid user centos [preauth] Jan 20 20:11:58 host unix_chkpwd[3840]: password check failed for user (centos) Jan 20 20:11:58 host sshd[3832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.234.147 user=centos Jan 20 20:12:00 host sshd[3828]: Failed password for invalid user bitrix from 34.126.78.62 port 44492 ssh2 Jan 20 20:12:01 host sshd[3832]: Failed password for invalid user centos from 128.199.234.147 port 45410 ssh2 Jan 20 20:12:01 host sshd[3832]: Received disconnect from 128.199.234.147 port 45410:11: Bye Bye [preauth] Jan 20 20:12:01 host sshd[3832]: Disconnected from 128.199.234.147 port 45410 [preauth] Jan 20 20:12:01 host sshd[3867]: Invalid user cfguser from 46.8.19.64 port 35556 Jan 20 20:12:01 host sshd[3867]: input_userauth_request: invalid user cfguser [preauth] Jan 20 20:12:01 host sshd[3867]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:12:01 host sshd[3867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.8.19.64 Jan 20 20:12:03 host sshd[3867]: Failed password for invalid user cfguser from 46.8.19.64 port 35556 ssh2 Jan 20 20:12:03 host sshd[3867]: Received disconnect from 46.8.19.64 port 35556:11: Bye Bye [preauth] Jan 20 20:12:03 host sshd[3867]: Disconnected from 46.8.19.64 port 35556 [preauth] Jan 20 20:12:04 host sshd[3893]: Invalid user andy from 182.23.111.74 port 46874 Jan 20 20:12:04 host sshd[3893]: input_userauth_request: invalid user andy [preauth] Jan 20 20:12:04 host sshd[3893]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:12:04 host sshd[3893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.23.111.74 Jan 20 20:12:07 host sshd[3893]: Failed password for invalid user andy from 182.23.111.74 port 46874 ssh2 Jan 20 20:12:07 host sshd[3893]: Received disconnect from 182.23.111.74 port 46874:11: Bye Bye [preauth] Jan 20 20:12:07 host sshd[3893]: Disconnected from 182.23.111.74 port 46874 [preauth] Jan 20 20:12:09 host sshd[3948]: Invalid user systest from 156.251.130.170 port 33942 Jan 20 20:12:09 host sshd[3948]: input_userauth_request: invalid user systest [preauth] Jan 20 20:12:09 host sshd[3948]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:12:09 host sshd[3948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.251.130.170 Jan 20 20:12:11 host sshd[3948]: Failed password for invalid user systest from 156.251.130.170 port 33942 ssh2 Jan 20 20:12:11 host sshd[3948]: Received disconnect from 156.251.130.170 port 33942:11: Bye Bye [preauth] Jan 20 20:12:11 host sshd[3948]: Disconnected from 156.251.130.170 port 33942 [preauth] Jan 20 20:12:20 host sshd[4028]: Invalid user jenkins from 190.64.136.124 port 36927 Jan 20 20:12:20 host sshd[4028]: input_userauth_request: invalid user jenkins [preauth] Jan 20 20:12:20 host sshd[4028]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:12:20 host sshd[4028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.136.124 Jan 20 20:12:21 host sshd[4028]: Failed password for invalid user jenkins from 190.64.136.124 port 36927 ssh2 Jan 20 20:12:21 host sshd[4028]: Received disconnect from 190.64.136.124 port 36927:11: Bye Bye [preauth] Jan 20 20:12:21 host sshd[4028]: Disconnected from 190.64.136.124 port 36927 [preauth] Jan 20 20:12:58 host sshd[4140]: Invalid user userguest from 181.191.9.163 port 52524 Jan 20 20:12:58 host sshd[4140]: input_userauth_request: invalid user userguest [preauth] Jan 20 20:12:58 host sshd[4140]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:12:58 host sshd[4140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.191.9.163 Jan 20 20:13:00 host sshd[4140]: Failed password for invalid user userguest from 181.191.9.163 port 52524 ssh2 Jan 20 20:13:01 host sshd[4140]: Received disconnect from 181.191.9.163 port 52524:11: Bye Bye [preauth] Jan 20 20:13:01 host sshd[4140]: Disconnected from 181.191.9.163 port 52524 [preauth] Jan 20 20:13:03 host sshd[4164]: Invalid user testdev from 152.32.174.199 port 54864 Jan 20 20:13:03 host sshd[4164]: input_userauth_request: invalid user testdev [preauth] Jan 20 20:13:03 host sshd[4164]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:13:03 host sshd[4164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.174.199 Jan 20 20:13:05 host sshd[4164]: Failed password for invalid user testdev from 152.32.174.199 port 54864 ssh2 Jan 20 20:13:05 host sshd[4164]: Received disconnect from 152.32.174.199 port 54864:11: Bye Bye [preauth] Jan 20 20:13:05 host sshd[4164]: Disconnected from 152.32.174.199 port 54864 [preauth] Jan 20 20:13:08 host sshd[4181]: Invalid user ericadmin from 167.172.246.83 port 35946 Jan 20 20:13:08 host sshd[4181]: input_userauth_request: invalid user ericadmin [preauth] Jan 20 20:13:08 host sshd[4181]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:13:08 host sshd[4181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.246.83 Jan 20 20:13:10 host sshd[4181]: Failed password for invalid user ericadmin from 167.172.246.83 port 35946 ssh2 Jan 20 20:13:10 host sshd[4181]: Received disconnect from 167.172.246.83 port 35946:11: Bye Bye [preauth] Jan 20 20:13:10 host sshd[4181]: Disconnected from 167.172.246.83 port 35946 [preauth] Jan 20 20:14:11 host sshd[4284]: Invalid user sysadmin from 89.179.126.155 port 36380 Jan 20 20:14:11 host sshd[4284]: input_userauth_request: invalid user sysadmin [preauth] Jan 20 20:14:11 host sshd[4284]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:14:11 host sshd[4284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.179.126.155 Jan 20 20:14:13 host sshd[4284]: Failed password for invalid user sysadmin from 89.179.126.155 port 36380 ssh2 Jan 20 20:14:13 host sshd[4284]: Received disconnect from 89.179.126.155 port 36380:11: Bye Bye [preauth] Jan 20 20:14:13 host sshd[4284]: Disconnected from 89.179.126.155 port 36380 [preauth] Jan 20 20:14:37 host sshd[4332]: Invalid user toor from 181.191.9.163 port 46648 Jan 20 20:14:37 host sshd[4332]: input_userauth_request: invalid user toor [preauth] Jan 20 20:14:37 host sshd[4332]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:14:37 host sshd[4332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.191.9.163 Jan 20 20:14:40 host sshd[4332]: Failed password for invalid user toor from 181.191.9.163 port 46648 ssh2 Jan 20 20:14:54 host sshd[4381]: Invalid user admin from 204.48.17.233 port 51860 Jan 20 20:14:54 host sshd[4381]: input_userauth_request: invalid user admin [preauth] Jan 20 20:14:54 host sshd[4381]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:14:54 host sshd[4381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.17.233 Jan 20 20:14:57 host sshd[4381]: Failed password for invalid user admin from 204.48.17.233 port 51860 ssh2 Jan 20 20:14:57 host sshd[4381]: Received disconnect from 204.48.17.233 port 51860:11: Bye Bye [preauth] Jan 20 20:14:57 host sshd[4381]: Disconnected from 204.48.17.233 port 51860 [preauth] Jan 20 20:16:33 host sshd[4604]: Invalid user ali from 14.97.235.186 port 53666 Jan 20 20:16:33 host sshd[4604]: input_userauth_request: invalid user ali [preauth] Jan 20 20:16:33 host sshd[4604]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:16:33 host sshd[4604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.97.235.186 Jan 20 20:16:34 host sshd[4604]: Failed password for invalid user ali from 14.97.235.186 port 53666 ssh2 Jan 20 20:16:34 host sshd[4604]: Received disconnect from 14.97.235.186 port 53666:11: Bye Bye [preauth] Jan 20 20:16:34 host sshd[4604]: Disconnected from 14.97.235.186 port 53666 [preauth] Jan 20 20:16:42 host sshd[4615]: Invalid user ftpadmin from 5.141.81.226 port 46464 Jan 20 20:16:42 host sshd[4615]: input_userauth_request: invalid user ftpadmin [preauth] Jan 20 20:16:42 host sshd[4615]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:16:42 host sshd[4615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.141.81.226 Jan 20 20:16:44 host sshd[4615]: Failed password for invalid user ftpadmin from 5.141.81.226 port 46464 ssh2 Jan 20 20:16:44 host sshd[4615]: Received disconnect from 5.141.81.226 port 46464:11: Bye Bye [preauth] Jan 20 20:16:44 host sshd[4615]: Disconnected from 5.141.81.226 port 46464 [preauth] Jan 20 20:17:45 host sshd[4820]: Invalid user list from 167.172.246.83 port 54908 Jan 20 20:17:45 host sshd[4820]: input_userauth_request: invalid user list [preauth] Jan 20 20:17:45 host sshd[4820]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:17:45 host sshd[4820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.246.83 Jan 20 20:17:47 host sshd[4820]: Failed password for invalid user list from 167.172.246.83 port 54908 ssh2 Jan 20 20:17:47 host sshd[4820]: Received disconnect from 167.172.246.83 port 54908:11: Bye Bye [preauth] Jan 20 20:17:47 host sshd[4820]: Disconnected from 167.172.246.83 port 54908 [preauth] Jan 20 20:18:15 host sshd[4877]: Invalid user ediuser from 89.179.126.155 port 58061 Jan 20 20:18:15 host sshd[4877]: input_userauth_request: invalid user ediuser [preauth] Jan 20 20:18:15 host sshd[4877]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:18:15 host sshd[4877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.179.126.155 Jan 20 20:18:17 host sshd[4877]: Failed password for invalid user ediuser from 89.179.126.155 port 58061 ssh2 Jan 20 20:18:17 host sshd[4877]: Received disconnect from 89.179.126.155 port 58061:11: Bye Bye [preauth] Jan 20 20:18:17 host sshd[4877]: Disconnected from 89.179.126.155 port 58061 [preauth] Jan 20 20:18:19 host sshd[4883]: Invalid user uftp from 14.97.235.186 port 8384 Jan 20 20:18:19 host sshd[4883]: input_userauth_request: invalid user uftp [preauth] Jan 20 20:18:19 host sshd[4883]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:18:19 host sshd[4883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.97.235.186 Jan 20 20:18:22 host sshd[4883]: Failed password for invalid user uftp from 14.97.235.186 port 8384 ssh2 Jan 20 20:18:22 host sshd[4883]: Received disconnect from 14.97.235.186 port 8384:11: Bye Bye [preauth] Jan 20 20:18:22 host sshd[4883]: Disconnected from 14.97.235.186 port 8384 [preauth] Jan 20 20:18:47 host sshd[4944]: Invalid user administrativo from 167.172.246.83 port 51388 Jan 20 20:18:47 host sshd[4944]: input_userauth_request: invalid user administrativo [preauth] Jan 20 20:18:47 host sshd[4944]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:18:47 host sshd[4944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.246.83 Jan 20 20:18:49 host sshd[4944]: Failed password for invalid user administrativo from 167.172.246.83 port 51388 ssh2 Jan 20 20:19:34 host sshd[5101]: Invalid user test from 89.179.126.155 port 43169 Jan 20 20:19:34 host sshd[5101]: input_userauth_request: invalid user test [preauth] Jan 20 20:19:34 host sshd[5101]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:19:34 host sshd[5101]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.179.126.155 Jan 20 20:19:35 host sshd[5106]: Invalid user www-data from 5.141.81.226 port 50580 Jan 20 20:19:35 host sshd[5106]: input_userauth_request: invalid user www-data [preauth] Jan 20 20:19:35 host sshd[5106]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:19:35 host sshd[5106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.141.81.226 Jan 20 20:19:36 host sshd[5101]: Failed password for invalid user test from 89.179.126.155 port 43169 ssh2 Jan 20 20:19:36 host sshd[5101]: Received disconnect from 89.179.126.155 port 43169:11: Bye Bye [preauth] Jan 20 20:19:36 host sshd[5101]: Disconnected from 89.179.126.155 port 43169 [preauth] Jan 20 20:19:36 host sshd[5110]: Invalid user s from 14.97.235.186 port 49510 Jan 20 20:19:36 host sshd[5110]: input_userauth_request: invalid user s [preauth] Jan 20 20:19:36 host sshd[5110]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:19:36 host sshd[5110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.97.235.186 Jan 20 20:19:37 host sshd[5106]: Failed password for invalid user www-data from 5.141.81.226 port 50580 ssh2 Jan 20 20:19:37 host sshd[5106]: Received disconnect from 5.141.81.226 port 50580:11: Bye Bye [preauth] Jan 20 20:19:37 host sshd[5106]: Disconnected from 5.141.81.226 port 50580 [preauth] Jan 20 20:19:39 host sshd[5110]: Failed password for invalid user s from 14.97.235.186 port 49510 ssh2 Jan 20 20:19:39 host sshd[5110]: Received disconnect from 14.97.235.186 port 49510:11: Bye Bye [preauth] Jan 20 20:19:39 host sshd[5110]: Disconnected from 14.97.235.186 port 49510 [preauth] Jan 20 20:20:05 host sshd[5237]: Invalid user server from 61.7.147.42 port 15580 Jan 20 20:20:05 host sshd[5237]: input_userauth_request: invalid user server [preauth] Jan 20 20:20:05 host sshd[5237]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:20:05 host sshd[5237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.7.147.42 Jan 20 20:20:06 host sshd[5235]: Invalid user sebastien from 204.48.17.233 port 39348 Jan 20 20:20:06 host sshd[5235]: input_userauth_request: invalid user sebastien [preauth] Jan 20 20:20:06 host sshd[5235]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:20:06 host sshd[5235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.17.233 Jan 20 20:20:07 host sshd[5237]: Failed password for invalid user server from 61.7.147.42 port 15580 ssh2 Jan 20 20:20:07 host sshd[5237]: Received disconnect from 61.7.147.42 port 15580:11: Bye Bye [preauth] Jan 20 20:20:07 host sshd[5237]: Disconnected from 61.7.147.42 port 15580 [preauth] Jan 20 20:20:08 host sshd[5235]: Failed password for invalid user sebastien from 204.48.17.233 port 39348 ssh2 Jan 20 20:20:08 host sshd[5235]: Received disconnect from 204.48.17.233 port 39348:11: Bye Bye [preauth] Jan 20 20:20:08 host sshd[5235]: Disconnected from 204.48.17.233 port 39348 [preauth] Jan 20 20:20:30 host sshd[5284]: Invalid user test from 152.32.174.199 port 52300 Jan 20 20:20:30 host sshd[5284]: input_userauth_request: invalid user test [preauth] Jan 20 20:20:30 host sshd[5284]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:20:30 host sshd[5284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.174.199 Jan 20 20:20:32 host sshd[5284]: Failed password for invalid user test from 152.32.174.199 port 52300 ssh2 Jan 20 20:20:33 host sshd[5284]: Received disconnect from 152.32.174.199 port 52300:11: Bye Bye [preauth] Jan 20 20:20:33 host sshd[5284]: Disconnected from 152.32.174.199 port 52300 [preauth] Jan 20 20:20:34 host sshd[5289]: Invalid user james from 27.71.238.208 port 49422 Jan 20 20:20:34 host sshd[5289]: input_userauth_request: invalid user james [preauth] Jan 20 20:20:34 host sshd[5289]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:20:34 host sshd[5289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.238.208 Jan 20 20:20:36 host sshd[5289]: Failed password for invalid user james from 27.71.238.208 port 49422 ssh2 Jan 20 20:20:37 host sshd[5289]: Received disconnect from 27.71.238.208 port 49422:11: Bye Bye [preauth] Jan 20 20:20:37 host sshd[5289]: Disconnected from 27.71.238.208 port 49422 [preauth] Jan 20 20:20:49 host sshd[5307]: Invalid user ipadmin from 5.141.81.226 port 44834 Jan 20 20:20:49 host sshd[5307]: input_userauth_request: invalid user ipadmin [preauth] Jan 20 20:20:49 host sshd[5307]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:20:49 host sshd[5307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.141.81.226 Jan 20 20:20:51 host sshd[5307]: Failed password for invalid user ipadmin from 5.141.81.226 port 44834 ssh2 Jan 20 20:20:51 host sshd[5307]: Received disconnect from 5.141.81.226 port 44834:11: Bye Bye [preauth] Jan 20 20:20:51 host sshd[5307]: Disconnected from 5.141.81.226 port 44834 [preauth] Jan 20 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 20:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 20:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkaretakers user-2=cochintaxi user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=ugotscom user-8=wwwrmswll user-9=wwwresourcehunte user-10=keralaholi user-11=travelboniface user-12=wwwkapin user-13=woodpeck user-14=disposeat user-15=remysagr user-16=wwwkmaorg user-17=pmcresources user-18=wwwtestugo user-19=shalinijames user-20=vfmassets user-21=straightcurve user-22=wwwletsstalkfood user-23=wwwevmhonda user-24=bonifacegroup user-25=mrsclean user-26=wwwnexidigital user-27=kottayamcalldriv user-28=phmetals user-29=gifterman user-30=palco123 feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 20:21:07 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 20:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 20:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LVC9PodaYI6ijOXA.~ Jan 20 20:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LVC9PodaYI6ijOXA.~' Jan 20 20:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LVC9PodaYI6ijOXA.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 20:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 20:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 20:21:08 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 20:21:08 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 20:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 20:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 20:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 20:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 20:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 20:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 20:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 20:21:24 host sshd[5627]: Invalid user kodi from 204.48.17.233 port 33998 Jan 20 20:21:24 host sshd[5627]: input_userauth_request: invalid user kodi [preauth] Jan 20 20:21:24 host sshd[5627]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:21:24 host sshd[5627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.48.17.233 Jan 20 20:21:26 host sshd[5627]: Failed password for invalid user kodi from 204.48.17.233 port 33998 ssh2 Jan 20 20:21:26 host sshd[5627]: Received disconnect from 204.48.17.233 port 33998:11: Bye Bye [preauth] Jan 20 20:21:26 host sshd[5627]: Disconnected from 204.48.17.233 port 33998 [preauth] Jan 20 20:22:06 host sshd[5733]: Invalid user django from 124.160.96.242 port 19882 Jan 20 20:22:06 host sshd[5733]: input_userauth_request: invalid user django [preauth] Jan 20 20:22:06 host sshd[5733]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:22:06 host sshd[5733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.242 Jan 20 20:22:08 host sshd[5733]: Failed password for invalid user django from 124.160.96.242 port 19882 ssh2 Jan 20 20:22:09 host sshd[5733]: Received disconnect from 124.160.96.242 port 19882:11: Bye Bye [preauth] Jan 20 20:22:09 host sshd[5733]: Disconnected from 124.160.96.242 port 19882 [preauth] Jan 20 20:22:58 host sshd[5942]: Invalid user hpcadmin from 152.32.174.199 port 46946 Jan 20 20:22:58 host sshd[5942]: input_userauth_request: invalid user hpcadmin [preauth] Jan 20 20:22:58 host sshd[5942]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:22:58 host sshd[5942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.174.199 Jan 20 20:22:59 host sshd[5942]: Failed password for invalid user hpcadmin from 152.32.174.199 port 46946 ssh2 Jan 20 20:23:24 host sshd[6025]: Invalid user manager from 27.71.238.208 port 47398 Jan 20 20:23:24 host sshd[6025]: input_userauth_request: invalid user manager [preauth] Jan 20 20:23:24 host sshd[6025]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:23:24 host sshd[6025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.238.208 Jan 20 20:23:27 host sshd[6025]: Failed password for invalid user manager from 27.71.238.208 port 47398 ssh2 Jan 20 20:23:27 host sshd[6025]: Received disconnect from 27.71.238.208 port 47398:11: Bye Bye [preauth] Jan 20 20:23:27 host sshd[6025]: Disconnected from 27.71.238.208 port 47398 [preauth] Jan 20 20:25:38 host sshd[6314]: Invalid user test from 27.71.238.208 port 41696 Jan 20 20:25:38 host sshd[6314]: input_userauth_request: invalid user test [preauth] Jan 20 20:25:38 host sshd[6314]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:25:38 host sshd[6314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.238.208 Jan 20 20:25:40 host sshd[6314]: Failed password for invalid user test from 27.71.238.208 port 41696 ssh2 Jan 20 20:30:59 host sshd[7052]: Invalid user s from 124.160.96.242 port 5984 Jan 20 20:30:59 host sshd[7052]: input_userauth_request: invalid user s [preauth] Jan 20 20:30:59 host sshd[7052]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:30:59 host sshd[7052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.242 Jan 20 20:31:01 host sshd[7052]: Failed password for invalid user s from 124.160.96.242 port 5984 ssh2 Jan 20 20:31:02 host sshd[7052]: Received disconnect from 124.160.96.242 port 5984:11: Bye Bye [preauth] Jan 20 20:31:02 host sshd[7052]: Disconnected from 124.160.96.242 port 5984 [preauth] Jan 20 20:31:36 host sshd[7128]: Invalid user uftp from 124.160.96.242 port 55515 Jan 20 20:31:36 host sshd[7128]: input_userauth_request: invalid user uftp [preauth] Jan 20 20:31:36 host sshd[7128]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:31:36 host sshd[7128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.242 Jan 20 20:31:38 host sshd[7128]: Failed password for invalid user uftp from 124.160.96.242 port 55515 ssh2 Jan 20 20:31:38 host sshd[7128]: Received disconnect from 124.160.96.242 port 55515:11: Bye Bye [preauth] Jan 20 20:31:38 host sshd[7128]: Disconnected from 124.160.96.242 port 55515 [preauth] Jan 20 20:38:59 host sshd[8052]: Invalid user ec2-user from 223.218.225.146 port 45858 Jan 20 20:38:59 host sshd[8052]: input_userauth_request: invalid user ec2-user [preauth] Jan 20 20:38:59 host sshd[8052]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:38:59 host sshd[8052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.218.225.146 Jan 20 20:39:01 host sshd[8052]: Failed password for invalid user ec2-user from 223.218.225.146 port 45858 ssh2 Jan 20 20:39:01 host sshd[8052]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:39:03 host sshd[8052]: Failed password for invalid user ec2-user from 223.218.225.146 port 45858 ssh2 Jan 20 20:39:03 host sshd[8052]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:39:05 host sshd[8052]: Failed password for invalid user ec2-user from 223.218.225.146 port 45858 ssh2 Jan 20 20:39:13 host sshd[8052]: Connection reset by 223.218.225.146 port 45858 [preauth] Jan 20 20:39:13 host sshd[8052]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.218.225.146 Jan 20 20:45:35 host sshd[8905]: Invalid user fileuser from 61.240.138.52 port 40783 Jan 20 20:45:35 host sshd[8905]: input_userauth_request: invalid user fileuser [preauth] Jan 20 20:45:35 host sshd[8905]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:45:35 host sshd[8905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.240.138.52 Jan 20 20:45:36 host sshd[8905]: Failed password for invalid user fileuser from 61.240.138.52 port 40783 ssh2 Jan 20 20:45:37 host sshd[8905]: Received disconnect from 61.240.138.52 port 40783:11: Bye Bye [preauth] Jan 20 20:45:37 host sshd[8905]: Disconnected from 61.240.138.52 port 40783 [preauth] Jan 20 20:47:35 host sshd[9330]: Invalid user ftpuser from 128.199.182.19 port 39776 Jan 20 20:47:35 host sshd[9330]: input_userauth_request: invalid user ftpuser [preauth] Jan 20 20:47:35 host sshd[9330]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:47:35 host sshd[9330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.182.19 Jan 20 20:47:37 host sshd[9330]: Failed password for invalid user ftpuser from 128.199.182.19 port 39776 ssh2 Jan 20 20:47:37 host sshd[9330]: Received disconnect from 128.199.182.19 port 39776:11: Bye Bye [preauth] Jan 20 20:47:37 host sshd[9330]: Disconnected from 128.199.182.19 port 39776 [preauth] Jan 20 20:48:54 host sshd[9499]: Invalid user jack from 139.59.16.31 port 53446 Jan 20 20:48:54 host sshd[9499]: input_userauth_request: invalid user jack [preauth] Jan 20 20:48:54 host sshd[9499]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:48:54 host sshd[9499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.16.31 Jan 20 20:48:56 host sshd[9499]: Failed password for invalid user jack from 139.59.16.31 port 53446 ssh2 Jan 20 20:48:56 host sshd[9499]: Received disconnect from 139.59.16.31 port 53446:11: Bye Bye [preauth] Jan 20 20:48:56 host sshd[9499]: Disconnected from 139.59.16.31 port 53446 [preauth] Jan 20 20:49:05 host sshd[9539]: Invalid user adminuser from 144.24.128.31 port 27082 Jan 20 20:49:05 host sshd[9539]: input_userauth_request: invalid user adminuser [preauth] Jan 20 20:49:05 host sshd[9539]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:49:05 host sshd[9539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.24.128.31 Jan 20 20:49:07 host sshd[9539]: Failed password for invalid user adminuser from 144.24.128.31 port 27082 ssh2 Jan 20 20:49:07 host sshd[9539]: Received disconnect from 144.24.128.31 port 27082:11: Bye Bye [preauth] Jan 20 20:49:07 host sshd[9539]: Disconnected from 144.24.128.31 port 27082 [preauth] Jan 20 20:50:36 host sshd[9815]: Invalid user user1 from 49.248.17.3 port 60658 Jan 20 20:50:36 host sshd[9815]: input_userauth_request: invalid user user1 [preauth] Jan 20 20:50:36 host sshd[9815]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:50:36 host sshd[9815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.17.3 Jan 20 20:50:38 host sshd[9815]: Failed password for invalid user user1 from 49.248.17.3 port 60658 ssh2 Jan 20 20:50:38 host sshd[9815]: Received disconnect from 49.248.17.3 port 60658:11: Bye Bye [preauth] Jan 20 20:50:38 host sshd[9815]: Disconnected from 49.248.17.3 port 60658 [preauth] Jan 20 20:51:28 host sshd[10016]: Invalid user testphp from 103.163.189.18 port 3341 Jan 20 20:51:28 host sshd[10016]: input_userauth_request: invalid user testphp [preauth] Jan 20 20:51:28 host sshd[10016]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:51:28 host sshd[10016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.163.189.18 Jan 20 20:51:30 host sshd[10016]: Failed password for invalid user testphp from 103.163.189.18 port 3341 ssh2 Jan 20 20:51:30 host sshd[10016]: Received disconnect from 103.163.189.18 port 3341:11: Bye Bye [preauth] Jan 20 20:51:30 host sshd[10016]: Disconnected from 103.163.189.18 port 3341 [preauth] Jan 20 20:52:38 host sshd[10143]: Invalid user admin from 183.99.143.30 port 58439 Jan 20 20:52:38 host sshd[10143]: input_userauth_request: invalid user admin [preauth] Jan 20 20:52:38 host sshd[10143]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:52:38 host sshd[10143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.99.143.30 Jan 20 20:52:40 host sshd[10143]: Failed password for invalid user admin from 183.99.143.30 port 58439 ssh2 Jan 20 20:52:40 host sshd[10143]: Failed password for invalid user admin from 183.99.143.30 port 58439 ssh2 Jan 20 20:52:41 host sshd[10143]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:52:43 host sshd[10154]: Invalid user deamon from 128.199.182.19 port 59864 Jan 20 20:52:43 host sshd[10154]: input_userauth_request: invalid user deamon [preauth] Jan 20 20:52:43 host sshd[10154]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:52:43 host sshd[10154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.182.19 Jan 20 20:52:43 host sshd[10143]: Failed password for invalid user admin from 183.99.143.30 port 58439 ssh2 Jan 20 20:52:44 host sshd[10143]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:52:46 host sshd[10154]: Failed password for invalid user deamon from 128.199.182.19 port 59864 ssh2 Jan 20 20:52:46 host sshd[10154]: Received disconnect from 128.199.182.19 port 59864:11: Bye Bye [preauth] Jan 20 20:52:46 host sshd[10154]: Disconnected from 128.199.182.19 port 59864 [preauth] Jan 20 20:52:46 host sshd[10143]: Failed password for invalid user admin from 183.99.143.30 port 58439 ssh2 Jan 20 20:52:46 host sshd[10160]: Invalid user username from 49.248.17.3 port 53794 Jan 20 20:52:46 host sshd[10160]: input_userauth_request: invalid user username [preauth] Jan 20 20:52:46 host sshd[10160]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:52:46 host sshd[10160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.17.3 Jan 20 20:52:47 host sshd[10143]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:52:48 host sshd[10160]: Failed password for invalid user username from 49.248.17.3 port 53794 ssh2 Jan 20 20:52:48 host sshd[10160]: Received disconnect from 49.248.17.3 port 53794:11: Bye Bye [preauth] Jan 20 20:52:48 host sshd[10160]: Disconnected from 49.248.17.3 port 53794 [preauth] Jan 20 20:52:49 host sshd[10143]: Failed password for invalid user admin from 183.99.143.30 port 58439 ssh2 Jan 20 20:52:50 host sshd[10143]: Connection reset by 183.99.143.30 port 58439 [preauth] Jan 20 20:52:50 host sshd[10143]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.99.143.30 Jan 20 20:52:50 host sshd[10143]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 20 20:53:03 host sshd[10224]: Invalid user doadmin from 139.59.16.31 port 39464 Jan 20 20:53:03 host sshd[10224]: input_userauth_request: invalid user doadmin [preauth] Jan 20 20:53:03 host sshd[10224]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:53:03 host sshd[10224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.16.31 Jan 20 20:53:05 host sshd[10224]: Failed password for invalid user doadmin from 139.59.16.31 port 39464 ssh2 Jan 20 20:53:05 host sshd[10224]: Received disconnect from 139.59.16.31 port 39464:11: Bye Bye [preauth] Jan 20 20:53:05 host sshd[10224]: Disconnected from 139.59.16.31 port 39464 [preauth] Jan 20 20:53:12 host sshd[10234]: Invalid user jenkins2 from 103.163.189.18 port 11367 Jan 20 20:53:12 host sshd[10234]: input_userauth_request: invalid user jenkins2 [preauth] Jan 20 20:53:12 host sshd[10234]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:53:12 host sshd[10234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.163.189.18 Jan 20 20:53:14 host sshd[10234]: Failed password for invalid user jenkins2 from 103.163.189.18 port 11367 ssh2 Jan 20 20:53:14 host sshd[10234]: Received disconnect from 103.163.189.18 port 11367:11: Bye Bye [preauth] Jan 20 20:53:14 host sshd[10234]: Disconnected from 103.163.189.18 port 11367 [preauth] Jan 20 20:53:21 host sshd[10245]: Invalid user teste from 144.24.128.31 port 15644 Jan 20 20:53:21 host sshd[10245]: input_userauth_request: invalid user teste [preauth] Jan 20 20:53:21 host sshd[10245]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:53:21 host sshd[10245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.24.128.31 Jan 20 20:53:23 host sshd[10245]: Failed password for invalid user teste from 144.24.128.31 port 15644 ssh2 Jan 20 20:53:23 host sshd[10245]: Received disconnect from 144.24.128.31 port 15644:11: Bye Bye [preauth] Jan 20 20:53:23 host sshd[10245]: Disconnected from 144.24.128.31 port 15644 [preauth] Jan 20 20:53:49 host sshd[10313]: Invalid user test from 219.127.11.94 port 53857 Jan 20 20:53:49 host sshd[10313]: input_userauth_request: invalid user test [preauth] Jan 20 20:53:49 host sshd[10313]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:53:49 host sshd[10313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.127.11.94 Jan 20 20:53:52 host sshd[10313]: Failed password for invalid user test from 219.127.11.94 port 53857 ssh2 Jan 20 20:53:52 host sshd[10313]: Received disconnect from 219.127.11.94 port 53857:11: Bye Bye [preauth] Jan 20 20:53:52 host sshd[10313]: Disconnected from 219.127.11.94 port 53857 [preauth] Jan 20 20:54:08 host sshd[10353]: Invalid user fileuser from 49.248.17.3 port 37856 Jan 20 20:54:08 host sshd[10353]: input_userauth_request: invalid user fileuser [preauth] Jan 20 20:54:08 host sshd[10353]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:54:08 host sshd[10353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.17.3 Jan 20 20:54:10 host sshd[10353]: Failed password for invalid user fileuser from 49.248.17.3 port 37856 ssh2 Jan 20 20:54:10 host sshd[10353]: Received disconnect from 49.248.17.3 port 37856:11: Bye Bye [preauth] Jan 20 20:54:10 host sshd[10353]: Disconnected from 49.248.17.3 port 37856 [preauth] Jan 20 20:54:10 host sshd[10360]: Invalid user esuser from 128.199.182.19 port 54546 Jan 20 20:54:10 host sshd[10360]: input_userauth_request: invalid user esuser [preauth] Jan 20 20:54:10 host sshd[10360]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:54:10 host sshd[10360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.182.19 Jan 20 20:54:11 host sshd[10360]: Failed password for invalid user esuser from 128.199.182.19 port 54546 ssh2 Jan 20 20:54:11 host sshd[10360]: Received disconnect from 128.199.182.19 port 54546:11: Bye Bye [preauth] Jan 20 20:54:11 host sshd[10360]: Disconnected from 128.199.182.19 port 54546 [preauth] Jan 20 20:54:31 host sshd[10469]: Invalid user vuser from 103.163.189.18 port 29939 Jan 20 20:54:31 host sshd[10469]: input_userauth_request: invalid user vuser [preauth] Jan 20 20:54:31 host sshd[10469]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:54:31 host sshd[10469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.163.189.18 Jan 20 20:54:33 host sshd[10469]: Failed password for invalid user vuser from 103.163.189.18 port 29939 ssh2 Jan 20 20:54:33 host sshd[10469]: Received disconnect from 103.163.189.18 port 29939:11: Bye Bye [preauth] Jan 20 20:54:33 host sshd[10469]: Disconnected from 103.163.189.18 port 29939 [preauth] Jan 20 20:54:35 host sshd[10474]: Invalid user backups from 144.24.128.31 port 38470 Jan 20 20:54:35 host sshd[10474]: input_userauth_request: invalid user backups [preauth] Jan 20 20:54:35 host sshd[10474]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:54:35 host sshd[10474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.24.128.31 Jan 20 20:54:36 host sshd[10535]: Invalid user pmuser from 139.59.16.31 port 37750 Jan 20 20:54:36 host sshd[10535]: input_userauth_request: invalid user pmuser [preauth] Jan 20 20:54:36 host sshd[10535]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:54:36 host sshd[10535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.16.31 Jan 20 20:54:36 host sshd[10474]: Failed password for invalid user backups from 144.24.128.31 port 38470 ssh2 Jan 20 20:54:38 host sshd[10535]: Failed password for invalid user pmuser from 139.59.16.31 port 37750 ssh2 Jan 20 20:54:38 host sshd[10535]: Received disconnect from 139.59.16.31 port 37750:11: Bye Bye [preauth] Jan 20 20:54:38 host sshd[10535]: Disconnected from 139.59.16.31 port 37750 [preauth] Jan 20 20:56:06 host sshd[10865]: Invalid user adminuser from 61.240.138.52 port 54181 Jan 20 20:56:06 host sshd[10865]: input_userauth_request: invalid user adminuser [preauth] Jan 20 20:56:06 host sshd[10865]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:56:06 host sshd[10865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.240.138.52 Jan 20 20:56:08 host sshd[10865]: Failed password for invalid user adminuser from 61.240.138.52 port 54181 ssh2 Jan 20 20:56:08 host sshd[10865]: Received disconnect from 61.240.138.52 port 54181:11: Bye Bye [preauth] Jan 20 20:56:08 host sshd[10865]: Disconnected from 61.240.138.52 port 54181 [preauth] Jan 20 20:56:15 host sshd[10877]: Invalid user webuser from 219.127.11.94 port 59196 Jan 20 20:56:15 host sshd[10877]: input_userauth_request: invalid user webuser [preauth] Jan 20 20:56:15 host sshd[10877]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:56:15 host sshd[10877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.127.11.94 Jan 20 20:56:16 host sshd[10877]: Failed password for invalid user webuser from 219.127.11.94 port 59196 ssh2 Jan 20 20:56:16 host sshd[10877]: Received disconnect from 219.127.11.94 port 59196:11: Bye Bye [preauth] Jan 20 20:56:16 host sshd[10877]: Disconnected from 219.127.11.94 port 59196 [preauth] Jan 20 20:56:53 host sshd[10947]: Invalid user nginx from 61.240.138.52 port 60175 Jan 20 20:56:53 host sshd[10947]: input_userauth_request: invalid user nginx [preauth] Jan 20 20:56:53 host sshd[10947]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:56:53 host sshd[10947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.240.138.52 Jan 20 20:56:55 host sshd[10947]: Failed password for invalid user nginx from 61.240.138.52 port 60175 ssh2 Jan 20 20:56:55 host sshd[10947]: Received disconnect from 61.240.138.52 port 60175:11: Bye Bye [preauth] Jan 20 20:56:55 host sshd[10947]: Disconnected from 61.240.138.52 port 60175 [preauth] Jan 20 20:57:12 host sshd[11025]: Invalid user gitlab-runner from 220.133.178.244 port 44125 Jan 20 20:57:12 host sshd[11025]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 20 20:57:12 host sshd[11025]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:57:12 host sshd[11025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.178.244 Jan 20 20:57:14 host sshd[11025]: Failed password for invalid user gitlab-runner from 220.133.178.244 port 44125 ssh2 Jan 20 20:57:15 host sshd[11025]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:57:17 host sshd[11025]: Failed password for invalid user gitlab-runner from 220.133.178.244 port 44125 ssh2 Jan 20 20:57:17 host sshd[11025]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:57:19 host sshd[11035]: Invalid user support from 221.153.108.222 port 55824 Jan 20 20:57:19 host sshd[11035]: input_userauth_request: invalid user support [preauth] Jan 20 20:57:19 host sshd[11035]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:57:19 host sshd[11035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.153.108.222 Jan 20 20:57:20 host sshd[11025]: Failed password for invalid user gitlab-runner from 220.133.178.244 port 44125 ssh2 Jan 20 20:57:20 host sshd[11025]: Failed password for invalid user gitlab-runner from 220.133.178.244 port 44125 ssh2 Jan 20 20:57:21 host sshd[11025]: Connection closed by 220.133.178.244 port 44125 [preauth] Jan 20 20:57:21 host sshd[11025]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.178.244 Jan 20 20:57:21 host sshd[11035]: Failed password for invalid user support from 221.153.108.222 port 55824 ssh2 Jan 20 20:57:21 host sshd[11035]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:57:23 host sshd[11035]: Failed password for invalid user support from 221.153.108.222 port 55824 ssh2 Jan 20 20:57:24 host sshd[11035]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:57:26 host sshd[11035]: Failed password for invalid user support from 221.153.108.222 port 55824 ssh2 Jan 20 20:57:27 host sshd[11035]: Failed password for invalid user support from 221.153.108.222 port 55824 ssh2 Jan 20 20:57:27 host sshd[11035]: Connection reset by 221.153.108.222 port 55824 [preauth] Jan 20 20:57:27 host sshd[11035]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.153.108.222 Jan 20 20:58:04 host sshd[11182]: Invalid user appuser from 219.127.11.94 port 51474 Jan 20 20:58:04 host sshd[11182]: input_userauth_request: invalid user appuser [preauth] Jan 20 20:58:04 host sshd[11182]: pam_unix(sshd:auth): check pass; user unknown Jan 20 20:58:04 host sshd[11182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.127.11.94 Jan 20 20:58:06 host sshd[11182]: Failed password for invalid user appuser from 219.127.11.94 port 51474 ssh2 Jan 20 20:58:15 host sshd[11232]: Did not receive identification string from 51.79.79.43 port 40454 Jan 20 21:04:40 host sshd[12110]: User root from 220.133.92.233 not allowed because not listed in AllowUsers Jan 20 21:04:40 host sshd[12110]: input_userauth_request: invalid user root [preauth] Jan 20 21:04:40 host unix_chkpwd[12113]: password check failed for user (root) Jan 20 21:04:40 host sshd[12110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.92.233 user=root Jan 20 21:04:40 host sshd[12110]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 21:04:42 host sshd[12110]: Failed password for invalid user root from 220.133.92.233 port 53669 ssh2 Jan 20 21:04:43 host sshd[12110]: Connection reset by 220.133.92.233 port 53669 [preauth] Jan 20 21:08:20 host sshd[12658]: Invalid user hb from 194.110.203.109 port 56778 Jan 20 21:08:20 host sshd[12658]: input_userauth_request: invalid user hb [preauth] Jan 20 21:08:20 host sshd[12658]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:08:20 host sshd[12658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 21:08:23 host sshd[12658]: Failed password for invalid user hb from 194.110.203.109 port 56778 ssh2 Jan 20 21:08:26 host sshd[12658]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:08:28 host sshd[12658]: Failed password for invalid user hb from 194.110.203.109 port 56778 ssh2 Jan 20 21:08:31 host sshd[12658]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:08:33 host sshd[12658]: Failed password for invalid user hb from 194.110.203.109 port 56778 ssh2 Jan 20 21:08:37 host sshd[12658]: Connection closed by 194.110.203.109 port 56778 [preauth] Jan 20 21:08:37 host sshd[12658]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 21:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 21:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 21:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwevmhonda user-2=bonifacegroup user-3=wwwletsstalkfood user-4=straightcurve user-5=phmetals user-6=kottayamcalldriv user-7=palco123 user-8=gifterman user-9=wwwnexidigital user-10=mrsclean user-11=disposeat user-12=wwwkmaorg user-13=remysagr user-14=wwwkapin user-15=woodpeck user-16=shalinijames user-17=wwwtestugo user-18=vfmassets user-19=pmcresources user-20=wwwpmcresource user-21=travelboniface user-22=ugotscom user-23=keralaholi user-24=wwwresourcehunte user-25=wwwrmswll user-26=cochintaxi user-27=wwwkaretakers user-28=a2zgroup user-29=dartsimp user-30=laundryboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 21:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7JcERHtPMn24vpBm.~ Jan 20 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7JcERHtPMn24vpBm.~' Jan 20 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7JcERHtPMn24vpBm.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 21:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 21:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 21:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 21:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 21:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 21:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 21:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 21:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 21:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 21:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 21:24:08 host sshd[15352]: Invalid user user from 116.128.229.225 port 56280 Jan 20 21:24:08 host sshd[15352]: input_userauth_request: invalid user user [preauth] Jan 20 21:24:09 host sshd[15352]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:24:09 host sshd[15352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.128.229.225 Jan 20 21:24:11 host sshd[15352]: Failed password for invalid user user from 116.128.229.225 port 56280 ssh2 Jan 20 21:24:12 host sshd[15352]: Received disconnect from 116.128.229.225 port 56280:11: Bye Bye [preauth] Jan 20 21:24:12 host sshd[15352]: Disconnected from 116.128.229.225 port 56280 [preauth] Jan 20 21:25:31 host sshd[15485]: User root from 211.196.120.196 not allowed because not listed in AllowUsers Jan 20 21:25:31 host sshd[15485]: input_userauth_request: invalid user root [preauth] Jan 20 21:25:31 host unix_chkpwd[15511]: password check failed for user (root) Jan 20 21:25:31 host sshd[15485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.196.120.196 user=root Jan 20 21:25:31 host sshd[15485]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 21:25:33 host sshd[15485]: Failed password for invalid user root from 211.196.120.196 port 33604 ssh2 Jan 20 21:25:34 host unix_chkpwd[15514]: password check failed for user (root) Jan 20 21:25:34 host sshd[15485]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 21:25:36 host sshd[15485]: Failed password for invalid user root from 211.196.120.196 port 33604 ssh2 Jan 20 21:25:37 host sshd[15485]: Connection reset by 211.196.120.196 port 33604 [preauth] Jan 20 21:25:37 host sshd[15485]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.196.120.196 user=root Jan 20 21:25:44 host sshd[15522]: Invalid user admin from 83.29.41.96 port 52147 Jan 20 21:25:44 host sshd[15522]: input_userauth_request: invalid user admin [preauth] Jan 20 21:25:44 host sshd[15522]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:25:44 host sshd[15522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.29.41.96 Jan 20 21:25:46 host sshd[15522]: Failed password for invalid user admin from 83.29.41.96 port 52147 ssh2 Jan 20 21:25:46 host sshd[15522]: Failed password for invalid user admin from 83.29.41.96 port 52147 ssh2 Jan 20 21:25:47 host sshd[15522]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:25:48 host sshd[15522]: Failed password for invalid user admin from 83.29.41.96 port 52147 ssh2 Jan 20 21:25:50 host sshd[15522]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:25:52 host sshd[15522]: Failed password for invalid user admin from 83.29.41.96 port 52147 ssh2 Jan 20 21:25:53 host sshd[15522]: Connection reset by 83.29.41.96 port 52147 [preauth] Jan 20 21:25:53 host sshd[15522]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.29.41.96 Jan 20 21:29:15 host sshd[16086]: Invalid user anonymous from 62.233.50.248 port 11301 Jan 20 21:29:15 host sshd[16086]: input_userauth_request: invalid user anonymous [preauth] Jan 20 21:29:15 host sshd[16086]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:29:15 host sshd[16086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 20 21:29:17 host sshd[16086]: Failed password for invalid user anonymous from 62.233.50.248 port 11301 ssh2 Jan 20 21:29:17 host sshd[16086]: Received disconnect from 62.233.50.248 port 11301:11: Client disconnecting normally [preauth] Jan 20 21:29:17 host sshd[16086]: Disconnected from 62.233.50.248 port 11301 [preauth] Jan 20 21:37:19 host sshd[17289]: Invalid user mtest from 128.199.96.178 port 47628 Jan 20 21:37:19 host sshd[17289]: input_userauth_request: invalid user mtest [preauth] Jan 20 21:37:19 host sshd[17289]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:37:19 host sshd[17289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.96.178 Jan 20 21:37:22 host sshd[17289]: Failed password for invalid user mtest from 128.199.96.178 port 47628 ssh2 Jan 20 21:37:22 host sshd[17289]: Received disconnect from 128.199.96.178 port 47628:11: Bye Bye [preauth] Jan 20 21:37:22 host sshd[17289]: Disconnected from 128.199.96.178 port 47628 [preauth] Jan 20 21:38:00 host sshd[17398]: Invalid user manager from 165.232.44.11 port 44106 Jan 20 21:38:00 host sshd[17398]: input_userauth_request: invalid user manager [preauth] Jan 20 21:38:00 host sshd[17398]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:38:00 host sshd[17398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.44.11 Jan 20 21:38:03 host sshd[17398]: Failed password for invalid user manager from 165.232.44.11 port 44106 ssh2 Jan 20 21:38:03 host sshd[17398]: Received disconnect from 165.232.44.11 port 44106:11: Bye Bye [preauth] Jan 20 21:38:03 host sshd[17398]: Disconnected from 165.232.44.11 port 44106 [preauth] Jan 20 21:39:36 host sshd[17609]: invalid public DH value: >= p-1 [preauth] Jan 20 21:39:36 host sshd[17609]: ssh_dispatch_run_fatal: Connection from 1.157.188.27 port 58795: incomplete message [preauth] Jan 20 21:40:04 host sshd[17698]: Invalid user openvpn from 128.199.96.178 port 46752 Jan 20 21:40:04 host sshd[17698]: input_userauth_request: invalid user openvpn [preauth] Jan 20 21:40:04 host sshd[17698]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:40:04 host sshd[17698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.96.178 Jan 20 21:40:06 host sshd[17698]: Failed password for invalid user openvpn from 128.199.96.178 port 46752 ssh2 Jan 20 21:40:06 host sshd[17698]: Received disconnect from 128.199.96.178 port 46752:11: Bye Bye [preauth] Jan 20 21:40:06 host sshd[17698]: Disconnected from 128.199.96.178 port 46752 [preauth] Jan 20 21:40:12 host sshd[17708]: Invalid user passadmin from 150.136.161.172 port 42348 Jan 20 21:40:12 host sshd[17708]: input_userauth_request: invalid user passadmin [preauth] Jan 20 21:40:12 host sshd[17708]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:40:12 host sshd[17708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.161.172 Jan 20 21:40:14 host sshd[17708]: Failed password for invalid user passadmin from 150.136.161.172 port 42348 ssh2 Jan 20 21:40:15 host sshd[17708]: Received disconnect from 150.136.161.172 port 42348:11: Bye Bye [preauth] Jan 20 21:40:15 host sshd[17708]: Disconnected from 150.136.161.172 port 42348 [preauth] Jan 20 21:40:46 host sshd[17766]: Invalid user xuser from 128.199.96.178 port 38782 Jan 20 21:40:46 host sshd[17766]: input_userauth_request: invalid user xuser [preauth] Jan 20 21:40:46 host sshd[17766]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:40:47 host sshd[17766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.96.178 Jan 20 21:40:48 host sshd[17766]: Failed password for invalid user xuser from 128.199.96.178 port 38782 ssh2 Jan 20 21:40:48 host sshd[17766]: Received disconnect from 128.199.96.178 port 38782:11: Bye Bye [preauth] Jan 20 21:40:48 host sshd[17766]: Disconnected from 128.199.96.178 port 38782 [preauth] Jan 20 21:41:56 host sshd[17918]: Did not receive identification string from 198.235.24.167 port 50195 Jan 20 21:43:29 host sshd[18108]: Invalid user cactiuser from 165.232.44.11 port 34220 Jan 20 21:43:29 host sshd[18108]: input_userauth_request: invalid user cactiuser [preauth] Jan 20 21:43:29 host sshd[18108]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:43:29 host sshd[18108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.44.11 Jan 20 21:43:31 host sshd[18108]: Failed password for invalid user cactiuser from 165.232.44.11 port 34220 ssh2 Jan 20 21:43:31 host sshd[18108]: Received disconnect from 165.232.44.11 port 34220:11: Bye Bye [preauth] Jan 20 21:43:31 host sshd[18108]: Disconnected from 165.232.44.11 port 34220 [preauth] Jan 20 21:44:32 host sshd[18340]: Invalid user administrador from 165.232.44.11 port 49198 Jan 20 21:44:32 host sshd[18340]: input_userauth_request: invalid user administrador [preauth] Jan 20 21:44:32 host sshd[18340]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:44:32 host sshd[18340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.232.44.11 Jan 20 21:44:35 host sshd[18340]: Failed password for invalid user administrador from 165.232.44.11 port 49198 ssh2 Jan 20 21:44:35 host sshd[18340]: Received disconnect from 165.232.44.11 port 49198:11: Bye Bye [preauth] Jan 20 21:44:35 host sshd[18340]: Disconnected from 165.232.44.11 port 49198 [preauth] Jan 20 21:45:24 host sshd[18466]: Invalid user adminuser from 157.231.35.151 port 63928 Jan 20 21:45:24 host sshd[18466]: input_userauth_request: invalid user adminuser [preauth] Jan 20 21:45:24 host sshd[18466]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:45:24 host sshd[18466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.231.35.151 Jan 20 21:45:25 host sshd[18466]: Failed password for invalid user adminuser from 157.231.35.151 port 63928 ssh2 Jan 20 21:45:26 host sshd[18466]: Received disconnect from 157.231.35.151 port 63928:11: Bye Bye [preauth] Jan 20 21:45:26 host sshd[18466]: Disconnected from 157.231.35.151 port 63928 [preauth] Jan 20 21:46:48 host sshd[18677]: Invalid user student from 150.136.161.172 port 53634 Jan 20 21:46:48 host sshd[18677]: input_userauth_request: invalid user student [preauth] Jan 20 21:46:48 host sshd[18677]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:46:48 host sshd[18677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.161.172 Jan 20 21:46:50 host sshd[18677]: Failed password for invalid user student from 150.136.161.172 port 53634 ssh2 Jan 20 21:46:50 host sshd[18677]: Received disconnect from 150.136.161.172 port 53634:11: Bye Bye [preauth] Jan 20 21:46:50 host sshd[18677]: Disconnected from 150.136.161.172 port 53634 [preauth] Jan 20 21:48:52 host sshd[18912]: Connection reset by 150.136.161.172 port 59940 [preauth] Jan 20 21:53:28 host sshd[19603]: Invalid user soporte from 157.231.35.151 port 37678 Jan 20 21:53:28 host sshd[19603]: input_userauth_request: invalid user soporte [preauth] Jan 20 21:53:28 host sshd[19603]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:53:28 host sshd[19603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.231.35.151 Jan 20 21:53:29 host sshd[19603]: Failed password for invalid user soporte from 157.231.35.151 port 37678 ssh2 Jan 20 21:53:30 host sshd[19603]: Received disconnect from 157.231.35.151 port 37678:11: Bye Bye [preauth] Jan 20 21:53:30 host sshd[19603]: Disconnected from 157.231.35.151 port 37678 [preauth] Jan 20 21:54:43 host sshd[19744]: Invalid user test001 from 150.136.161.172 port 50338 Jan 20 21:54:43 host sshd[19744]: input_userauth_request: invalid user test001 [preauth] Jan 20 21:54:43 host sshd[19744]: pam_unix(sshd:auth): check pass; user unknown Jan 20 21:54:43 host sshd[19744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.161.172 Jan 20 21:54:45 host sshd[19744]: Failed password for invalid user test001 from 150.136.161.172 port 50338 ssh2 Jan 20 21:54:45 host sshd[19744]: Received disconnect from 150.136.161.172 port 50338:11: Bye Bye [preauth] Jan 20 21:54:45 host sshd[19744]: Disconnected from 150.136.161.172 port 50338 [preauth] Jan 20 22:00:35 host sshd[20703]: Connection closed by 157.231.35.151 port 50246 [preauth] Jan 20 22:07:07 host sshd[21768]: Invalid user ubuntu from 157.231.35.151 port 49162 Jan 20 22:07:07 host sshd[21768]: input_userauth_request: invalid user ubuntu [preauth] Jan 20 22:07:07 host sshd[21768]: pam_unix(sshd:auth): check pass; user unknown Jan 20 22:07:07 host sshd[21768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.231.35.151 Jan 20 22:07:09 host sshd[21768]: Failed password for invalid user ubuntu from 157.231.35.151 port 49162 ssh2 Jan 20 22:11:43 host sshd[22481]: Connection reset by 1.53.143.40 port 41511 [preauth] Jan 20 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=gifterman user-4=palco123 user-5=kottayamcalldriv user-6=phmetals user-7=straightcurve user-8=wwwletsstalkfood user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=woodpeck user-16=wwwkapin user-17=disposeat user-18=remysagr user-19=wwwkmaorg user-20=wwwrmswll user-21=wwwresourcehunte user-22=keralaholi user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 22:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LwzDVFIVcANaqfV7.~ Jan 20 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LwzDVFIVcANaqfV7.~' Jan 20 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-LwzDVFIVcANaqfV7.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 22:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 22:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 22:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 22:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 22:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 22:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 22:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 22:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 22:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 22:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 22:22:09 host sshd[24136]: User root from 195.34.205.118 not allowed because not listed in AllowUsers Jan 20 22:22:09 host sshd[24136]: input_userauth_request: invalid user root [preauth] Jan 20 22:22:09 host unix_chkpwd[24139]: password check failed for user (root) Jan 20 22:22:09 host sshd[24136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.34.205.118 user=root Jan 20 22:22:09 host sshd[24136]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 22:22:11 host sshd[24136]: Failed password for invalid user root from 195.34.205.118 port 50921 ssh2 Jan 20 22:22:11 host unix_chkpwd[24141]: password check failed for user (root) Jan 20 22:22:11 host sshd[24136]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 22:22:13 host sshd[24136]: Failed password for invalid user root from 195.34.205.118 port 50921 ssh2 Jan 20 22:22:14 host unix_chkpwd[24145]: password check failed for user (root) Jan 20 22:22:14 host sshd[24136]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 22:22:16 host sshd[24136]: Failed password for invalid user root from 195.34.205.118 port 50921 ssh2 Jan 20 22:22:16 host unix_chkpwd[24149]: password check failed for user (root) Jan 20 22:22:16 host sshd[24136]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 22:22:18 host sshd[24136]: Failed password for invalid user root from 195.34.205.118 port 50921 ssh2 Jan 20 22:22:18 host unix_chkpwd[24157]: password check failed for user (root) Jan 20 22:22:18 host sshd[24136]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 22:22:20 host sshd[24136]: Failed password for invalid user root from 195.34.205.118 port 50921 ssh2 Jan 20 22:48:17 host sshd[27608]: Invalid user shiny from 143.198.212.105 port 56000 Jan 20 22:48:17 host sshd[27608]: input_userauth_request: invalid user shiny [preauth] Jan 20 22:48:17 host sshd[27608]: pam_unix(sshd:auth): check pass; user unknown Jan 20 22:48:17 host sshd[27608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.212.105 Jan 20 22:48:20 host sshd[27608]: Failed password for invalid user shiny from 143.198.212.105 port 56000 ssh2 Jan 20 22:48:20 host sshd[27608]: Received disconnect from 143.198.212.105 port 56000:11: Bye Bye [preauth] Jan 20 22:48:20 host sshd[27608]: Disconnected from 143.198.212.105 port 56000 [preauth] Jan 20 22:51:11 host sshd[28058]: Invalid user admin1 from 143.198.212.105 port 33742 Jan 20 22:51:11 host sshd[28058]: input_userauth_request: invalid user admin1 [preauth] Jan 20 22:51:11 host sshd[28058]: pam_unix(sshd:auth): check pass; user unknown Jan 20 22:51:11 host sshd[28058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.212.105 Jan 20 22:51:13 host sshd[28058]: Failed password for invalid user admin1 from 143.198.212.105 port 33742 ssh2 Jan 20 22:51:13 host sshd[28058]: Received disconnect from 143.198.212.105 port 33742:11: Bye Bye [preauth] Jan 20 22:51:13 host sshd[28058]: Disconnected from 143.198.212.105 port 33742 [preauth] Jan 20 22:52:33 host sshd[28245]: Invalid user tacuser from 143.198.212.105 port 38590 Jan 20 22:52:33 host sshd[28245]: input_userauth_request: invalid user tacuser [preauth] Jan 20 22:52:33 host sshd[28245]: pam_unix(sshd:auth): check pass; user unknown Jan 20 22:52:33 host sshd[28245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.198.212.105 Jan 20 22:52:36 host sshd[28245]: Failed password for invalid user tacuser from 143.198.212.105 port 38590 ssh2 Jan 20 22:53:15 host sshd[28332]: User root from 59.23.199.98 not allowed because not listed in AllowUsers Jan 20 22:53:15 host sshd[28332]: input_userauth_request: invalid user root [preauth] Jan 20 22:53:15 host unix_chkpwd[28336]: password check failed for user (root) Jan 20 22:53:15 host sshd[28332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.23.199.98 user=root Jan 20 22:53:15 host sshd[28332]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 22:53:18 host sshd[28332]: Failed password for invalid user root from 59.23.199.98 port 61858 ssh2 Jan 20 22:53:18 host sshd[28332]: Connection reset by 59.23.199.98 port 61858 [preauth] Jan 20 22:56:16 host sshd[28775]: Invalid user hc from 194.110.203.109 port 55148 Jan 20 22:56:16 host sshd[28775]: input_userauth_request: invalid user hc [preauth] Jan 20 22:56:16 host sshd[28775]: pam_unix(sshd:auth): check pass; user unknown Jan 20 22:56:16 host sshd[28775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 22:56:18 host sshd[28775]: Failed password for invalid user hc from 194.110.203.109 port 55148 ssh2 Jan 20 22:56:21 host sshd[28775]: pam_unix(sshd:auth): check pass; user unknown Jan 20 22:56:23 host sshd[28775]: Failed password for invalid user hc from 194.110.203.109 port 55148 ssh2 Jan 20 22:56:27 host sshd[28775]: pam_unix(sshd:auth): check pass; user unknown Jan 20 22:56:28 host sshd[28775]: Failed password for invalid user hc from 194.110.203.109 port 55148 ssh2 Jan 20 22:56:32 host sshd[28775]: Connection closed by 194.110.203.109 port 55148 [preauth] Jan 20 22:56:32 host sshd[28775]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 20 23:07:15 host sshd[30312]: Invalid user username from 3.85.21.213 port 39680 Jan 20 23:07:15 host sshd[30312]: input_userauth_request: invalid user username [preauth] Jan 20 23:07:15 host sshd[30312]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:07:15 host sshd[30312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.85.21.213 Jan 20 23:07:17 host sshd[30312]: Failed password for invalid user username from 3.85.21.213 port 39680 ssh2 Jan 20 23:07:17 host sshd[30312]: Connection closed by 3.85.21.213 port 39680 [preauth] Jan 20 23:10:53 host sshd[30807]: Invalid user usr from 183.97.192.131 port 41879 Jan 20 23:10:53 host sshd[30807]: input_userauth_request: invalid user usr [preauth] Jan 20 23:10:53 host sshd[30807]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:10:53 host sshd[30807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.97.192.131 Jan 20 23:10:55 host sshd[30807]: Failed password for invalid user usr from 183.97.192.131 port 41879 ssh2 Jan 20 23:10:56 host sshd[30807]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:10:58 host sshd[30807]: Failed password for invalid user usr from 183.97.192.131 port 41879 ssh2 Jan 20 23:10:58 host sshd[30807]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:11:00 host sshd[30807]: Failed password for invalid user usr from 183.97.192.131 port 41879 ssh2 Jan 20 23:11:02 host sshd[30807]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:11:04 host sshd[30807]: Failed password for invalid user usr from 183.97.192.131 port 41879 ssh2 Jan 20 23:11:28 host sshd[30900]: Invalid user Admin from 114.35.197.154 port 37723 Jan 20 23:11:28 host sshd[30900]: input_userauth_request: invalid user Admin [preauth] Jan 20 23:11:28 host sshd[30900]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:11:28 host sshd[30900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.197.154 Jan 20 23:11:30 host sshd[30900]: Failed password for invalid user Admin from 114.35.197.154 port 37723 ssh2 Jan 20 23:11:30 host sshd[30900]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:11:32 host sshd[30900]: Failed password for invalid user Admin from 114.35.197.154 port 37723 ssh2 Jan 20 23:11:33 host sshd[30900]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:11:35 host sshd[30900]: Failed password for invalid user Admin from 114.35.197.154 port 37723 ssh2 Jan 20 23:11:36 host sshd[30900]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:11:38 host sshd[30900]: Failed password for invalid user Admin from 114.35.197.154 port 37723 ssh2 Jan 20 23:11:38 host sshd[30900]: Failed password for invalid user Admin from 114.35.197.154 port 37723 ssh2 Jan 20 23:11:39 host sshd[30900]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:11:41 host sshd[30900]: Failed password for invalid user Admin from 114.35.197.154 port 37723 ssh2 Jan 20 23:11:41 host sshd[30900]: error: maximum authentication attempts exceeded for invalid user Admin from 114.35.197.154 port 37723 ssh2 [preauth] Jan 20 23:11:41 host sshd[30900]: Disconnecting: Too many authentication failures [preauth] Jan 20 23:11:41 host sshd[30900]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.197.154 Jan 20 23:11:41 host sshd[30900]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 20 23:18:12 host sshd[31799]: Invalid user netopia from 205.185.113.129 port 34484 Jan 20 23:18:12 host sshd[31799]: input_userauth_request: invalid user netopia [preauth] Jan 20 23:18:12 host sshd[31799]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:18:12 host sshd[31799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 20 23:18:13 host sshd[31799]: Failed password for invalid user netopia from 205.185.113.129 port 34484 ssh2 Jan 20 23:18:14 host sshd[31799]: Connection closed by 205.185.113.129 port 34484 [preauth] Jan 20 23:19:04 host sshd[31903]: User root from 114.35.10.149 not allowed because not listed in AllowUsers Jan 20 23:19:04 host sshd[31903]: input_userauth_request: invalid user root [preauth] Jan 20 23:19:04 host unix_chkpwd[31910]: password check failed for user (root) Jan 20 23:19:04 host sshd[31903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.10.149 user=root Jan 20 23:19:04 host sshd[31903]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 23:19:06 host sshd[31903]: Failed password for invalid user root from 114.35.10.149 port 32880 ssh2 Jan 20 23:19:07 host unix_chkpwd[31913]: password check failed for user (root) Jan 20 23:19:07 host sshd[31903]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 23:19:09 host sshd[31903]: Failed password for invalid user root from 114.35.10.149 port 32880 ssh2 Jan 20 23:19:10 host unix_chkpwd[31916]: password check failed for user (root) Jan 20 23:19:10 host sshd[31903]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 23:19:12 host sshd[31903]: Failed password for invalid user root from 114.35.10.149 port 32880 ssh2 Jan 20 23:19:13 host sshd[31903]: Connection reset by 114.35.10.149 port 32880 [preauth] Jan 20 23:19:13 host sshd[31903]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.10.149 user=root Jan 20 23:20:09 host sshd[32173]: Invalid user user from 221.145.220.100 port 50687 Jan 20 23:20:09 host sshd[32173]: input_userauth_request: invalid user user [preauth] Jan 20 23:20:09 host sshd[32173]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:20:09 host sshd[32173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.145.220.100 Jan 20 23:20:12 host sshd[32173]: Failed password for invalid user user from 221.145.220.100 port 50687 ssh2 Jan 20 23:20:13 host sshd[32173]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:20:15 host sshd[32173]: Failed password for invalid user user from 221.145.220.100 port 50687 ssh2 Jan 20 23:20:15 host sshd[32173]: Connection reset by 221.145.220.100 port 50687 [preauth] Jan 20 23:20:15 host sshd[32173]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.145.220.100 Jan 20 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 20 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 20 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 20 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwletsstalkfood user-2=straightcurve user-3=bonifacegroup user-4=wwwevmhonda user-5=mrsclean user-6=wwwnexidigital user-7=gifterman user-8=palco123 user-9=phmetals user-10=kottayamcalldriv user-11=woodpeck user-12=wwwkapin user-13=wwwkmaorg user-14=disposeat user-15=remysagr user-16=pmcresources user-17=vfmassets user-18=wwwtestugo user-19=shalinijames user-20=wwwpmcresource user-21=wwwrmswll user-22=wwwresourcehunte user-23=keralaholi user-24=ugotscom user-25=travelboniface user-26=cochintaxi user-27=wwwkaretakers user-28=laundryboniface user-29=dartsimp user-30=a2zgroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 20 23:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 20 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-tA3dA2LVzZPrZx5F.~ Jan 20 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-tA3dA2LVzZPrZx5F.~' Jan 20 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-tA3dA2LVzZPrZx5F.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 20 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 20 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 20 23:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 20 23:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 20 23:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 20 23:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 20 23:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 20 23:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 20 23:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 20 23:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 20 23:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 20 23:23:54 host sshd[420]: User root from 220.132.126.181 not allowed because not listed in AllowUsers Jan 20 23:23:54 host sshd[420]: input_userauth_request: invalid user root [preauth] Jan 20 23:23:54 host unix_chkpwd[425]: password check failed for user (root) Jan 20 23:23:54 host sshd[420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.126.181 user=root Jan 20 23:23:54 host sshd[420]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 23:23:56 host sshd[420]: Failed password for invalid user root from 220.132.126.181 port 54915 ssh2 Jan 20 23:23:57 host sshd[420]: Connection reset by 220.132.126.181 port 54915 [preauth] Jan 20 23:28:01 host sshd[1142]: Invalid user admin from 220.133.144.238 port 50088 Jan 20 23:28:01 host sshd[1142]: input_userauth_request: invalid user admin [preauth] Jan 20 23:28:01 host sshd[1142]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:28:01 host sshd[1142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.144.238 Jan 20 23:28:03 host sshd[1142]: Failed password for invalid user admin from 220.133.144.238 port 50088 ssh2 Jan 20 23:28:04 host sshd[1142]: Failed password for invalid user admin from 220.133.144.238 port 50088 ssh2 Jan 20 23:28:04 host sshd[1142]: Connection reset by 220.133.144.238 port 50088 [preauth] Jan 20 23:33:58 host sshd[2327]: Did not receive identification string from 80.76.51.143 port 37398 Jan 20 23:36:00 host sshd[2646]: Invalid user jimchen from 106.10.122.53 port 42388 Jan 20 23:36:00 host sshd[2646]: input_userauth_request: invalid user jimchen [preauth] Jan 20 23:36:01 host sshd[2646]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:36:01 host sshd[2646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 20 23:36:03 host sshd[2646]: Failed password for invalid user jimchen from 106.10.122.53 port 42388 ssh2 Jan 20 23:36:03 host sshd[2646]: Connection closed by 106.10.122.53 port 42388 [preauth] Jan 20 23:38:01 host sshd[3060]: Invalid user admin from 122.117.98.206 port 39607 Jan 20 23:38:01 host sshd[3060]: input_userauth_request: invalid user admin [preauth] Jan 20 23:38:01 host sshd[3060]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:38:01 host sshd[3060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.98.206 Jan 20 23:38:03 host sshd[3060]: Failed password for invalid user admin from 122.117.98.206 port 39607 ssh2 Jan 20 23:38:03 host sshd[3060]: Failed password for invalid user admin from 122.117.98.206 port 39607 ssh2 Jan 20 23:38:04 host sshd[3060]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:38:07 host sshd[3060]: Failed password for invalid user admin from 122.117.98.206 port 39607 ssh2 Jan 20 23:38:07 host sshd[3060]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:38:09 host sshd[3060]: Failed password for invalid user admin from 122.117.98.206 port 39607 ssh2 Jan 20 23:38:10 host sshd[3060]: Connection reset by 122.117.98.206 port 39607 [preauth] Jan 20 23:38:10 host sshd[3060]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.98.206 Jan 20 23:38:33 host sshd[3167]: Did not receive identification string from 117.50.160.88 port 60316 Jan 20 23:38:35 host sshd[3168]: Invalid user ftpuser from 117.50.160.88 port 39482 Jan 20 23:38:35 host sshd[3168]: input_userauth_request: invalid user ftpuser [preauth] Jan 20 23:38:35 host sshd[3176]: User root from 117.50.160.88 not allowed because not listed in AllowUsers Jan 20 23:38:35 host sshd[3176]: input_userauth_request: invalid user root [preauth] Jan 20 23:38:35 host sshd[3184]: Invalid user esuser from 117.50.160.88 port 39488 Jan 20 23:38:35 host sshd[3184]: input_userauth_request: invalid user esuser [preauth] Jan 20 23:38:35 host sshd[3193]: User root from 117.50.160.88 not allowed because not listed in AllowUsers Jan 20 23:38:35 host sshd[3193]: input_userauth_request: invalid user root [preauth] Jan 20 23:38:36 host sshd[3192]: Invalid user web from 117.50.160.88 port 39454 Jan 20 23:38:36 host sshd[3192]: input_userauth_request: invalid user web [preauth] Jan 20 23:38:36 host unix_chkpwd[3219]: password check failed for user (root) Jan 20 23:38:36 host sshd[3193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.160.88 user=root Jan 20 23:38:36 host sshd[3193]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 20 23:38:36 host sshd[3204]: User mysql from 117.50.160.88 not allowed because not listed in AllowUsers Jan 20 23:38:36 host sshd[3204]: input_userauth_request: invalid user mysql [preauth] Jan 20 23:38:36 host sshd[3192]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:38:36 host sshd[3192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.160.88 Jan 20 23:38:36 host unix_chkpwd[3227]: password check failed for user (mysql) Jan 20 23:38:36 host sshd[3204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.160.88 user=mysql Jan 20 23:38:36 host sshd[3204]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 20 23:38:36 host sshd[3168]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:38:36 host sshd[3168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.160.88 Jan 20 23:38:36 host sshd[3184]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:38:36 host sshd[3184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.160.88 Jan 20 23:38:36 host sshd[3173]: Invalid user user from 117.50.160.88 port 39476 Jan 20 23:38:36 host sshd[3173]: input_userauth_request: invalid user user [preauth] Jan 20 23:38:36 host sshd[3172]: Invalid user hadoop from 117.50.160.88 port 39442 Jan 20 23:38:36 host sshd[3172]: input_userauth_request: invalid user hadoop [preauth] Jan 20 23:38:36 host sshd[3180]: User root from 117.50.160.88 not allowed because not listed in AllowUsers Jan 20 23:38:36 host sshd[3180]: input_userauth_request: invalid user root [preauth] Jan 20 23:38:36 host sshd[3179]: User root from 117.50.160.88 not allowed because not listed in AllowUsers Jan 20 23:38:36 host sshd[3179]: input_userauth_request: invalid user root [preauth] Jan 20 23:38:36 host sshd[3211]: User root from 117.50.160.88 not allowed because not listed in AllowUsers Jan 20 23:38:36 host sshd[3211]: input_userauth_request: invalid user root [preauth] Jan 20 23:38:38 host sshd[3193]: Failed password for invalid user root from 117.50.160.88 port 39500 ssh2 Jan 20 23:38:38 host sshd[3192]: Failed password for invalid user web from 117.50.160.88 port 39454 ssh2 Jan 20 23:38:38 host sshd[3204]: Failed password for invalid user mysql from 117.50.160.88 port 39522 ssh2 Jan 20 23:38:38 host sshd[3168]: Failed password for invalid user ftpuser from 117.50.160.88 port 39482 ssh2 Jan 20 23:38:38 host sshd[3184]: Failed password for invalid user esuser from 117.50.160.88 port 39488 ssh2 Jan 20 23:45:59 host sshd[4192]: Invalid user dmdba from 27.254.159.123 port 37597 Jan 20 23:45:59 host sshd[4192]: input_userauth_request: invalid user dmdba [preauth] Jan 20 23:45:59 host sshd[4192]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:45:59 host sshd[4192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.159.123 Jan 20 23:46:00 host sshd[4192]: Failed password for invalid user dmdba from 27.254.159.123 port 37597 ssh2 Jan 20 23:46:01 host sshd[4192]: Received disconnect from 27.254.159.123 port 37597:11: Bye Bye [preauth] Jan 20 23:46:01 host sshd[4192]: Disconnected from 27.254.159.123 port 37597 [preauth] Jan 20 23:46:02 host sshd[4216]: Invalid user vagrant from 68.178.167.86 port 51748 Jan 20 23:46:02 host sshd[4216]: input_userauth_request: invalid user vagrant [preauth] Jan 20 23:46:02 host sshd[4216]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:46:02 host sshd[4216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.178.167.86 Jan 20 23:46:04 host sshd[4216]: Failed password for invalid user vagrant from 68.178.167.86 port 51748 ssh2 Jan 20 23:46:04 host sshd[4216]: Received disconnect from 68.178.167.86 port 51748:11: Bye Bye [preauth] Jan 20 23:46:04 host sshd[4216]: Disconnected from 68.178.167.86 port 51748 [preauth] Jan 20 23:46:20 host sshd[4242]: Invalid user ftpuser from 93.41.209.74 port 38998 Jan 20 23:46:20 host sshd[4242]: input_userauth_request: invalid user ftpuser [preauth] Jan 20 23:46:20 host sshd[4242]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:46:20 host sshd[4242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.41.209.74 Jan 20 23:46:23 host sshd[4242]: Failed password for invalid user ftpuser from 93.41.209.74 port 38998 ssh2 Jan 20 23:46:23 host sshd[4242]: Received disconnect from 93.41.209.74 port 38998:11: Bye Bye [preauth] Jan 20 23:46:23 host sshd[4242]: Disconnected from 93.41.209.74 port 38998 [preauth] Jan 20 23:49:11 host sshd[4650]: Invalid user newuser from 43.133.229.111 port 40592 Jan 20 23:49:11 host sshd[4650]: input_userauth_request: invalid user newuser [preauth] Jan 20 23:49:11 host sshd[4650]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:49:11 host sshd[4650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.133.229.111 Jan 20 23:49:12 host sshd[4650]: Failed password for invalid user newuser from 43.133.229.111 port 40592 ssh2 Jan 20 23:49:13 host sshd[4650]: Received disconnect from 43.133.229.111 port 40592:11: Bye Bye [preauth] Jan 20 23:49:13 host sshd[4650]: Disconnected from 43.133.229.111 port 40592 [preauth] Jan 20 23:50:27 host sshd[4807]: Invalid user teste from 146.190.55.221 port 35232 Jan 20 23:50:27 host sshd[4807]: input_userauth_request: invalid user teste [preauth] Jan 20 23:50:27 host sshd[4807]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:50:27 host sshd[4807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.55.221 Jan 20 23:50:28 host sshd[4807]: Failed password for invalid user teste from 146.190.55.221 port 35232 ssh2 Jan 20 23:50:29 host sshd[4807]: Received disconnect from 146.190.55.221 port 35232:11: Bye Bye [preauth] Jan 20 23:50:29 host sshd[4807]: Disconnected from 146.190.55.221 port 35232 [preauth] Jan 20 23:52:54 host sshd[5117]: Invalid user ossuser from 146.190.55.221 port 49688 Jan 20 23:52:54 host sshd[5117]: input_userauth_request: invalid user ossuser [preauth] Jan 20 23:52:54 host sshd[5117]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:52:54 host sshd[5117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.55.221 Jan 20 23:52:56 host sshd[5117]: Failed password for invalid user ossuser from 146.190.55.221 port 49688 ssh2 Jan 20 23:52:56 host sshd[5117]: Received disconnect from 146.190.55.221 port 49688:11: Bye Bye [preauth] Jan 20 23:52:56 host sshd[5117]: Disconnected from 146.190.55.221 port 49688 [preauth] Jan 20 23:53:17 host sshd[5174]: Invalid user synadmin from 68.178.167.86 port 54354 Jan 20 23:53:17 host sshd[5174]: input_userauth_request: invalid user synadmin [preauth] Jan 20 23:53:17 host sshd[5174]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:53:17 host sshd[5174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.178.167.86 Jan 20 23:53:18 host sshd[5174]: Failed password for invalid user synadmin from 68.178.167.86 port 54354 ssh2 Jan 20 23:53:18 host sshd[5174]: Received disconnect from 68.178.167.86 port 54354:11: Bye Bye [preauth] Jan 20 23:53:18 host sshd[5174]: Disconnected from 68.178.167.86 port 54354 [preauth] Jan 20 23:53:45 host sshd[5244]: Invalid user pbsadmin from 27.254.159.123 port 39363 Jan 20 23:53:45 host sshd[5244]: input_userauth_request: invalid user pbsadmin [preauth] Jan 20 23:53:45 host sshd[5244]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:53:45 host sshd[5244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.159.123 Jan 20 23:53:46 host sshd[5244]: Failed password for invalid user pbsadmin from 27.254.159.123 port 39363 ssh2 Jan 20 23:53:46 host sshd[5244]: Received disconnect from 27.254.159.123 port 39363:11: Bye Bye [preauth] Jan 20 23:53:46 host sshd[5244]: Disconnected from 27.254.159.123 port 39363 [preauth] Jan 20 23:53:48 host sshd[5249]: Invalid user sysadmin from 43.133.229.111 port 36050 Jan 20 23:53:48 host sshd[5249]: input_userauth_request: invalid user sysadmin [preauth] Jan 20 23:53:48 host sshd[5249]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:53:48 host sshd[5249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.133.229.111 Jan 20 23:53:49 host sshd[5249]: Failed password for invalid user sysadmin from 43.133.229.111 port 36050 ssh2 Jan 20 23:53:49 host sshd[5249]: Received disconnect from 43.133.229.111 port 36050:11: Bye Bye [preauth] Jan 20 23:53:49 host sshd[5249]: Disconnected from 43.133.229.111 port 36050 [preauth] Jan 20 23:54:01 host sshd[5362]: Invalid user testy from 93.41.209.74 port 23637 Jan 20 23:54:01 host sshd[5362]: input_userauth_request: invalid user testy [preauth] Jan 20 23:54:01 host sshd[5362]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:54:01 host sshd[5362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.41.209.74 Jan 20 23:54:02 host sshd[5365]: Invalid user ubuntu from 146.190.55.221 port 45950 Jan 20 23:54:02 host sshd[5365]: input_userauth_request: invalid user ubuntu [preauth] Jan 20 23:54:02 host sshd[5365]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:54:02 host sshd[5365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.190.55.221 Jan 20 23:54:03 host sshd[5362]: Failed password for invalid user testy from 93.41.209.74 port 23637 ssh2 Jan 20 23:54:04 host sshd[5362]: Received disconnect from 93.41.209.74 port 23637:11: Bye Bye [preauth] Jan 20 23:54:04 host sshd[5362]: Disconnected from 93.41.209.74 port 23637 [preauth] Jan 20 23:54:04 host sshd[5365]: Failed password for invalid user ubuntu from 146.190.55.221 port 45950 ssh2 Jan 20 23:54:05 host sshd[5365]: Received disconnect from 146.190.55.221 port 45950:11: Bye Bye [preauth] Jan 20 23:54:05 host sshd[5365]: Disconnected from 146.190.55.221 port 45950 [preauth] Jan 20 23:54:54 host sshd[5493]: Invalid user git from 68.178.167.86 port 53730 Jan 20 23:54:54 host sshd[5493]: input_userauth_request: invalid user git [preauth] Jan 20 23:54:54 host sshd[5493]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:54:54 host sshd[5493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.178.167.86 Jan 20 23:54:56 host sshd[5493]: Failed password for invalid user git from 68.178.167.86 port 53730 ssh2 Jan 20 23:54:56 host sshd[5493]: Received disconnect from 68.178.167.86 port 53730:11: Bye Bye [preauth] Jan 20 23:54:56 host sshd[5493]: Disconnected from 68.178.167.86 port 53730 [preauth] Jan 20 23:55:01 host sshd[5535]: Invalid user cpd from 43.133.229.111 port 35464 Jan 20 23:55:01 host sshd[5535]: input_userauth_request: invalid user cpd [preauth] Jan 20 23:55:01 host sshd[5535]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:55:01 host sshd[5535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.133.229.111 Jan 20 23:55:03 host sshd[5535]: Failed password for invalid user cpd from 43.133.229.111 port 35464 ssh2 Jan 20 23:55:19 host sshd[5621]: Invalid user sshvpn from 93.41.209.74 port 35187 Jan 20 23:55:19 host sshd[5621]: input_userauth_request: invalid user sshvpn [preauth] Jan 20 23:55:19 host sshd[5621]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:55:19 host sshd[5621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.41.209.74 Jan 20 23:55:21 host sshd[5621]: Failed password for invalid user sshvpn from 93.41.209.74 port 35187 ssh2 Jan 20 23:55:21 host sshd[5621]: Received disconnect from 93.41.209.74 port 35187:11: Bye Bye [preauth] Jan 20 23:55:21 host sshd[5621]: Disconnected from 93.41.209.74 port 35187 [preauth] Jan 20 23:55:23 host sshd[5665]: Invalid user test2 from 27.254.159.123 port 52542 Jan 20 23:55:23 host sshd[5665]: input_userauth_request: invalid user test2 [preauth] Jan 20 23:55:23 host sshd[5665]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:55:23 host sshd[5665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.159.123 Jan 20 23:55:24 host sshd[5665]: Failed password for invalid user test2 from 27.254.159.123 port 52542 ssh2 Jan 20 23:55:25 host sshd[5665]: Received disconnect from 27.254.159.123 port 52542:11: Bye Bye [preauth] Jan 20 23:55:25 host sshd[5665]: Disconnected from 27.254.159.123 port 52542 [preauth] Jan 20 23:56:35 host sshd[5838]: Invalid user bradley from 107.189.30.59 port 36304 Jan 20 23:56:35 host sshd[5838]: input_userauth_request: invalid user bradley [preauth] Jan 20 23:56:35 host sshd[5838]: pam_unix(sshd:auth): check pass; user unknown Jan 20 23:56:35 host sshd[5838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 20 23:56:37 host sshd[5838]: Failed password for invalid user bradley from 107.189.30.59 port 36304 ssh2 Jan 20 23:56:38 host sshd[5838]: Connection closed by 107.189.30.59 port 36304 [preauth] Jan 21 00:01:50 host sshd[6560]: Invalid user admin from 220.135.177.191 port 54376 Jan 21 00:01:50 host sshd[6560]: input_userauth_request: invalid user admin [preauth] Jan 21 00:01:50 host sshd[6560]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:01:50 host sshd[6560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.177.191 Jan 21 00:01:52 host sshd[6560]: Failed password for invalid user admin from 220.135.177.191 port 54376 ssh2 Jan 21 00:01:55 host sshd[6560]: Connection closed by 220.135.177.191 port 54376 [preauth] Jan 21 00:01:55 host sshd[6588]: Invalid user ONTUSER from 210.209.145.27 port 59237 Jan 21 00:01:55 host sshd[6588]: input_userauth_request: invalid user ONTUSER [preauth] Jan 21 00:01:55 host sshd[6588]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:01:55 host sshd[6588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.209.145.27 Jan 21 00:01:57 host sshd[6588]: Failed password for invalid user ONTUSER from 210.209.145.27 port 59237 ssh2 Jan 21 00:01:59 host sshd[6588]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:02:00 host sshd[6588]: Failed password for invalid user ONTUSER from 210.209.145.27 port 59237 ssh2 Jan 21 00:02:01 host sshd[6588]: Failed password for invalid user ONTUSER from 210.209.145.27 port 59237 ssh2 Jan 21 00:02:02 host sshd[6588]: Connection closed by 210.209.145.27 port 59237 [preauth] Jan 21 00:02:02 host sshd[6588]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.209.145.27 Jan 21 00:06:54 host sshd[7481]: Invalid user admin from 50.208.237.91 port 45750 Jan 21 00:06:54 host sshd[7481]: input_userauth_request: invalid user admin [preauth] Jan 21 00:06:54 host sshd[7481]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:06:54 host sshd[7481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.208.237.91 Jan 21 00:06:56 host sshd[7487]: Invalid user ftptest from 188.166.236.29 port 48734 Jan 21 00:06:56 host sshd[7487]: input_userauth_request: invalid user ftptest [preauth] Jan 21 00:06:56 host sshd[7487]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:06:56 host sshd[7487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.236.29 Jan 21 00:06:56 host sshd[7481]: Failed password for invalid user admin from 50.208.237.91 port 45750 ssh2 Jan 21 00:06:56 host sshd[7481]: Received disconnect from 50.208.237.91 port 45750:11: Bye Bye [preauth] Jan 21 00:06:56 host sshd[7481]: Disconnected from 50.208.237.91 port 45750 [preauth] Jan 21 00:06:58 host sshd[7487]: Failed password for invalid user ftptest from 188.166.236.29 port 48734 ssh2 Jan 21 00:06:58 host sshd[7487]: Received disconnect from 188.166.236.29 port 48734:11: Bye Bye [preauth] Jan 21 00:06:58 host sshd[7487]: Disconnected from 188.166.236.29 port 48734 [preauth] Jan 21 00:08:04 host sshd[7620]: Invalid user sstest from 133.130.89.210 port 39058 Jan 21 00:08:04 host sshd[7620]: input_userauth_request: invalid user sstest [preauth] Jan 21 00:08:04 host sshd[7620]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:08:04 host sshd[7620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.89.210 Jan 21 00:08:06 host sshd[7620]: Failed password for invalid user sstest from 133.130.89.210 port 39058 ssh2 Jan 21 00:08:06 host sshd[7620]: Received disconnect from 133.130.89.210 port 39058:11: Bye Bye [preauth] Jan 21 00:08:06 host sshd[7620]: Disconnected from 133.130.89.210 port 39058 [preauth] Jan 21 00:08:19 host sshd[7638]: Invalid user wwwtest from 188.166.5.84 port 37736 Jan 21 00:08:19 host sshd[7638]: input_userauth_request: invalid user wwwtest [preauth] Jan 21 00:08:19 host sshd[7638]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:08:19 host sshd[7638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.5.84 Jan 21 00:08:21 host sshd[7638]: Failed password for invalid user wwwtest from 188.166.5.84 port 37736 ssh2 Jan 21 00:08:21 host sshd[7638]: Received disconnect from 188.166.5.84 port 37736:11: Bye Bye [preauth] Jan 21 00:08:21 host sshd[7638]: Disconnected from 188.166.5.84 port 37736 [preauth] Jan 21 00:08:40 host sshd[7684]: Invalid user git1 from 46.101.5.100 port 39922 Jan 21 00:08:40 host sshd[7684]: input_userauth_request: invalid user git1 [preauth] Jan 21 00:08:40 host sshd[7684]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:08:40 host sshd[7684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.5.100 Jan 21 00:08:42 host sshd[7684]: Failed password for invalid user git1 from 46.101.5.100 port 39922 ssh2 Jan 21 00:08:43 host sshd[7684]: Received disconnect from 46.101.5.100 port 39922:11: Bye Bye [preauth] Jan 21 00:08:43 host sshd[7684]: Disconnected from 46.101.5.100 port 39922 [preauth] Jan 21 00:08:54 host sshd[7699]: Invalid user admin from 159.89.233.162 port 54774 Jan 21 00:08:54 host sshd[7699]: input_userauth_request: invalid user admin [preauth] Jan 21 00:08:54 host sshd[7699]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:08:54 host sshd[7699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.233.162 Jan 21 00:08:56 host sshd[7699]: Failed password for invalid user admin from 159.89.233.162 port 54774 ssh2 Jan 21 00:08:57 host sshd[7699]: Received disconnect from 159.89.233.162 port 54774:11: Bye Bye [preauth] Jan 21 00:08:57 host sshd[7699]: Disconnected from 159.89.233.162 port 54774 [preauth] Jan 21 00:09:44 host sshd[7806]: ssh_dispatch_run_fatal: Connection from 85.233.150.79 port 35209: bignum is negative [preauth] Jan 21 00:10:05 host sshd[7938]: User ftp from 213.215.140.6 not allowed because not listed in AllowUsers Jan 21 00:10:05 host sshd[7938]: input_userauth_request: invalid user ftp [preauth] Jan 21 00:10:05 host unix_chkpwd[7984]: password check failed for user (ftp) Jan 21 00:10:05 host sshd[7938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.215.140.6 user=ftp Jan 21 00:10:05 host sshd[7938]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 21 00:10:07 host sshd[7938]: Failed password for invalid user ftp from 213.215.140.6 port 33358 ssh2 Jan 21 00:10:07 host sshd[7938]: Received disconnect from 213.215.140.6 port 33358:11: Bye Bye [preauth] Jan 21 00:10:07 host sshd[7938]: Disconnected from 213.215.140.6 port 33358 [preauth] Jan 21 00:10:50 host sshd[8076]: Invalid user bdadmin from 139.59.68.67 port 33060 Jan 21 00:10:50 host sshd[8076]: input_userauth_request: invalid user bdadmin [preauth] Jan 21 00:10:50 host sshd[8076]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:10:50 host sshd[8076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.68.67 Jan 21 00:10:52 host sshd[8076]: Failed password for invalid user bdadmin from 139.59.68.67 port 33060 ssh2 Jan 21 00:10:52 host sshd[8076]: Received disconnect from 139.59.68.67 port 33060:11: Bye Bye [preauth] Jan 21 00:10:52 host sshd[8076]: Disconnected from 139.59.68.67 port 33060 [preauth] Jan 21 00:11:13 host sshd[8119]: Invalid user admin from 124.156.2.182 port 50600 Jan 21 00:11:13 host sshd[8119]: input_userauth_request: invalid user admin [preauth] Jan 21 00:11:13 host sshd[8119]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:11:13 host sshd[8119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.2.182 Jan 21 00:11:15 host sshd[8119]: Failed password for invalid user admin from 124.156.2.182 port 50600 ssh2 Jan 21 00:11:15 host sshd[8119]: Received disconnect from 124.156.2.182 port 50600:11: Bye Bye [preauth] Jan 21 00:11:15 host sshd[8119]: Disconnected from 124.156.2.182 port 50600 [preauth] Jan 21 00:11:28 host sshd[8139]: Invalid user pi from 175.208.179.9 port 63896 Jan 21 00:11:28 host sshd[8139]: input_userauth_request: invalid user pi [preauth] Jan 21 00:11:28 host sshd[8139]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:11:28 host sshd[8139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.208.179.9 Jan 21 00:11:30 host sshd[8139]: Failed password for invalid user pi from 175.208.179.9 port 63896 ssh2 Jan 21 00:11:31 host sshd[8139]: Connection reset by 175.208.179.9 port 63896 [preauth] Jan 21 00:12:11 host sshd[8231]: Invalid user master from 61.76.169.138 port 30961 Jan 21 00:12:11 host sshd[8231]: input_userauth_request: invalid user master [preauth] Jan 21 00:12:11 host sshd[8231]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:12:11 host sshd[8231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.169.138 Jan 21 00:12:12 host sshd[8231]: Failed password for invalid user master from 61.76.169.138 port 30961 ssh2 Jan 21 00:12:13 host sshd[8231]: Received disconnect from 61.76.169.138 port 30961:11: Bye Bye [preauth] Jan 21 00:12:13 host sshd[8231]: Disconnected from 61.76.169.138 port 30961 [preauth] Jan 21 00:12:26 host sshd[8246]: Invalid user tadmin from 46.101.5.100 port 56754 Jan 21 00:12:26 host sshd[8246]: input_userauth_request: invalid user tadmin [preauth] Jan 21 00:12:26 host sshd[8246]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:12:26 host sshd[8246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.5.100 Jan 21 00:12:28 host sshd[8246]: Failed password for invalid user tadmin from 46.101.5.100 port 56754 ssh2 Jan 21 00:12:29 host sshd[8246]: Received disconnect from 46.101.5.100 port 56754:11: Bye Bye [preauth] Jan 21 00:12:29 host sshd[8246]: Disconnected from 46.101.5.100 port 56754 [preauth] Jan 21 00:12:37 host sshd[8280]: Invalid user phptest from 50.208.237.91 port 48424 Jan 21 00:12:37 host sshd[8280]: input_userauth_request: invalid user phptest [preauth] Jan 21 00:12:37 host sshd[8280]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:12:37 host sshd[8280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.208.237.91 Jan 21 00:12:39 host sshd[8280]: Failed password for invalid user phptest from 50.208.237.91 port 48424 ssh2 Jan 21 00:12:39 host sshd[8280]: Received disconnect from 50.208.237.91 port 48424:11: Bye Bye [preauth] Jan 21 00:12:39 host sshd[8280]: Disconnected from 50.208.237.91 port 48424 [preauth] Jan 21 00:12:44 host sshd[8288]: Invalid user tech from 213.215.140.6 port 42552 Jan 21 00:12:44 host sshd[8288]: input_userauth_request: invalid user tech [preauth] Jan 21 00:12:44 host sshd[8288]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:12:44 host sshd[8288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.215.140.6 Jan 21 00:12:46 host sshd[8288]: Failed password for invalid user tech from 213.215.140.6 port 42552 ssh2 Jan 21 00:12:47 host sshd[8288]: Received disconnect from 213.215.140.6 port 42552:11: Bye Bye [preauth] Jan 21 00:12:47 host sshd[8288]: Disconnected from 213.215.140.6 port 42552 [preauth] Jan 21 00:13:05 host sshd[8358]: Invalid user kodi from 188.166.5.84 port 56656 Jan 21 00:13:05 host sshd[8358]: input_userauth_request: invalid user kodi [preauth] Jan 21 00:13:05 host sshd[8358]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:13:05 host sshd[8358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.5.84 Jan 21 00:13:06 host sshd[8358]: Failed password for invalid user kodi from 188.166.5.84 port 56656 ssh2 Jan 21 00:13:06 host sshd[8358]: Received disconnect from 188.166.5.84 port 56656:11: Bye Bye [preauth] Jan 21 00:13:06 host sshd[8358]: Disconnected from 188.166.5.84 port 56656 [preauth] Jan 21 00:13:30 host sshd[8416]: Invalid user sarah from 46.101.5.100 port 55516 Jan 21 00:13:30 host sshd[8416]: input_userauth_request: invalid user sarah [preauth] Jan 21 00:13:30 host sshd[8416]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:13:30 host sshd[8416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.5.100 Jan 21 00:13:32 host sshd[8416]: Failed password for invalid user sarah from 46.101.5.100 port 55516 ssh2 Jan 21 00:13:32 host sshd[8416]: Received disconnect from 46.101.5.100 port 55516:11: Bye Bye [preauth] Jan 21 00:13:32 host sshd[8416]: Disconnected from 46.101.5.100 port 55516 [preauth] Jan 21 00:13:41 host sshd[8460]: Invalid user aceuser from 159.89.233.162 port 50302 Jan 21 00:13:41 host sshd[8460]: input_userauth_request: invalid user aceuser [preauth] Jan 21 00:13:41 host sshd[8460]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:13:41 host sshd[8460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.233.162 Jan 21 00:13:43 host sshd[8460]: Failed password for invalid user aceuser from 159.89.233.162 port 50302 ssh2 Jan 21 00:13:43 host sshd[8460]: Received disconnect from 159.89.233.162 port 50302:11: Bye Bye [preauth] Jan 21 00:13:43 host sshd[8460]: Disconnected from 159.89.233.162 port 50302 [preauth] Jan 21 00:13:49 host sshd[8475]: Invalid user steam from 139.59.68.67 port 38906 Jan 21 00:13:49 host sshd[8475]: input_userauth_request: invalid user steam [preauth] Jan 21 00:13:49 host sshd[8475]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:13:49 host sshd[8475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.68.67 Jan 21 00:13:50 host sshd[8477]: Invalid user admin from 50.208.237.91 port 47398 Jan 21 00:13:50 host sshd[8477]: input_userauth_request: invalid user admin [preauth] Jan 21 00:13:50 host sshd[8477]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:13:50 host sshd[8477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.208.237.91 Jan 21 00:13:51 host sshd[8475]: Failed password for invalid user steam from 139.59.68.67 port 38906 ssh2 Jan 21 00:13:51 host sshd[8475]: Received disconnect from 139.59.68.67 port 38906:11: Bye Bye [preauth] Jan 21 00:13:51 host sshd[8475]: Disconnected from 139.59.68.67 port 38906 [preauth] Jan 21 00:13:52 host sshd[8477]: Failed password for invalid user admin from 50.208.237.91 port 47398 ssh2 Jan 21 00:13:52 host sshd[8477]: Received disconnect from 50.208.237.91 port 47398:11: Bye Bye [preauth] Jan 21 00:13:52 host sshd[8477]: Disconnected from 50.208.237.91 port 47398 [preauth] Jan 21 00:14:03 host sshd[8535]: Invalid user ldapuser from 188.166.5.84 port 50876 Jan 21 00:14:03 host sshd[8535]: input_userauth_request: invalid user ldapuser [preauth] Jan 21 00:14:03 host sshd[8535]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:14:03 host sshd[8535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.5.84 Jan 21 00:14:05 host sshd[8535]: Failed password for invalid user ldapuser from 188.166.5.84 port 50876 ssh2 Jan 21 00:14:10 host sshd[8621]: Invalid user admin from 188.166.236.29 port 38006 Jan 21 00:14:10 host sshd[8621]: input_userauth_request: invalid user admin [preauth] Jan 21 00:14:10 host sshd[8621]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:14:10 host sshd[8621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.236.29 Jan 21 00:14:11 host sshd[8621]: Failed password for invalid user admin from 188.166.236.29 port 38006 ssh2 Jan 21 00:14:12 host sshd[8621]: Received disconnect from 188.166.236.29 port 38006:11: Bye Bye [preauth] Jan 21 00:14:12 host sshd[8621]: Disconnected from 188.166.236.29 port 38006 [preauth] Jan 21 00:14:27 host sshd[8671]: Invalid user shadow from 200.73.134.13 port 50750 Jan 21 00:14:27 host sshd[8671]: input_userauth_request: invalid user shadow [preauth] Jan 21 00:14:27 host sshd[8671]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:14:27 host sshd[8671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.134.13 Jan 21 00:14:29 host sshd[8702]: Invalid user django from 133.130.89.210 port 36020 Jan 21 00:14:29 host sshd[8702]: input_userauth_request: invalid user django [preauth] Jan 21 00:14:29 host sshd[8702]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:14:29 host sshd[8702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.89.210 Jan 21 00:14:29 host sshd[8671]: Failed password for invalid user shadow from 200.73.134.13 port 50750 ssh2 Jan 21 00:14:30 host sshd[8714]: Invalid user tech from 124.156.2.182 port 58492 Jan 21 00:14:30 host sshd[8714]: input_userauth_request: invalid user tech [preauth] Jan 21 00:14:30 host sshd[8714]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:14:30 host sshd[8714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.2.182 Jan 21 00:14:30 host sshd[8702]: Failed password for invalid user django from 133.130.89.210 port 36020 ssh2 Jan 21 00:14:30 host sshd[8702]: Received disconnect from 133.130.89.210 port 36020:11: Bye Bye [preauth] Jan 21 00:14:30 host sshd[8702]: Disconnected from 133.130.89.210 port 36020 [preauth] Jan 21 00:14:30 host sshd[8671]: Received disconnect from 200.73.134.13 port 50750:11: Bye Bye [preauth] Jan 21 00:14:30 host sshd[8671]: Disconnected from 200.73.134.13 port 50750 [preauth] Jan 21 00:14:31 host sshd[8714]: Failed password for invalid user tech from 124.156.2.182 port 58492 ssh2 Jan 21 00:14:31 host sshd[8714]: Received disconnect from 124.156.2.182 port 58492:11: Bye Bye [preauth] Jan 21 00:14:31 host sshd[8714]: Disconnected from 124.156.2.182 port 58492 [preauth] Jan 21 00:14:46 host sshd[8770]: Invalid user admin from 159.89.233.162 port 49038 Jan 21 00:14:46 host sshd[8770]: input_userauth_request: invalid user admin [preauth] Jan 21 00:14:46 host sshd[8770]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:14:46 host sshd[8770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.233.162 Jan 21 00:14:48 host sshd[8775]: Invalid user robert from 1.179.157.230 port 50806 Jan 21 00:14:48 host sshd[8775]: input_userauth_request: invalid user robert [preauth] Jan 21 00:14:48 host sshd[8775]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:14:48 host sshd[8775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.157.230 Jan 21 00:14:48 host sshd[8770]: Failed password for invalid user admin from 159.89.233.162 port 49038 ssh2 Jan 21 00:14:50 host sshd[8775]: Failed password for invalid user robert from 1.179.157.230 port 50806 ssh2 Jan 21 00:14:50 host sshd[8775]: Received disconnect from 1.179.157.230 port 50806:11: Bye Bye [preauth] Jan 21 00:14:50 host sshd[8775]: Disconnected from 1.179.157.230 port 50806 [preauth] Jan 21 00:15:09 host sshd[8884]: Invalid user zookeeper from 61.76.169.138 port 19802 Jan 21 00:15:09 host sshd[8884]: input_userauth_request: invalid user zookeeper [preauth] Jan 21 00:15:09 host sshd[8884]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:15:09 host sshd[8884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.169.138 Jan 21 00:15:11 host sshd[8884]: Failed password for invalid user zookeeper from 61.76.169.138 port 19802 ssh2 Jan 21 00:15:12 host sshd[8884]: Received disconnect from 61.76.169.138 port 19802:11: Bye Bye [preauth] Jan 21 00:15:12 host sshd[8884]: Disconnected from 61.76.169.138 port 19802 [preauth] Jan 21 00:15:12 host sshd[8899]: Invalid user libadmin from 139.59.68.67 port 33602 Jan 21 00:15:12 host sshd[8899]: input_userauth_request: invalid user libadmin [preauth] Jan 21 00:15:12 host sshd[8899]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:15:12 host sshd[8899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.68.67 Jan 21 00:15:13 host sshd[8899]: Failed password for invalid user libadmin from 139.59.68.67 port 33602 ssh2 Jan 21 00:15:36 host sshd[9290]: Invalid user arkserver from 188.166.236.29 port 52940 Jan 21 00:15:36 host sshd[9290]: input_userauth_request: invalid user arkserver [preauth] Jan 21 00:15:36 host sshd[9290]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:15:36 host sshd[9290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.236.29 Jan 21 00:15:38 host sshd[9290]: Failed password for invalid user arkserver from 188.166.236.29 port 52940 ssh2 Jan 21 00:15:38 host sshd[9290]: Received disconnect from 188.166.236.29 port 52940:11: Bye Bye [preauth] Jan 21 00:15:38 host sshd[9290]: Disconnected from 188.166.236.29 port 52940 [preauth] Jan 21 00:15:43 host sshd[9456]: Invalid user itmuser from 124.156.2.182 port 53010 Jan 21 00:15:43 host sshd[9456]: input_userauth_request: invalid user itmuser [preauth] Jan 21 00:15:43 host sshd[9456]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:15:43 host sshd[9456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.2.182 Jan 21 00:15:45 host sshd[9456]: Failed password for invalid user itmuser from 124.156.2.182 port 53010 ssh2 Jan 21 00:15:45 host sshd[9456]: Received disconnect from 124.156.2.182 port 53010:11: Bye Bye [preauth] Jan 21 00:15:45 host sshd[9456]: Disconnected from 124.156.2.182 port 53010 [preauth] Jan 21 00:16:08 host sshd[9890]: Invalid user testing from 133.130.89.210 port 34468 Jan 21 00:16:08 host sshd[9890]: input_userauth_request: invalid user testing [preauth] Jan 21 00:16:08 host sshd[9890]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:16:08 host sshd[9890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.89.210 Jan 21 00:16:11 host sshd[9890]: Failed password for invalid user testing from 133.130.89.210 port 34468 ssh2 Jan 21 00:16:11 host sshd[9890]: Received disconnect from 133.130.89.210 port 34468:11: Bye Bye [preauth] Jan 21 00:16:11 host sshd[9890]: Disconnected from 133.130.89.210 port 34468 [preauth] Jan 21 00:16:37 host sshd[10031]: Invalid user ftptest from 61.76.169.138 port 2826 Jan 21 00:16:37 host sshd[10031]: input_userauth_request: invalid user ftptest [preauth] Jan 21 00:16:37 host sshd[10031]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:16:37 host sshd[10031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.169.138 Jan 21 00:16:38 host sshd[10031]: Failed password for invalid user ftptest from 61.76.169.138 port 2826 ssh2 Jan 21 00:17:56 host sshd[10185]: Invalid user vncuser from 200.73.134.13 port 43744 Jan 21 00:17:56 host sshd[10185]: input_userauth_request: invalid user vncuser [preauth] Jan 21 00:17:56 host sshd[10185]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:17:56 host sshd[10185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.134.13 Jan 21 00:17:58 host sshd[10185]: Failed password for invalid user vncuser from 200.73.134.13 port 43744 ssh2 Jan 21 00:17:59 host sshd[10185]: Received disconnect from 200.73.134.13 port 43744:11: Bye Bye [preauth] Jan 21 00:17:59 host sshd[10185]: Disconnected from 200.73.134.13 port 43744 [preauth] Jan 21 00:18:48 host sshd[10300]: Invalid user super from 1.179.157.230 port 42236 Jan 21 00:18:48 host sshd[10300]: input_userauth_request: invalid user super [preauth] Jan 21 00:18:48 host sshd[10300]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:18:48 host sshd[10300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.157.230 Jan 21 00:18:50 host sshd[10300]: Failed password for invalid user super from 1.179.157.230 port 42236 ssh2 Jan 21 00:18:50 host sshd[10300]: Received disconnect from 1.179.157.230 port 42236:11: Bye Bye [preauth] Jan 21 00:18:50 host sshd[10300]: Disconnected from 1.179.157.230 port 42236 [preauth] Jan 21 00:19:26 host sshd[10362]: Invalid user dnsekakf2$$ from 108.6.214.115 port 57523 Jan 21 00:19:26 host sshd[10362]: input_userauth_request: invalid user dnsekakf2$$ [preauth] Jan 21 00:19:26 host sshd[10362]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:19:26 host sshd[10362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.6.214.115 Jan 21 00:19:27 host sshd[10362]: Failed password for invalid user dnsekakf2$$ from 108.6.214.115 port 57523 ssh2 Jan 21 00:19:28 host sshd[10362]: Failed password for invalid user dnsekakf2$$ from 108.6.214.115 port 57523 ssh2 Jan 21 00:19:28 host sshd[10362]: Connection closed by 108.6.214.115 port 57523 [preauth] Jan 21 00:19:33 host sshd[10374]: Invalid user admin from 200.73.134.13 port 53868 Jan 21 00:19:33 host sshd[10374]: input_userauth_request: invalid user admin [preauth] Jan 21 00:19:33 host sshd[10374]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:19:33 host sshd[10374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.134.13 Jan 21 00:19:35 host sshd[10374]: Failed password for invalid user admin from 200.73.134.13 port 53868 ssh2 Jan 21 00:20:44 host sshd[10692]: Invalid user sonar from 104.248.92.191 port 54588 Jan 21 00:20:44 host sshd[10692]: input_userauth_request: invalid user sonar [preauth] Jan 21 00:20:44 host sshd[10692]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:20:44 host sshd[10692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.92.191 Jan 21 00:20:45 host sshd[10695]: Invalid user test from 1.179.157.230 port 59014 Jan 21 00:20:45 host sshd[10695]: input_userauth_request: invalid user test [preauth] Jan 21 00:20:45 host sshd[10695]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:20:45 host sshd[10695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.157.230 Jan 21 00:20:46 host sshd[10692]: Failed password for invalid user sonar from 104.248.92.191 port 54588 ssh2 Jan 21 00:20:46 host sshd[10692]: Received disconnect from 104.248.92.191 port 54588:11: Bye Bye [preauth] Jan 21 00:20:46 host sshd[10692]: Disconnected from 104.248.92.191 port 54588 [preauth] Jan 21 00:20:47 host sshd[10695]: Failed password for invalid user test from 1.179.157.230 port 59014 ssh2 Jan 21 00:20:47 host sshd[10695]: Received disconnect from 1.179.157.230 port 59014:11: Bye Bye [preauth] Jan 21 00:20:47 host sshd[10695]: Disconnected from 1.179.157.230 port 59014 [preauth] Jan 21 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 00:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=palco123 user-4=gifterman user-5=kottayamcalldriv user-6=phmetals user-7=wwwletsstalkfood user-8=straightcurve user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=woodpeck user-16=wwwkapin user-17=disposeat user-18=remysagr user-19=wwwkmaorg user-20=wwwresourcehunte user-21=keralaholi user-22=wwwrmswll user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 00:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vJ7hh4aSMtQnkn7A.~ Jan 21 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vJ7hh4aSMtQnkn7A.~' Jan 21 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vJ7hh4aSMtQnkn7A.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 00:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 00:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 00:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 00:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 00:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 00:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 00:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 00:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 00:23:09 host sshd[11219]: Invalid user es from 43.159.52.230 port 33962 Jan 21 00:23:09 host sshd[11219]: input_userauth_request: invalid user es [preauth] Jan 21 00:23:09 host sshd[11219]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:23:09 host sshd[11219]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.52.230 Jan 21 00:23:12 host sshd[11219]: Failed password for invalid user es from 43.159.52.230 port 33962 ssh2 Jan 21 00:23:12 host sshd[11219]: Received disconnect from 43.159.52.230 port 33962:11: Bye Bye [preauth] Jan 21 00:23:12 host sshd[11219]: Disconnected from 43.159.52.230 port 33962 [preauth] Jan 21 00:24:47 host sshd[11435]: Invalid user test from 202.179.191.68 port 57952 Jan 21 00:24:47 host sshd[11435]: input_userauth_request: invalid user test [preauth] Jan 21 00:24:47 host sshd[11435]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:24:47 host sshd[11435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.179.191.68 Jan 21 00:24:48 host sshd[11435]: Failed password for invalid user test from 202.179.191.68 port 57952 ssh2 Jan 21 00:24:48 host sshd[11435]: Received disconnect from 202.179.191.68 port 57952:11: Bye Bye [preauth] Jan 21 00:24:48 host sshd[11435]: Disconnected from 202.179.191.68 port 57952 [preauth] Jan 21 00:26:27 host sshd[11610]: Invalid user etluser from 159.89.85.209 port 60384 Jan 21 00:26:27 host sshd[11610]: input_userauth_request: invalid user etluser [preauth] Jan 21 00:26:27 host sshd[11610]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:26:27 host sshd[11610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.85.209 Jan 21 00:26:28 host sshd[11610]: Failed password for invalid user etluser from 159.89.85.209 port 60384 ssh2 Jan 21 00:26:29 host sshd[11610]: Received disconnect from 159.89.85.209 port 60384:11: Bye Bye [preauth] Jan 21 00:26:29 host sshd[11610]: Disconnected from 159.89.85.209 port 60384 [preauth] Jan 21 00:26:43 host sshd[11657]: Connection closed by 45.79.181.251 port 2624 [preauth] Jan 21 00:26:45 host sshd[11669]: Connection closed by 45.79.181.251 port 2638 [preauth] Jan 21 00:26:48 host sshd[11673]: Connection closed by 45.79.181.251 port 2652 [preauth] Jan 21 00:26:48 host sshd[11677]: Invalid user postgres from 43.134.176.134 port 40438 Jan 21 00:26:48 host sshd[11677]: input_userauth_request: invalid user postgres [preauth] Jan 21 00:26:48 host sshd[11677]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:26:48 host sshd[11677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.176.134 Jan 21 00:26:50 host sshd[11677]: Failed password for invalid user postgres from 43.134.176.134 port 40438 ssh2 Jan 21 00:26:50 host sshd[11677]: Received disconnect from 43.134.176.134 port 40438:11: Bye Bye [preauth] Jan 21 00:26:50 host sshd[11677]: Disconnected from 43.134.176.134 port 40438 [preauth] Jan 21 00:26:55 host sshd[11686]: Invalid user benjamin from 104.248.92.191 port 60262 Jan 21 00:26:55 host sshd[11686]: input_userauth_request: invalid user benjamin [preauth] Jan 21 00:26:55 host sshd[11686]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:26:55 host sshd[11686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.92.191 Jan 21 00:26:57 host sshd[11686]: Failed password for invalid user benjamin from 104.248.92.191 port 60262 ssh2 Jan 21 00:26:57 host sshd[11686]: Received disconnect from 104.248.92.191 port 60262:11: Bye Bye [preauth] Jan 21 00:26:57 host sshd[11686]: Disconnected from 104.248.92.191 port 60262 [preauth] Jan 21 00:27:47 host sshd[11905]: Invalid user server from 202.179.191.68 port 42162 Jan 21 00:27:47 host sshd[11905]: input_userauth_request: invalid user server [preauth] Jan 21 00:27:47 host sshd[11905]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:27:47 host sshd[11905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.179.191.68 Jan 21 00:27:49 host sshd[11905]: Failed password for invalid user server from 202.179.191.68 port 42162 ssh2 Jan 21 00:27:49 host sshd[11905]: Received disconnect from 202.179.191.68 port 42162:11: Bye Bye [preauth] Jan 21 00:27:49 host sshd[11905]: Disconnected from 202.179.191.68 port 42162 [preauth] Jan 21 00:27:56 host sshd[11919]: Invalid user invoices from 104.248.92.191 port 60316 Jan 21 00:27:56 host sshd[11919]: input_userauth_request: invalid user invoices [preauth] Jan 21 00:27:56 host sshd[11919]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:27:56 host sshd[11919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.92.191 Jan 21 00:27:58 host sshd[11919]: Failed password for invalid user invoices from 104.248.92.191 port 60316 ssh2 Jan 21 00:27:59 host sshd[11956]: Invalid user ec2-user from 43.159.52.230 port 41500 Jan 21 00:27:59 host sshd[11956]: input_userauth_request: invalid user ec2-user [preauth] Jan 21 00:27:59 host sshd[11956]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:27:59 host sshd[11956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.52.230 Jan 21 00:28:01 host sshd[11956]: Failed password for invalid user ec2-user from 43.159.52.230 port 41500 ssh2 Jan 21 00:28:01 host sshd[11956]: Received disconnect from 43.159.52.230 port 41500:11: Bye Bye [preauth] Jan 21 00:28:01 host sshd[11956]: Disconnected from 43.159.52.230 port 41500 [preauth] Jan 21 00:28:07 host sshd[11980]: Invalid user maxadmin from 159.89.85.209 port 51996 Jan 21 00:28:07 host sshd[11980]: input_userauth_request: invalid user maxadmin [preauth] Jan 21 00:28:07 host sshd[11980]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:28:07 host sshd[11980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.85.209 Jan 21 00:28:09 host sshd[11980]: Failed password for invalid user maxadmin from 159.89.85.209 port 51996 ssh2 Jan 21 00:28:09 host sshd[11980]: Received disconnect from 159.89.85.209 port 51996:11: Bye Bye [preauth] Jan 21 00:28:09 host sshd[11980]: Disconnected from 159.89.85.209 port 51996 [preauth] Jan 21 00:28:58 host sshd[12069]: Invalid user test from 43.134.176.134 port 54722 Jan 21 00:28:58 host sshd[12069]: input_userauth_request: invalid user test [preauth] Jan 21 00:28:58 host sshd[12069]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:28:58 host sshd[12069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.176.134 Jan 21 00:29:00 host sshd[12069]: Failed password for invalid user test from 43.134.176.134 port 54722 ssh2 Jan 21 00:29:00 host sshd[12069]: Received disconnect from 43.134.176.134 port 54722:11: Bye Bye [preauth] Jan 21 00:29:00 host sshd[12069]: Disconnected from 43.134.176.134 port 54722 [preauth] Jan 21 00:29:08 host sshd[12102]: Invalid user test_qpfs from 202.179.191.68 port 54666 Jan 21 00:29:08 host sshd[12102]: input_userauth_request: invalid user test_qpfs [preauth] Jan 21 00:29:08 host sshd[12102]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:29:08 host sshd[12102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.179.191.68 Jan 21 00:29:09 host sshd[12094]: Invalid user sockduser from 159.89.85.209 port 42736 Jan 21 00:29:09 host sshd[12094]: input_userauth_request: invalid user sockduser [preauth] Jan 21 00:29:09 host sshd[12094]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:29:09 host sshd[12094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.85.209 Jan 21 00:29:11 host sshd[12094]: Failed password for invalid user sockduser from 159.89.85.209 port 42736 ssh2 Jan 21 00:29:11 host sshd[12102]: Failed password for invalid user test_qpfs from 202.179.191.68 port 54666 ssh2 Jan 21 00:29:11 host sshd[12102]: Received disconnect from 202.179.191.68 port 54666:11: Bye Bye [preauth] Jan 21 00:29:11 host sshd[12102]: Disconnected from 202.179.191.68 port 54666 [preauth] Jan 21 00:29:11 host sshd[12094]: Received disconnect from 159.89.85.209 port 42736:11: Bye Bye [preauth] Jan 21 00:29:11 host sshd[12094]: Disconnected from 159.89.85.209 port 42736 [preauth] Jan 21 00:29:26 host sshd[12202]: Invalid user linux from 43.159.52.230 port 40258 Jan 21 00:29:26 host sshd[12202]: input_userauth_request: invalid user linux [preauth] Jan 21 00:29:26 host sshd[12202]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:29:26 host sshd[12202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.52.230 Jan 21 00:29:28 host sshd[12202]: Failed password for invalid user linux from 43.159.52.230 port 40258 ssh2 Jan 21 00:30:20 host sshd[12360]: Invalid user eyftpuser from 43.134.176.134 port 50780 Jan 21 00:30:20 host sshd[12360]: input_userauth_request: invalid user eyftpuser [preauth] Jan 21 00:30:20 host sshd[12360]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:30:20 host sshd[12360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.134.176.134 Jan 21 00:30:22 host sshd[12360]: Failed password for invalid user eyftpuser from 43.134.176.134 port 50780 ssh2 Jan 21 00:30:22 host sshd[12360]: Received disconnect from 43.134.176.134 port 50780:11: Bye Bye [preauth] Jan 21 00:30:22 host sshd[12360]: Disconnected from 43.134.176.134 port 50780 [preauth] Jan 21 00:44:47 host sshd[14198]: Invalid user hd from 194.110.203.109 port 60434 Jan 21 00:44:47 host sshd[14198]: input_userauth_request: invalid user hd [preauth] Jan 21 00:44:47 host sshd[14198]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:44:47 host sshd[14198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 00:44:49 host sshd[14198]: Failed password for invalid user hd from 194.110.203.109 port 60434 ssh2 Jan 21 00:44:52 host sshd[14198]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:44:54 host sshd[14198]: Failed password for invalid user hd from 194.110.203.109 port 60434 ssh2 Jan 21 00:44:57 host sshd[14198]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:45:00 host sshd[14198]: Failed password for invalid user hd from 194.110.203.109 port 60434 ssh2 Jan 21 00:45:03 host sshd[14198]: Connection closed by 194.110.203.109 port 60434 [preauth] Jan 21 00:45:03 host sshd[14198]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 00:48:43 host sshd[14767]: Invalid user service from 31.41.244.124 port 28203 Jan 21 00:48:43 host sshd[14767]: input_userauth_request: invalid user service [preauth] Jan 21 00:48:43 host sshd[14767]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:48:43 host sshd[14767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 21 00:48:45 host sshd[14767]: Failed password for invalid user service from 31.41.244.124 port 28203 ssh2 Jan 21 00:48:45 host sshd[14767]: Received disconnect from 31.41.244.124 port 28203:11: Client disconnecting normally [preauth] Jan 21 00:48:45 host sshd[14767]: Disconnected from 31.41.244.124 port 28203 [preauth] Jan 21 00:54:35 host sshd[15557]: Invalid user postgres from 116.15.64.17 port 60843 Jan 21 00:54:35 host sshd[15557]: input_userauth_request: invalid user postgres [preauth] Jan 21 00:54:35 host sshd[15557]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:54:35 host sshd[15557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.15.64.17 Jan 21 00:54:37 host sshd[15557]: Failed password for invalid user postgres from 116.15.64.17 port 60843 ssh2 Jan 21 00:54:37 host sshd[15557]: Connection reset by 116.15.64.17 port 60843 [preauth] Jan 21 00:54:37 host sshd[15561]: Invalid user default from 220.134.3.80 port 52343 Jan 21 00:54:37 host sshd[15561]: input_userauth_request: invalid user default [preauth] Jan 21 00:54:37 host sshd[15561]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:54:37 host sshd[15561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.3.80 Jan 21 00:54:39 host sshd[15561]: Failed password for invalid user default from 220.134.3.80 port 52343 ssh2 Jan 21 00:54:39 host sshd[15561]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:54:41 host sshd[15561]: Failed password for invalid user default from 220.134.3.80 port 52343 ssh2 Jan 21 00:54:42 host sshd[15561]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:54:44 host sshd[15561]: Failed password for invalid user default from 220.134.3.80 port 52343 ssh2 Jan 21 00:54:45 host sshd[15561]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:54:47 host sshd[15561]: Failed password for invalid user default from 220.134.3.80 port 52343 ssh2 Jan 21 00:54:48 host sshd[15561]: pam_unix(sshd:auth): check pass; user unknown Jan 21 00:54:50 host sshd[15561]: Failed password for invalid user default from 220.134.3.80 port 52343 ssh2 Jan 21 00:58:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 00:58:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 00:58:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:01:41 host sshd[16608]: Did not receive identification string from 192.241.230.17 port 39448 Jan 21 01:01:42 host sshd[16718]: Did not receive identification string from 43.138.17.106 port 34984 Jan 21 01:01:43 host sshd[16719]: Invalid user dockeradmin from 43.138.17.106 port 41128 Jan 21 01:01:43 host sshd[16719]: input_userauth_request: invalid user dockeradmin [preauth] Jan 21 01:01:43 host sshd[16720]: Invalid user tester from 43.138.17.106 port 41092 Jan 21 01:01:43 host sshd[16720]: input_userauth_request: invalid user tester [preauth] Jan 21 01:01:43 host sshd[16721]: Invalid user web from 43.138.17.106 port 41130 Jan 21 01:01:43 host sshd[16721]: input_userauth_request: invalid user web [preauth] Jan 21 01:01:43 host sshd[16722]: User root from 43.138.17.106 not allowed because not listed in AllowUsers Jan 21 01:01:43 host sshd[16722]: input_userauth_request: invalid user root [preauth] Jan 21 01:01:43 host sshd[16724]: User root from 43.138.17.106 not allowed because not listed in AllowUsers Jan 21 01:01:43 host sshd[16724]: input_userauth_request: invalid user root [preauth] Jan 21 01:01:43 host sshd[16729]: User root from 43.138.17.106 not allowed because not listed in AllowUsers Jan 21 01:01:43 host sshd[16729]: input_userauth_request: invalid user root [preauth] Jan 21 01:01:43 host sshd[16723]: Invalid user oracle from 43.138.17.106 port 41106 Jan 21 01:01:43 host sshd[16723]: input_userauth_request: invalid user oracle [preauth] Jan 21 01:01:43 host sshd[16727]: User root from 43.138.17.106 not allowed because not listed in AllowUsers Jan 21 01:01:43 host sshd[16727]: input_userauth_request: invalid user root [preauth] Jan 21 01:01:43 host sshd[16733]: User root from 43.138.17.106 not allowed because not listed in AllowUsers Jan 21 01:01:43 host sshd[16733]: input_userauth_request: invalid user root [preauth] Jan 21 01:01:43 host sshd[16725]: Invalid user admin from 43.138.17.106 port 41100 Jan 21 01:01:43 host sshd[16725]: input_userauth_request: invalid user admin [preauth] Jan 21 01:01:43 host sshd[16730]: Invalid user dockeradmin from 43.138.17.106 port 41104 Jan 21 01:01:43 host sshd[16730]: input_userauth_request: invalid user dockeradmin [preauth] Jan 21 01:01:43 host sshd[16734]: Invalid user oracle from 43.138.17.106 port 41140 Jan 21 01:01:43 host sshd[16734]: input_userauth_request: invalid user oracle [preauth] Jan 21 01:01:43 host sshd[16736]: User mysql from 43.138.17.106 not allowed because not listed in AllowUsers Jan 21 01:01:43 host sshd[16736]: input_userauth_request: invalid user mysql [preauth] Jan 21 01:01:43 host sshd[16728]: Invalid user emqx from 43.138.17.106 port 41156 Jan 21 01:01:43 host sshd[16728]: input_userauth_request: invalid user emqx [preauth] Jan 21 01:01:43 host sshd[16735]: User root from 43.138.17.106 not allowed because not listed in AllowUsers Jan 21 01:01:43 host sshd[16735]: input_userauth_request: invalid user root [preauth] Jan 21 01:01:43 host sshd[16737]: Invalid user ansible from 43.138.17.106 port 41122 Jan 21 01:01:43 host sshd[16737]: input_userauth_request: invalid user ansible [preauth] Jan 21 01:01:43 host sshd[16739]: Invalid user oracle from 43.138.17.106 port 41154 Jan 21 01:01:43 host sshd[16739]: input_userauth_request: invalid user oracle [preauth] Jan 21 01:01:43 host sshd[16738]: User root from 43.138.17.106 not allowed because not listed in AllowUsers Jan 21 01:01:43 host sshd[16738]: input_userauth_request: invalid user root [preauth] Jan 21 01:01:43 host sshd[16743]: User root from 43.138.17.106 not allowed because not listed in AllowUsers Jan 21 01:01:43 host sshd[16743]: input_userauth_request: invalid user root [preauth] Jan 21 01:01:43 host sshd[16741]: Invalid user dmdba from 43.138.17.106 port 41110 Jan 21 01:01:43 host sshd[16741]: input_userauth_request: invalid user dmdba [preauth] Jan 21 01:01:43 host sshd[16744]: User root from 43.138.17.106 not allowed because not listed in AllowUsers Jan 21 01:01:43 host sshd[16744]: input_userauth_request: invalid user root [preauth] Jan 21 01:01:43 host sshd[16745]: Invalid user esuser from 43.138.17.106 port 41116 Jan 21 01:01:43 host sshd[16745]: input_userauth_request: invalid user esuser [preauth] Jan 21 01:01:43 host sshd[16747]: User root from 43.138.17.106 not allowed because not listed in AllowUsers Jan 21 01:01:43 host sshd[16747]: input_userauth_request: invalid user root [preauth] Jan 21 01:01:44 host sshd[16719]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:01:44 host sshd[16719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.17.106 Jan 21 01:01:44 host sshd[16720]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:01:44 host sshd[16720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.17.106 Jan 21 01:01:44 host sshd[16721]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:01:44 host sshd[16721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.17.106 Jan 21 01:01:44 host sshd[16723]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:01:44 host sshd[16723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.17.106 Jan 21 01:01:44 host sshd[16730]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:01:44 host sshd[16730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.17.106 Jan 21 01:01:44 host sshd[16725]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:01:44 host sshd[16725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.17.106 Jan 21 01:01:44 host sshd[16728]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:01:44 host sshd[16728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.17.106 Jan 21 01:01:44 host sshd[16734]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:01:44 host sshd[16734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.17.106 Jan 21 01:01:44 host unix_chkpwd[16782]: password check failed for user (root) Jan 21 01:01:44 host sshd[16722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.17.106 user=root Jan 21 01:01:44 host sshd[16722]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:01:44 host unix_chkpwd[16783]: password check failed for user (root) Jan 21 01:01:44 host unix_chkpwd[16785]: password check failed for user (root) Jan 21 01:01:44 host sshd[16729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.17.106 user=root Jan 21 01:01:44 host sshd[16729]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:01:44 host sshd[16724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.17.106 user=root Jan 21 01:01:44 host sshd[16724]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:01:44 host unix_chkpwd[16786]: password check failed for user (root) Jan 21 01:01:44 host sshd[16727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.17.106 user=root Jan 21 01:01:44 host sshd[16727]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:01:44 host unix_chkpwd[16787]: password check failed for user (root) Jan 21 01:01:44 host sshd[16733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.17.106 user=root Jan 21 01:01:44 host sshd[16733]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:01:44 host unix_chkpwd[16784]: password check failed for user (root) Jan 21 01:01:44 host sshd[16738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.17.106 user=root Jan 21 01:01:44 host sshd[16738]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:01:44 host unix_chkpwd[16788]: password check failed for user (root) Jan 21 01:01:44 host sshd[16735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.138.17.106 user=root Jan 21 01:01:44 host sshd[16735]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:01:44 host sshd[16726]: Invalid user ubuntu from 43.138.17.106 port 41152 Jan 21 01:01:44 host sshd[16726]: input_userauth_request: invalid user ubuntu [preauth] Jan 21 01:01:46 host sshd[16719]: Failed password for invalid user dockeradmin from 43.138.17.106 port 41128 ssh2 Jan 21 01:01:46 host sshd[16720]: Failed password for invalid user tester from 43.138.17.106 port 41092 ssh2 Jan 21 01:01:46 host sshd[16721]: Failed password for invalid user web from 43.138.17.106 port 41130 ssh2 Jan 21 01:01:46 host sshd[16723]: Failed password for invalid user oracle from 43.138.17.106 port 41106 ssh2 Jan 21 01:01:46 host sshd[16730]: Failed password for invalid user dockeradmin from 43.138.17.106 port 41104 ssh2 Jan 21 01:01:46 host sshd[16725]: Failed password for invalid user admin from 43.138.17.106 port 41100 ssh2 Jan 21 01:01:46 host sshd[16728]: Failed password for invalid user emqx from 43.138.17.106 port 41156 ssh2 Jan 21 01:01:46 host sshd[16734]: Failed password for invalid user oracle from 43.138.17.106 port 41140 ssh2 Jan 21 01:01:46 host sshd[16722]: Failed password for invalid user root from 43.138.17.106 port 41142 ssh2 Jan 21 01:01:46 host sshd[16729]: Failed password for invalid user root from 43.138.17.106 port 41138 ssh2 Jan 21 01:01:46 host sshd[16724]: Failed password for invalid user root from 43.138.17.106 port 41094 ssh2 Jan 21 01:01:46 host sshd[16727]: Failed password for invalid user root from 43.138.17.106 port 41144 ssh2 Jan 21 01:01:46 host sshd[16733]: Failed password for invalid user root from 43.138.17.106 port 41146 ssh2 Jan 21 01:01:46 host sshd[16738]: Failed password for invalid user root from 43.138.17.106 port 41120 ssh2 Jan 21 01:01:46 host sshd[16735]: Failed password for invalid user root from 43.138.17.106 port 41096 ssh2 Jan 21 01:01:52 host sshd[16821]: Invalid user admin from 45.55.43.92 port 58172 Jan 21 01:01:52 host sshd[16821]: input_userauth_request: invalid user admin [preauth] Jan 21 01:01:53 host sshd[16821]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:01:53 host sshd[16821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.43.92 Jan 21 01:01:55 host sshd[16821]: Failed password for invalid user admin from 45.55.43.92 port 58172 ssh2 Jan 21 01:01:55 host sshd[16821]: Connection closed by 45.55.43.92 port 58172 [preauth] Jan 21 01:08:01 host sshd[17571]: User root from 45.55.43.92 not allowed because not listed in AllowUsers Jan 21 01:08:01 host sshd[17571]: input_userauth_request: invalid user root [preauth] Jan 21 01:08:01 host unix_chkpwd[17584]: password check failed for user (root) Jan 21 01:08:01 host sshd[17571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.43.92 user=root Jan 21 01:08:01 host sshd[17571]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:08:04 host sshd[17571]: Failed password for invalid user root from 45.55.43.92 port 53604 ssh2 Jan 21 01:08:04 host sshd[17571]: Connection closed by 45.55.43.92 port 53604 [preauth] Jan 21 01:16:04 host sshd[18573]: Did not receive identification string from 149.129.220.222 port 61000 Jan 21 01:16:57 host sshd[18663]: Invalid user hikvision from 173.19.61.250 port 34064 Jan 21 01:16:57 host sshd[18663]: input_userauth_request: invalid user hikvision [preauth] Jan 21 01:16:57 host sshd[18663]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:16:57 host sshd[18663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.19.61.250 Jan 21 01:16:59 host sshd[18663]: Failed password for invalid user hikvision from 173.19.61.250 port 34064 ssh2 Jan 21 01:16:59 host sshd[18663]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:17:01 host sshd[18663]: Failed password for invalid user hikvision from 173.19.61.250 port 34064 ssh2 Jan 21 01:17:02 host sshd[18663]: Failed password for invalid user hikvision from 173.19.61.250 port 34064 ssh2 Jan 21 01:17:02 host sshd[18663]: Connection closed by 173.19.61.250 port 34064 [preauth] Jan 21 01:17:02 host sshd[18663]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.19.61.250 Jan 21 01:17:36 host sshd[18738]: Invalid user support from 211.107.136.97 port 62111 Jan 21 01:17:36 host sshd[18738]: input_userauth_request: invalid user support [preauth] Jan 21 01:17:36 host sshd[18738]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:17:36 host sshd[18738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.107.136.97 Jan 21 01:17:38 host sshd[18738]: Failed password for invalid user support from 211.107.136.97 port 62111 ssh2 Jan 21 01:17:39 host sshd[18738]: Connection reset by 211.107.136.97 port 62111 [preauth] Jan 21 01:19:10 host sshd[18894]: Invalid user nginx from 123.241.250.118 port 38882 Jan 21 01:19:10 host sshd[18894]: input_userauth_request: invalid user nginx [preauth] Jan 21 01:19:10 host sshd[18894]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:19:10 host sshd[18894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.241.250.118 Jan 21 01:19:12 host sshd[18894]: Failed password for invalid user nginx from 123.241.250.118 port 38882 ssh2 Jan 21 01:19:12 host sshd[18894]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:19:14 host sshd[18894]: Failed password for invalid user nginx from 123.241.250.118 port 38882 ssh2 Jan 21 01:19:14 host sshd[18894]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:19:16 host sshd[18894]: Failed password for invalid user nginx from 123.241.250.118 port 38882 ssh2 Jan 21 01:19:16 host sshd[18894]: Failed password for invalid user nginx from 123.241.250.118 port 38882 ssh2 Jan 21 01:19:16 host sshd[18894]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:19:18 host sshd[18894]: Failed password for invalid user nginx from 123.241.250.118 port 38882 ssh2 Jan 21 01:19:18 host sshd[18894]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:19:20 host sshd[18894]: Failed password for invalid user nginx from 123.241.250.118 port 38882 ssh2 Jan 21 01:19:20 host sshd[18894]: error: maximum authentication attempts exceeded for invalid user nginx from 123.241.250.118 port 38882 ssh2 [preauth] Jan 21 01:19:20 host sshd[18894]: Disconnecting: Too many authentication failures [preauth] Jan 21 01:19:20 host sshd[18894]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.241.250.118 Jan 21 01:19:20 host sshd[18894]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 21 01:19:49 host sshd[19090]: invalid public DH value: >= p-1 [preauth] Jan 21 01:19:49 host sshd[19090]: ssh_dispatch_run_fatal: Connection from 124.11.82.91 port 55221: incomplete message [preauth] Jan 21 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 01:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 01:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=gifterman user-4=palco123 user-5=kottayamcalldriv user-6=phmetals user-7=straightcurve user-8=wwwletsstalkfood user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=woodpeck user-16=wwwkapin user-17=remysagr user-18=disposeat user-19=wwwkmaorg user-20=wwwrmswll user-21=wwwresourcehunte user-22=keralaholi user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 01:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-j2PyD0A5a9BezEoh.~ Jan 21 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-j2PyD0A5a9BezEoh.~' Jan 21 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-j2PyD0A5a9BezEoh.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 01:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 01:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 01:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 01:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 01:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 01:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 01:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 01:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 01:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 01:24:06 host sshd[19792]: Invalid user weblogic from 209.141.55.27 port 50976 Jan 21 01:24:06 host sshd[19792]: input_userauth_request: invalid user weblogic [preauth] Jan 21 01:24:06 host sshd[19792]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:24:06 host sshd[19792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 Jan 21 01:24:08 host sshd[19792]: Failed password for invalid user weblogic from 209.141.55.27 port 50976 ssh2 Jan 21 01:24:09 host sshd[19792]: Received disconnect from 209.141.55.27 port 50976:11: Normal Shutdown, Thank you for playing [preauth] Jan 21 01:24:09 host sshd[19792]: Disconnected from 209.141.55.27 port 50976 [preauth] Jan 21 01:31:38 host sshd[20897]: User root from 183.103.201.115 not allowed because not listed in AllowUsers Jan 21 01:31:38 host sshd[20897]: input_userauth_request: invalid user root [preauth] Jan 21 01:31:38 host unix_chkpwd[20902]: password check failed for user (root) Jan 21 01:31:38 host sshd[20897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.103.201.115 user=root Jan 21 01:31:38 host sshd[20897]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:31:40 host sshd[20897]: Failed password for invalid user root from 183.103.201.115 port 47757 ssh2 Jan 21 01:31:41 host unix_chkpwd[20909]: password check failed for user (root) Jan 21 01:31:41 host sshd[20897]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:31:43 host sshd[20897]: Failed password for invalid user root from 183.103.201.115 port 47757 ssh2 Jan 21 01:31:44 host unix_chkpwd[20913]: password check failed for user (root) Jan 21 01:31:44 host sshd[20897]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:31:46 host sshd[20897]: Failed password for invalid user root from 183.103.201.115 port 47757 ssh2 Jan 21 01:31:47 host unix_chkpwd[20919]: password check failed for user (root) Jan 21 01:31:47 host sshd[20897]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:31:49 host sshd[20897]: Failed password for invalid user root from 183.103.201.115 port 47757 ssh2 Jan 21 01:31:50 host unix_chkpwd[20930]: password check failed for user (root) Jan 21 01:31:50 host sshd[20897]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:31:52 host sshd[20897]: Failed password for invalid user root from 183.103.201.115 port 47757 ssh2 Jan 21 01:35:08 host sshd[21367]: User root from 220.132.173.74 not allowed because not listed in AllowUsers Jan 21 01:35:08 host sshd[21367]: input_userauth_request: invalid user root [preauth] Jan 21 01:35:08 host unix_chkpwd[21371]: password check failed for user (root) Jan 21 01:35:08 host sshd[21367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.173.74 user=root Jan 21 01:35:08 host sshd[21367]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:35:09 host sshd[21367]: Failed password for invalid user root from 220.132.173.74 port 42339 ssh2 Jan 21 01:35:10 host unix_chkpwd[21385]: password check failed for user (root) Jan 21 01:35:10 host sshd[21367]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:35:12 host sshd[21367]: Failed password for invalid user root from 220.132.173.74 port 42339 ssh2 Jan 21 01:35:13 host unix_chkpwd[21390]: password check failed for user (root) Jan 21 01:35:13 host sshd[21367]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:35:14 host sshd[21367]: Failed password for invalid user root from 220.132.173.74 port 42339 ssh2 Jan 21 01:35:15 host sshd[21367]: Connection reset by 220.132.173.74 port 42339 [preauth] Jan 21 01:35:15 host sshd[21367]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.132.173.74 user=root Jan 21 01:36:10 host sshd[21640]: ssh_dispatch_run_fatal: Connection from 122.117.159.2 port 60129: bignum is negative [preauth] Jan 21 01:42:00 host sshd[22607]: Bad protocol version identification 'GET / HTTP/1.1' from 157.245.96.51 port 38034 Jan 21 01:42:32 host sshd[22653]: Connection closed by 157.245.96.51 port 39136 [preauth] Jan 21 01:45:17 host sshd[23239]: Did not receive identification string from 121.4.132.245 port 41880 Jan 21 01:45:19 host sshd[23243]: Invalid user testuser from 121.4.132.245 port 46184 Jan 21 01:45:19 host sshd[23243]: input_userauth_request: invalid user testuser [preauth] Jan 21 01:45:19 host sshd[23249]: Invalid user admin from 121.4.132.245 port 46110 Jan 21 01:45:19 host sshd[23249]: input_userauth_request: invalid user admin [preauth] Jan 21 01:45:19 host sshd[23246]: Invalid user pi from 121.4.132.245 port 46136 Jan 21 01:45:19 host sshd[23246]: input_userauth_request: invalid user pi [preauth] Jan 21 01:45:19 host sshd[23245]: Invalid user test from 121.4.132.245 port 46126 Jan 21 01:45:19 host sshd[23245]: input_userauth_request: invalid user test [preauth] Jan 21 01:45:19 host sshd[23247]: Invalid user ubnt from 121.4.132.245 port 46132 Jan 21 01:45:19 host sshd[23247]: input_userauth_request: invalid user ubnt [preauth] Jan 21 01:45:19 host sshd[23251]: Invalid user admin from 121.4.132.245 port 46118 Jan 21 01:45:19 host sshd[23251]: input_userauth_request: invalid user admin [preauth] Jan 21 01:45:19 host sshd[23250]: Invalid user oracle from 121.4.132.245 port 46138 Jan 21 01:45:19 host sshd[23250]: input_userauth_request: invalid user oracle [preauth] Jan 21 01:45:19 host sshd[23254]: Invalid user ftpuser from 121.4.132.245 port 46186 Jan 21 01:45:19 host sshd[23254]: input_userauth_request: invalid user ftpuser [preauth] Jan 21 01:45:19 host sshd[23256]: User root from 121.4.132.245 not allowed because not listed in AllowUsers Jan 21 01:45:19 host sshd[23258]: Invalid user test from 121.4.132.245 port 46176 Jan 21 01:45:19 host sshd[23256]: input_userauth_request: invalid user root [preauth] Jan 21 01:45:19 host sshd[23258]: input_userauth_request: invalid user test [preauth] Jan 21 01:45:19 host sshd[23262]: Invalid user steam from 121.4.132.245 port 46160 Jan 21 01:45:19 host sshd[23262]: input_userauth_request: invalid user steam [preauth] Jan 21 01:45:19 host sshd[23263]: Invalid user bot from 121.4.132.245 port 46182 Jan 21 01:45:19 host sshd[23263]: input_userauth_request: invalid user bot [preauth] Jan 21 01:45:19 host sshd[23260]: Invalid user dev from 121.4.132.245 port 46142 Jan 21 01:45:19 host sshd[23260]: input_userauth_request: invalid user dev [preauth] Jan 21 01:45:19 host sshd[23270]: User root from 121.4.132.245 not allowed because not listed in AllowUsers Jan 21 01:45:19 host sshd[23270]: input_userauth_request: invalid user root [preauth] Jan 21 01:45:20 host sshd[23243]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:20 host sshd[23243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:20 host sshd[23246]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:20 host sshd[23246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:20 host sshd[23241]: Invalid user git from 121.4.132.245 port 46108 Jan 21 01:45:20 host sshd[23241]: input_userauth_request: invalid user git [preauth] Jan 21 01:45:20 host sshd[23250]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:20 host sshd[23250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:20 host sshd[23251]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:20 host sshd[23251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:20 host sshd[23262]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:20 host sshd[23262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:20 host sshd[23263]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:20 host sshd[23263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:20 host sshd[23260]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:20 host sshd[23260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:20 host unix_chkpwd[23303]: password check failed for user (root) Jan 21 01:45:20 host sshd[23270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 user=root Jan 21 01:45:20 host sshd[23270]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:45:20 host sshd[23244]: Invalid user ec2-user from 121.4.132.245 port 46144 Jan 21 01:45:20 host sshd[23244]: input_userauth_request: invalid user ec2-user [preauth] Jan 21 01:45:20 host sshd[23248]: Invalid user vagrant from 121.4.132.245 port 46180 Jan 21 01:45:20 host sshd[23248]: input_userauth_request: invalid user vagrant [preauth] Jan 21 01:45:20 host sshd[23261]: Invalid user teamspeak from 121.4.132.245 port 46154 Jan 21 01:45:20 host sshd[23261]: input_userauth_request: invalid user teamspeak [preauth] Jan 21 01:45:20 host sshd[23264]: Invalid user admin from 121.4.132.245 port 46146 Jan 21 01:45:20 host sshd[23264]: input_userauth_request: invalid user admin [preauth] Jan 21 01:45:20 host sshd[23289]: Invalid user guest from 121.4.132.245 port 46124 Jan 21 01:45:20 host sshd[23289]: input_userauth_request: invalid user guest [preauth] Jan 21 01:45:20 host sshd[23241]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:20 host sshd[23241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:20 host sshd[23244]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:20 host sshd[23244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:20 host sshd[23257]: Invalid user vagrant from 121.4.132.245 port 46158 Jan 21 01:45:20 host sshd[23257]: input_userauth_request: invalid user vagrant [preauth] Jan 21 01:45:20 host sshd[23248]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:20 host sshd[23248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:20 host sshd[23265]: User root from 121.4.132.245 not allowed because not listed in AllowUsers Jan 21 01:45:20 host sshd[23265]: input_userauth_request: invalid user root [preauth] Jan 21 01:45:20 host sshd[23261]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:20 host sshd[23261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:20 host sshd[23269]: User root from 121.4.132.245 not allowed because not listed in AllowUsers Jan 21 01:45:20 host sshd[23269]: input_userauth_request: invalid user root [preauth] Jan 21 01:45:20 host sshd[23266]: Invalid user steam from 121.4.132.245 port 46148 Jan 21 01:45:20 host sshd[23266]: input_userauth_request: invalid user steam [preauth] Jan 21 01:45:20 host sshd[23264]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:20 host sshd[23264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:20 host sshd[23289]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:20 host sshd[23289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:20 host sshd[23249]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:20 host sshd[23249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:20 host sshd[23245]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:20 host sshd[23245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:20 host sshd[23247]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:20 host sshd[23247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:21 host sshd[23258]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:21 host sshd[23258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:21 host sshd[23254]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:21 host sshd[23254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:21 host unix_chkpwd[23314]: password check failed for user (root) Jan 21 01:45:21 host sshd[23256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 user=root Jan 21 01:45:21 host sshd[23256]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:45:21 host sshd[23257]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:21 host sshd[23257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:21 host unix_chkpwd[23317]: password check failed for user (root) Jan 21 01:45:21 host sshd[23265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 user=root Jan 21 01:45:21 host sshd[23265]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:45:21 host sshd[23281]: Invalid user ubuntu from 121.4.132.245 port 46140 Jan 21 01:45:21 host sshd[23281]: input_userauth_request: invalid user ubuntu [preauth] Jan 21 01:45:21 host unix_chkpwd[23318]: password check failed for user (root) Jan 21 01:45:21 host sshd[23269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 user=root Jan 21 01:45:21 host sshd[23269]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:45:21 host sshd[23281]: pam_unix(sshd:auth): check pass; user unknown Jan 21 01:45:21 host sshd[23281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.4.132.245 Jan 21 01:45:21 host sshd[23243]: Failed password for invalid user testuser from 121.4.132.245 port 46184 ssh2 Jan 21 01:45:21 host sshd[23246]: Failed password for invalid user pi from 121.4.132.245 port 46136 ssh2 Jan 21 01:45:21 host sshd[23251]: Failed password for invalid user admin from 121.4.132.245 port 46118 ssh2 Jan 21 01:45:21 host sshd[23250]: Failed password for invalid user oracle from 121.4.132.245 port 46138 ssh2 Jan 21 01:45:21 host sshd[23262]: Failed password for invalid user steam from 121.4.132.245 port 46160 ssh2 Jan 21 01:45:21 host sshd[23263]: Failed password for invalid user bot from 121.4.132.245 port 46182 ssh2 Jan 21 01:45:21 host sshd[23260]: Failed password for invalid user dev from 121.4.132.245 port 46142 ssh2 Jan 21 01:45:22 host sshd[23270]: Failed password for invalid user root from 121.4.132.245 port 46168 ssh2 Jan 21 01:45:22 host sshd[23241]: Failed password for invalid user git from 121.4.132.245 port 46108 ssh2 Jan 21 01:45:22 host sshd[23244]: Failed password for invalid user ec2-user from 121.4.132.245 port 46144 ssh2 Jan 21 01:45:22 host sshd[23248]: Failed password for invalid user vagrant from 121.4.132.245 port 46180 ssh2 Jan 21 01:45:22 host sshd[23261]: Failed password for invalid user teamspeak from 121.4.132.245 port 46154 ssh2 Jan 21 01:45:22 host sshd[23264]: Failed password for invalid user admin from 121.4.132.245 port 46146 ssh2 Jan 21 01:45:22 host sshd[23289]: Failed password for invalid user guest from 121.4.132.245 port 46124 ssh2 Jan 21 01:45:22 host sshd[23249]: Failed password for invalid user admin from 121.4.132.245 port 46110 ssh2 Jan 21 01:45:22 host sshd[23245]: Failed password for invalid user test from 121.4.132.245 port 46126 ssh2 Jan 21 01:45:22 host sshd[23247]: Failed password for invalid user ubnt from 121.4.132.245 port 46132 ssh2 Jan 21 01:45:23 host sshd[23258]: Failed password for invalid user test from 121.4.132.245 port 46176 ssh2 Jan 21 01:45:23 host sshd[23254]: Failed password for invalid user ftpuser from 121.4.132.245 port 46186 ssh2 Jan 21 01:45:23 host sshd[23256]: Failed password for invalid user root from 121.4.132.245 port 46170 ssh2 Jan 21 01:45:23 host sshd[23257]: Failed password for invalid user vagrant from 121.4.132.245 port 46158 ssh2 Jan 21 01:45:23 host sshd[23265]: Failed password for invalid user root from 121.4.132.245 port 46164 ssh2 Jan 21 01:45:23 host sshd[23269]: Failed password for invalid user root from 121.4.132.245 port 46120 ssh2 Jan 21 01:45:23 host sshd[23281]: Failed password for invalid user ubuntu from 121.4.132.245 port 46140 ssh2 Jan 21 01:55:53 host sshd[24934]: User root from 175.194.174.75 not allowed because not listed in AllowUsers Jan 21 01:55:53 host sshd[24934]: input_userauth_request: invalid user root [preauth] Jan 21 01:55:53 host unix_chkpwd[24938]: password check failed for user (root) Jan 21 01:55:53 host sshd[24934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.194.174.75 user=root Jan 21 01:55:53 host sshd[24934]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:55:55 host sshd[24934]: Failed password for invalid user root from 175.194.174.75 port 61613 ssh2 Jan 21 01:55:56 host unix_chkpwd[24942]: password check failed for user (root) Jan 21 01:55:56 host sshd[24934]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 01:55:58 host sshd[24934]: Failed password for invalid user root from 175.194.174.75 port 61613 ssh2 Jan 21 01:55:59 host sshd[24934]: Connection reset by 175.194.174.75 port 61613 [preauth] Jan 21 01:55:59 host sshd[24934]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.194.174.75 user=root Jan 21 02:05:06 host sshd[26216]: User root from 114.33.16.186 not allowed because not listed in AllowUsers Jan 21 02:05:06 host sshd[26216]: input_userauth_request: invalid user root [preauth] Jan 21 02:05:06 host unix_chkpwd[26220]: password check failed for user (root) Jan 21 02:05:06 host sshd[26216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.16.186 user=root Jan 21 02:05:06 host sshd[26216]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:05:08 host sshd[26216]: Failed password for invalid user root from 114.33.16.186 port 44025 ssh2 Jan 21 02:05:09 host unix_chkpwd[26223]: password check failed for user (root) Jan 21 02:05:09 host sshd[26216]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:05:11 host sshd[26216]: Failed password for invalid user root from 114.33.16.186 port 44025 ssh2 Jan 21 02:05:12 host unix_chkpwd[26298]: password check failed for user (root) Jan 21 02:05:12 host sshd[26216]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:05:14 host sshd[26216]: Failed password for invalid user root from 114.33.16.186 port 44025 ssh2 Jan 21 02:05:14 host unix_chkpwd[26314]: password check failed for user (root) Jan 21 02:05:14 host sshd[26216]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:05:16 host sshd[26216]: Failed password for invalid user root from 114.33.16.186 port 44025 ssh2 Jan 21 02:07:23 host sshd[26583]: Connection reset by 91.92.127.190 port 49822 [preauth] Jan 21 02:08:24 host sshd[26713]: ssh_dispatch_run_fatal: Connection from 50.250.34.202 port 52789: bignum is negative [preauth] Jan 21 02:09:18 host sshd[26817]: Connection reset by 121.146.70.126 port 59310 [preauth] Jan 21 02:14:43 host sshd[27731]: User root from 195.226.194.142 not allowed because not listed in AllowUsers Jan 21 02:14:43 host sshd[27731]: input_userauth_request: invalid user root [preauth] Jan 21 02:14:44 host unix_chkpwd[27734]: password check failed for user (root) Jan 21 02:14:44 host sshd[27731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 user=root Jan 21 02:14:44 host sshd[27731]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:14:45 host sshd[27731]: Failed password for invalid user root from 195.226.194.142 port 43526 ssh2 Jan 21 02:14:45 host sshd[27731]: Received disconnect from 195.226.194.142 port 43526:11: Bye Bye [preauth] Jan 21 02:14:45 host sshd[27731]: Disconnected from 195.226.194.142 port 43526 [preauth] Jan 21 02:17:29 host sshd[28184]: Did not receive identification string from 51.15.3.135 port 49686 Jan 21 02:17:29 host sshd[28187]: Invalid user admin from 51.15.3.135 port 51170 Jan 21 02:17:29 host sshd[28187]: input_userauth_request: invalid user admin [preauth] Jan 21 02:17:29 host sshd[28188]: User root from 51.15.3.135 not allowed because not listed in AllowUsers Jan 21 02:17:29 host sshd[28188]: input_userauth_request: invalid user root [preauth] Jan 21 02:17:29 host sshd[28195]: User root from 51.15.3.135 not allowed because not listed in AllowUsers Jan 21 02:17:29 host sshd[28195]: input_userauth_request: invalid user root [preauth] Jan 21 02:17:29 host sshd[28189]: Invalid user admin from 51.15.3.135 port 51156 Jan 21 02:17:29 host sshd[28189]: input_userauth_request: invalid user admin [preauth] Jan 21 02:17:29 host sshd[28186]: Invalid user www from 51.15.3.135 port 50992 Jan 21 02:17:29 host sshd[28186]: input_userauth_request: invalid user www [preauth] Jan 21 02:17:29 host sshd[28191]: User root from 51.15.3.135 not allowed because not listed in AllowUsers Jan 21 02:17:29 host sshd[28191]: input_userauth_request: invalid user root [preauth] Jan 21 02:17:29 host sshd[28194]: Invalid user pi from 51.15.3.135 port 51224 Jan 21 02:17:29 host sshd[28194]: input_userauth_request: invalid user pi [preauth] Jan 21 02:17:29 host sshd[28190]: Invalid user student from 51.15.3.135 port 51086 Jan 21 02:17:29 host sshd[28190]: input_userauth_request: invalid user student [preauth] Jan 21 02:17:29 host sshd[28192]: User root from 51.15.3.135 not allowed because not listed in AllowUsers Jan 21 02:17:29 host sshd[28192]: input_userauth_request: invalid user root [preauth] Jan 21 02:17:29 host sshd[28197]: Invalid user guest from 51.15.3.135 port 51116 Jan 21 02:17:29 host sshd[28197]: input_userauth_request: invalid user guest [preauth] Jan 21 02:17:29 host sshd[28199]: User root from 51.15.3.135 not allowed because not listed in AllowUsers Jan 21 02:17:29 host sshd[28199]: input_userauth_request: invalid user root [preauth] Jan 21 02:17:29 host sshd[28198]: User root from 51.15.3.135 not allowed because not listed in AllowUsers Jan 21 02:17:29 host sshd[28198]: input_userauth_request: invalid user root [preauth] Jan 21 02:17:29 host sshd[28200]: Invalid user admin from 51.15.3.135 port 51142 Jan 21 02:17:29 host sshd[28200]: input_userauth_request: invalid user admin [preauth] Jan 21 02:17:29 host sshd[28204]: Invalid user git from 51.15.3.135 port 51250 Jan 21 02:17:29 host sshd[28196]: User root from 51.15.3.135 not allowed because not listed in AllowUsers Jan 21 02:17:29 host sshd[28204]: input_userauth_request: invalid user git [preauth] Jan 21 02:17:29 host sshd[28196]: input_userauth_request: invalid user root [preauth] Jan 21 02:17:29 host sshd[28206]: Invalid user teamspeak from 51.15.3.135 port 51210 Jan 21 02:17:29 host sshd[28207]: User root from 51.15.3.135 not allowed because not listed in AllowUsers Jan 21 02:17:29 host sshd[28206]: input_userauth_request: invalid user teamspeak [preauth] Jan 21 02:17:29 host sshd[28207]: input_userauth_request: invalid user root [preauth] Jan 21 02:17:29 host sshd[28202]: Invalid user oracle from 51.15.3.135 port 51220 Jan 21 02:17:29 host sshd[28202]: input_userauth_request: invalid user oracle [preauth] Jan 21 02:17:29 host sshd[28203]: User root from 51.15.3.135 not allowed because not listed in AllowUsers Jan 21 02:17:29 host sshd[28193]: User root from 51.15.3.135 not allowed because not listed in AllowUsers Jan 21 02:17:29 host sshd[28193]: input_userauth_request: invalid user root [preauth] Jan 21 02:17:29 host sshd[28203]: input_userauth_request: invalid user root [preauth] Jan 21 02:17:29 host sshd[28201]: User root from 51.15.3.135 not allowed because not listed in AllowUsers Jan 21 02:17:29 host sshd[28201]: input_userauth_request: invalid user root [preauth] Jan 21 02:17:29 host sshd[28209]: Invalid user admin from 51.15.3.135 port 51262 Jan 21 02:17:29 host sshd[28209]: input_userauth_request: invalid user admin [preauth] Jan 21 02:17:29 host sshd[28208]: User root from 51.15.3.135 not allowed because not listed in AllowUsers Jan 21 02:17:29 host sshd[28208]: input_userauth_request: invalid user root [preauth] Jan 21 02:17:29 host sshd[28205]: Invalid user student from 51.15.3.135 port 51076 Jan 21 02:17:29 host sshd[28205]: input_userauth_request: invalid user student [preauth] Jan 21 02:17:29 host sshd[28216]: Invalid user devops from 51.15.3.135 port 51206 Jan 21 02:17:29 host sshd[28216]: input_userauth_request: invalid user devops [preauth] Jan 21 02:17:29 host sshd[28213]: Invalid user www from 51.15.3.135 port 51148 Jan 21 02:17:29 host sshd[28213]: input_userauth_request: invalid user www [preauth] Jan 21 02:17:29 host sshd[28210]: Invalid user ubnt from 51.15.3.135 port 51106 Jan 21 02:17:29 host sshd[28210]: input_userauth_request: invalid user ubnt [preauth] Jan 21 02:17:29 host sshd[28217]: User root from 51.15.3.135 not allowed because not listed in AllowUsers Jan 21 02:17:29 host sshd[28217]: input_userauth_request: invalid user root [preauth] Jan 21 02:17:29 host sshd[28218]: Invalid user hadoop from 51.15.3.135 port 51244 Jan 21 02:17:29 host sshd[28218]: input_userauth_request: invalid user hadoop [preauth] Jan 21 02:17:29 host sshd[28187]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:17:30 host sshd[28187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 21 02:17:30 host sshd[28189]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:17:30 host sshd[28189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 21 02:17:30 host sshd[28186]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:17:30 host sshd[28186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 21 02:17:30 host sshd[28194]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:17:30 host sshd[28194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 21 02:17:30 host unix_chkpwd[28244]: password check failed for user (root) Jan 21 02:17:30 host sshd[28188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 user=root Jan 21 02:17:30 host sshd[28188]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:17:30 host unix_chkpwd[28245]: password check failed for user (root) Jan 21 02:17:30 host sshd[28195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 user=root Jan 21 02:17:30 host sshd[28195]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:17:30 host unix_chkpwd[28246]: password check failed for user (root) Jan 21 02:17:30 host sshd[28191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 user=root Jan 21 02:17:30 host sshd[28191]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:17:30 host sshd[28190]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:17:30 host sshd[28190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 21 02:17:30 host sshd[28197]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:17:30 host sshd[28197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 21 02:17:30 host unix_chkpwd[28247]: password check failed for user (root) Jan 21 02:17:30 host sshd[28192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 user=root Jan 21 02:17:30 host sshd[28192]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:17:30 host sshd[28200]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:17:30 host sshd[28200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 21 02:17:30 host sshd[28204]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:17:30 host sshd[28204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 21 02:17:30 host sshd[28206]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:17:30 host sshd[28206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 21 02:17:30 host sshd[28202]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:17:30 host sshd[28202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 21 02:17:30 host unix_chkpwd[28250]: password check failed for user (root) Jan 21 02:17:30 host unix_chkpwd[28248]: password check failed for user (root) Jan 21 02:17:30 host sshd[28196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 user=root Jan 21 02:17:30 host sshd[28196]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:17:30 host sshd[28199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 user=root Jan 21 02:17:30 host sshd[28199]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:17:30 host sshd[28209]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:17:30 host sshd[28209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 21 02:17:30 host unix_chkpwd[28249]: password check failed for user (root) Jan 21 02:17:30 host sshd[28198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 user=root Jan 21 02:17:30 host sshd[28198]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:17:30 host unix_chkpwd[28251]: password check failed for user (root) Jan 21 02:17:30 host sshd[28201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 user=root Jan 21 02:17:30 host sshd[28201]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:17:30 host sshd[28205]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:17:30 host sshd[28205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 21 02:17:30 host unix_chkpwd[28253]: password check failed for user (root) Jan 21 02:17:30 host sshd[28207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 user=root Jan 21 02:17:30 host sshd[28207]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:17:30 host unix_chkpwd[28252]: password check failed for user (root) Jan 21 02:17:30 host sshd[28203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 user=root Jan 21 02:17:30 host sshd[28203]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:17:30 host unix_chkpwd[28255]: password check failed for user (root) Jan 21 02:17:30 host sshd[28208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 user=root Jan 21 02:17:30 host sshd[28208]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:17:30 host sshd[28216]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:17:30 host sshd[28216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 21 02:17:30 host sshd[28213]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:17:30 host sshd[28213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 21 02:17:30 host unix_chkpwd[28254]: password check failed for user (root) Jan 21 02:17:30 host sshd[28193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 user=root Jan 21 02:17:30 host sshd[28193]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:17:30 host sshd[28218]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:17:30 host sshd[28218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 21 02:17:30 host sshd[28210]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:17:30 host sshd[28210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 21 02:17:30 host unix_chkpwd[28256]: password check failed for user (root) Jan 21 02:17:30 host sshd[28217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 user=root Jan 21 02:17:30 host sshd[28217]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:17:30 host sshd[28258]: Invalid user admin from 51.15.3.135 port 51138 Jan 21 02:17:30 host sshd[28258]: input_userauth_request: invalid user admin [preauth] Jan 21 02:17:30 host sshd[28257]: User root from 51.15.3.135 not allowed because not listed in AllowUsers Jan 21 02:17:30 host sshd[28257]: input_userauth_request: invalid user root [preauth] Jan 21 02:17:30 host sshd[28259]: User root from 51.15.3.135 not allowed because not listed in AllowUsers Jan 21 02:17:30 host sshd[28259]: input_userauth_request: invalid user root [preauth] Jan 21 02:17:31 host sshd[28258]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:17:31 host sshd[28258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 Jan 21 02:17:31 host unix_chkpwd[28264]: password check failed for user (root) Jan 21 02:17:31 host sshd[28257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 user=root Jan 21 02:17:31 host sshd[28257]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:17:31 host unix_chkpwd[28265]: password check failed for user (root) Jan 21 02:17:31 host sshd[28259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.3.135 user=root Jan 21 02:17:31 host sshd[28259]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:17:31 host sshd[28189]: Failed password for invalid user admin from 51.15.3.135 port 51156 ssh2 Jan 21 02:17:31 host sshd[28186]: Failed password for invalid user www from 51.15.3.135 port 50992 ssh2 Jan 21 02:17:31 host sshd[28194]: Failed password for invalid user pi from 51.15.3.135 port 51224 ssh2 Jan 21 02:17:31 host sshd[28195]: Failed password for invalid user root from 51.15.3.135 port 51216 ssh2 Jan 21 02:17:31 host sshd[28191]: Failed password for invalid user root from 51.15.3.135 port 51178 ssh2 Jan 21 02:17:31 host sshd[28190]: Failed password for invalid user student from 51.15.3.135 port 51086 ssh2 Jan 21 02:17:31 host sshd[28197]: Failed password for invalid user guest from 51.15.3.135 port 51116 ssh2 Jan 21 02:17:31 host sshd[28192]: Failed password for invalid user root from 51.15.3.135 port 51226 ssh2 Jan 21 02:17:31 host sshd[28200]: Failed password for invalid user admin from 51.15.3.135 port 51142 ssh2 Jan 21 02:17:31 host sshd[28204]: Failed password for invalid user git from 51.15.3.135 port 51250 ssh2 Jan 21 02:17:31 host sshd[28206]: Failed password for invalid user teamspeak from 51.15.3.135 port 51210 ssh2 Jan 21 02:17:31 host sshd[28202]: Failed password for invalid user oracle from 51.15.3.135 port 51220 ssh2 Jan 21 02:17:31 host sshd[28196]: Failed password for invalid user root from 51.15.3.135 port 51132 ssh2 Jan 21 02:17:31 host sshd[28199]: Failed password for invalid user root from 51.15.3.135 port 51122 ssh2 Jan 21 02:17:31 host sshd[28209]: Failed password for invalid user admin from 51.15.3.135 port 51262 ssh2 Jan 21 02:17:31 host sshd[28198]: Failed password for invalid user root from 51.15.3.135 port 51096 ssh2 Jan 21 02:17:31 host sshd[28201]: Failed password for invalid user root from 51.15.3.135 port 51214 ssh2 Jan 21 02:17:31 host sshd[28205]: Failed password for invalid user student from 51.15.3.135 port 51076 ssh2 Jan 21 02:17:31 host sshd[28207]: Failed password for invalid user root from 51.15.3.135 port 51208 ssh2 Jan 21 02:17:31 host sshd[28203]: Failed password for invalid user root from 51.15.3.135 port 51102 ssh2 Jan 21 02:17:31 host sshd[28208]: Failed password for invalid user root from 51.15.3.135 port 51260 ssh2 Jan 21 02:17:31 host sshd[28216]: Failed password for invalid user devops from 51.15.3.135 port 51206 ssh2 Jan 21 02:17:31 host sshd[28213]: Failed password for invalid user www from 51.15.3.135 port 51148 ssh2 Jan 21 02:17:31 host sshd[28193]: Failed password for invalid user root from 51.15.3.135 port 51110 ssh2 Jan 21 02:17:31 host sshd[28189]: Connection closed by 51.15.3.135 port 51156 [preauth] Jan 21 02:17:31 host sshd[28218]: Failed password for invalid user hadoop from 51.15.3.135 port 51244 ssh2 Jan 21 02:17:31 host sshd[28186]: Connection closed by 51.15.3.135 port 50992 [preauth] Jan 21 02:17:31 host sshd[28194]: Connection closed by 51.15.3.135 port 51224 [preauth] Jan 21 02:17:31 host sshd[28195]: Connection closed by 51.15.3.135 port 51216 [preauth] Jan 21 02:17:31 host sshd[28210]: Failed password for invalid user ubnt from 51.15.3.135 port 51106 ssh2 Jan 21 02:17:31 host sshd[28191]: Connection closed by 51.15.3.135 port 51178 [preauth] Jan 21 02:17:31 host sshd[28190]: Connection closed by 51.15.3.135 port 51086 [preauth] Jan 21 02:17:31 host sshd[28197]: Connection closed by 51.15.3.135 port 51116 [preauth] Jan 21 02:17:31 host sshd[28217]: Failed password for invalid user root from 51.15.3.135 port 51166 ssh2 Jan 21 02:17:31 host sshd[28192]: Connection closed by 51.15.3.135 port 51226 [preauth] Jan 21 02:17:31 host sshd[28204]: Connection closed by 51.15.3.135 port 51250 [preauth] Jan 21 02:17:31 host sshd[28200]: Connection closed by 51.15.3.135 port 51142 [preauth] Jan 21 02:17:31 host sshd[28206]: Connection closed by 51.15.3.135 port 51210 [preauth] Jan 21 02:17:31 host sshd[28202]: Connection closed by 51.15.3.135 port 51220 [preauth] Jan 21 02:17:31 host sshd[28199]: Connection closed by 51.15.3.135 port 51122 [preauth] Jan 21 02:17:31 host sshd[28196]: Connection closed by 51.15.3.135 port 51132 [preauth] Jan 21 02:17:31 host sshd[28198]: Connection closed by 51.15.3.135 port 51096 [preauth] Jan 21 02:17:31 host sshd[28209]: Connection closed by 51.15.3.135 port 51262 [preauth] Jan 21 02:17:31 host sshd[28201]: Connection closed by 51.15.3.135 port 51214 [preauth] Jan 21 02:17:31 host sshd[28205]: Connection closed by 51.15.3.135 port 51076 [preauth] Jan 21 02:17:31 host sshd[28207]: Connection closed by 51.15.3.135 port 51208 [preauth] Jan 21 02:17:31 host sshd[28208]: Connection closed by 51.15.3.135 port 51260 [preauth] Jan 21 02:17:31 host sshd[28203]: Connection closed by 51.15.3.135 port 51102 [preauth] Jan 21 02:17:31 host sshd[28216]: Connection closed by 51.15.3.135 port 51206 [preauth] Jan 21 02:17:31 host sshd[28193]: Connection closed by 51.15.3.135 port 51110 [preauth] Jan 21 02:17:32 host sshd[28213]: Connection closed by 51.15.3.135 port 51148 [preauth] Jan 21 02:17:32 host sshd[28218]: Connection closed by 51.15.3.135 port 51244 [preauth] Jan 21 02:17:32 host sshd[28210]: Connection closed by 51.15.3.135 port 51106 [preauth] Jan 21 02:17:32 host sshd[28217]: Connection closed by 51.15.3.135 port 51166 [preauth] Jan 21 02:17:32 host sshd[28187]: Failed password for invalid user admin from 51.15.3.135 port 51170 ssh2 Jan 21 02:17:32 host sshd[28188]: Failed password for invalid user root from 51.15.3.135 port 51128 ssh2 Jan 21 02:17:33 host sshd[28258]: Failed password for invalid user admin from 51.15.3.135 port 51138 ssh2 Jan 21 02:17:33 host sshd[28257]: Failed password for invalid user root from 51.15.3.135 port 51162 ssh2 Jan 21 02:17:33 host sshd[28259]: Failed password for invalid user root from 51.15.3.135 port 51080 ssh2 Jan 21 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 02:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 02:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 02:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=a2zgroup user-4=dartsimp user-5=laundryboniface user-6=wwwpmcresource user-7=travelboniface user-8=ugotscom user-9=keralaholi user-10=wwwresourcehunte user-11=wwwrmswll user-12=disposeat user-13=remysagr user-14=wwwkmaorg user-15=wwwkapin user-16=woodpeck user-17=shalinijames user-18=wwwtestugo user-19=vfmassets user-20=pmcresources user-21=wwwevmhonda user-22=bonifacegroup user-23=wwwletsstalkfood user-24=straightcurve user-25=phmetals user-26=kottayamcalldriv user-27=palco123 user-28=gifterman user-29=wwwnexidigital user-30=mrsclean feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 02:21:04 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 02:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 02:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fPdHXYUUOEwBeTwf.~ Jan 21 02:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fPdHXYUUOEwBeTwf.~' Jan 21 02:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-fPdHXYUUOEwBeTwf.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 02:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 02:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 02:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 02:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 02:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 02:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 02:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 02:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 02:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 02:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:24:33 host sshd[29448]: User root from 42.200.237.165 not allowed because not listed in AllowUsers Jan 21 02:24:33 host sshd[29448]: input_userauth_request: invalid user root [preauth] Jan 21 02:24:33 host unix_chkpwd[29451]: password check failed for user (root) Jan 21 02:24:33 host sshd[29448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.237.165 user=root Jan 21 02:24:33 host sshd[29448]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:24:36 host sshd[29448]: Failed password for invalid user root from 42.200.237.165 port 45779 ssh2 Jan 21 02:24:36 host sshd[29448]: Connection reset by 42.200.237.165 port 45779 [preauth] Jan 21 02:28:55 host sshd[30068]: Did not receive identification string from 82.157.194.152 port 41532 Jan 21 02:28:57 host sshd[30070]: User root from 82.157.194.152 not allowed because not listed in AllowUsers Jan 21 02:28:57 host sshd[30071]: Invalid user steam from 82.157.194.152 port 43810 Jan 21 02:28:57 host sshd[30070]: input_userauth_request: invalid user root [preauth] Jan 21 02:28:57 host sshd[30071]: input_userauth_request: invalid user steam [preauth] Jan 21 02:28:57 host sshd[30072]: Invalid user postgres from 82.157.194.152 port 43850 Jan 21 02:28:57 host sshd[30072]: input_userauth_request: invalid user postgres [preauth] Jan 21 02:28:57 host sshd[30073]: Invalid user admin from 82.157.194.152 port 43858 Jan 21 02:28:57 host sshd[30073]: input_userauth_request: invalid user admin [preauth] Jan 21 02:28:57 host sshd[30069]: Invalid user postgres from 82.157.194.152 port 43808 Jan 21 02:28:57 host sshd[30069]: input_userauth_request: invalid user postgres [preauth] Jan 21 02:28:57 host sshd[30081]: User mysql from 82.157.194.152 not allowed because not listed in AllowUsers Jan 21 02:28:57 host sshd[30074]: Invalid user vagrant from 82.157.194.152 port 43800 Jan 21 02:28:57 host sshd[30081]: input_userauth_request: invalid user mysql [preauth] Jan 21 02:28:57 host sshd[30074]: input_userauth_request: invalid user vagrant [preauth] Jan 21 02:28:57 host sshd[30079]: Invalid user oracle from 82.157.194.152 port 43826 Jan 21 02:28:57 host sshd[30079]: input_userauth_request: invalid user oracle [preauth] Jan 21 02:28:57 host sshd[30077]: Invalid user admin from 82.157.194.152 port 43796 Jan 21 02:28:57 host sshd[30077]: input_userauth_request: invalid user admin [preauth] Jan 21 02:28:57 host sshd[30082]: Invalid user zjw from 82.157.194.152 port 43816 Jan 21 02:28:57 host sshd[30082]: input_userauth_request: invalid user zjw [preauth] Jan 21 02:28:57 host sshd[30076]: Invalid user postgres from 82.157.194.152 port 43794 Jan 21 02:28:57 host sshd[30076]: input_userauth_request: invalid user postgres [preauth] Jan 21 02:28:57 host sshd[30087]: User root from 82.157.194.152 not allowed because not listed in AllowUsers Jan 21 02:28:57 host sshd[30087]: input_userauth_request: invalid user root [preauth] Jan 21 02:28:57 host sshd[30083]: User root from 82.157.194.152 not allowed because not listed in AllowUsers Jan 21 02:28:57 host sshd[30083]: input_userauth_request: invalid user root [preauth] Jan 21 02:28:57 host sshd[30089]: Invalid user bot from 82.157.194.152 port 43866 Jan 21 02:28:57 host sshd[30089]: input_userauth_request: invalid user bot [preauth] Jan 21 02:28:57 host sshd[30088]: User root from 82.157.194.152 not allowed because not listed in AllowUsers Jan 21 02:28:57 host sshd[30088]: input_userauth_request: invalid user root [preauth] Jan 21 02:28:57 host sshd[30091]: Invalid user steam from 82.157.194.152 port 43842 Jan 21 02:28:57 host sshd[30091]: input_userauth_request: invalid user steam [preauth] Jan 21 02:28:57 host sshd[30094]: Invalid user dmdba from 82.157.194.152 port 43864 Jan 21 02:28:57 host sshd[30094]: input_userauth_request: invalid user dmdba [preauth] Jan 21 02:28:57 host sshd[30096]: Invalid user postgres from 82.157.194.152 port 43862 Jan 21 02:28:57 host sshd[30096]: input_userauth_request: invalid user postgres [preauth] Jan 21 02:28:57 host sshd[30095]: Invalid user student from 82.157.194.152 port 43836 Jan 21 02:28:57 host sshd[30095]: input_userauth_request: invalid user student [preauth] Jan 21 02:28:57 host sshd[30097]: Invalid user ubuntu from 82.157.194.152 port 43830 Jan 21 02:28:57 host sshd[30097]: input_userauth_request: invalid user ubuntu [preauth] Jan 21 02:28:57 host sshd[30098]: Invalid user admin from 82.157.194.152 port 43838 Jan 21 02:28:57 host sshd[30098]: input_userauth_request: invalid user admin [preauth] Jan 21 02:28:57 host sshd[30100]: Invalid user pi from 82.157.194.152 port 43792 Jan 21 02:28:57 host sshd[30100]: input_userauth_request: invalid user pi [preauth] Jan 21 02:28:57 host sshd[30071]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:57 host sshd[30071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:57 host sshd[30069]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:57 host sshd[30069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:57 host unix_chkpwd[30123]: password check failed for user (root) Jan 21 02:28:57 host sshd[30070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 user=root Jan 21 02:28:57 host sshd[30070]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:28:57 host sshd[30074]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:57 host sshd[30074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:57 host sshd[30079]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:57 host sshd[30079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:57 host sshd[30077]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:57 host sshd[30077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:57 host unix_chkpwd[30124]: password check failed for user (mysql) Jan 21 02:28:57 host sshd[30081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 user=mysql Jan 21 02:28:57 host sshd[30081]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 21 02:28:57 host sshd[30082]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:57 host sshd[30082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:57 host sshd[30076]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:57 host sshd[30076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:57 host sshd[30089]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:57 host sshd[30089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:57 host unix_chkpwd[30125]: password check failed for user (root) Jan 21 02:28:57 host sshd[30087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 user=root Jan 21 02:28:57 host sshd[30087]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:28:57 host unix_chkpwd[30126]: password check failed for user (root) Jan 21 02:28:57 host sshd[30083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 user=root Jan 21 02:28:57 host sshd[30083]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:28:57 host sshd[30091]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:57 host sshd[30091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:57 host unix_chkpwd[30127]: password check failed for user (root) Jan 21 02:28:57 host sshd[30088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 user=root Jan 21 02:28:57 host sshd[30088]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:28:57 host sshd[30094]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:57 host sshd[30094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:57 host sshd[30096]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:57 host sshd[30096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:57 host sshd[30095]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:57 host sshd[30095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:57 host sshd[30097]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:57 host sshd[30097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:57 host sshd[30098]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:57 host sshd[30098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:57 host sshd[30100]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:57 host sshd[30100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:58 host sshd[30086]: Invalid user postgres from 82.157.194.152 port 43804 Jan 21 02:28:58 host sshd[30086]: input_userauth_request: invalid user postgres [preauth] Jan 21 02:28:58 host sshd[30078]: Invalid user oracle from 82.157.194.152 port 43832 Jan 21 02:28:58 host sshd[30078]: input_userauth_request: invalid user oracle [preauth] Jan 21 02:28:58 host sshd[30080]: Invalid user ubnt from 82.157.194.152 port 43806 Jan 21 02:28:58 host sshd[30080]: input_userauth_request: invalid user ubnt [preauth] Jan 21 02:28:58 host sshd[30090]: Invalid user halo from 82.157.194.152 port 43868 Jan 21 02:28:58 host sshd[30090]: input_userauth_request: invalid user halo [preauth] Jan 21 02:28:58 host sshd[30072]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:58 host sshd[30072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:58 host sshd[30073]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:58 host sshd[30073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:58 host sshd[30086]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:58 host sshd[30086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:58 host sshd[30090]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:58 host sshd[30090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:58 host sshd[30080]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:28:58 host sshd[30080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:28:59 host sshd[30071]: Failed password for invalid user steam from 82.157.194.152 port 43810 ssh2 Jan 21 02:28:59 host sshd[30069]: Failed password for invalid user postgres from 82.157.194.152 port 43808 ssh2 Jan 21 02:28:59 host sshd[30070]: Failed password for invalid user root from 82.157.194.152 port 43848 ssh2 Jan 21 02:28:59 host sshd[30074]: Failed password for invalid user vagrant from 82.157.194.152 port 43800 ssh2 Jan 21 02:28:59 host sshd[30079]: Failed password for invalid user oracle from 82.157.194.152 port 43826 ssh2 Jan 21 02:28:59 host sshd[30077]: Failed password for invalid user admin from 82.157.194.152 port 43796 ssh2 Jan 21 02:28:59 host sshd[30081]: Failed password for invalid user mysql from 82.157.194.152 port 43860 ssh2 Jan 21 02:28:59 host sshd[30082]: Failed password for invalid user zjw from 82.157.194.152 port 43816 ssh2 Jan 21 02:28:59 host sshd[30076]: Failed password for invalid user postgres from 82.157.194.152 port 43794 ssh2 Jan 21 02:28:59 host sshd[30089]: Failed password for invalid user bot from 82.157.194.152 port 43866 ssh2 Jan 21 02:28:59 host sshd[30087]: Failed password for invalid user root from 82.157.194.152 port 43854 ssh2 Jan 21 02:28:59 host sshd[30083]: Failed password for invalid user root from 82.157.194.152 port 43820 ssh2 Jan 21 02:28:59 host sshd[30091]: Failed password for invalid user steam from 82.157.194.152 port 43842 ssh2 Jan 21 02:28:59 host sshd[30088]: Failed password for invalid user root from 82.157.194.152 port 43818 ssh2 Jan 21 02:28:59 host sshd[30094]: Failed password for invalid user dmdba from 82.157.194.152 port 43864 ssh2 Jan 21 02:28:59 host sshd[30096]: Failed password for invalid user postgres from 82.157.194.152 port 43862 ssh2 Jan 21 02:28:59 host sshd[30095]: Failed password for invalid user student from 82.157.194.152 port 43836 ssh2 Jan 21 02:28:59 host sshd[30097]: Failed password for invalid user ubuntu from 82.157.194.152 port 43830 ssh2 Jan 21 02:28:59 host sshd[30098]: Failed password for invalid user admin from 82.157.194.152 port 43838 ssh2 Jan 21 02:28:59 host sshd[30100]: Failed password for invalid user pi from 82.157.194.152 port 43792 ssh2 Jan 21 02:28:59 host sshd[30071]: Connection closed by 82.157.194.152 port 43810 [preauth] Jan 21 02:29:00 host sshd[30069]: Connection closed by 82.157.194.152 port 43808 [preauth] Jan 21 02:29:00 host sshd[30070]: Connection closed by 82.157.194.152 port 43848 [preauth] Jan 21 02:29:00 host sshd[30074]: Connection closed by 82.157.194.152 port 43800 [preauth] Jan 21 02:29:00 host sshd[30078]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:29:00 host sshd[30078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.194.152 Jan 21 02:29:00 host sshd[30079]: Connection closed by 82.157.194.152 port 43826 [preauth] Jan 21 02:29:00 host sshd[30081]: Connection closed by 82.157.194.152 port 43860 [preauth] Jan 21 02:29:00 host sshd[30077]: Connection closed by 82.157.194.152 port 43796 [preauth] Jan 21 02:29:00 host sshd[30082]: Connection closed by 82.157.194.152 port 43816 [preauth] Jan 21 02:29:00 host sshd[30076]: Connection closed by 82.157.194.152 port 43794 [preauth] Jan 21 02:29:00 host sshd[30089]: Connection closed by 82.157.194.152 port 43866 [preauth] Jan 21 02:29:00 host sshd[30087]: Connection closed by 82.157.194.152 port 43854 [preauth] Jan 21 02:29:00 host sshd[30083]: Connection closed by 82.157.194.152 port 43820 [preauth] Jan 21 02:29:00 host sshd[30091]: Connection closed by 82.157.194.152 port 43842 [preauth] Jan 21 02:29:00 host sshd[30088]: Connection closed by 82.157.194.152 port 43818 [preauth] Jan 21 02:29:00 host sshd[30094]: Connection closed by 82.157.194.152 port 43864 [preauth] Jan 21 02:29:00 host sshd[30096]: Connection closed by 82.157.194.152 port 43862 [preauth] Jan 21 02:29:00 host sshd[30095]: Connection closed by 82.157.194.152 port 43836 [preauth] Jan 21 02:29:00 host sshd[30097]: Connection closed by 82.157.194.152 port 43830 [preauth] Jan 21 02:29:00 host sshd[30098]: Connection closed by 82.157.194.152 port 43838 [preauth] Jan 21 02:29:00 host sshd[30100]: Connection closed by 82.157.194.152 port 43792 [preauth] Jan 21 02:29:00 host sshd[30072]: Failed password for invalid user postgres from 82.157.194.152 port 43850 ssh2 Jan 21 02:29:00 host sshd[30073]: Failed password for invalid user admin from 82.157.194.152 port 43858 ssh2 Jan 21 02:29:00 host sshd[30086]: Failed password for invalid user postgres from 82.157.194.152 port 43804 ssh2 Jan 21 02:29:01 host sshd[30090]: Failed password for invalid user halo from 82.157.194.152 port 43868 ssh2 Jan 21 02:29:01 host sshd[30080]: Failed password for invalid user ubnt from 82.157.194.152 port 43806 ssh2 Jan 21 02:29:01 host sshd[30090]: Connection closed by 82.157.194.152 port 43868 [preauth] Jan 21 02:29:01 host sshd[30080]: Connection closed by 82.157.194.152 port 43806 [preauth] Jan 21 02:29:01 host sshd[30078]: Failed password for invalid user oracle from 82.157.194.152 port 43832 ssh2 Jan 21 02:29:01 host sshd[30086]: Connection closed by 82.157.194.152 port 43804 [preauth] Jan 21 02:29:02 host sshd[30078]: Connection closed by 82.157.194.152 port 43832 [preauth] Jan 21 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 02:29:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=travelboniface user-3=keralaholi user-4=wwwresourcehunte user-5=wwwrmswll user-6=ugotscom user-7=wwwkaretakers user-8=cochintaxi user-9=a2zgroup user-10=dartsimp user-11=laundryboniface user-12=bonifacegroup user-13=wwwevmhonda user-14=straightcurve user-15=wwwletsstalkfood user-16=palco123 user-17=gifterman user-18=kottayamcalldriv user-19=phmetals user-20=mrsclean user-21=wwwnexidigital user-22=disposeat user-23=wwwkmaorg user-24=remysagr user-25=wwwkapin user-26=woodpeck user-27=vfmassets user-28=shalinijames user-29=wwwtestugo user-30=pmcresources feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 02:29:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 02:29:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Jan 21 02:29:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 21 02:29:10 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 21 02:29:10 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 21 02:29:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Jan 21 02:29:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Jan 21 02:29:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Jan 21 02:29:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:12 host sshd[30272]: Invalid user he from 194.110.203.109 port 51166 Jan 21 02:29:12 host sshd[30272]: input_userauth_request: invalid user he [preauth] Jan 21 02:29:12 host sshd[30272]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:29:12 host sshd[30272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 02:29:14 host sshd[30272]: Failed password for invalid user he from 194.110.203.109 port 51166 ssh2 Jan 21 02:29:17 host sshd[30272]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:29:20 host sshd[30272]: Failed password for invalid user he from 194.110.203.109 port 51166 ssh2 Jan 21 02:29:23 host sshd[30272]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:29:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 21 02:29:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 21 02:29:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 21 02:29:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Jan 21 02:29:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:25 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:26 host sshd[30272]: Failed password for invalid user he from 194.110.203.109 port 51166 ssh2 Jan 21 02:29:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Jan 21 02:29:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Jan 21 02:29:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Jan 21 02:29:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Jan 21 02:29:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:27 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:29 host sshd[30272]: Connection closed by 194.110.203.109 port 51166 [preauth] Jan 21 02:29:29 host sshd[30272]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 02:29:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Jan 21 02:29:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:40 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:42 host sshd[30485]: Invalid user bigipuser3 from 74.89.19.182 port 46082 Jan 21 02:29:42 host sshd[30485]: input_userauth_request: invalid user bigipuser3 [preauth] Jan 21 02:29:42 host sshd[30485]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:29:42 host sshd[30485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.89.19.182 Jan 21 02:29:44 host sshd[30485]: Failed password for invalid user bigipuser3 from 74.89.19.182 port 46082 ssh2 Jan 21 02:29:45 host sshd[30485]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Jan 21 02:29:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Jan 21 02:29:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Jan 21 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 21 02:29:46 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 21 02:29:46 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 21 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Jan 21 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 02:29:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 02:29:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 21 02:29:46 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 21 02:29:46 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 21 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Jan 21 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:47 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:47 host sshd[30485]: Failed password for invalid user bigipuser3 from 74.89.19.182 port 46082 ssh2 Jan 21 02:29:48 host sshd[30485]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:29:49 host sshd[30485]: Failed password for invalid user bigipuser3 from 74.89.19.182 port 46082 ssh2 Jan 21 02:29:50 host sshd[30485]: Failed password for invalid user bigipuser3 from 74.89.19.182 port 46082 ssh2 Jan 21 02:29:50 host sshd[30485]: Connection closed by 74.89.19.182 port 46082 [preauth] Jan 21 02:29:50 host sshd[30485]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.89.19.182 Jan 21 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 21 02:29:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 21 02:29:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 21 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Jan 21 02:29:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Jan 21 02:29:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:29:56 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Jan 21 02:29:56 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:29:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:30:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Jan 21 02:30:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:30:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:30:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Jan 21 02:30:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:30:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 21 02:30:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 21 02:30:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 21 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Jan 21 02:30:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:30:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:30:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Jan 21 02:30:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:30:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:30:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Jan 21 02:30:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:30:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:30:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Jan 21 02:30:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:30:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:30:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 21 02:30:31 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 21 02:30:31 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 21 02:30:37 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Jan 21 02:30:37 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:30:38 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:30:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 21 02:30:47 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 21 02:30:47 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 21 02:30:54 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Jan 21 02:30:54 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:30:54 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Jan 21 02:30:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:30:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:30:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Jan 21 02:30:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:30:58 host sshd[31830]: Invalid user Admin from 61.57.145.23 port 45185 Jan 21 02:30:58 host sshd[31830]: input_userauth_request: invalid user Admin [preauth] Jan 21 02:30:58 host sshd[31830]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:30:58 host sshd[31830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.57.145.23 Jan 21 02:30:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Jan 21 02:30:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:30:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 21 02:30:59 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 02:30:59 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 02:30:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Jan 21 02:30:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:30:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:31:00 host sshd[31830]: Failed password for invalid user Admin from 61.57.145.23 port 45185 ssh2 Jan 21 02:31:02 host sshd[31830]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:31:04 host sshd[31830]: Failed password for invalid user Admin from 61.57.145.23 port 45185 ssh2 Jan 21 02:31:05 host sshd[31830]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:31:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 21 02:31:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 02:31:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 02:31:07 host sshd[31830]: Failed password for invalid user Admin from 61.57.145.23 port 45185 ssh2 Jan 21 02:31:08 host sshd[31830]: Connection reset by 61.57.145.23 port 45185 [preauth] Jan 21 02:31:08 host sshd[31830]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.57.145.23 Jan 21 02:31:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Jan 21 02:31:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:31:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:31:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 21 02:31:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 02:31:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Jan 21 02:31:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:31:27 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Jan 21 02:31:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:31:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Jan 21 02:31:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:31:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Jan 21 02:31:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:31:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 21 02:31:31 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 21 02:31:31 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 21 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Jan 21 02:31:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:31:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:31:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Jan 21 02:31:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:31:32 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 21 02:31:45 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 21 02:31:45 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 21 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Jan 21 02:31:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:31:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:31:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Jan 21 02:31:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:31:47 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:31:47 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Jan 21 02:31:47 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:31:47 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Jan 21 02:31:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:00 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Jan 21 02:32:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 21 02:32:11 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 21 02:32:11 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 21 02:32:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Jan 21 02:32:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Jan 21 02:32:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Jan 21 02:32:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Jan 21 02:32:19 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:19 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwpmcresource WpToolkitNotification send_admin_auto_updates_notification available_updates_text= available_updates_list= installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): Jan 21 02:32:22 host sudo: wp-toolkit : (command continued) require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012[error]FailedToExecuteWpCliCommand: Jan 21 02:32:22 host sudo: wp-toolkit : (command continued) exit status 1[/error]#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status Jan 21 02:32:22 host sudo: wp-toolkit : (command continued) 1[/error]#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: [error]FailedToExecuteWpCliCommand: chdir /home/woodpeck/public_html/wp: no such file or directory[/error]#012<br/><br/>' --output=json Jan 21 02:32:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:29 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:29 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:30 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:30 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 21 02:32:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 02:32:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 02:33:39 host sshd[1089]: Invalid user cuser from 43.153.65.72 port 46094 Jan 21 02:33:39 host sshd[1089]: input_userauth_request: invalid user cuser [preauth] Jan 21 02:33:39 host sshd[1089]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:33:39 host sshd[1089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.65.72 Jan 21 02:33:42 host sshd[1089]: Failed password for invalid user cuser from 43.153.65.72 port 46094 ssh2 Jan 21 02:33:42 host sshd[1089]: Received disconnect from 43.153.65.72 port 46094:11: Bye Bye [preauth] Jan 21 02:33:42 host sshd[1089]: Disconnected from 43.153.65.72 port 46094 [preauth] Jan 21 02:33:46 host sshd[1098]: Invalid user nginx from 114.33.75.166 port 54002 Jan 21 02:33:46 host sshd[1098]: input_userauth_request: invalid user nginx [preauth] Jan 21 02:33:46 host sshd[1098]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:33:46 host sshd[1098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.75.166 Jan 21 02:33:48 host sshd[1098]: Failed password for invalid user nginx from 114.33.75.166 port 54002 ssh2 Jan 21 02:33:48 host sshd[1098]: Connection reset by 114.33.75.166 port 54002 [preauth] Jan 21 02:34:16 host sshd[1142]: Connection closed by 198.199.102.221 port 36520 [preauth] Jan 21 02:36:43 host sshd[1454]: invalid public DH value: >= p-1 [preauth] Jan 21 02:36:43 host sshd[1454]: ssh_dispatch_run_fatal: Connection from 61.238.242.222 port 43007: incomplete message [preauth] Jan 21 02:37:26 host sshd[1630]: User mysql from 62.233.50.248 not allowed because not listed in AllowUsers Jan 21 02:37:26 host sshd[1630]: input_userauth_request: invalid user mysql [preauth] Jan 21 02:37:26 host unix_chkpwd[1633]: password check failed for user (mysql) Jan 21 02:37:26 host sshd[1630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 user=mysql Jan 21 02:37:26 host sshd[1630]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 21 02:37:28 host sshd[1630]: Failed password for invalid user mysql from 62.233.50.248 port 31976 ssh2 Jan 21 02:37:28 host sshd[1630]: Received disconnect from 62.233.50.248 port 31976:11: Client disconnecting normally [preauth] Jan 21 02:37:28 host sshd[1630]: Disconnected from 62.233.50.248 port 31976 [preauth] Jan 21 02:40:17 host sshd[2004]: Invalid user ubuntuftp from 43.153.65.72 port 41100 Jan 21 02:40:17 host sshd[2004]: input_userauth_request: invalid user ubuntuftp [preauth] Jan 21 02:40:17 host sshd[2004]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:40:17 host sshd[2004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.65.72 Jan 21 02:40:18 host sshd[2004]: Failed password for invalid user ubuntuftp from 43.153.65.72 port 41100 ssh2 Jan 21 02:40:19 host sshd[2004]: Received disconnect from 43.153.65.72 port 41100:11: Bye Bye [preauth] Jan 21 02:40:19 host sshd[2004]: Disconnected from 43.153.65.72 port 41100 [preauth] Jan 21 02:41:48 host sshd[2190]: Invalid user web-user from 43.153.65.72 port 39450 Jan 21 02:41:48 host sshd[2190]: input_userauth_request: invalid user web-user [preauth] Jan 21 02:41:48 host sshd[2190]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:41:48 host sshd[2190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.65.72 Jan 21 02:41:50 host sshd[2190]: Failed password for invalid user web-user from 43.153.65.72 port 39450 ssh2 Jan 21 02:41:51 host sshd[2190]: Received disconnect from 43.153.65.72 port 39450:11: Bye Bye [preauth] Jan 21 02:41:51 host sshd[2190]: Disconnected from 43.153.65.72 port 39450 [preauth] Jan 21 02:47:11 host sshd[3004]: Did not receive identification string from 198.23.174.250 port 40298 Jan 21 02:49:14 host sshd[3243]: User root from 1.34.76.249 not allowed because not listed in AllowUsers Jan 21 02:49:14 host sshd[3243]: input_userauth_request: invalid user root [preauth] Jan 21 02:49:14 host unix_chkpwd[3252]: password check failed for user (root) Jan 21 02:49:14 host sshd[3243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.76.249 user=root Jan 21 02:49:14 host sshd[3243]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 02:49:17 host sshd[3243]: Failed password for invalid user root from 1.34.76.249 port 53645 ssh2 Jan 21 02:49:18 host sshd[3243]: Connection reset by 1.34.76.249 port 53645 [preauth] Jan 21 02:49:56 host sshd[3317]: Invalid user magento from 68.183.56.198 port 39146 Jan 21 02:49:56 host sshd[3317]: input_userauth_request: invalid user magento [preauth] Jan 21 02:49:56 host sshd[3317]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:49:56 host sshd[3317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.56.198 Jan 21 02:49:59 host sshd[3317]: Failed password for invalid user magento from 68.183.56.198 port 39146 ssh2 Jan 21 02:49:59 host sshd[3317]: Received disconnect from 68.183.56.198 port 39146:11: Bye Bye [preauth] Jan 21 02:49:59 host sshd[3317]: Disconnected from 68.183.56.198 port 39146 [preauth] Jan 21 02:50:38 host sshd[3548]: User ftp from 59.126.192.53 not allowed because not listed in AllowUsers Jan 21 02:50:38 host sshd[3548]: input_userauth_request: invalid user ftp [preauth] Jan 21 02:50:38 host unix_chkpwd[3553]: password check failed for user (ftp) Jan 21 02:50:38 host sshd[3548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.192.53 user=ftp Jan 21 02:50:38 host sshd[3548]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 21 02:50:40 host sshd[3548]: Failed password for invalid user ftp from 59.126.192.53 port 35905 ssh2 Jan 21 02:50:40 host sshd[3548]: Connection reset by 59.126.192.53 port 35905 [preauth] Jan 21 02:52:21 host sshd[3771]: User nobody from 43.243.165.203 not allowed because not listed in AllowUsers Jan 21 02:52:21 host sshd[3771]: input_userauth_request: invalid user nobody [preauth] Jan 21 02:52:21 host unix_chkpwd[3774]: password check failed for user (nobody) Jan 21 02:52:21 host sshd[3771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.165.203 user=nobody Jan 21 02:52:21 host sshd[3771]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "nobody" Jan 21 02:52:23 host sshd[3771]: Failed password for invalid user nobody from 43.243.165.203 port 58978 ssh2 Jan 21 02:52:23 host sshd[3771]: Received disconnect from 43.243.165.203 port 58978:11: Bye Bye [preauth] Jan 21 02:52:23 host sshd[3771]: Disconnected from 43.243.165.203 port 58978 [preauth] Jan 21 02:52:26 host sshd[3778]: Invalid user ark from 58.27.95.2 port 55208 Jan 21 02:52:26 host sshd[3778]: input_userauth_request: invalid user ark [preauth] Jan 21 02:52:26 host sshd[3778]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:52:26 host sshd[3778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.27.95.2 Jan 21 02:52:27 host sshd[3778]: Failed password for invalid user ark from 58.27.95.2 port 55208 ssh2 Jan 21 02:52:28 host sshd[3778]: Received disconnect from 58.27.95.2 port 55208:11: Bye Bye [preauth] Jan 21 02:52:28 host sshd[3778]: Disconnected from 58.27.95.2 port 55208 [preauth] Jan 21 02:53:54 host sshd[3924]: Invalid user docker from 189.18.12.201 port 55966 Jan 21 02:53:54 host sshd[3924]: input_userauth_request: invalid user docker [preauth] Jan 21 02:53:54 host sshd[3924]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:53:54 host sshd[3924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.18.12.201 Jan 21 02:53:56 host sshd[3924]: Failed password for invalid user docker from 189.18.12.201 port 55966 ssh2 Jan 21 02:53:59 host sshd[3924]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:54:01 host sshd[3924]: Failed password for invalid user docker from 189.18.12.201 port 55966 ssh2 Jan 21 02:54:04 host sshd[3924]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:54:06 host sshd[3924]: Failed password for invalid user docker from 189.18.12.201 port 55966 ssh2 Jan 21 02:54:07 host sshd[3924]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:54:09 host sshd[3924]: Failed password for invalid user docker from 189.18.12.201 port 55966 ssh2 Jan 21 02:54:10 host sshd[3924]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:54:13 host sshd[3924]: Failed password for invalid user docker from 189.18.12.201 port 55966 ssh2 Jan 21 02:54:35 host sshd[4046]: Invalid user tempuser from 68.183.56.198 port 34160 Jan 21 02:54:35 host sshd[4046]: input_userauth_request: invalid user tempuser [preauth] Jan 21 02:54:35 host sshd[4046]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:54:35 host sshd[4046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.56.198 Jan 21 02:54:37 host sshd[4046]: Failed password for invalid user tempuser from 68.183.56.198 port 34160 ssh2 Jan 21 02:54:37 host sshd[4046]: Received disconnect from 68.183.56.198 port 34160:11: Bye Bye [preauth] Jan 21 02:54:37 host sshd[4046]: Disconnected from 68.183.56.198 port 34160 [preauth] Jan 21 02:54:40 host sshd[4051]: Invalid user deployer from 41.138.60.187 port 60918 Jan 21 02:54:40 host sshd[4051]: input_userauth_request: invalid user deployer [preauth] Jan 21 02:54:40 host sshd[4051]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:54:40 host sshd[4051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.138.60.187 Jan 21 02:54:41 host sshd[4064]: Invalid user testupload from 43.243.165.203 port 36968 Jan 21 02:54:41 host sshd[4064]: input_userauth_request: invalid user testupload [preauth] Jan 21 02:54:41 host sshd[4064]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:54:41 host sshd[4064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.165.203 Jan 21 02:54:42 host sshd[4051]: Failed password for invalid user deployer from 41.138.60.187 port 60918 ssh2 Jan 21 02:54:42 host sshd[4051]: Received disconnect from 41.138.60.187 port 60918:11: Bye Bye [preauth] Jan 21 02:54:42 host sshd[4051]: Disconnected from 41.138.60.187 port 60918 [preauth] Jan 21 02:54:43 host sshd[4064]: Failed password for invalid user testupload from 43.243.165.203 port 36968 ssh2 Jan 21 02:54:43 host sshd[4064]: Received disconnect from 43.243.165.203 port 36968:11: Bye Bye [preauth] Jan 21 02:54:43 host sshd[4064]: Disconnected from 43.243.165.203 port 36968 [preauth] Jan 21 02:54:47 host sshd[4073]: Invalid user devops from 186.96.156.73 port 46506 Jan 21 02:54:47 host sshd[4073]: input_userauth_request: invalid user devops [preauth] Jan 21 02:54:47 host sshd[4073]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:54:47 host sshd[4073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.96.156.73 Jan 21 02:54:48 host sshd[4073]: Failed password for invalid user devops from 186.96.156.73 port 46506 ssh2 Jan 21 02:54:48 host sshd[4073]: Received disconnect from 186.96.156.73 port 46506:11: Bye Bye [preauth] Jan 21 02:54:48 host sshd[4073]: Disconnected from 186.96.156.73 port 46506 [preauth] Jan 21 02:54:55 host sshd[4113]: User centos from 58.27.95.2 not allowed because not listed in AllowUsers Jan 21 02:54:55 host sshd[4113]: input_userauth_request: invalid user centos [preauth] Jan 21 02:54:55 host unix_chkpwd[4115]: password check failed for user (centos) Jan 21 02:54:55 host sshd[4113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.27.95.2 user=centos Jan 21 02:54:57 host sshd[4113]: Failed password for invalid user centos from 58.27.95.2 port 52006 ssh2 Jan 21 02:54:57 host sshd[4113]: Received disconnect from 58.27.95.2 port 52006:11: Bye Bye [preauth] Jan 21 02:54:57 host sshd[4113]: Disconnected from 58.27.95.2 port 52006 [preauth] Jan 21 02:55:42 host sshd[4353]: Invalid user testdummy from 68.183.56.198 port 33064 Jan 21 02:55:42 host sshd[4353]: input_userauth_request: invalid user testdummy [preauth] Jan 21 02:55:42 host sshd[4353]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:55:42 host sshd[4353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.56.198 Jan 21 02:55:45 host sshd[4353]: Failed password for invalid user testdummy from 68.183.56.198 port 33064 ssh2 Jan 21 02:56:17 host sshd[4447]: Invalid user ssh-user from 41.138.60.187 port 46272 Jan 21 02:56:17 host sshd[4447]: input_userauth_request: invalid user ssh-user [preauth] Jan 21 02:56:17 host sshd[4447]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:56:17 host sshd[4447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.138.60.187 Jan 21 02:56:19 host sshd[4447]: Failed password for invalid user ssh-user from 41.138.60.187 port 46272 ssh2 Jan 21 02:56:19 host sshd[4447]: Received disconnect from 41.138.60.187 port 46272:11: Bye Bye [preauth] Jan 21 02:56:19 host sshd[4447]: Disconnected from 41.138.60.187 port 46272 [preauth] Jan 21 02:56:22 host sshd[4453]: Invalid user deployer from 186.96.156.73 port 46876 Jan 21 02:56:22 host sshd[4453]: input_userauth_request: invalid user deployer [preauth] Jan 21 02:56:22 host sshd[4453]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:56:22 host sshd[4453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.96.156.73 Jan 21 02:56:24 host sshd[4453]: Failed password for invalid user deployer from 186.96.156.73 port 46876 ssh2 Jan 21 02:56:25 host sshd[4453]: Received disconnect from 186.96.156.73 port 46876:11: Bye Bye [preauth] Jan 21 02:56:25 host sshd[4453]: Disconnected from 186.96.156.73 port 46876 [preauth] Jan 21 02:57:44 host sshd[4601]: Invalid user eyftpuser from 186.96.156.73 port 46024 Jan 21 02:57:44 host sshd[4601]: input_userauth_request: invalid user eyftpuser [preauth] Jan 21 02:57:45 host sshd[4601]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:57:45 host sshd[4601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.96.156.73 Jan 21 02:57:47 host sshd[4601]: Failed password for invalid user eyftpuser from 186.96.156.73 port 46024 ssh2 Jan 21 02:57:47 host sshd[4601]: Received disconnect from 186.96.156.73 port 46024:11: Bye Bye [preauth] Jan 21 02:57:47 host sshd[4601]: Disconnected from 186.96.156.73 port 46024 [preauth] Jan 21 02:57:48 host sshd[4606]: Invalid user mark from 41.138.60.187 port 52456 Jan 21 02:57:48 host sshd[4606]: input_userauth_request: invalid user mark [preauth] Jan 21 02:57:48 host sshd[4606]: pam_unix(sshd:auth): check pass; user unknown Jan 21 02:57:48 host sshd[4606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.138.60.187 Jan 21 02:57:49 host sshd[4606]: Failed password for invalid user mark from 41.138.60.187 port 52456 ssh2 Jan 21 02:57:49 host sshd[4606]: Received disconnect from 41.138.60.187 port 52456:11: Bye Bye [preauth] Jan 21 02:57:49 host sshd[4606]: Disconnected from 41.138.60.187 port 52456 [preauth] Jan 21 03:05:57 host sshd[5885]: Invalid user digitalizacion from 103.212.211.133 port 44126 Jan 21 03:05:57 host sshd[5885]: input_userauth_request: invalid user digitalizacion [preauth] Jan 21 03:05:57 host sshd[5885]: pam_unix(sshd:auth): check pass; user unknown Jan 21 03:05:57 host sshd[5885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.212.211.133 Jan 21 03:05:59 host sshd[5885]: Failed password for invalid user digitalizacion from 103.212.211.133 port 44126 ssh2 Jan 21 03:06:00 host sshd[5885]: Received disconnect from 103.212.211.133 port 44126:11: Bye Bye [preauth] Jan 21 03:06:00 host sshd[5885]: Disconnected from 103.212.211.133 port 44126 [preauth] Jan 21 03:06:25 host sshd[5955]: Invalid user admin from 175.205.33.61 port 60099 Jan 21 03:06:25 host sshd[5955]: input_userauth_request: invalid user admin [preauth] Jan 21 03:06:25 host sshd[5955]: pam_unix(sshd:auth): check pass; user unknown Jan 21 03:06:25 host sshd[5955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.205.33.61 Jan 21 03:06:27 host sshd[5955]: Failed password for invalid user admin from 175.205.33.61 port 60099 ssh2 Jan 21 03:06:28 host sshd[5955]: Failed password for invalid user admin from 175.205.33.61 port 60099 ssh2 Jan 21 03:06:28 host sshd[5955]: pam_unix(sshd:auth): check pass; user unknown Jan 21 03:06:30 host sshd[5955]: Failed password for invalid user admin from 175.205.33.61 port 60099 ssh2 Jan 21 03:06:31 host sshd[5955]: pam_unix(sshd:auth): check pass; user unknown Jan 21 03:06:33 host sshd[5955]: Failed password for invalid user admin from 175.205.33.61 port 60099 ssh2 Jan 21 03:06:33 host sshd[5955]: pam_unix(sshd:auth): check pass; user unknown Jan 21 03:06:35 host sshd[5955]: Failed password for invalid user admin from 175.205.33.61 port 60099 ssh2 Jan 21 03:09:31 host sshd[6403]: Invalid user pi from 14.50.121.131 port 57141 Jan 21 03:09:31 host sshd[6403]: input_userauth_request: invalid user pi [preauth] Jan 21 03:09:31 host sshd[6403]: pam_unix(sshd:auth): check pass; user unknown Jan 21 03:09:31 host sshd[6403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.50.121.131 Jan 21 03:09:33 host sshd[6403]: Failed password for invalid user pi from 14.50.121.131 port 57141 ssh2 Jan 21 03:09:35 host sshd[6403]: pam_unix(sshd:auth): check pass; user unknown Jan 21 03:09:37 host sshd[6403]: Failed password for invalid user pi from 14.50.121.131 port 57141 ssh2 Jan 21 03:09:38 host sshd[6403]: pam_unix(sshd:auth): check pass; user unknown Jan 21 03:09:40 host sshd[6403]: Failed password for invalid user pi from 14.50.121.131 port 57141 ssh2 Jan 21 03:09:49 host sshd[6431]: Invalid user celery from 103.212.211.133 port 47410 Jan 21 03:09:49 host sshd[6431]: input_userauth_request: invalid user celery [preauth] Jan 21 03:09:49 host sshd[6431]: pam_unix(sshd:auth): check pass; user unknown Jan 21 03:09:49 host sshd[6431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.212.211.133 Jan 21 03:09:51 host sshd[6431]: Failed password for invalid user celery from 103.212.211.133 port 47410 ssh2 Jan 21 03:09:51 host sshd[6431]: Received disconnect from 103.212.211.133 port 47410:11: Bye Bye [preauth] Jan 21 03:09:51 host sshd[6431]: Disconnected from 103.212.211.133 port 47410 [preauth] Jan 21 03:10:12 host sshd[6484]: Invalid user celery from 43.156.7.128 port 37246 Jan 21 03:10:12 host sshd[6484]: input_userauth_request: invalid user celery [preauth] Jan 21 03:10:12 host sshd[6484]: pam_unix(sshd:auth): check pass; user unknown Jan 21 03:10:12 host sshd[6484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.7.128 Jan 21 03:10:15 host sshd[6484]: Failed password for invalid user celery from 43.156.7.128 port 37246 ssh2 Jan 21 03:10:15 host sshd[6484]: Received disconnect from 43.156.7.128 port 37246:11: Bye Bye [preauth] Jan 21 03:10:15 host sshd[6484]: Disconnected from 43.156.7.128 port 37246 [preauth] Jan 21 03:11:05 host sshd[6702]: Invalid user adminuser from 103.212.211.133 port 37408 Jan 21 03:11:05 host sshd[6702]: input_userauth_request: invalid user adminuser [preauth] Jan 21 03:11:05 host sshd[6702]: pam_unix(sshd:auth): check pass; user unknown Jan 21 03:11:05 host sshd[6702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.212.211.133 Jan 21 03:11:08 host sshd[6702]: Failed password for invalid user adminuser from 103.212.211.133 port 37408 ssh2 Jan 21 03:11:08 host sshd[6702]: Received disconnect from 103.212.211.133 port 37408:11: Bye Bye [preauth] Jan 21 03:11:08 host sshd[6702]: Disconnected from 103.212.211.133 port 37408 [preauth] Jan 21 03:11:35 host sshd[6803]: User root from 121.170.183.246 not allowed because not listed in AllowUsers Jan 21 03:11:35 host sshd[6803]: input_userauth_request: invalid user root [preauth] Jan 21 03:11:35 host unix_chkpwd[6807]: password check failed for user (root) Jan 21 03:11:35 host sshd[6803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.170.183.246 user=root Jan 21 03:11:35 host sshd[6803]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 03:11:37 host sshd[6803]: Failed password for invalid user root from 121.170.183.246 port 61546 ssh2 Jan 21 03:11:37 host unix_chkpwd[6810]: password check failed for user (root) Jan 21 03:11:37 host sshd[6803]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 03:11:38 host sshd[6803]: Failed password for invalid user root from 121.170.183.246 port 61546 ssh2 Jan 21 03:11:39 host unix_chkpwd[6815]: password check failed for user (root) Jan 21 03:11:39 host sshd[6803]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 03:11:41 host sshd[6803]: Failed password for invalid user root from 121.170.183.246 port 61546 ssh2 Jan 21 03:11:41 host unix_chkpwd[6818]: password check failed for user (root) Jan 21 03:11:41 host sshd[6803]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 03:11:43 host sshd[6803]: Failed password for invalid user root from 121.170.183.246 port 61546 ssh2 Jan 21 03:12:07 host sshd[6893]: Invalid user steam from 43.156.7.128 port 37370 Jan 21 03:12:07 host sshd[6893]: input_userauth_request: invalid user steam [preauth] Jan 21 03:12:07 host sshd[6893]: pam_unix(sshd:auth): check pass; user unknown Jan 21 03:12:07 host sshd[6893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.7.128 Jan 21 03:12:09 host sshd[6893]: Failed password for invalid user steam from 43.156.7.128 port 37370 ssh2 Jan 21 03:12:09 host sshd[6893]: Received disconnect from 43.156.7.128 port 37370:11: Bye Bye [preauth] Jan 21 03:12:09 host sshd[6893]: Disconnected from 43.156.7.128 port 37370 [preauth] Jan 21 03:13:42 host sshd[7069]: Invalid user adminuser from 43.156.7.128 port 35826 Jan 21 03:13:42 host sshd[7069]: input_userauth_request: invalid user adminuser [preauth] Jan 21 03:13:42 host sshd[7069]: pam_unix(sshd:auth): check pass; user unknown Jan 21 03:13:42 host sshd[7069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.7.128 Jan 21 03:13:44 host sshd[7069]: Failed password for invalid user adminuser from 43.156.7.128 port 35826 ssh2 Jan 21 03:13:44 host sshd[7069]: Received disconnect from 43.156.7.128 port 35826:11: Bye Bye [preauth] Jan 21 03:13:44 host sshd[7069]: Disconnected from 43.156.7.128 port 35826 [preauth] Jan 21 03:15:33 host sshd[7559]: User root from 195.226.194.142 not allowed because not listed in AllowUsers Jan 21 03:15:33 host sshd[7559]: input_userauth_request: invalid user root [preauth] Jan 21 03:15:33 host unix_chkpwd[7563]: password check failed for user (root) Jan 21 03:15:33 host sshd[7559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 user=root Jan 21 03:15:33 host sshd[7559]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 03:15:35 host sshd[7559]: Failed password for invalid user root from 195.226.194.142 port 33504 ssh2 Jan 21 03:15:35 host sshd[7559]: Received disconnect from 195.226.194.142 port 33504:11: Bye Bye [preauth] Jan 21 03:15:35 host sshd[7559]: Disconnected from 195.226.194.142 port 33504 [preauth] Jan 21 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 03:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 03:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 03:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 03:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=disposeat user-2=wwwkmaorg user-3=remysagr user-4=wwwkapin user-5=woodpeck user-6=vfmassets user-7=shalinijames user-8=wwwtestugo user-9=pmcresources user-10=bonifacegroup user-11=wwwevmhonda user-12=straightcurve user-13=wwwletsstalkfood user-14=palco123 user-15=gifterman user-16=phmetals user-17=kottayamcalldriv user-18=mrsclean user-19=wwwnexidigital user-20=wwwkaretakers user-21=cochintaxi user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=ugotscom feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 03:21:10 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 03:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 03:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-NHIVsuud9rynZAex.~ Jan 21 03:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-NHIVsuud9rynZAex.~' Jan 21 03:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-NHIVsuud9rynZAex.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 03:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 03:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 03:21:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 03:21:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 03:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 03:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 03:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 03:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 03:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 03:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 03:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 03:28:23 host sshd[9954]: User root from 219.78.122.29 not allowed because not listed in AllowUsers Jan 21 03:28:23 host sshd[9954]: input_userauth_request: invalid user root [preauth] Jan 21 03:28:23 host unix_chkpwd[9959]: password check failed for user (root) Jan 21 03:28:23 host sshd[9954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.78.122.29 user=root Jan 21 03:28:23 host sshd[9954]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 03:28:25 host sshd[9954]: Failed password for invalid user root from 219.78.122.29 port 36148 ssh2 Jan 21 03:28:25 host sshd[9954]: Received disconnect from 219.78.122.29 port 36148:11: Bye Bye [preauth] Jan 21 03:28:25 host sshd[9954]: Disconnected from 219.78.122.29 port 36148 [preauth] Jan 21 03:28:26 host sshd[9965]: Invalid user apc from 219.78.122.29 port 36243 Jan 21 03:28:26 host sshd[9965]: input_userauth_request: invalid user apc [preauth] Jan 21 03:28:26 host sshd[9965]: pam_unix(sshd:auth): check pass; user unknown Jan 21 03:28:26 host sshd[9965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.78.122.29 Jan 21 03:28:28 host sshd[9965]: Failed password for invalid user apc from 219.78.122.29 port 36243 ssh2 Jan 21 03:28:28 host sshd[9965]: Received disconnect from 219.78.122.29 port 36243:11: Bye Bye [preauth] Jan 21 03:28:28 host sshd[9965]: Disconnected from 219.78.122.29 port 36243 [preauth] Jan 21 03:28:29 host sshd[9992]: Invalid user cloudera from 219.78.122.29 port 36277 Jan 21 03:28:29 host sshd[9992]: input_userauth_request: invalid user cloudera [preauth] Jan 21 03:28:29 host sshd[9992]: pam_unix(sshd:auth): check pass; user unknown Jan 21 03:28:29 host sshd[9992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.78.122.29 Jan 21 03:28:31 host sshd[9992]: Failed password for invalid user cloudera from 219.78.122.29 port 36277 ssh2 Jan 21 03:36:13 host sshd[11582]: Invalid user ubnt from 68.111.155.156 port 45642 Jan 21 03:36:13 host sshd[11582]: input_userauth_request: invalid user ubnt [preauth] Jan 21 03:36:13 host sshd[11582]: pam_unix(sshd:auth): check pass; user unknown Jan 21 03:36:13 host sshd[11582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.111.155.156 Jan 21 03:36:15 host sshd[11582]: Failed password for invalid user ubnt from 68.111.155.156 port 45642 ssh2 Jan 21 03:36:15 host sshd[11582]: Connection reset by 68.111.155.156 port 45642 [preauth] Jan 21 03:42:01 host sshd[12780]: User root from 220.134.100.175 not allowed because not listed in AllowUsers Jan 21 03:42:01 host sshd[12780]: input_userauth_request: invalid user root [preauth] Jan 21 03:42:01 host unix_chkpwd[12814]: password check failed for user (root) Jan 21 03:42:01 host sshd[12780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.100.175 user=root Jan 21 03:42:01 host sshd[12780]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 03:42:04 host sshd[12780]: Failed password for invalid user root from 220.134.100.175 port 42706 ssh2 Jan 21 03:42:04 host sshd[12780]: Connection reset by 220.134.100.175 port 42706 [preauth] Jan 21 03:45:29 host sshd[13380]: User root from 195.226.194.142 not allowed because not listed in AllowUsers Jan 21 03:45:29 host sshd[13380]: input_userauth_request: invalid user root [preauth] Jan 21 03:45:30 host unix_chkpwd[13386]: password check failed for user (root) Jan 21 03:45:30 host sshd[13380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.142 user=root Jan 21 03:45:30 host sshd[13380]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 03:45:31 host sshd[13380]: Failed password for invalid user root from 195.226.194.142 port 61168 ssh2 Jan 21 03:45:31 host sshd[13380]: Received disconnect from 195.226.194.142 port 61168:11: Bye Bye [preauth] Jan 21 03:45:31 host sshd[13380]: Disconnected from 195.226.194.142 port 61168 [preauth] Jan 21 03:48:10 host sshd[13795]: Invalid user from 64.62.197.180 port 24085 Jan 21 03:48:10 host sshd[13795]: input_userauth_request: invalid user [preauth] Jan 21 03:48:13 host sshd[13795]: Connection closed by 64.62.197.180 port 24085 [preauth] Jan 21 03:50:50 host sshd[14144]: invalid public DH value: >= p-1 [preauth] Jan 21 03:50:50 host sshd[14144]: ssh_dispatch_run_fatal: Connection from 125.228.212.253 port 60464: incomplete message [preauth] Jan 21 04:02:34 host sshd[15738]: Invalid user spark from 186.103.146.180 port 40010 Jan 21 04:02:34 host sshd[15738]: input_userauth_request: invalid user spark [preauth] Jan 21 04:02:34 host sshd[15738]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:02:34 host sshd[15738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.103.146.180 Jan 21 04:02:35 host sshd[15738]: Failed password for invalid user spark from 186.103.146.180 port 40010 ssh2 Jan 21 04:02:36 host sshd[15738]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:02:38 host sshd[15738]: Failed password for invalid user spark from 186.103.146.180 port 40010 ssh2 Jan 21 04:02:39 host sshd[15738]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:02:41 host sshd[15738]: Failed password for invalid user spark from 186.103.146.180 port 40010 ssh2 Jan 21 04:02:43 host sshd[15738]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:02:45 host sshd[15738]: Failed password for invalid user spark from 186.103.146.180 port 40010 ssh2 Jan 21 04:02:46 host sshd[15738]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:02:47 host sshd[15738]: Failed password for invalid user spark from 186.103.146.180 port 40010 ssh2 Jan 21 04:04:15 host sshd[15960]: Invalid user ibmuser from 161.82.233.183 port 55112 Jan 21 04:04:15 host sshd[15960]: input_userauth_request: invalid user ibmuser [preauth] Jan 21 04:04:15 host sshd[15960]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:04:15 host sshd[15960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.82.233.183 Jan 21 04:04:18 host sshd[15960]: Failed password for invalid user ibmuser from 161.82.233.183 port 55112 ssh2 Jan 21 04:04:18 host sshd[15960]: Received disconnect from 161.82.233.183 port 55112:11: Bye Bye [preauth] Jan 21 04:04:18 host sshd[15960]: Disconnected from 161.82.233.183 port 55112 [preauth] Jan 21 04:07:19 host sshd[16441]: Invalid user developer from 144.217.90.5 port 44462 Jan 21 04:07:19 host sshd[16441]: input_userauth_request: invalid user developer [preauth] Jan 21 04:07:19 host sshd[16441]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:07:19 host sshd[16441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.90.5 Jan 21 04:07:21 host sshd[16441]: Failed password for invalid user developer from 144.217.90.5 port 44462 ssh2 Jan 21 04:07:21 host sshd[16441]: Received disconnect from 144.217.90.5 port 44462:11: Bye Bye [preauth] Jan 21 04:07:21 host sshd[16441]: Disconnected from 144.217.90.5 port 44462 [preauth] Jan 21 04:07:42 host sshd[16489]: Invalid user ubuntu from 195.19.97.157 port 57588 Jan 21 04:07:42 host sshd[16489]: input_userauth_request: invalid user ubuntu [preauth] Jan 21 04:07:42 host sshd[16489]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:07:42 host sshd[16489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.97.157 Jan 21 04:07:44 host sshd[16489]: Failed password for invalid user ubuntu from 195.19.97.157 port 57588 ssh2 Jan 21 04:07:44 host sshd[16489]: Received disconnect from 195.19.97.157 port 57588:11: Bye Bye [preauth] Jan 21 04:07:44 host sshd[16489]: Disconnected from 195.19.97.157 port 57588 [preauth] Jan 21 04:08:55 host sshd[16600]: Invalid user ubuntu from 159.203.10.59 port 45998 Jan 21 04:08:55 host sshd[16600]: input_userauth_request: invalid user ubuntu [preauth] Jan 21 04:08:55 host sshd[16600]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:08:55 host sshd[16600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.10.59 Jan 21 04:08:57 host sshd[16600]: Failed password for invalid user ubuntu from 159.203.10.59 port 45998 ssh2 Jan 21 04:08:57 host sshd[16600]: Received disconnect from 159.203.10.59 port 45998:11: Bye Bye [preauth] Jan 21 04:08:57 host sshd[16600]: Disconnected from 159.203.10.59 port 45998 [preauth] Jan 21 04:10:05 host sshd[16737]: Invalid user ubuntu from 144.217.90.5 port 44678 Jan 21 04:10:05 host sshd[16737]: input_userauth_request: invalid user ubuntu [preauth] Jan 21 04:10:05 host sshd[16737]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:10:05 host sshd[16737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.90.5 Jan 21 04:10:06 host sshd[16737]: Failed password for invalid user ubuntu from 144.217.90.5 port 44678 ssh2 Jan 21 04:10:07 host sshd[16737]: Received disconnect from 144.217.90.5 port 44678:11: Bye Bye [preauth] Jan 21 04:10:07 host sshd[16737]: Disconnected from 144.217.90.5 port 44678 [preauth] Jan 21 04:10:58 host sshd[16829]: Invalid user eacsaci from 144.217.90.5 port 57394 Jan 21 04:10:58 host sshd[16829]: input_userauth_request: invalid user eacsaci [preauth] Jan 21 04:10:58 host sshd[16829]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:10:58 host sshd[16829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.90.5 Jan 21 04:11:01 host sshd[16829]: Failed password for invalid user eacsaci from 144.217.90.5 port 57394 ssh2 Jan 21 04:11:06 host sshd[16989]: Invalid user toto from 161.82.233.183 port 38420 Jan 21 04:11:06 host sshd[16989]: input_userauth_request: invalid user toto [preauth] Jan 21 04:11:06 host sshd[16989]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:11:06 host sshd[16989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.82.233.183 Jan 21 04:11:08 host sshd[16989]: Failed password for invalid user toto from 161.82.233.183 port 38420 ssh2 Jan 21 04:11:08 host sshd[16989]: Received disconnect from 161.82.233.183 port 38420:11: Bye Bye [preauth] Jan 21 04:11:08 host sshd[16989]: Disconnected from 161.82.233.183 port 38420 [preauth] Jan 21 04:11:15 host sshd[17000]: Invalid user admin from 220.135.21.25 port 36468 Jan 21 04:11:15 host sshd[17000]: input_userauth_request: invalid user admin [preauth] Jan 21 04:11:15 host sshd[17000]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:11:15 host sshd[17000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.21.25 Jan 21 04:11:17 host sshd[17000]: Failed password for invalid user admin from 220.135.21.25 port 36468 ssh2 Jan 21 04:11:18 host sshd[17000]: Failed password for invalid user admin from 220.135.21.25 port 36468 ssh2 Jan 21 04:11:19 host sshd[17000]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:11:21 host sshd[17000]: Failed password for invalid user admin from 220.135.21.25 port 36468 ssh2 Jan 21 04:11:22 host sshd[17000]: Connection reset by 220.135.21.25 port 36468 [preauth] Jan 21 04:11:22 host sshd[17000]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.21.25 Jan 21 04:11:28 host sshd[17022]: Invalid user developer from 159.203.10.59 port 48512 Jan 21 04:11:28 host sshd[17022]: input_userauth_request: invalid user developer [preauth] Jan 21 04:11:28 host sshd[17022]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:11:28 host sshd[17022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.10.59 Jan 21 04:11:30 host sshd[17022]: Failed password for invalid user developer from 159.203.10.59 port 48512 ssh2 Jan 21 04:11:31 host sshd[17022]: Received disconnect from 159.203.10.59 port 48512:11: Bye Bye [preauth] Jan 21 04:11:31 host sshd[17022]: Disconnected from 159.203.10.59 port 48512 [preauth] Jan 21 04:11:43 host sshd[17069]: Invalid user test9 from 195.19.97.157 port 39844 Jan 21 04:11:43 host sshd[17069]: input_userauth_request: invalid user test9 [preauth] Jan 21 04:11:43 host sshd[17069]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:11:43 host sshd[17069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.97.157 Jan 21 04:11:45 host sshd[17069]: Failed password for invalid user test9 from 195.19.97.157 port 39844 ssh2 Jan 21 04:11:45 host sshd[17069]: Received disconnect from 195.19.97.157 port 39844:11: Bye Bye [preauth] Jan 21 04:11:45 host sshd[17069]: Disconnected from 195.19.97.157 port 39844 [preauth] Jan 21 04:12:25 host sshd[17132]: Invalid user dmdba from 161.82.233.183 port 41952 Jan 21 04:12:25 host sshd[17132]: input_userauth_request: invalid user dmdba [preauth] Jan 21 04:12:25 host sshd[17132]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:12:25 host sshd[17132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.82.233.183 Jan 21 04:12:27 host sshd[17132]: Failed password for invalid user dmdba from 161.82.233.183 port 41952 ssh2 Jan 21 04:12:42 host sshd[17200]: Invalid user shareuser from 159.203.10.59 port 55956 Jan 21 04:12:42 host sshd[17200]: input_userauth_request: invalid user shareuser [preauth] Jan 21 04:12:42 host sshd[17200]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:12:42 host sshd[17200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.10.59 Jan 21 04:12:44 host sshd[17200]: Failed password for invalid user shareuser from 159.203.10.59 port 55956 ssh2 Jan 21 04:12:44 host sshd[17200]: Received disconnect from 159.203.10.59 port 55956:11: Bye Bye [preauth] Jan 21 04:12:44 host sshd[17200]: Disconnected from 159.203.10.59 port 55956 [preauth] Jan 21 04:12:59 host sshd[17258]: Invalid user vpn from 195.19.97.157 port 34192 Jan 21 04:12:59 host sshd[17258]: input_userauth_request: invalid user vpn [preauth] Jan 21 04:12:59 host sshd[17258]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:12:59 host sshd[17258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.19.97.157 Jan 21 04:13:01 host sshd[17258]: Failed password for invalid user vpn from 195.19.97.157 port 34192 ssh2 Jan 21 04:17:49 host sshd[17809]: Invalid user hf from 194.110.203.109 port 51902 Jan 21 04:17:49 host sshd[17809]: input_userauth_request: invalid user hf [preauth] Jan 21 04:17:49 host sshd[17809]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:17:49 host sshd[17809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 04:17:51 host sshd[17809]: Failed password for invalid user hf from 194.110.203.109 port 51902 ssh2 Jan 21 04:17:54 host sshd[17809]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:17:56 host sshd[17809]: Failed password for invalid user hf from 194.110.203.109 port 51902 ssh2 Jan 21 04:18:00 host sshd[17809]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:18:01 host sshd[17809]: Failed password for invalid user hf from 194.110.203.109 port 51902 ssh2 Jan 21 04:18:04 host sshd[17809]: Connection closed by 194.110.203.109 port 51902 [preauth] Jan 21 04:18:04 host sshd[17809]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 04:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 04:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 04:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 04:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=travelboniface user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=ugotscom user-6=wwwpmcresource user-7=dartsimp user-8=a2zgroup user-9=laundryboniface user-10=wwwkaretakers user-11=cochintaxi user-12=gifterman user-13=palco123 user-14=phmetals user-15=kottayamcalldriv user-16=mrsclean user-17=wwwnexidigital user-18=bonifacegroup user-19=wwwevmhonda user-20=straightcurve user-21=wwwletsstalkfood user-22=vfmassets user-23=wwwtestugo user-24=shalinijames user-25=pmcresources user-26=wwwkmaorg user-27=disposeat user-28=remysagr user-29=woodpeck user-30=wwwkapin feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 04:21:07 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 04:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 04:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jXF5BGZ2yhHOONba.~ Jan 21 04:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jXF5BGZ2yhHOONba.~' Jan 21 04:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jXF5BGZ2yhHOONba.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 04:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 04:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 04:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 04:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 04:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 04:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 04:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 04:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 04:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 04:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 04:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 04:28:17 host sshd[19450]: Invalid user zyfwp from 211.51.73.64 port 62531 Jan 21 04:28:17 host sshd[19450]: input_userauth_request: invalid user zyfwp [preauth] Jan 21 04:28:17 host sshd[19450]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:28:17 host sshd[19450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.51.73.64 Jan 21 04:28:19 host sshd[19450]: Failed password for invalid user zyfwp from 211.51.73.64 port 62531 ssh2 Jan 21 04:28:20 host sshd[19450]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:28:21 host sshd[19450]: Failed password for invalid user zyfwp from 211.51.73.64 port 62531 ssh2 Jan 21 04:28:22 host sshd[19450]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:28:24 host sshd[19450]: Failed password for invalid user zyfwp from 211.51.73.64 port 62531 ssh2 Jan 21 04:39:20 host sshd[21065]: Invalid user postgres from 112.160.9.96 port 61568 Jan 21 04:39:20 host sshd[21065]: input_userauth_request: invalid user postgres [preauth] Jan 21 04:39:20 host sshd[21065]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:39:20 host sshd[21065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.160.9.96 Jan 21 04:39:22 host sshd[21065]: Failed password for invalid user postgres from 112.160.9.96 port 61568 ssh2 Jan 21 04:39:23 host sshd[21065]: Connection reset by 112.160.9.96 port 61568 [preauth] Jan 21 04:45:39 host sshd[22077]: Invalid user jesus from 107.189.30.59 port 50996 Jan 21 04:45:39 host sshd[22077]: input_userauth_request: invalid user jesus [preauth] Jan 21 04:45:39 host sshd[22077]: pam_unix(sshd:auth): check pass; user unknown Jan 21 04:45:39 host sshd[22077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 21 04:45:41 host sshd[22077]: Failed password for invalid user jesus from 107.189.30.59 port 50996 ssh2 Jan 21 04:45:42 host sshd[22077]: Connection closed by 107.189.30.59 port 50996 [preauth] Jan 21 04:46:52 host sshd[22243]: Bad protocol version identification '\003' from 80.66.76.59 port 28842 Jan 21 04:46:53 host sshd[22244]: Bad protocol version identification '\003' from 80.66.76.59 port 29613 Jan 21 05:01:38 host sshd[24447]: ssh_dispatch_run_fatal: Connection from 152.249.207.123 port 49790: bignum is negative [preauth] Jan 21 05:09:37 host sshd[25535]: Invalid user admin from 211.114.224.97 port 62269 Jan 21 05:09:37 host sshd[25535]: input_userauth_request: invalid user admin [preauth] Jan 21 05:09:37 host sshd[25535]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:09:37 host sshd[25535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.114.224.97 Jan 21 05:09:39 host sshd[25535]: Failed password for invalid user admin from 211.114.224.97 port 62269 ssh2 Jan 21 05:09:40 host sshd[25535]: Failed password for invalid user admin from 211.114.224.97 port 62269 ssh2 Jan 21 05:09:40 host sshd[25535]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:09:43 host sshd[25535]: Failed password for invalid user admin from 211.114.224.97 port 62269 ssh2 Jan 21 05:09:43 host sshd[25535]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:09:45 host sshd[25535]: Failed password for invalid user admin from 211.114.224.97 port 62269 ssh2 Jan 21 05:09:46 host sshd[25535]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:09:49 host sshd[25535]: Failed password for invalid user admin from 211.114.224.97 port 62269 ssh2 Jan 21 05:14:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 05:14:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:14:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:14:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 05:14:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:14:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:14:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 05:14:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:14:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:14:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 05:14:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:14:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:14:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 05:14:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:14:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:14:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 05:14:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:14:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:14:01 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 05:14:01 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:14:01 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 05:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 05:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 05:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 05:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 05:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 05:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=shalinijames user-3=wwwtestugo user-4=pmcresources user-5=disposeat user-6=wwwkmaorg user-7=remysagr user-8=woodpeck user-9=wwwkapin user-10=palco123 user-11=gifterman user-12=kottayamcalldriv user-13=phmetals user-14=wwwnexidigital user-15=mrsclean user-16=bonifacegroup user-17=wwwevmhonda user-18=straightcurve user-19=wwwletsstalkfood user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=keralaholi user-27=wwwresourcehunte user-28=wwwrmswll user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 05:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 05:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 05:21:05 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 05:21:05 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=evmhonda.com --output=json Jan 21 05:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/test -e /home/wwwevmhonda/wordpress-backups Jan 21 05:21:05 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 21 05:21:05 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 21 05:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=letsstalkfood.com --output=json Jan 21 05:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/test -e /home/wwwletsstalkfood/wordpress-backups Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 21 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=mrsclean.co.in --output=json Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 21 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/test -e /home/mrsclean/wordpress-backups Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 21 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=shalinijames.com --output=json Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/test -e /home/shalinijames/wordpress-backups Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 21 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=testugo.in --output=json Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 21 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 21 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/test -e /home/wwwtestugo/wordpress-backups Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 21 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=ugotechnologies.com --output=json Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 05:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 05:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/test -e /home/ugotscom/wordpress-backups Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=woodpeckerindia.com --output=json Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/test -e /home/woodpeck/wordpress-backups Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=panlys.com --output=json Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/test -e /home/palco123/wordpress-backups Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 domainuserdata domain=resourcehunters.com --output=json Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/test -e /home/wwwresourcehunte/wordpress-backups Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /var/cpanel/licenseid_credentials.json Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=vfmassets ; COMMAND=/bin/cat /home/vfmassets/.wp-toolkit-identifier Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user vfmassets by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user vfmassets Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/cat /home/shalinijames/.wp-toolkit-identifier Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/cat /home/wwwtestugo/.wp-toolkit-identifier Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=pmcresources ; COMMAND=/bin/cat /home/pmcresources/.wp-toolkit-identifier Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user pmcresources by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user pmcresources Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=disposeat ; COMMAND=/bin/cat /home/disposeat/.wp-toolkit-identifier Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user disposeat by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user disposeat Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkmaorg ; COMMAND=/bin/cat /home/wwwkmaorg/.wp-toolkit-identifier Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwkmaorg by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwkmaorg Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=remysagr ; COMMAND=/bin/cat /home/remysagr/.wp-toolkit-identifier Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user remysagr by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user remysagr Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/cat /home/woodpeck/.wp-toolkit-identifier Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkapin ; COMMAND=/bin/cat /home/wwwkapin/.wp-toolkit-identifier Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user wwwkapin by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user wwwkapin Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/cat /home/palco123/.wp-toolkit-identifier Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 21 05:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=gifterman ; COMMAND=/bin/cat /home/gifterman/.wp-toolkit-identifier Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session opened for user gifterman by (uid=0) Jan 21 05:21:07 host sudo: pam_unix(sudo:session): session closed for user gifterman Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=kottayamcalldriv ; COMMAND=/bin/cat /home/kottayamcalldriv/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user kottayamcalldriv by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user kottayamcalldriv Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=phmetals ; COMMAND=/bin/cat /home/phmetals/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user phmetals by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user phmetals Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwnexidigital ; COMMAND=/bin/cat /home/wwwnexidigital/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwnexidigital by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwnexidigital Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/cat /home/mrsclean/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=bonifacegroup ; COMMAND=/bin/cat /home/bonifacegroup/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user bonifacegroup by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user bonifacegroup Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/cat /home/wwwevmhonda/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=straightcurve ; COMMAND=/bin/cat /home/straightcurve/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user straightcurve by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user straightcurve Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/cat /home/wwwletsstalkfood/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=a2zgroup ; COMMAND=/bin/cat /home/a2zgroup/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user a2zgroup by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user a2zgroup Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=dartsimp ; COMMAND=/bin/cat /home/dartsimp/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user dartsimp by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user dartsimp Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=laundryboniface ; COMMAND=/bin/cat /home/laundryboniface/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user laundryboniface by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user laundryboniface Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwkaretakers ; COMMAND=/bin/cat /home/wwwkaretakers/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwkaretakers by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwkaretakers Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=cochintaxi ; COMMAND=/bin/cat /home/cochintaxi/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user cochintaxi by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user cochintaxi Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=travelboniface ; COMMAND=/bin/cat /home/travelboniface/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user travelboniface by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user travelboniface Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-Kgb6IfTRCyEWwGEb.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-Kgb6IfTRCyEWwGEb.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/cat /home/wwwresourcehunte/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwrmswll ; COMMAND=/bin/cat /home/wwwrmswll/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwrmswll by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwrmswll Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwpmcresource ; COMMAND=/bin/cat /home/wwwpmcresource/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user wwwpmcresource by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user wwwpmcresource Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/cat /home/keralaholi/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -f /home/keralaholi/.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/test -e /home/keralaholi/-wpt-tmp-Ux3kd1tgJ6rVoQy8.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 21 05:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=keralaholi ; COMMAND=/bin/sh -c cat > /home/keralaholi/-wpt-tmp-Ux3kd1tgJ6rVoQy8.wp-toolkit-identifier Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session opened for user keralaholi by (uid=0) Jan 21 05:21:08 host sudo: pam_unix(sudo:session): session closed for user keralaholi Jan 21 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_shared_ip --output=json Jan 21 05:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_public_ip ip=167.71.234.10 --output=json Jan 21 05:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jUPM2Dhyn1qVtJ0B.~ Jan 21 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jUPM2Dhyn1qVtJ0B.~' Jan 21 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jUPM2Dhyn1qVtJ0B.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 05:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 05:21:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:21:14 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 05:21:14 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 05:21:14 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 05:30:05 host sshd[29517]: Invalid user postgresql from 188.166.102.71 port 55986 Jan 21 05:30:05 host sshd[29517]: input_userauth_request: invalid user postgresql [preauth] Jan 21 05:30:05 host sshd[29517]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:30:05 host sshd[29517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.102.71 Jan 21 05:30:07 host sshd[29517]: Failed password for invalid user postgresql from 188.166.102.71 port 55986 ssh2 Jan 21 05:30:07 host sshd[29517]: Received disconnect from 188.166.102.71 port 55986:11: Bye Bye [preauth] Jan 21 05:30:07 host sshd[29517]: Disconnected from 188.166.102.71 port 55986 [preauth] Jan 21 05:31:11 host sshd[29780]: Invalid user system from 139.59.255.59 port 40530 Jan 21 05:31:11 host sshd[29780]: input_userauth_request: invalid user system [preauth] Jan 21 05:31:11 host sshd[29780]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:31:11 host sshd[29780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.255.59 Jan 21 05:31:12 host sshd[29780]: Failed password for invalid user system from 139.59.255.59 port 40530 ssh2 Jan 21 05:31:12 host sshd[29780]: Received disconnect from 139.59.255.59 port 40530:11: Bye Bye [preauth] Jan 21 05:31:12 host sshd[29780]: Disconnected from 139.59.255.59 port 40530 [preauth] Jan 21 05:31:18 host sshd[29787]: Invalid user test1 from 201.17.131.43 port 56339 Jan 21 05:31:18 host sshd[29787]: input_userauth_request: invalid user test1 [preauth] Jan 21 05:31:18 host sshd[29787]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:31:18 host sshd[29787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.131.43 Jan 21 05:31:19 host sshd[29787]: Failed password for invalid user test1 from 201.17.131.43 port 56339 ssh2 Jan 21 05:31:20 host sshd[29787]: Received disconnect from 201.17.131.43 port 56339:11: Bye Bye [preauth] Jan 21 05:31:20 host sshd[29787]: Disconnected from 201.17.131.43 port 56339 [preauth] Jan 21 05:31:45 host sshd[29854]: Invalid user user from 43.153.63.151 port 50768 Jan 21 05:31:45 host sshd[29854]: input_userauth_request: invalid user user [preauth] Jan 21 05:31:45 host sshd[29854]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:31:45 host sshd[29854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.63.151 Jan 21 05:31:48 host sshd[29854]: Failed password for invalid user user from 43.153.63.151 port 50768 ssh2 Jan 21 05:31:48 host sshd[29854]: Received disconnect from 43.153.63.151 port 50768:11: Bye Bye [preauth] Jan 21 05:31:48 host sshd[29854]: Disconnected from 43.153.63.151 port 50768 [preauth] Jan 21 05:31:55 host sshd[29863]: Invalid user Test from 164.77.119.34 port 21355 Jan 21 05:31:55 host sshd[29863]: input_userauth_request: invalid user Test [preauth] Jan 21 05:31:55 host sshd[29863]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:31:55 host sshd[29863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.119.34 Jan 21 05:31:56 host sshd[29863]: Failed password for invalid user Test from 164.77.119.34 port 21355 ssh2 Jan 21 05:31:57 host sshd[29863]: Received disconnect from 164.77.119.34 port 21355:11: Bye Bye [preauth] Jan 21 05:31:57 host sshd[29863]: Disconnected from 164.77.119.34 port 21355 [preauth] Jan 21 05:32:56 host sshd[29993]: User sshd from 194.169.175.102 not allowed because not listed in AllowUsers Jan 21 05:32:56 host sshd[29993]: input_userauth_request: invalid user sshd [preauth] Jan 21 05:32:56 host unix_chkpwd[29996]: password check failed for user (sshd) Jan 21 05:32:56 host sshd[29993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=sshd Jan 21 05:32:56 host sshd[29993]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sshd" Jan 21 05:32:58 host sshd[29993]: Failed password for invalid user sshd from 194.169.175.102 port 49349 ssh2 Jan 21 05:32:58 host sshd[29993]: Received disconnect from 194.169.175.102 port 49349:11: Client disconnecting normally [preauth] Jan 21 05:32:58 host sshd[29993]: Disconnected from 194.169.175.102 port 49349 [preauth] Jan 21 05:33:07 host sshd[30021]: Invalid user nexus from 51.158.175.97 port 57594 Jan 21 05:33:07 host sshd[30021]: input_userauth_request: invalid user nexus [preauth] Jan 21 05:33:07 host sshd[30021]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:33:07 host sshd[30021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.175.97 Jan 21 05:33:09 host sshd[30021]: Failed password for invalid user nexus from 51.158.175.97 port 57594 ssh2 Jan 21 05:33:09 host sshd[30021]: Received disconnect from 51.158.175.97 port 57594:11: Bye Bye [preauth] Jan 21 05:33:09 host sshd[30021]: Disconnected from 51.158.175.97 port 57594 [preauth] Jan 21 05:35:58 host sshd[30545]: Invalid user ftpadmin from 188.166.102.71 port 35490 Jan 21 05:35:58 host sshd[30545]: input_userauth_request: invalid user ftpadmin [preauth] Jan 21 05:35:58 host sshd[30545]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:35:58 host sshd[30545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.102.71 Jan 21 05:36:00 host sshd[30545]: Failed password for invalid user ftpadmin from 188.166.102.71 port 35490 ssh2 Jan 21 05:36:00 host sshd[30545]: Received disconnect from 188.166.102.71 port 35490:11: Bye Bye [preauth] Jan 21 05:36:00 host sshd[30545]: Disconnected from 188.166.102.71 port 35490 [preauth] Jan 21 05:36:22 host sshd[30661]: Invalid user User from 51.83.72.156 port 38806 Jan 21 05:36:22 host sshd[30661]: input_userauth_request: invalid user User [preauth] Jan 21 05:36:22 host sshd[30661]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:36:22 host sshd[30661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.72.156 Jan 21 05:36:24 host sshd[30661]: Failed password for invalid user User from 51.83.72.156 port 38806 ssh2 Jan 21 05:36:24 host sshd[30661]: Received disconnect from 51.83.72.156 port 38806:11: Bye Bye [preauth] Jan 21 05:36:24 host sshd[30661]: Disconnected from 51.83.72.156 port 38806 [preauth] Jan 21 05:37:04 host sshd[30763]: Invalid user user from 188.166.102.71 port 55238 Jan 21 05:37:04 host sshd[30763]: input_userauth_request: invalid user user [preauth] Jan 21 05:37:04 host sshd[30763]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:37:04 host sshd[30763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.102.71 Jan 21 05:37:06 host sshd[30763]: Failed password for invalid user user from 188.166.102.71 port 55238 ssh2 Jan 21 05:37:06 host sshd[30763]: Received disconnect from 188.166.102.71 port 55238:11: Bye Bye [preauth] Jan 21 05:37:06 host sshd[30763]: Disconnected from 188.166.102.71 port 55238 [preauth] Jan 21 05:37:09 host sshd[30790]: User tomcat from 51.158.175.97 not allowed because not listed in AllowUsers Jan 21 05:37:09 host sshd[30790]: input_userauth_request: invalid user tomcat [preauth] Jan 21 05:37:09 host unix_chkpwd[30804]: password check failed for user (tomcat) Jan 21 05:37:09 host sshd[30790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.175.97 user=tomcat Jan 21 05:37:09 host sshd[30790]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "tomcat" Jan 21 05:37:11 host sshd[30790]: Failed password for invalid user tomcat from 51.158.175.97 port 44440 ssh2 Jan 21 05:37:11 host sshd[30790]: Received disconnect from 51.158.175.97 port 44440:11: Bye Bye [preauth] Jan 21 05:37:11 host sshd[30790]: Disconnected from 51.158.175.97 port 44440 [preauth] Jan 21 05:37:11 host sshd[30807]: Invalid user ftest from 139.59.255.59 port 41408 Jan 21 05:37:11 host sshd[30807]: input_userauth_request: invalid user ftest [preauth] Jan 21 05:37:11 host sshd[30807]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:37:11 host sshd[30807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.255.59 Jan 21 05:37:13 host sshd[30807]: Failed password for invalid user ftest from 139.59.255.59 port 41408 ssh2 Jan 21 05:37:13 host sshd[30807]: Received disconnect from 139.59.255.59 port 41408:11: Bye Bye [preauth] Jan 21 05:37:13 host sshd[30807]: Disconnected from 139.59.255.59 port 41408 [preauth] Jan 21 05:37:58 host sshd[30924]: Invalid user ftptest from 51.83.72.156 port 36688 Jan 21 05:37:58 host sshd[30924]: input_userauth_request: invalid user ftptest [preauth] Jan 21 05:37:58 host sshd[30924]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:37:58 host sshd[30924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.72.156 Jan 21 05:37:58 host sshd[30927]: Invalid user ftp_user1 from 62.89.5.174 port 36608 Jan 21 05:37:58 host sshd[30927]: input_userauth_request: invalid user ftp_user1 [preauth] Jan 21 05:37:58 host sshd[30927]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:37:58 host sshd[30927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.89.5.174 Jan 21 05:37:59 host sshd[30922]: Invalid user httpadmin from 164.77.119.34 port 13974 Jan 21 05:37:59 host sshd[30922]: input_userauth_request: invalid user httpadmin [preauth] Jan 21 05:37:59 host sshd[30922]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:37:59 host sshd[30922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.119.34 Jan 21 05:37:59 host sshd[30924]: Failed password for invalid user ftptest from 51.83.72.156 port 36688 ssh2 Jan 21 05:37:59 host sshd[30924]: Received disconnect from 51.83.72.156 port 36688:11: Bye Bye [preauth] Jan 21 05:37:59 host sshd[30924]: Disconnected from 51.83.72.156 port 36688 [preauth] Jan 21 05:38:00 host sshd[30927]: Failed password for invalid user ftp_user1 from 62.89.5.174 port 36608 ssh2 Jan 21 05:38:00 host sshd[30927]: Received disconnect from 62.89.5.174 port 36608:11: Bye Bye [preauth] Jan 21 05:38:00 host sshd[30927]: Disconnected from 62.89.5.174 port 36608 [preauth] Jan 21 05:38:01 host sshd[30922]: Failed password for invalid user httpadmin from 164.77.119.34 port 13974 ssh2 Jan 21 05:38:02 host sshd[30922]: Received disconnect from 164.77.119.34 port 13974:11: Bye Bye [preauth] Jan 21 05:38:02 host sshd[30922]: Disconnected from 164.77.119.34 port 13974 [preauth] Jan 21 05:38:25 host sshd[30980]: Invalid user nsuser from 164.132.49.218 port 55748 Jan 21 05:38:25 host sshd[30980]: input_userauth_request: invalid user nsuser [preauth] Jan 21 05:38:25 host sshd[30980]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:38:25 host sshd[30980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.49.218 Jan 21 05:38:27 host sshd[30980]: Failed password for invalid user nsuser from 164.132.49.218 port 55748 ssh2 Jan 21 05:38:28 host sshd[30980]: Received disconnect from 164.132.49.218 port 55748:11: Bye Bye [preauth] Jan 21 05:38:28 host sshd[30980]: Disconnected from 164.132.49.218 port 55748 [preauth] Jan 21 05:38:38 host sshd[31013]: Invalid user wcsuser from 139.59.255.59 port 40136 Jan 21 05:38:38 host sshd[31013]: input_userauth_request: invalid user wcsuser [preauth] Jan 21 05:38:38 host sshd[31013]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:38:38 host sshd[31013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.255.59 Jan 21 05:38:40 host sshd[31013]: Failed password for invalid user wcsuser from 139.59.255.59 port 40136 ssh2 Jan 21 05:38:40 host sshd[31013]: Received disconnect from 139.59.255.59 port 40136:11: Bye Bye [preauth] Jan 21 05:38:40 host sshd[31013]: Disconnected from 139.59.255.59 port 40136 [preauth] Jan 21 05:38:53 host sshd[31064]: Invalid user jet from 104.244.74.6 port 55796 Jan 21 05:38:53 host sshd[31064]: input_userauth_request: invalid user jet [preauth] Jan 21 05:38:53 host sshd[31064]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:38:53 host sshd[31064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 21 05:38:55 host sshd[31064]: Failed password for invalid user jet from 104.244.74.6 port 55796 ssh2 Jan 21 05:38:56 host sshd[31064]: Connection closed by 104.244.74.6 port 55796 [preauth] Jan 21 05:38:59 host sshd[31071]: Invalid user users from 205.185.123.158 port 50728 Jan 21 05:38:59 host sshd[31071]: input_userauth_request: invalid user users [preauth] Jan 21 05:38:59 host sshd[31071]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:38:59 host sshd[31071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.123.158 Jan 21 05:39:01 host sshd[31074]: Invalid user FTPUser from 201.17.131.43 port 33749 Jan 21 05:39:01 host sshd[31074]: input_userauth_request: invalid user FTPUser [preauth] Jan 21 05:39:01 host sshd[31074]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:39:01 host sshd[31074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.131.43 Jan 21 05:39:01 host sshd[31071]: Failed password for invalid user users from 205.185.123.158 port 50728 ssh2 Jan 21 05:39:01 host sshd[31077]: Invalid user userbot from 51.83.72.156 port 59456 Jan 21 05:39:01 host sshd[31077]: input_userauth_request: invalid user userbot [preauth] Jan 21 05:39:01 host sshd[31077]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:39:01 host sshd[31077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.72.156 Jan 21 05:39:01 host sshd[31071]: Received disconnect from 205.185.123.158 port 50728:11: Bye Bye [preauth] Jan 21 05:39:01 host sshd[31071]: Disconnected from 205.185.123.158 port 50728 [preauth] Jan 21 05:39:02 host sshd[31074]: Failed password for invalid user FTPUser from 201.17.131.43 port 33749 ssh2 Jan 21 05:39:03 host sshd[31077]: Failed password for invalid user userbot from 51.83.72.156 port 59456 ssh2 Jan 21 05:39:03 host sshd[31074]: Received disconnect from 201.17.131.43 port 33749:11: Bye Bye [preauth] Jan 21 05:39:03 host sshd[31074]: Disconnected from 201.17.131.43 port 33749 [preauth] Jan 21 05:39:03 host sshd[31077]: Received disconnect from 51.83.72.156 port 59456:11: Bye Bye [preauth] Jan 21 05:39:03 host sshd[31077]: Disconnected from 51.83.72.156 port 59456 [preauth] Jan 21 05:39:32 host sshd[31192]: Invalid user testik from 185.186.147.60 port 59040 Jan 21 05:39:32 host sshd[31192]: input_userauth_request: invalid user testik [preauth] Jan 21 05:39:32 host sshd[31192]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:39:32 host sshd[31192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.186.147.60 Jan 21 05:39:35 host sshd[31192]: Failed password for invalid user testik from 185.186.147.60 port 59040 ssh2 Jan 21 05:39:35 host sshd[31192]: Received disconnect from 185.186.147.60 port 59040:11: Bye Bye [preauth] Jan 21 05:39:35 host sshd[31192]: Disconnected from 185.186.147.60 port 59040 [preauth] Jan 21 05:39:46 host sshd[31231]: Invalid user tempadmin from 164.77.119.34 port 27447 Jan 21 05:39:46 host sshd[31231]: input_userauth_request: invalid user tempadmin [preauth] Jan 21 05:39:46 host sshd[31231]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:39:46 host sshd[31231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.119.34 Jan 21 05:39:48 host sshd[31231]: Failed password for invalid user tempadmin from 164.77.119.34 port 27447 ssh2 Jan 21 05:39:49 host sshd[31231]: Received disconnect from 164.77.119.34 port 27447:11: Bye Bye [preauth] Jan 21 05:39:49 host sshd[31231]: Disconnected from 164.77.119.34 port 27447 [preauth] Jan 21 05:40:38 host sshd[31408]: Invalid user postgres from 201.17.131.43 port 54090 Jan 21 05:40:38 host sshd[31408]: input_userauth_request: invalid user postgres [preauth] Jan 21 05:40:38 host sshd[31408]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:40:38 host sshd[31408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.17.131.43 Jan 21 05:40:39 host sshd[31408]: Failed password for invalid user postgres from 201.17.131.43 port 54090 ssh2 Jan 21 05:40:50 host sshd[31562]: Invalid user gitlab-runner from 164.132.49.218 port 35782 Jan 21 05:40:50 host sshd[31562]: input_userauth_request: invalid user gitlab-runner [preauth] Jan 21 05:40:50 host sshd[31562]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:40:50 host sshd[31562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.49.218 Jan 21 05:40:52 host sshd[31562]: Failed password for invalid user gitlab-runner from 164.132.49.218 port 35782 ssh2 Jan 21 05:40:52 host sshd[31562]: Received disconnect from 164.132.49.218 port 35782:11: Bye Bye [preauth] Jan 21 05:40:52 host sshd[31562]: Disconnected from 164.132.49.218 port 35782 [preauth] Jan 21 05:41:39 host sshd[31675]: Invalid user abc from 62.89.5.174 port 47266 Jan 21 05:41:39 host sshd[31675]: input_userauth_request: invalid user abc [preauth] Jan 21 05:41:39 host sshd[31675]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:41:39 host sshd[31675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.89.5.174 Jan 21 05:41:42 host sshd[31675]: Failed password for invalid user abc from 62.89.5.174 port 47266 ssh2 Jan 21 05:41:42 host sshd[31675]: Received disconnect from 62.89.5.174 port 47266:11: Bye Bye [preauth] Jan 21 05:41:42 host sshd[31675]: Disconnected from 62.89.5.174 port 47266 [preauth] Jan 21 05:41:59 host sshd[31705]: Invalid user winadmin from 164.132.49.218 port 35466 Jan 21 05:41:59 host sshd[31705]: input_userauth_request: invalid user winadmin [preauth] Jan 21 05:41:59 host sshd[31705]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:41:59 host sshd[31705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.49.218 Jan 21 05:42:01 host sshd[31705]: Failed password for invalid user winadmin from 164.132.49.218 port 35466 ssh2 Jan 21 05:42:01 host sshd[31705]: Received disconnect from 164.132.49.218 port 35466:11: Bye Bye [preauth] Jan 21 05:42:01 host sshd[31705]: Disconnected from 164.132.49.218 port 35466 [preauth] Jan 21 05:42:06 host sshd[31757]: Invalid user admin from 205.185.123.158 port 58928 Jan 21 05:42:06 host sshd[31757]: input_userauth_request: invalid user admin [preauth] Jan 21 05:42:06 host sshd[31757]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:42:06 host sshd[31757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.123.158 Jan 21 05:42:08 host sshd[31757]: Failed password for invalid user admin from 205.185.123.158 port 58928 ssh2 Jan 21 05:42:08 host sshd[31757]: Received disconnect from 205.185.123.158 port 58928:11: Bye Bye [preauth] Jan 21 05:42:08 host sshd[31757]: Disconnected from 205.185.123.158 port 58928 [preauth] Jan 21 05:42:34 host sshd[31817]: Invalid user mike from 185.186.147.60 port 37112 Jan 21 05:42:34 host sshd[31817]: input_userauth_request: invalid user mike [preauth] Jan 21 05:42:34 host sshd[31817]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:42:34 host sshd[31817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.186.147.60 Jan 21 05:42:37 host sshd[31817]: Failed password for invalid user mike from 185.186.147.60 port 37112 ssh2 Jan 21 05:42:37 host sshd[31817]: Received disconnect from 185.186.147.60 port 37112:11: Bye Bye [preauth] Jan 21 05:42:37 host sshd[31817]: Disconnected from 185.186.147.60 port 37112 [preauth] Jan 21 05:42:50 host sshd[31836]: Invalid user daniel from 62.89.5.174 port 41872 Jan 21 05:42:50 host sshd[31836]: input_userauth_request: invalid user daniel [preauth] Jan 21 05:42:50 host sshd[31836]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:42:50 host sshd[31836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.89.5.174 Jan 21 05:42:52 host sshd[31836]: Failed password for invalid user daniel from 62.89.5.174 port 41872 ssh2 Jan 21 05:42:52 host sshd[31836]: Received disconnect from 62.89.5.174 port 41872:11: Bye Bye [preauth] Jan 21 05:42:52 host sshd[31836]: Disconnected from 62.89.5.174 port 41872 [preauth] Jan 21 05:44:03 host sshd[32050]: Invalid user admins from 43.153.63.151 port 44630 Jan 21 05:44:03 host sshd[32050]: input_userauth_request: invalid user admins [preauth] Jan 21 05:44:03 host sshd[32050]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:44:03 host sshd[32050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.63.151 Jan 21 05:44:05 host sshd[32050]: Failed password for invalid user admins from 43.153.63.151 port 44630 ssh2 Jan 21 05:44:06 host sshd[32050]: Received disconnect from 43.153.63.151 port 44630:11: Bye Bye [preauth] Jan 21 05:44:06 host sshd[32050]: Disconnected from 43.153.63.151 port 44630 [preauth] Jan 21 05:44:10 host sshd[32059]: Invalid user factorio from 185.186.147.60 port 36086 Jan 21 05:44:10 host sshd[32059]: input_userauth_request: invalid user factorio [preauth] Jan 21 05:44:10 host sshd[32059]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:44:10 host sshd[32059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.186.147.60 Jan 21 05:44:12 host sshd[32059]: Failed password for invalid user factorio from 185.186.147.60 port 36086 ssh2 Jan 21 05:44:12 host sshd[32059]: Received disconnect from 185.186.147.60 port 36086:11: Bye Bye [preauth] Jan 21 05:44:12 host sshd[32059]: Disconnected from 185.186.147.60 port 36086 [preauth] Jan 21 05:44:27 host sshd[32114]: Invalid user mongouser from 205.185.123.158 port 52850 Jan 21 05:44:27 host sshd[32114]: input_userauth_request: invalid user mongouser [preauth] Jan 21 05:44:27 host sshd[32114]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:44:27 host sshd[32114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.123.158 Jan 21 05:44:28 host sshd[32114]: Failed password for invalid user mongouser from 205.185.123.158 port 52850 ssh2 Jan 21 05:44:29 host sshd[32114]: Received disconnect from 205.185.123.158 port 52850:11: Bye Bye [preauth] Jan 21 05:44:29 host sshd[32114]: Disconnected from 205.185.123.158 port 52850 [preauth] Jan 21 05:45:26 host sshd[32263]: Invalid user mpiuser from 43.155.101.206 port 59406 Jan 21 05:45:26 host sshd[32263]: input_userauth_request: invalid user mpiuser [preauth] Jan 21 05:45:26 host sshd[32263]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:45:26 host sshd[32263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.101.206 Jan 21 05:45:28 host sshd[32263]: Failed password for invalid user mpiuser from 43.155.101.206 port 59406 ssh2 Jan 21 05:45:28 host sshd[32263]: Received disconnect from 43.155.101.206 port 59406:11: Bye Bye [preauth] Jan 21 05:45:28 host sshd[32263]: Disconnected from 43.155.101.206 port 59406 [preauth] Jan 21 05:46:38 host sshd[32410]: Invalid user wp-admin from 43.153.63.151 port 42110 Jan 21 05:46:38 host sshd[32410]: input_userauth_request: invalid user wp-admin [preauth] Jan 21 05:46:38 host sshd[32410]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:46:38 host sshd[32410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.63.151 Jan 21 05:46:40 host sshd[32410]: Failed password for invalid user wp-admin from 43.153.63.151 port 42110 ssh2 Jan 21 05:48:36 host sshd[311]: Invalid user Sujan from 31.41.244.124 port 42554 Jan 21 05:48:36 host sshd[311]: input_userauth_request: invalid user Sujan [preauth] Jan 21 05:48:36 host sshd[311]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:48:36 host sshd[311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 21 05:48:39 host sshd[311]: Failed password for invalid user Sujan from 31.41.244.124 port 42554 ssh2 Jan 21 05:48:39 host sshd[311]: Received disconnect from 31.41.244.124 port 42554:11: Client disconnecting normally [preauth] Jan 21 05:48:39 host sshd[311]: Disconnected from 31.41.244.124 port 42554 [preauth] Jan 21 05:50:10 host sshd[506]: Did not receive identification string from 4.224.22.134 port 46308 Jan 21 05:50:10 host sshd[513]: Invalid user admin from 4.224.22.134 port 48262 Jan 21 05:50:10 host sshd[513]: input_userauth_request: invalid user admin [preauth] Jan 21 05:50:10 host sshd[508]: User root from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[508]: input_userauth_request: invalid user root [preauth] Jan 21 05:50:10 host sshd[509]: User root from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[509]: input_userauth_request: invalid user root [preauth] Jan 21 05:50:10 host sshd[513]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:50:10 host sshd[513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 Jan 21 05:50:10 host sshd[512]: User root from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[512]: input_userauth_request: invalid user root [preauth] Jan 21 05:50:10 host sshd[507]: Invalid user www from 4.224.22.134 port 48208 Jan 21 05:50:10 host sshd[511]: User root from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[507]: input_userauth_request: invalid user www [preauth] Jan 21 05:50:10 host sshd[511]: input_userauth_request: invalid user root [preauth] Jan 21 05:50:10 host sshd[510]: User root from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[510]: input_userauth_request: invalid user root [preauth] Jan 21 05:50:10 host sshd[524]: User root from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[524]: input_userauth_request: invalid user root [preauth] Jan 21 05:50:10 host sshd[507]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:50:10 host sshd[507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 Jan 21 05:50:10 host sshd[542]: User root from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[542]: input_userauth_request: invalid user root [preauth] Jan 21 05:50:10 host sshd[515]: Invalid user admin from 4.224.22.134 port 48210 Jan 21 05:50:10 host sshd[515]: input_userauth_request: invalid user admin [preauth] Jan 21 05:50:10 host sshd[522]: User root from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[522]: input_userauth_request: invalid user root [preauth] Jan 21 05:50:10 host sshd[536]: User root from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[536]: input_userauth_request: invalid user root [preauth] Jan 21 05:50:10 host sshd[530]: Invalid user pi from 4.224.22.134 port 48246 Jan 21 05:50:10 host sshd[519]: Invalid user pi from 4.224.22.134 port 48196 Jan 21 05:50:10 host sshd[530]: input_userauth_request: invalid user pi [preauth] Jan 21 05:50:10 host unix_chkpwd[582]: password check failed for user (root) Jan 21 05:50:10 host unix_chkpwd[583]: password check failed for user (root) Jan 21 05:50:10 host sshd[512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=root Jan 21 05:50:10 host sshd[519]: input_userauth_request: invalid user pi [preauth] Jan 21 05:50:10 host sshd[512]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 05:50:10 host sshd[514]: Invalid user ubuntu from 4.224.22.134 port 48112 Jan 21 05:50:10 host sshd[514]: input_userauth_request: invalid user ubuntu [preauth] Jan 21 05:50:10 host sshd[515]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:50:10 host sshd[515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 Jan 21 05:50:10 host sshd[509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=root Jan 21 05:50:10 host sshd[509]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 05:50:10 host unix_chkpwd[584]: password check failed for user (root) Jan 21 05:50:10 host sshd[510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=root Jan 21 05:50:10 host sshd[510]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 05:50:10 host sshd[532]: User root from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[539]: Invalid user pi from 4.224.22.134 port 48266 Jan 21 05:50:10 host sshd[532]: input_userauth_request: invalid user root [preauth] Jan 21 05:50:10 host sshd[539]: input_userauth_request: invalid user pi [preauth] Jan 21 05:50:10 host sshd[531]: Invalid user admin from 4.224.22.134 port 48268 Jan 21 05:50:10 host sshd[521]: Invalid user admin from 4.224.22.134 port 48198 Jan 21 05:50:10 host unix_chkpwd[580]: password check failed for user (root) Jan 21 05:50:10 host sshd[531]: input_userauth_request: invalid user admin [preauth] Jan 21 05:50:10 host sshd[508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=root Jan 21 05:50:10 host sshd[508]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 05:50:10 host sshd[546]: User root from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[546]: input_userauth_request: invalid user root [preauth] Jan 21 05:50:10 host sshd[521]: input_userauth_request: invalid user admin [preauth] Jan 21 05:50:10 host sshd[541]: Invalid user pi from 4.224.22.134 port 48228 Jan 21 05:50:10 host sshd[540]: User root from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[540]: input_userauth_request: invalid user root [preauth] Jan 21 05:50:10 host sshd[548]: Invalid user zjw from 4.224.22.134 port 48256 Jan 21 05:50:10 host sshd[548]: input_userauth_request: invalid user zjw [preauth] Jan 21 05:50:10 host sshd[520]: Invalid user admin from 4.224.22.134 port 48206 Jan 21 05:50:10 host sshd[549]: User root from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[537]: Invalid user admin from 4.224.22.134 port 48250 Jan 21 05:50:10 host sshd[526]: Invalid user steam from 4.224.22.134 port 48240 Jan 21 05:50:10 host sshd[549]: input_userauth_request: invalid user root [preauth] Jan 21 05:50:10 host sshd[518]: User centos from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[541]: input_userauth_request: invalid user pi [preauth] Jan 21 05:50:10 host sshd[525]: User centos from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[547]: User root from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[514]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:50:10 host sshd[514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 Jan 21 05:50:10 host sshd[529]: User root from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[545]: User centos from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[516]: Invalid user ansadmin from 4.224.22.134 port 48202 Jan 21 05:50:10 host sshd[516]: input_userauth_request: invalid user ansadmin [preauth] Jan 21 05:50:10 host sshd[545]: input_userauth_request: invalid user centos [preauth] Jan 21 05:50:10 host sshd[526]: input_userauth_request: invalid user steam [preauth] Jan 21 05:50:10 host sshd[530]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:50:10 host sshd[530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 Jan 21 05:50:10 host sshd[527]: Invalid user steam from 4.224.22.134 port 48230 Jan 21 05:50:10 host sshd[520]: input_userauth_request: invalid user admin [preauth] Jan 21 05:50:10 host sshd[529]: input_userauth_request: invalid user root [preauth] Jan 21 05:50:10 host sshd[518]: input_userauth_request: invalid user centos [preauth] Jan 21 05:50:10 host sshd[527]: input_userauth_request: invalid user steam [preauth] Jan 21 05:50:10 host sshd[547]: input_userauth_request: invalid user root [preauth] Jan 21 05:50:10 host sshd[519]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:50:10 host sshd[519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 Jan 21 05:50:10 host sshd[525]: input_userauth_request: invalid user centos [preauth] Jan 21 05:50:10 host sshd[537]: input_userauth_request: invalid user admin [preauth] Jan 21 05:50:10 host unix_chkpwd[587]: password check failed for user (root) Jan 21 05:50:10 host sshd[531]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:50:10 host sshd[531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 Jan 21 05:50:10 host sshd[543]: User root from 4.224.22.134 not allowed because not listed in AllowUsers Jan 21 05:50:10 host sshd[521]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:50:10 host sshd[521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 Jan 21 05:50:10 host sshd[543]: input_userauth_request: invalid user root [preauth] Jan 21 05:50:10 host sshd[542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=root Jan 21 05:50:10 host sshd[542]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 05:50:10 host sshd[539]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:50:10 host sshd[539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 Jan 21 05:50:10 host unix_chkpwd[586]: password check failed for user (root) Jan 21 05:50:10 host sshd[541]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:50:10 host sshd[541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 Jan 21 05:50:10 host sshd[524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=root Jan 21 05:50:10 host sshd[524]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 05:50:10 host sshd[537]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:50:10 host sshd[537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 Jan 21 05:50:10 host sshd[526]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:50:10 host sshd[526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 Jan 21 05:50:10 host sshd[520]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:50:10 host sshd[520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 Jan 21 05:50:10 host unix_chkpwd[585]: password check failed for user (root) Jan 21 05:50:10 host sshd[511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=root Jan 21 05:50:10 host sshd[511]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 05:50:10 host sshd[533]: Invalid user pi from 4.224.22.134 port 48232 Jan 21 05:50:10 host sshd[548]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:50:10 host sshd[548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 Jan 21 05:50:10 host sshd[516]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:50:10 host sshd[516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 Jan 21 05:50:10 host sshd[533]: input_userauth_request: invalid user pi [preauth] Jan 21 05:50:10 host sshd[527]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:50:10 host sshd[527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 Jan 21 05:50:10 host unix_chkpwd[588]: password check failed for user (root) Jan 21 05:50:10 host sshd[522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=root Jan 21 05:50:10 host sshd[522]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 05:50:10 host unix_chkpwd[589]: password check failed for user (root) Jan 21 05:50:10 host sshd[536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=root Jan 21 05:50:10 host sshd[536]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 05:50:10 host sshd[533]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:50:10 host sshd[533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 Jan 21 05:50:10 host unix_chkpwd[604]: password check failed for user (centos) Jan 21 05:50:10 host sshd[525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=centos Jan 21 05:50:10 host unix_chkpwd[593]: password check failed for user (centos) Jan 21 05:50:10 host sshd[518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=centos Jan 21 05:50:10 host unix_chkpwd[603]: password check failed for user (root) Jan 21 05:50:10 host unix_chkpwd[596]: password check failed for user (root) Jan 21 05:50:10 host sshd[549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=root Jan 21 05:50:10 host sshd[549]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 05:50:10 host sshd[547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=root Jan 21 05:50:10 host sshd[547]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 05:50:10 host unix_chkpwd[590]: password check failed for user (root) Jan 21 05:50:10 host unix_chkpwd[592]: password check failed for user (root) Jan 21 05:50:10 host sshd[546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=root Jan 21 05:50:10 host sshd[546]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 05:50:10 host sshd[540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=root Jan 21 05:50:10 host sshd[540]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 05:50:10 host unix_chkpwd[595]: password check failed for user (centos) Jan 21 05:50:10 host sshd[545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=centos Jan 21 05:50:10 host unix_chkpwd[606]: password check failed for user (root) Jan 21 05:50:10 host sshd[543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=root Jan 21 05:50:10 host sshd[543]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 05:50:10 host unix_chkpwd[591]: password check failed for user (root) Jan 21 05:50:10 host sshd[532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=root Jan 21 05:50:10 host sshd[532]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 05:50:10 host unix_chkpwd[594]: password check failed for user (root) Jan 21 05:50:10 host sshd[529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.224.22.134 user=root Jan 21 05:50:10 host sshd[529]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 05:50:12 host sshd[513]: Failed password for invalid user admin from 4.224.22.134 port 48262 ssh2 Jan 21 05:50:12 host sshd[507]: Failed password for invalid user www from 4.224.22.134 port 48208 ssh2 Jan 21 05:50:12 host sshd[512]: Failed password for invalid user root from 4.224.22.134 port 48254 ssh2 Jan 21 05:50:12 host sshd[515]: Failed password for invalid user admin from 4.224.22.134 port 48210 ssh2 Jan 21 05:50:12 host sshd[509]: Failed password for invalid user root from 4.224.22.134 port 48212 ssh2 Jan 21 05:50:12 host sshd[510]: Failed password for invalid user root from 4.224.22.134 port 48242 ssh2 Jan 21 05:50:12 host sshd[508]: Failed password for invalid user root from 4.224.22.134 port 48194 ssh2 Jan 21 05:50:12 host sshd[514]: Failed password for invalid user ubuntu from 4.224.22.134 port 48112 ssh2 Jan 21 05:50:12 host sshd[530]: Failed password for invalid user pi from 4.224.22.134 port 48246 ssh2 Jan 21 05:50:12 host sshd[519]: Failed password for invalid user pi from 4.224.22.134 port 48196 ssh2 Jan 21 05:50:12 host sshd[531]: Failed password for invalid user admin from 4.224.22.134 port 48268 ssh2 Jan 21 05:50:12 host sshd[521]: Failed password for invalid user admin from 4.224.22.134 port 48198 ssh2 Jan 21 05:50:12 host sshd[542]: Failed password for invalid user root from 4.224.22.134 port 48226 ssh2 Jan 21 05:50:12 host sshd[539]: Failed password for invalid user pi from 4.224.22.134 port 48266 ssh2 Jan 21 05:50:12 host sshd[541]: Failed password for invalid user pi from 4.224.22.134 port 48228 ssh2 Jan 21 05:50:12 host sshd[524]: Failed password for invalid user root from 4.224.22.134 port 48218 ssh2 Jan 21 05:50:12 host sshd[526]: Failed password for invalid user steam from 4.224.22.134 port 48240 ssh2 Jan 21 05:50:12 host sshd[537]: Failed password for invalid user admin from 4.224.22.134 port 48250 ssh2 Jan 21 05:50:12 host sshd[520]: Failed password for invalid user admin from 4.224.22.134 port 48206 ssh2 Jan 21 05:50:12 host sshd[511]: Failed password for invalid user root from 4.224.22.134 port 48234 ssh2 Jan 21 05:50:12 host sshd[548]: Failed password for invalid user zjw from 4.224.22.134 port 48256 ssh2 Jan 21 05:50:12 host sshd[516]: Failed password for invalid user ansadmin from 4.224.22.134 port 48202 ssh2 Jan 21 05:50:12 host sshd[527]: Failed password for invalid user steam from 4.224.22.134 port 48230 ssh2 Jan 21 05:50:12 host sshd[522]: Failed password for invalid user root from 4.224.22.134 port 48216 ssh2 Jan 21 05:50:12 host sshd[536]: Failed password for invalid user root from 4.224.22.134 port 48238 ssh2 Jan 21 05:50:12 host sshd[533]: Failed password for invalid user pi from 4.224.22.134 port 48232 ssh2 Jan 21 05:50:12 host sshd[525]: Failed password for invalid user centos from 4.224.22.134 port 48220 ssh2 Jan 21 05:50:12 host sshd[518]: Failed password for invalid user centos from 4.224.22.134 port 48200 ssh2 Jan 21 05:50:12 host sshd[549]: Failed password for invalid user root from 4.224.22.134 port 48260 ssh2 Jan 21 05:50:12 host sshd[547]: Failed password for invalid user root from 4.224.22.134 port 48222 ssh2 Jan 21 05:50:12 host sshd[513]: Connection closed by 4.224.22.134 port 48262 [preauth] Jan 21 05:50:12 host sshd[507]: Connection closed by 4.224.22.134 port 48208 [preauth] Jan 21 05:50:12 host sshd[546]: Failed password for invalid user root from 4.224.22.134 port 48264 ssh2 Jan 21 05:50:12 host sshd[540]: Failed password for invalid user root from 4.224.22.134 port 48204 ssh2 Jan 21 05:50:12 host sshd[545]: Failed password for invalid user centos from 4.224.22.134 port 48214 ssh2 Jan 21 05:50:12 host sshd[509]: Connection closed by 4.224.22.134 port 48212 [preauth] Jan 21 05:50:12 host sshd[543]: Failed password for invalid user root from 4.224.22.134 port 48252 ssh2 Jan 21 05:50:12 host sshd[512]: Connection closed by 4.224.22.134 port 48254 [preauth] Jan 21 05:50:12 host sshd[532]: Failed password for invalid user root from 4.224.22.134 port 48258 ssh2 Jan 21 05:50:12 host sshd[529]: Failed password for invalid user root from 4.224.22.134 port 48224 ssh2 Jan 21 05:50:12 host sshd[515]: Connection closed by 4.224.22.134 port 48210 [preauth] Jan 21 05:50:12 host sshd[510]: Connection closed by 4.224.22.134 port 48242 [preauth] Jan 21 05:50:12 host sshd[508]: Connection closed by 4.224.22.134 port 48194 [preauth] Jan 21 05:50:12 host sshd[511]: Connection closed by 4.224.22.134 port 48234 [preauth] Jan 21 05:50:12 host sshd[530]: Connection closed by 4.224.22.134 port 48246 [preauth] Jan 21 05:50:12 host sshd[539]: Connection closed by 4.224.22.134 port 48266 [preauth] Jan 21 05:50:12 host sshd[514]: Connection closed by 4.224.22.134 port 48112 [preauth] Jan 21 05:50:12 host sshd[542]: Connection closed by 4.224.22.134 port 48226 [preauth] Jan 21 05:50:12 host sshd[531]: Connection closed by 4.224.22.134 port 48268 [preauth] Jan 21 05:50:12 host sshd[521]: Connection closed by 4.224.22.134 port 48198 [preauth] Jan 21 05:50:12 host sshd[527]: Connection closed by 4.224.22.134 port 48230 [preauth] Jan 21 05:50:12 host sshd[519]: Connection closed by 4.224.22.134 port 48196 [preauth] Jan 21 05:50:12 host sshd[520]: Connection closed by 4.224.22.134 port 48206 [preauth] Jan 21 05:50:12 host sshd[548]: Connection closed by 4.224.22.134 port 48256 [preauth] Jan 21 05:50:12 host sshd[526]: Connection closed by 4.224.22.134 port 48240 [preauth] Jan 21 05:50:12 host sshd[541]: Connection closed by 4.224.22.134 port 48228 [preauth] Jan 21 05:50:12 host sshd[537]: Connection closed by 4.224.22.134 port 48250 [preauth] Jan 21 05:50:12 host sshd[516]: Connection closed by 4.224.22.134 port 48202 [preauth] Jan 21 05:50:12 host sshd[524]: Connection closed by 4.224.22.134 port 48218 [preauth] Jan 21 05:50:12 host sshd[536]: Connection closed by 4.224.22.134 port 48238 [preauth] Jan 21 05:50:12 host sshd[525]: Connection closed by 4.224.22.134 port 48220 [preauth] Jan 21 05:50:13 host sshd[533]: Connection closed by 4.224.22.134 port 48232 [preauth] Jan 21 05:50:13 host sshd[522]: Connection closed by 4.224.22.134 port 48216 [preauth] Jan 21 05:50:13 host sshd[547]: Connection closed by 4.224.22.134 port 48222 [preauth] Jan 21 05:50:13 host sshd[549]: Connection closed by 4.224.22.134 port 48260 [preauth] Jan 21 05:50:13 host sshd[518]: Connection closed by 4.224.22.134 port 48200 [preauth] Jan 21 05:50:13 host sshd[546]: Connection closed by 4.224.22.134 port 48264 [preauth] Jan 21 05:50:13 host sshd[540]: Connection closed by 4.224.22.134 port 48204 [preauth] Jan 21 05:50:13 host sshd[529]: Connection closed by 4.224.22.134 port 48224 [preauth] Jan 21 05:50:13 host sshd[545]: Connection closed by 4.224.22.134 port 48214 [preauth] Jan 21 05:50:13 host sshd[532]: Connection closed by 4.224.22.134 port 48258 [preauth] Jan 21 05:50:13 host sshd[543]: Connection closed by 4.224.22.134 port 48252 [preauth] Jan 21 05:54:55 host sshd[1234]: Invalid user ble from 43.155.101.206 port 32794 Jan 21 05:54:55 host sshd[1234]: input_userauth_request: invalid user ble [preauth] Jan 21 05:54:55 host sshd[1234]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:54:55 host sshd[1234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.101.206 Jan 21 05:54:57 host sshd[1234]: Failed password for invalid user ble from 43.155.101.206 port 32794 ssh2 Jan 21 05:54:57 host sshd[1234]: Received disconnect from 43.155.101.206 port 32794:11: Bye Bye [preauth] Jan 21 05:54:57 host sshd[1234]: Disconnected from 43.155.101.206 port 32794 [preauth] Jan 21 05:57:02 host sshd[1619]: Invalid user test3 from 43.155.101.206 port 60374 Jan 21 05:57:02 host sshd[1619]: input_userauth_request: invalid user test3 [preauth] Jan 21 05:57:02 host sshd[1619]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:57:02 host sshd[1619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.101.206 Jan 21 05:57:04 host sshd[1619]: Failed password for invalid user test3 from 43.155.101.206 port 60374 ssh2 Jan 21 05:57:04 host sshd[1619]: Received disconnect from 43.155.101.206 port 60374:11: Bye Bye [preauth] Jan 21 05:57:04 host sshd[1619]: Disconnected from 43.155.101.206 port 60374 [preauth] Jan 21 05:59:53 host sshd[2005]: Invalid user hg from 194.110.203.109 port 48462 Jan 21 05:59:53 host sshd[2005]: input_userauth_request: invalid user hg [preauth] Jan 21 05:59:53 host sshd[2005]: pam_unix(sshd:auth): check pass; user unknown Jan 21 05:59:53 host sshd[2005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 05:59:56 host sshd[2005]: Failed password for invalid user hg from 194.110.203.109 port 48462 ssh2 Jan 21 05:59:59 host sshd[2005]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:00:01 host sshd[2005]: Failed password for invalid user hg from 194.110.203.109 port 48462 ssh2 Jan 21 06:00:04 host sshd[2005]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:00:06 host sshd[2005]: Failed password for invalid user hg from 194.110.203.109 port 48462 ssh2 Jan 21 06:00:09 host sshd[2005]: Connection closed by 194.110.203.109 port 48462 [preauth] Jan 21 06:00:09 host sshd[2005]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 06:02:46 host sshd[2536]: Invalid user vadmin from 78.193.208.86 port 48708 Jan 21 06:02:46 host sshd[2536]: input_userauth_request: invalid user vadmin [preauth] Jan 21 06:02:46 host sshd[2536]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:02:46 host sshd[2536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.193.208.86 Jan 21 06:02:49 host sshd[2536]: Failed password for invalid user vadmin from 78.193.208.86 port 48708 ssh2 Jan 21 06:02:49 host sshd[2536]: Connection reset by 78.193.208.86 port 48708 [preauth] Jan 21 06:05:16 host sshd[2874]: Invalid user usr from 114.35.33.33 port 38835 Jan 21 06:05:16 host sshd[2874]: input_userauth_request: invalid user usr [preauth] Jan 21 06:05:16 host sshd[2874]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:05:16 host sshd[2874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.33.33 Jan 21 06:05:18 host sshd[2874]: Failed password for invalid user usr from 114.35.33.33 port 38835 ssh2 Jan 21 06:05:18 host sshd[2874]: Connection reset by 114.35.33.33 port 38835 [preauth] Jan 21 06:16:16 host sshd[4569]: Invalid user ansibleuser from 91.205.128.170 port 44322 Jan 21 06:16:16 host sshd[4569]: input_userauth_request: invalid user ansibleuser [preauth] Jan 21 06:16:16 host sshd[4569]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:16:16 host sshd[4569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.205.128.170 Jan 21 06:16:19 host sshd[4569]: Failed password for invalid user ansibleuser from 91.205.128.170 port 44322 ssh2 Jan 21 06:16:19 host sshd[4569]: Received disconnect from 91.205.128.170 port 44322:11: Bye Bye [preauth] Jan 21 06:16:19 host sshd[4569]: Disconnected from 91.205.128.170 port 44322 [preauth] Jan 21 06:16:33 host sshd[4622]: Invalid user admin from 69.55.54.65 port 58000 Jan 21 06:16:33 host sshd[4622]: input_userauth_request: invalid user admin [preauth] Jan 21 06:16:33 host sshd[4622]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:16:33 host sshd[4622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.55.54.65 Jan 21 06:16:35 host sshd[4622]: Failed password for invalid user admin from 69.55.54.65 port 58000 ssh2 Jan 21 06:16:36 host sshd[4622]: Received disconnect from 69.55.54.65 port 58000:11: Bye Bye [preauth] Jan 21 06:16:36 host sshd[4622]: Disconnected from 69.55.54.65 port 58000 [preauth] Jan 21 06:17:30 host sshd[4779]: Invalid user anne from 103.164.221.210 port 48844 Jan 21 06:17:30 host sshd[4779]: input_userauth_request: invalid user anne [preauth] Jan 21 06:17:30 host sshd[4779]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:17:30 host sshd[4779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.164.221.210 Jan 21 06:17:31 host sshd[4779]: Failed password for invalid user anne from 103.164.221.210 port 48844 ssh2 Jan 21 06:17:32 host sshd[4779]: Received disconnect from 103.164.221.210 port 48844:11: Bye Bye [preauth] Jan 21 06:17:32 host sshd[4779]: Disconnected from 103.164.221.210 port 48844 [preauth] Jan 21 06:20:24 host sshd[5397]: Invalid user elk from 165.22.242.64 port 37254 Jan 21 06:20:24 host sshd[5397]: input_userauth_request: invalid user elk [preauth] Jan 21 06:20:24 host sshd[5397]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:20:24 host sshd[5397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.242.64 Jan 21 06:20:26 host sshd[5397]: Failed password for invalid user elk from 165.22.242.64 port 37254 ssh2 Jan 21 06:20:26 host sshd[5397]: Received disconnect from 165.22.242.64 port 37254:11: Bye Bye [preauth] Jan 21 06:20:26 host sshd[5397]: Disconnected from 165.22.242.64 port 37254 [preauth] Jan 21 06:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 06:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 06:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 06:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 06:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 06:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 06:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=wwwkmaorg user-4=disposeat user-5=remysagr user-6=pmcresources user-7=vfmassets user-8=shalinijames user-9=wwwtestugo user-10=straightcurve user-11=wwwletsstalkfood user-12=bonifacegroup user-13=wwwevmhonda user-14=mrsclean user-15=wwwnexidigital user-16=palco123 user-17=gifterman user-18=kottayamcalldriv user-19=phmetals user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=wwwresourcehunte user-27=keralaholi user-28=wwwrmswll user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 06:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 06:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 06:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-xPJpSJ2ZMFaCKARu.~ Jan 21 06:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-xPJpSJ2ZMFaCKARu.~' Jan 21 06:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-xPJpSJ2ZMFaCKARu.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 06:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 06:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 06:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 06:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 06:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 06:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 06:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 06:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 06:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 06:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 06:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 06:22:54 host sshd[5992]: Invalid user share from 91.205.128.170 port 46362 Jan 21 06:22:54 host sshd[5992]: input_userauth_request: invalid user share [preauth] Jan 21 06:22:54 host sshd[5992]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:22:54 host sshd[5992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.205.128.170 Jan 21 06:22:56 host sshd[5992]: Failed password for invalid user share from 91.205.128.170 port 46362 ssh2 Jan 21 06:22:56 host sshd[5992]: Received disconnect from 91.205.128.170 port 46362:11: Bye Bye [preauth] Jan 21 06:22:56 host sshd[5992]: Disconnected from 91.205.128.170 port 46362 [preauth] Jan 21 06:23:33 host sshd[6178]: Invalid user rancher from 69.55.54.65 port 59448 Jan 21 06:23:33 host sshd[6178]: input_userauth_request: invalid user rancher [preauth] Jan 21 06:23:33 host sshd[6178]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:23:33 host sshd[6178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.55.54.65 Jan 21 06:23:35 host sshd[6178]: Failed password for invalid user rancher from 69.55.54.65 port 59448 ssh2 Jan 21 06:23:35 host sshd[6178]: Received disconnect from 69.55.54.65 port 59448:11: Bye Bye [preauth] Jan 21 06:23:35 host sshd[6178]: Disconnected from 69.55.54.65 port 59448 [preauth] Jan 21 06:23:37 host sshd[6209]: Invalid user remote from 165.22.242.64 port 48340 Jan 21 06:23:37 host sshd[6209]: input_userauth_request: invalid user remote [preauth] Jan 21 06:23:37 host sshd[6209]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:23:37 host sshd[6209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.242.64 Jan 21 06:23:38 host sshd[6209]: Failed password for invalid user remote from 165.22.242.64 port 48340 ssh2 Jan 21 06:23:38 host sshd[6209]: Received disconnect from 165.22.242.64 port 48340:11: Bye Bye [preauth] Jan 21 06:23:38 host sshd[6209]: Disconnected from 165.22.242.64 port 48340 [preauth] Jan 21 06:23:59 host sshd[6258]: Invalid user halo from 103.164.221.210 port 46150 Jan 21 06:23:59 host sshd[6258]: input_userauth_request: invalid user halo [preauth] Jan 21 06:23:59 host sshd[6258]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:23:59 host sshd[6258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.164.221.210 Jan 21 06:24:01 host sshd[6258]: Failed password for invalid user halo from 103.164.221.210 port 46150 ssh2 Jan 21 06:24:01 host sshd[6258]: Received disconnect from 103.164.221.210 port 46150:11: Bye Bye [preauth] Jan 21 06:24:01 host sshd[6258]: Disconnected from 103.164.221.210 port 46150 [preauth] Jan 21 06:24:09 host sshd[6286]: Invalid user download from 91.205.128.170 port 40778 Jan 21 06:24:09 host sshd[6286]: input_userauth_request: invalid user download [preauth] Jan 21 06:24:09 host sshd[6286]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:24:09 host sshd[6286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.205.128.170 Jan 21 06:24:11 host sshd[6286]: Failed password for invalid user download from 91.205.128.170 port 40778 ssh2 Jan 21 06:24:17 host sshd[6338]: Did not receive identification string from 45.79.181.104 port 7598 Jan 21 06:24:20 host sshd[6341]: Connection closed by 45.79.181.104 port 7600 [preauth] Jan 21 06:24:21 host sshd[6351]: Did not receive identification string from 45.79.181.104 port 56086 Jan 21 06:24:24 host sshd[6355]: Invalid user default from 122.117.101.117 port 43056 Jan 21 06:24:24 host sshd[6355]: input_userauth_request: invalid user default [preauth] Jan 21 06:24:24 host sshd[6355]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:24:24 host sshd[6355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.101.117 Jan 21 06:24:26 host sshd[6355]: Failed password for invalid user default from 122.117.101.117 port 43056 ssh2 Jan 21 06:24:26 host sshd[6355]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:24:28 host sshd[6355]: Failed password for invalid user default from 122.117.101.117 port 43056 ssh2 Jan 21 06:24:29 host sshd[6355]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:24:31 host sshd[6355]: Failed password for invalid user default from 122.117.101.117 port 43056 ssh2 Jan 21 06:24:32 host sshd[6355]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:24:34 host sshd[6355]: Failed password for invalid user default from 122.117.101.117 port 43056 ssh2 Jan 21 06:24:34 host sshd[6355]: Connection reset by 122.117.101.117 port 43056 [preauth] Jan 21 06:24:34 host sshd[6355]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.101.117 Jan 21 06:24:34 host sshd[6355]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 21 06:24:41 host sshd[6419]: Invalid user gitlab-psql from 69.55.54.65 port 53898 Jan 21 06:24:41 host sshd[6419]: input_userauth_request: invalid user gitlab-psql [preauth] Jan 21 06:24:41 host sshd[6419]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:24:41 host sshd[6419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.55.54.65 Jan 21 06:24:43 host sshd[6419]: Failed password for invalid user gitlab-psql from 69.55.54.65 port 53898 ssh2 Jan 21 06:24:44 host sshd[6419]: Received disconnect from 69.55.54.65 port 53898:11: Bye Bye [preauth] Jan 21 06:24:44 host sshd[6419]: Disconnected from 69.55.54.65 port 53898 [preauth] Jan 21 06:25:01 host sshd[6525]: Invalid user testmail1 from 165.22.242.64 port 46948 Jan 21 06:25:01 host sshd[6525]: input_userauth_request: invalid user testmail1 [preauth] Jan 21 06:25:01 host sshd[6525]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:25:01 host sshd[6525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.242.64 Jan 21 06:25:03 host sshd[6525]: Failed password for invalid user testmail1 from 165.22.242.64 port 46948 ssh2 Jan 21 06:25:03 host sshd[6525]: Received disconnect from 165.22.242.64 port 46948:11: Bye Bye [preauth] Jan 21 06:25:03 host sshd[6525]: Disconnected from 165.22.242.64 port 46948 [preauth] Jan 21 06:25:26 host sshd[6642]: Invalid user testlab from 103.164.221.210 port 52390 Jan 21 06:25:26 host sshd[6642]: input_userauth_request: invalid user testlab [preauth] Jan 21 06:25:26 host sshd[6642]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:25:26 host sshd[6642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.164.221.210 Jan 21 06:25:28 host sshd[6642]: Failed password for invalid user testlab from 103.164.221.210 port 52390 ssh2 Jan 21 06:25:28 host sshd[6642]: Received disconnect from 103.164.221.210 port 52390:11: Bye Bye [preauth] Jan 21 06:25:28 host sshd[6642]: Disconnected from 103.164.221.210 port 52390 [preauth] Jan 21 06:26:05 host sshd[6876]: Invalid user jet from 104.244.74.6 port 47862 Jan 21 06:26:05 host sshd[6876]: input_userauth_request: invalid user jet [preauth] Jan 21 06:26:05 host sshd[6876]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:26:05 host sshd[6876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 21 06:26:08 host sshd[6876]: Failed password for invalid user jet from 104.244.74.6 port 47862 ssh2 Jan 21 06:26:08 host sshd[6876]: Connection closed by 104.244.74.6 port 47862 [preauth] Jan 21 06:28:13 host sshd[7137]: User root from 166.90.116.109 not allowed because not listed in AllowUsers Jan 21 06:28:13 host sshd[7137]: input_userauth_request: invalid user root [preauth] Jan 21 06:28:13 host unix_chkpwd[7146]: password check failed for user (root) Jan 21 06:28:13 host sshd[7137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.90.116.109 user=root Jan 21 06:28:13 host sshd[7137]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 06:28:15 host sshd[7137]: Failed password for invalid user root from 166.90.116.109 port 45817 ssh2 Jan 21 06:28:18 host unix_chkpwd[7152]: password check failed for user (root) Jan 21 06:28:18 host sshd[7137]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 06:28:20 host sshd[7137]: Failed password for invalid user root from 166.90.116.109 port 45817 ssh2 Jan 21 06:28:23 host unix_chkpwd[7166]: password check failed for user (root) Jan 21 06:28:23 host sshd[7137]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 06:28:25 host sshd[7137]: Failed password for invalid user root from 166.90.116.109 port 45817 ssh2 Jan 21 06:37:51 host sshd[8702]: Invalid user jet from 104.244.74.6 port 40908 Jan 21 06:37:51 host sshd[8702]: input_userauth_request: invalid user jet [preauth] Jan 21 06:37:51 host sshd[8702]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:37:51 host sshd[8702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.74.6 Jan 21 06:37:52 host sshd[8702]: Failed password for invalid user jet from 104.244.74.6 port 40908 ssh2 Jan 21 06:37:53 host sshd[8702]: Connection closed by 104.244.74.6 port 40908 [preauth] Jan 21 06:45:28 host sshd[9931]: Invalid user pingpang from 102.68.141.170 port 58520 Jan 21 06:45:28 host sshd[9931]: input_userauth_request: invalid user pingpang [preauth] Jan 21 06:45:29 host sshd[9931]: pam_unix(sshd:auth): check pass; user unknown Jan 21 06:45:29 host sshd[9931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.68.141.170 Jan 21 06:45:31 host sshd[9931]: Failed password for invalid user pingpang from 102.68.141.170 port 58520 ssh2 Jan 21 06:45:31 host sshd[9931]: Connection closed by 102.68.141.170 port 58520 [preauth] Jan 21 06:50:26 host sshd[10743]: User root from 59.25.72.10 not allowed because not listed in AllowUsers Jan 21 06:50:26 host sshd[10743]: input_userauth_request: invalid user root [preauth] Jan 21 06:50:26 host unix_chkpwd[10753]: password check failed for user (root) Jan 21 06:50:26 host sshd[10743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.72.10 user=root Jan 21 06:50:26 host sshd[10743]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 06:50:28 host sshd[10743]: Failed password for invalid user root from 59.25.72.10 port 39057 ssh2 Jan 21 07:12:52 host sshd[14294]: ssh_dispatch_run_fatal: Connection from 220.132.132.19 port 41995: bignum is negative [preauth] Jan 21 07:18:01 host sshd[15212]: Invalid user admin from 114.32.250.42 port 36643 Jan 21 07:18:01 host sshd[15212]: input_userauth_request: invalid user admin [preauth] Jan 21 07:18:01 host sshd[15212]: pam_unix(sshd:auth): check pass; user unknown Jan 21 07:18:01 host sshd[15212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.250.42 Jan 21 07:18:03 host sshd[15212]: Failed password for invalid user admin from 114.32.250.42 port 36643 ssh2 Jan 21 07:18:04 host sshd[15212]: Failed password for invalid user admin from 114.32.250.42 port 36643 ssh2 Jan 21 07:18:04 host sshd[15212]: pam_unix(sshd:auth): check pass; user unknown Jan 21 07:18:07 host sshd[15212]: Failed password for invalid user admin from 114.32.250.42 port 36643 ssh2 Jan 21 07:18:07 host sshd[15212]: pam_unix(sshd:auth): check pass; user unknown Jan 21 07:18:10 host sshd[15212]: Failed password for invalid user admin from 114.32.250.42 port 36643 ssh2 Jan 21 07:18:10 host sshd[15212]: Connection reset by 114.32.250.42 port 36643 [preauth] Jan 21 07:18:10 host sshd[15212]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.250.42 Jan 21 07:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 07:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 07:21:02 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:02 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=palco123 user-2=gifterman user-3=kottayamcalldriv user-4=phmetals user-5=wwwnexidigital user-6=mrsclean user-7=bonifacegroup user-8=wwwevmhonda user-9=straightcurve user-10=wwwletsstalkfood user-11=vfmassets user-12=shalinijames user-13=wwwtestugo user-14=pmcresources user-15=wwwkmaorg user-16=disposeat user-17=remysagr user-18=wwwkapin user-19=woodpeck user-20=travelboniface user-21=wwwresourcehunte user-22=keralaholi user-23=wwwrmswll user-24=ugotscom user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=cochintaxi user-30=wwwkaretakers feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 07:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OOCwX4OnDxlcBuKu.~ Jan 21 07:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OOCwX4OnDxlcBuKu.~' Jan 21 07:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OOCwX4OnDxlcBuKu.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 07:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 07:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 07:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 07:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 07:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 07:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 07:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 07:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 07:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 07:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 07:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 07:30:24 host sshd[17472]: Invalid user yangyi from 106.10.122.53 port 47948 Jan 21 07:30:24 host sshd[17472]: input_userauth_request: invalid user yangyi [preauth] Jan 21 07:30:24 host sshd[17472]: pam_unix(sshd:auth): check pass; user unknown Jan 21 07:30:24 host sshd[17472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 21 07:30:26 host sshd[17472]: Failed password for invalid user yangyi from 106.10.122.53 port 47948 ssh2 Jan 21 07:30:26 host sshd[17472]: Connection closed by 106.10.122.53 port 47948 [preauth] Jan 21 07:34:25 host sshd[17981]: Invalid user uucpadm from 205.185.113.129 port 35636 Jan 21 07:34:25 host sshd[17981]: input_userauth_request: invalid user uucpadm [preauth] Jan 21 07:34:25 host sshd[17981]: pam_unix(sshd:auth): check pass; user unknown Jan 21 07:34:25 host sshd[17981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 21 07:34:27 host sshd[17981]: Failed password for invalid user uucpadm from 205.185.113.129 port 35636 ssh2 Jan 21 07:34:28 host sshd[17981]: Connection closed by 205.185.113.129 port 35636 [preauth] Jan 21 07:38:30 host sshd[18455]: Bad packet length 3613523697. [preauth] Jan 21 07:38:30 host sshd[18455]: ssh_dispatch_run_fatal: Connection from 211.109.181.11 port 59278: message authentication code incorrect [preauth] Jan 21 07:39:01 host sshd[18521]: Invalid user admin from 220.94.5.121 port 61667 Jan 21 07:39:01 host sshd[18521]: input_userauth_request: invalid user admin [preauth] Jan 21 07:39:01 host sshd[18521]: pam_unix(sshd:auth): check pass; user unknown Jan 21 07:39:01 host sshd[18521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.94.5.121 Jan 21 07:39:03 host sshd[18521]: Failed password for invalid user admin from 220.94.5.121 port 61667 ssh2 Jan 21 07:39:04 host sshd[18521]: Connection reset by 220.94.5.121 port 61667 [preauth] Jan 21 07:43:13 host sshd[19192]: Invalid user remote from 62.233.50.248 port 6118 Jan 21 07:43:13 host sshd[19192]: input_userauth_request: invalid user remote [preauth] Jan 21 07:43:14 host sshd[19192]: pam_unix(sshd:auth): check pass; user unknown Jan 21 07:43:14 host sshd[19192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 21 07:43:16 host sshd[19192]: Failed password for invalid user remote from 62.233.50.248 port 6118 ssh2 Jan 21 07:43:16 host sshd[19192]: Received disconnect from 62.233.50.248 port 6118:11: Client disconnecting normally [preauth] Jan 21 07:43:16 host sshd[19192]: Disconnected from 62.233.50.248 port 6118 [preauth] Jan 21 07:48:22 host sshd[20218]: Invalid user pi from 122.117.99.202 port 48313 Jan 21 07:48:22 host sshd[20218]: input_userauth_request: invalid user pi [preauth] Jan 21 07:48:22 host sshd[20218]: pam_unix(sshd:auth): check pass; user unknown Jan 21 07:48:22 host sshd[20218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.99.202 Jan 21 07:48:25 host sshd[20218]: Failed password for invalid user pi from 122.117.99.202 port 48313 ssh2 Jan 21 07:48:26 host sshd[20218]: pam_unix(sshd:auth): check pass; user unknown Jan 21 07:48:28 host sshd[20218]: Failed password for invalid user pi from 122.117.99.202 port 48313 ssh2 Jan 21 07:48:28 host sshd[20218]: Connection reset by 122.117.99.202 port 48313 [preauth] Jan 21 07:48:28 host sshd[20218]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.99.202 Jan 21 07:48:59 host sshd[20315]: Invalid user hh from 194.110.203.109 port 45524 Jan 21 07:48:59 host sshd[20315]: input_userauth_request: invalid user hh [preauth] Jan 21 07:48:59 host sshd[20315]: pam_unix(sshd:auth): check pass; user unknown Jan 21 07:48:59 host sshd[20315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 07:49:01 host sshd[20315]: Failed password for invalid user hh from 194.110.203.109 port 45524 ssh2 Jan 21 07:49:04 host sshd[20315]: pam_unix(sshd:auth): check pass; user unknown Jan 21 07:49:07 host sshd[20315]: Failed password for invalid user hh from 194.110.203.109 port 45524 ssh2 Jan 21 07:49:10 host sshd[20315]: pam_unix(sshd:auth): check pass; user unknown Jan 21 07:49:12 host sshd[20315]: Failed password for invalid user hh from 194.110.203.109 port 45524 ssh2 Jan 21 07:49:15 host sshd[20315]: Connection closed by 194.110.203.109 port 45524 [preauth] Jan 21 07:49:15 host sshd[20315]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 08:01:08 host sshd[22307]: Did not receive identification string from 92.255.85.115 port 58258 Jan 21 08:09:51 host sshd[23737]: Invalid user Yukako from 162.218.126.136 port 33486 Jan 21 08:09:51 host sshd[23737]: input_userauth_request: invalid user Yukako [preauth] Jan 21 08:09:51 host sshd[23737]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:09:51 host sshd[23737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Jan 21 08:09:52 host sshd[23737]: Failed password for invalid user Yukako from 162.218.126.136 port 33486 ssh2 Jan 21 08:09:53 host sshd[23737]: Connection closed by 162.218.126.136 port 33486 [preauth] Jan 21 08:10:57 host sshd[23973]: Invalid user admin from 92.255.85.115 port 60367 Jan 21 08:10:57 host sshd[23973]: input_userauth_request: invalid user admin [preauth] Jan 21 08:10:57 host sshd[23973]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:10:57 host sshd[23973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 21 08:10:59 host sshd[23973]: Failed password for invalid user admin from 92.255.85.115 port 60367 ssh2 Jan 21 08:10:59 host sshd[23973]: Connection reset by 92.255.85.115 port 60367 [preauth] Jan 21 08:17:24 host sshd[24907]: Invalid user support from 92.255.85.115 port 56643 Jan 21 08:17:24 host sshd[24907]: input_userauth_request: invalid user support [preauth] Jan 21 08:17:25 host sshd[24907]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:17:25 host sshd[24907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.255.85.115 Jan 21 08:17:26 host sshd[24907]: Failed password for invalid user support from 92.255.85.115 port 56643 ssh2 Jan 21 08:17:26 host sshd[24907]: Connection reset by 92.255.85.115 port 56643 [preauth] Jan 21 08:18:15 host sshd[25136]: Invalid user pi from 118.34.209.108 port 37803 Jan 21 08:18:15 host sshd[25136]: input_userauth_request: invalid user pi [preauth] Jan 21 08:18:15 host sshd[25136]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:18:15 host sshd[25136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.209.108 Jan 21 08:18:16 host sshd[25136]: Failed password for invalid user pi from 118.34.209.108 port 37803 ssh2 Jan 21 08:18:20 host sshd[25136]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:18:22 host sshd[25136]: Failed password for invalid user pi from 118.34.209.108 port 37803 ssh2 Jan 21 08:18:23 host sshd[25136]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:18:25 host sshd[25136]: Failed password for invalid user pi from 118.34.209.108 port 37803 ssh2 Jan 21 08:18:27 host sshd[25136]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:18:28 host sshd[25136]: Failed password for invalid user pi from 118.34.209.108 port 37803 ssh2 Jan 21 08:18:29 host sshd[25136]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:18:31 host sshd[25136]: Failed password for invalid user pi from 118.34.209.108 port 37803 ssh2 Jan 21 08:18:33 host sshd[25136]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:18:35 host sshd[25136]: Failed password for invalid user pi from 118.34.209.108 port 37803 ssh2 Jan 21 08:18:35 host sshd[25136]: error: maximum authentication attempts exceeded for invalid user pi from 118.34.209.108 port 37803 ssh2 [preauth] Jan 21 08:18:35 host sshd[25136]: Disconnecting: Too many authentication failures [preauth] Jan 21 08:18:35 host sshd[25136]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.34.209.108 Jan 21 08:18:35 host sshd[25136]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 21 08:19:00 host sshd[25271]: User ftp from 112.173.157.225 not allowed because not listed in AllowUsers Jan 21 08:19:00 host sshd[25271]: input_userauth_request: invalid user ftp [preauth] Jan 21 08:19:00 host unix_chkpwd[25274]: password check failed for user (ftp) Jan 21 08:19:00 host sshd[25271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.173.157.225 user=ftp Jan 21 08:19:00 host sshd[25271]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 21 08:19:01 host sshd[25271]: Failed password for invalid user ftp from 112.173.157.225 port 62045 ssh2 Jan 21 08:19:02 host unix_chkpwd[25287]: password check failed for user (ftp) Jan 21 08:19:02 host sshd[25271]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 21 08:19:05 host sshd[25271]: Failed password for invalid user ftp from 112.173.157.225 port 62045 ssh2 Jan 21 08:19:05 host unix_chkpwd[25291]: password check failed for user (ftp) Jan 21 08:19:05 host sshd[25271]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 21 08:19:07 host sshd[25271]: Failed password for invalid user ftp from 112.173.157.225 port 62045 ssh2 Jan 21 08:19:08 host sshd[25271]: Failed password for invalid user ftp from 112.173.157.225 port 62045 ssh2 Jan 21 08:19:08 host unix_chkpwd[25319]: password check failed for user (ftp) Jan 21 08:19:08 host sshd[25271]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 21 08:19:10 host sshd[25271]: Failed password for invalid user ftp from 112.173.157.225 port 62045 ssh2 Jan 21 08:19:49 host sshd[25434]: Invalid user ibmuser from 139.59.105.82 port 49102 Jan 21 08:19:49 host sshd[25434]: input_userauth_request: invalid user ibmuser [preauth] Jan 21 08:19:49 host sshd[25434]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:19:49 host sshd[25434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.105.82 Jan 21 08:19:51 host sshd[25434]: Failed password for invalid user ibmuser from 139.59.105.82 port 49102 ssh2 Jan 21 08:19:52 host sshd[25434]: Received disconnect from 139.59.105.82 port 49102:11: Bye Bye [preauth] Jan 21 08:19:52 host sshd[25434]: Disconnected from 139.59.105.82 port 49102 [preauth] Jan 21 08:20:28 host sshd[25537]: Invalid user test8 from 188.235.137.135 port 48452 Jan 21 08:20:28 host sshd[25537]: input_userauth_request: invalid user test8 [preauth] Jan 21 08:20:28 host sshd[25537]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:20:28 host sshd[25537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.235.137.135 Jan 21 08:20:31 host sshd[25537]: Failed password for invalid user test8 from 188.235.137.135 port 48452 ssh2 Jan 21 08:20:31 host sshd[25537]: Received disconnect from 188.235.137.135 port 48452:11: Bye Bye [preauth] Jan 21 08:20:31 host sshd[25537]: Disconnected from 188.235.137.135 port 48452 [preauth] Jan 21 08:21:02 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=remysagr user-2=disposeat user-3=wwwkmaorg user-4=woodpeck user-5=wwwkapin user-6=shalinijames user-7=wwwtestugo user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=wwwletsstalkfood user-13=straightcurve user-14=phmetals user-15=kottayamcalldriv user-16=palco123 user-17=gifterman user-18=wwwnexidigital user-19=mrsclean user-20=cochintaxi user-21=wwwkaretakers user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=wwwresourcehunte user-29=keralaholi user-30=wwwrmswll feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 08:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3tCl6Jj482QiCBKI.~ Jan 21 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3tCl6Jj482QiCBKI.~' Jan 21 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-3tCl6Jj482QiCBKI.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 08:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 08:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 08:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 08:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 08:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 08:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 08:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 08:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 08:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 08:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 08:21:30 host sshd[25916]: Invalid user postgres from 222.119.64.11 port 38700 Jan 21 08:21:30 host sshd[25916]: input_userauth_request: invalid user postgres [preauth] Jan 21 08:21:30 host sshd[25916]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:21:30 host sshd[25916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.119.64.11 Jan 21 08:21:32 host sshd[25916]: Failed password for invalid user postgres from 222.119.64.11 port 38700 ssh2 Jan 21 08:21:32 host sshd[25916]: Received disconnect from 222.119.64.11 port 38700:11: Bye Bye [preauth] Jan 21 08:21:32 host sshd[25916]: Disconnected from 222.119.64.11 port 38700 [preauth] Jan 21 08:21:44 host sshd[25937]: Invalid user labuser from 128.199.210.191 port 56568 Jan 21 08:21:44 host sshd[25937]: input_userauth_request: invalid user labuser [preauth] Jan 21 08:21:44 host sshd[25937]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:21:44 host sshd[25937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.210.191 Jan 21 08:21:46 host sshd[25937]: Failed password for invalid user labuser from 128.199.210.191 port 56568 ssh2 Jan 21 08:21:46 host sshd[25937]: Received disconnect from 128.199.210.191 port 56568:11: Bye Bye [preauth] Jan 21 08:21:46 host sshd[25937]: Disconnected from 128.199.210.191 port 56568 [preauth] Jan 21 08:23:00 host sshd[26193]: Invalid user ansibleuser from 139.59.127.178 port 33640 Jan 21 08:23:00 host sshd[26193]: input_userauth_request: invalid user ansibleuser [preauth] Jan 21 08:23:00 host sshd[26193]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:23:00 host sshd[26193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.127.178 Jan 21 08:23:02 host sshd[26193]: Failed password for invalid user ansibleuser from 139.59.127.178 port 33640 ssh2 Jan 21 08:23:02 host sshd[26193]: Received disconnect from 139.59.127.178 port 33640:11: Bye Bye [preauth] Jan 21 08:23:02 host sshd[26193]: Disconnected from 139.59.127.178 port 33640 [preauth] Jan 21 08:23:14 host sshd[26231]: Invalid user devel from 139.59.229.85 port 48358 Jan 21 08:23:14 host sshd[26231]: input_userauth_request: invalid user devel [preauth] Jan 21 08:23:14 host sshd[26231]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:23:14 host sshd[26231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.229.85 Jan 21 08:23:16 host sshd[26231]: Failed password for invalid user devel from 139.59.229.85 port 48358 ssh2 Jan 21 08:23:16 host sshd[26231]: Received disconnect from 139.59.229.85 port 48358:11: Bye Bye [preauth] Jan 21 08:23:16 host sshd[26231]: Disconnected from 139.59.229.85 port 48358 [preauth] Jan 21 08:25:23 host sshd[26488]: Invalid user ansibleuser from 139.59.105.82 port 54836 Jan 21 08:25:23 host sshd[26488]: input_userauth_request: invalid user ansibleuser [preauth] Jan 21 08:25:23 host sshd[26488]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:25:23 host sshd[26488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.105.82 Jan 21 08:25:26 host sshd[26488]: Failed password for invalid user ansibleuser from 139.59.105.82 port 54836 ssh2 Jan 21 08:25:26 host sshd[26488]: Received disconnect from 139.59.105.82 port 54836:11: Bye Bye [preauth] Jan 21 08:25:26 host sshd[26488]: Disconnected from 139.59.105.82 port 54836 [preauth] Jan 21 08:25:45 host sshd[26535]: Invalid user admin from 98.59.154.71 port 41808 Jan 21 08:25:45 host sshd[26535]: input_userauth_request: invalid user admin [preauth] Jan 21 08:25:45 host sshd[26535]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:25:45 host sshd[26535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.59.154.71 Jan 21 08:25:47 host sshd[26535]: Failed password for invalid user admin from 98.59.154.71 port 41808 ssh2 Jan 21 08:25:47 host sshd[26535]: Connection reset by 98.59.154.71 port 41808 [preauth] Jan 21 08:25:55 host sshd[26550]: Invalid user admin from 128.199.210.191 port 58296 Jan 21 08:25:55 host sshd[26550]: input_userauth_request: invalid user admin [preauth] Jan 21 08:25:55 host sshd[26550]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:25:55 host sshd[26550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.210.191 Jan 21 08:25:56 host sshd[26550]: Failed password for invalid user admin from 128.199.210.191 port 58296 ssh2 Jan 21 08:25:56 host sshd[26550]: Received disconnect from 128.199.210.191 port 58296:11: Bye Bye [preauth] Jan 21 08:25:56 host sshd[26550]: Disconnected from 128.199.210.191 port 58296 [preauth] Jan 21 08:26:21 host sshd[26589]: Invalid user testuser from 222.119.64.11 port 55236 Jan 21 08:26:21 host sshd[26589]: input_userauth_request: invalid user testuser [preauth] Jan 21 08:26:21 host sshd[26589]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:26:21 host sshd[26589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.119.64.11 Jan 21 08:26:22 host sshd[26594]: Invalid user testuser from 139.59.127.178 port 40914 Jan 21 08:26:22 host sshd[26594]: input_userauth_request: invalid user testuser [preauth] Jan 21 08:26:22 host sshd[26594]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:26:22 host sshd[26594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.127.178 Jan 21 08:26:23 host sshd[26589]: Failed password for invalid user testuser from 222.119.64.11 port 55236 ssh2 Jan 21 08:26:24 host sshd[26589]: Received disconnect from 222.119.64.11 port 55236:11: Bye Bye [preauth] Jan 21 08:26:24 host sshd[26589]: Disconnected from 222.119.64.11 port 55236 [preauth] Jan 21 08:26:24 host sshd[26594]: Failed password for invalid user testuser from 139.59.127.178 port 40914 ssh2 Jan 21 08:26:24 host sshd[26594]: Received disconnect from 139.59.127.178 port 40914:11: Bye Bye [preauth] Jan 21 08:26:24 host sshd[26594]: Disconnected from 139.59.127.178 port 40914 [preauth] Jan 21 08:26:33 host sshd[26637]: Invalid user wordpress from 139.59.229.85 port 37162 Jan 21 08:26:33 host sshd[26637]: input_userauth_request: invalid user wordpress [preauth] Jan 21 08:26:33 host sshd[26637]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:26:33 host sshd[26637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.229.85 Jan 21 08:26:35 host sshd[26637]: Failed password for invalid user wordpress from 139.59.229.85 port 37162 ssh2 Jan 21 08:26:35 host sshd[26637]: Received disconnect from 139.59.229.85 port 37162:11: Bye Bye [preauth] Jan 21 08:26:35 host sshd[26637]: Disconnected from 139.59.229.85 port 37162 [preauth] Jan 21 08:26:41 host sshd[26649]: Invalid user ts3user from 139.59.105.82 port 40684 Jan 21 08:26:41 host sshd[26649]: input_userauth_request: invalid user ts3user [preauth] Jan 21 08:26:41 host sshd[26649]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:26:41 host sshd[26649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.105.82 Jan 21 08:26:43 host sshd[26649]: Failed password for invalid user ts3user from 139.59.105.82 port 40684 ssh2 Jan 21 08:27:16 host sshd[26749]: Invalid user testdummy from 128.199.210.191 port 56654 Jan 21 08:27:16 host sshd[26749]: input_userauth_request: invalid user testdummy [preauth] Jan 21 08:27:16 host sshd[26749]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:27:16 host sshd[26749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.210.191 Jan 21 08:27:18 host sshd[26749]: Failed password for invalid user testdummy from 128.199.210.191 port 56654 ssh2 Jan 21 08:27:18 host sshd[26749]: Received disconnect from 128.199.210.191 port 56654:11: Bye Bye [preauth] Jan 21 08:27:18 host sshd[26749]: Disconnected from 128.199.210.191 port 56654 [preauth] Jan 21 08:27:39 host sshd[26840]: Invalid user sftpadmin from 139.59.127.178 port 35332 Jan 21 08:27:39 host sshd[26840]: input_userauth_request: invalid user sftpadmin [preauth] Jan 21 08:27:39 host sshd[26840]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:27:39 host sshd[26840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.127.178 Jan 21 08:27:41 host sshd[26840]: Failed password for invalid user sftpadmin from 139.59.127.178 port 35332 ssh2 Jan 21 08:27:41 host sshd[26840]: Received disconnect from 139.59.127.178 port 35332:11: Bye Bye [preauth] Jan 21 08:27:41 host sshd[26840]: Disconnected from 139.59.127.178 port 35332 [preauth] Jan 21 08:27:59 host sshd[26988]: Invalid user ttuser from 222.119.64.11 port 53762 Jan 21 08:27:59 host sshd[26988]: input_userauth_request: invalid user ttuser [preauth] Jan 21 08:27:59 host sshd[26988]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:27:59 host sshd[26988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.119.64.11 Jan 21 08:28:00 host sshd[26988]: Failed password for invalid user ttuser from 222.119.64.11 port 53762 ssh2 Jan 21 08:28:00 host sshd[26988]: Received disconnect from 222.119.64.11 port 53762:11: Bye Bye [preauth] Jan 21 08:28:00 host sshd[26988]: Disconnected from 222.119.64.11 port 53762 [preauth] Jan 21 08:28:04 host sshd[27030]: Invalid user ubuntu from 188.235.137.135 port 39811 Jan 21 08:28:04 host sshd[27030]: input_userauth_request: invalid user ubuntu [preauth] Jan 21 08:28:04 host sshd[27030]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:28:04 host sshd[27030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.235.137.135 Jan 21 08:28:07 host sshd[27030]: Failed password for invalid user ubuntu from 188.235.137.135 port 39811 ssh2 Jan 21 08:28:07 host sshd[27030]: Received disconnect from 188.235.137.135 port 39811:11: Bye Bye [preauth] Jan 21 08:28:07 host sshd[27030]: Disconnected from 188.235.137.135 port 39811 [preauth] Jan 21 08:28:07 host sshd[27046]: Invalid user sysop from 139.59.229.85 port 48660 Jan 21 08:28:07 host sshd[27046]: input_userauth_request: invalid user sysop [preauth] Jan 21 08:28:07 host sshd[27046]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:28:07 host sshd[27046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.229.85 Jan 21 08:28:09 host sshd[27046]: Failed password for invalid user sysop from 139.59.229.85 port 48660 ssh2 Jan 21 08:29:39 host sshd[27252]: Invalid user postgres from 188.235.137.135 port 33105 Jan 21 08:29:39 host sshd[27252]: input_userauth_request: invalid user postgres [preauth] Jan 21 08:29:39 host sshd[27252]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:29:39 host sshd[27252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.235.137.135 Jan 21 08:29:40 host sshd[27252]: Failed password for invalid user postgres from 188.235.137.135 port 33105 ssh2 Jan 21 08:29:41 host sshd[27252]: Received disconnect from 188.235.137.135 port 33105:11: Bye Bye [preauth] Jan 21 08:29:41 host sshd[27252]: Disconnected from 188.235.137.135 port 33105 [preauth] Jan 21 08:44:04 host sshd[29335]: ssh_dispatch_run_fatal: Connection from 220.132.56.146 port 52372: bignum is negative [preauth] Jan 21 08:52:02 host sshd[31116]: Invalid user admin from 220.135.149.5 port 58200 Jan 21 08:52:02 host sshd[31116]: input_userauth_request: invalid user admin [preauth] Jan 21 08:52:02 host sshd[31116]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:52:02 host sshd[31116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.149.5 Jan 21 08:52:05 host sshd[31116]: Failed password for invalid user admin from 220.135.149.5 port 58200 ssh2 Jan 21 08:52:05 host sshd[31116]: Failed password for invalid user admin from 220.135.149.5 port 58200 ssh2 Jan 21 08:52:07 host sshd[31116]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:52:09 host sshd[31116]: Failed password for invalid user admin from 220.135.149.5 port 58200 ssh2 Jan 21 08:52:10 host sshd[31116]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:52:12 host sshd[31116]: Failed password for invalid user admin from 220.135.149.5 port 58200 ssh2 Jan 21 08:52:13 host sshd[31116]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:52:15 host sshd[31116]: Failed password for invalid user admin from 220.135.149.5 port 58200 ssh2 Jan 21 08:53:50 host sshd[31341]: Invalid user testugo from 141.98.11.150 port 46194 Jan 21 08:53:50 host sshd[31341]: input_userauth_request: invalid user testugo [preauth] Jan 21 08:53:50 host sshd[31341]: pam_unix(sshd:auth): check pass; user unknown Jan 21 08:53:50 host sshd[31341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.150 Jan 21 08:53:53 host sshd[31341]: Failed password for invalid user testugo from 141.98.11.150 port 46194 ssh2 Jan 21 08:53:54 host sshd[31341]: Received disconnect from 141.98.11.150 port 46194:11: Normal Shutdown, Thank you for playing [preauth] Jan 21 08:53:54 host sshd[31341]: Disconnected from 141.98.11.150 port 46194 [preauth] Jan 21 08:57:05 host sshd[31813]: Connection reset by 67.176.136.119 port 63408 [preauth] Jan 21 09:00:22 host sshd[32189]: Invalid user testugo from 141.98.11.150 port 35584 Jan 21 09:00:22 host sshd[32189]: input_userauth_request: invalid user testugo [preauth] Jan 21 09:00:22 host sshd[32189]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:00:22 host sshd[32189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.150 Jan 21 09:00:24 host sshd[32189]: Failed password for invalid user testugo from 141.98.11.150 port 35584 ssh2 Jan 21 09:00:24 host sshd[32189]: Received disconnect from 141.98.11.150 port 35584:11: Normal Shutdown, Thank you for playing [preauth] Jan 21 09:00:24 host sshd[32189]: Disconnected from 141.98.11.150 port 35584 [preauth] Jan 21 09:07:02 host sshd[698]: Invalid user testugo from 141.98.11.150 port 53942 Jan 21 09:07:02 host sshd[698]: input_userauth_request: invalid user testugo [preauth] Jan 21 09:07:02 host sshd[698]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:07:02 host sshd[698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.150 Jan 21 09:07:04 host sshd[698]: Failed password for invalid user testugo from 141.98.11.150 port 53942 ssh2 Jan 21 09:07:04 host sshd[698]: Received disconnect from 141.98.11.150 port 53942:11: Normal Shutdown, Thank you for playing [preauth] Jan 21 09:07:04 host sshd[698]: Disconnected from 141.98.11.150 port 53942 [preauth] Jan 21 09:13:55 host sshd[1631]: Did not receive identification string from 8.219.76.192 port 61000 Jan 21 09:19:45 host sshd[2275]: Invalid user user from 168.235.165.209 port 40408 Jan 21 09:19:45 host sshd[2275]: input_userauth_request: invalid user user [preauth] Jan 21 09:19:45 host sshd[2275]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:19:45 host sshd[2275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.235.165.209 Jan 21 09:19:47 host sshd[2275]: Failed password for invalid user user from 168.235.165.209 port 40408 ssh2 Jan 21 09:19:48 host sshd[2275]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:19:50 host sshd[2275]: Failed password for invalid user user from 168.235.165.209 port 40408 ssh2 Jan 21 09:19:51 host sshd[2275]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:19:53 host sshd[2275]: Failed password for invalid user user from 168.235.165.209 port 40408 ssh2 Jan 21 09:19:54 host sshd[2275]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:19:56 host sshd[2275]: Failed password for invalid user user from 168.235.165.209 port 40408 ssh2 Jan 21 09:19:56 host sshd[2275]: Connection reset by 168.235.165.209 port 40408 [preauth] Jan 21 09:19:56 host sshd[2275]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.235.165.209 Jan 21 09:19:56 host sshd[2275]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 21 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwnexidigital user-2=mrsclean user-3=gifterman user-4=palco123 user-5=kottayamcalldriv user-6=phmetals user-7=straightcurve user-8=wwwletsstalkfood user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=wwwtestugo user-14=shalinijames user-15=woodpeck user-16=wwwkapin user-17=wwwkmaorg user-18=disposeat user-19=remysagr user-20=wwwrmswll user-21=keralaholi user-22=wwwresourcehunte user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=dartsimp user-28=a2zgroup user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 09:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 09:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-87u27aLLU23ooX90.~ Jan 21 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-87u27aLLU23ooX90.~' Jan 21 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-87u27aLLU23ooX90.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 09:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 09:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 09:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 09:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 09:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 09:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 09:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 09:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 09:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 09:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 09:24:46 host sshd[3249]: User root from 100.37.189.176 not allowed because not listed in AllowUsers Jan 21 09:24:46 host sshd[3249]: input_userauth_request: invalid user root [preauth] Jan 21 09:24:46 host unix_chkpwd[3252]: password check failed for user (root) Jan 21 09:24:46 host sshd[3249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=100.37.189.176 user=root Jan 21 09:24:46 host sshd[3249]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 09:24:47 host sshd[3249]: Failed password for invalid user root from 100.37.189.176 port 61335 ssh2 Jan 21 09:24:48 host sshd[3249]: Connection reset by 100.37.189.176 port 61335 [preauth] Jan 21 09:26:25 host sshd[3558]: Invalid user uda from 212.220.204.3 port 40339 Jan 21 09:26:25 host sshd[3558]: input_userauth_request: invalid user uda [preauth] Jan 21 09:26:25 host sshd[3558]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:26:25 host sshd[3558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.220.204.3 Jan 21 09:26:27 host sshd[3558]: Failed password for invalid user uda from 212.220.204.3 port 40339 ssh2 Jan 21 09:26:27 host sshd[3558]: Connection closed by 212.220.204.3 port 40339 [preauth] Jan 21 09:32:34 host sshd[4406]: Invalid user lighthouse from 31.210.211.114 port 37843 Jan 21 09:32:34 host sshd[4406]: input_userauth_request: invalid user lighthouse [preauth] Jan 21 09:32:34 host sshd[4406]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:32:34 host sshd[4406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.210.211.114 Jan 21 09:32:35 host sshd[4406]: Failed password for invalid user lighthouse from 31.210.211.114 port 37843 ssh2 Jan 21 09:32:36 host sshd[4406]: Received disconnect from 31.210.211.114 port 37843:11: Bye Bye [preauth] Jan 21 09:32:36 host sshd[4406]: Disconnected from 31.210.211.114 port 37843 [preauth] Jan 21 09:33:47 host sshd[4559]: Invalid user tempadmin from 159.65.53.91 port 56638 Jan 21 09:33:47 host sshd[4559]: input_userauth_request: invalid user tempadmin [preauth] Jan 21 09:33:47 host sshd[4559]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:33:47 host sshd[4559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.53.91 Jan 21 09:33:48 host sshd[4559]: Failed password for invalid user tempadmin from 159.65.53.91 port 56638 ssh2 Jan 21 09:33:49 host sshd[4559]: Received disconnect from 159.65.53.91 port 56638:11: Bye Bye [preauth] Jan 21 09:33:49 host sshd[4559]: Disconnected from 159.65.53.91 port 56638 [preauth] Jan 21 09:34:39 host sshd[4658]: Invalid user apitest from 107.175.221.233 port 42766 Jan 21 09:34:39 host sshd[4658]: input_userauth_request: invalid user apitest [preauth] Jan 21 09:34:39 host sshd[4658]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:34:39 host sshd[4658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.221.233 Jan 21 09:34:41 host sshd[4658]: Failed password for invalid user apitest from 107.175.221.233 port 42766 ssh2 Jan 21 09:34:41 host sshd[4658]: Received disconnect from 107.175.221.233 port 42766:11: Bye Bye [preauth] Jan 21 09:34:41 host sshd[4658]: Disconnected from 107.175.221.233 port 42766 [preauth] Jan 21 09:36:39 host sshd[4915]: Invalid user mytest from 159.65.53.91 port 40914 Jan 21 09:36:39 host sshd[4915]: input_userauth_request: invalid user mytest [preauth] Jan 21 09:36:39 host sshd[4915]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:36:39 host sshd[4915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.53.91 Jan 21 09:36:41 host sshd[4915]: Failed password for invalid user mytest from 159.65.53.91 port 40914 ssh2 Jan 21 09:36:41 host sshd[4915]: Received disconnect from 159.65.53.91 port 40914:11: Bye Bye [preauth] Jan 21 09:36:41 host sshd[4915]: Disconnected from 159.65.53.91 port 40914 [preauth] Jan 21 09:36:44 host sshd[4925]: Invalid user oracle from 98.243.72.196 port 35464 Jan 21 09:36:44 host sshd[4925]: input_userauth_request: invalid user oracle [preauth] Jan 21 09:36:44 host sshd[4925]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:36:44 host sshd[4925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.243.72.196 Jan 21 09:36:47 host sshd[4925]: Failed password for invalid user oracle from 98.243.72.196 port 35464 ssh2 Jan 21 09:36:47 host sshd[4925]: Received disconnect from 98.243.72.196 port 35464:11: Bye Bye [preauth] Jan 21 09:36:47 host sshd[4925]: Disconnected from 98.243.72.196 port 35464 [preauth] Jan 21 09:37:10 host sshd[4969]: Invalid user node from 103.150.60.6 port 37776 Jan 21 09:37:10 host sshd[4969]: input_userauth_request: invalid user node [preauth] Jan 21 09:37:10 host sshd[4969]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:37:10 host sshd[4969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.150.60.6 Jan 21 09:37:12 host sshd[4969]: Failed password for invalid user node from 103.150.60.6 port 37776 ssh2 Jan 21 09:37:12 host sshd[4969]: Received disconnect from 103.150.60.6 port 37776:11: Bye Bye [preauth] Jan 21 09:37:12 host sshd[4969]: Disconnected from 103.150.60.6 port 37776 [preauth] Jan 21 09:37:28 host sshd[4995]: Invalid user admini from 31.210.211.114 port 42272 Jan 21 09:37:28 host sshd[4995]: input_userauth_request: invalid user admini [preauth] Jan 21 09:37:28 host sshd[4995]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:37:28 host sshd[4995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.210.211.114 Jan 21 09:37:30 host sshd[4995]: Failed password for invalid user admini from 31.210.211.114 port 42272 ssh2 Jan 21 09:37:30 host sshd[4995]: Received disconnect from 31.210.211.114 port 42272:11: Bye Bye [preauth] Jan 21 09:37:30 host sshd[4995]: Disconnected from 31.210.211.114 port 42272 [preauth] Jan 21 09:37:47 host sshd[5151]: Invalid user adminrig from 159.65.53.91 port 39626 Jan 21 09:37:47 host sshd[5151]: input_userauth_request: invalid user adminrig [preauth] Jan 21 09:37:47 host sshd[5151]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:37:47 host sshd[5151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.53.91 Jan 21 09:37:49 host sshd[5151]: Failed password for invalid user adminrig from 159.65.53.91 port 39626 ssh2 Jan 21 09:37:49 host sshd[5151]: Received disconnect from 159.65.53.91 port 39626:11: Bye Bye [preauth] Jan 21 09:37:49 host sshd[5151]: Disconnected from 159.65.53.91 port 39626 [preauth] Jan 21 09:38:06 host sshd[5221]: Invalid user guestuser from 98.243.72.196 port 35572 Jan 21 09:38:06 host sshd[5221]: input_userauth_request: invalid user guestuser [preauth] Jan 21 09:38:06 host sshd[5221]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:38:06 host sshd[5221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.243.72.196 Jan 21 09:38:09 host sshd[5221]: Failed password for invalid user guestuser from 98.243.72.196 port 35572 ssh2 Jan 21 09:38:09 host sshd[5221]: Received disconnect from 98.243.72.196 port 35572:11: Bye Bye [preauth] Jan 21 09:38:09 host sshd[5221]: Disconnected from 98.243.72.196 port 35572 [preauth] Jan 21 09:38:58 host sshd[5316]: Invalid user arkserver from 31.210.211.114 port 36877 Jan 21 09:38:58 host sshd[5316]: input_userauth_request: invalid user arkserver [preauth] Jan 21 09:38:58 host sshd[5316]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:38:58 host sshd[5316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.210.211.114 Jan 21 09:38:59 host sshd[5316]: Failed password for invalid user arkserver from 31.210.211.114 port 36877 ssh2 Jan 21 09:38:59 host sshd[5316]: Received disconnect from 31.210.211.114 port 36877:11: Bye Bye [preauth] Jan 21 09:38:59 host sshd[5316]: Disconnected from 31.210.211.114 port 36877 [preauth] Jan 21 09:39:18 host sshd[5392]: Invalid user dspace from 98.243.72.196 port 35674 Jan 21 09:39:18 host sshd[5392]: input_userauth_request: invalid user dspace [preauth] Jan 21 09:39:18 host sshd[5392]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:39:18 host sshd[5392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.243.72.196 Jan 21 09:39:21 host sshd[5392]: Failed password for invalid user dspace from 98.243.72.196 port 35674 ssh2 Jan 21 09:39:32 host sshd[5472]: Invalid user dev from 103.150.60.6 port 38142 Jan 21 09:39:32 host sshd[5472]: input_userauth_request: invalid user dev [preauth] Jan 21 09:39:32 host sshd[5472]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:39:32 host sshd[5472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.150.60.6 Jan 21 09:39:34 host sshd[5472]: Failed password for invalid user dev from 103.150.60.6 port 38142 ssh2 Jan 21 09:39:34 host sshd[5472]: Received disconnect from 103.150.60.6 port 38142:11: Bye Bye [preauth] Jan 21 09:39:34 host sshd[5472]: Disconnected from 103.150.60.6 port 38142 [preauth] Jan 21 09:39:41 host sshd[5487]: Invalid user hi from 194.110.203.109 port 46086 Jan 21 09:39:41 host sshd[5487]: input_userauth_request: invalid user hi [preauth] Jan 21 09:39:41 host sshd[5487]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:39:41 host sshd[5487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 09:39:43 host sshd[5487]: Failed password for invalid user hi from 194.110.203.109 port 46086 ssh2 Jan 21 09:39:46 host sshd[5487]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:39:48 host sshd[5487]: Failed password for invalid user hi from 194.110.203.109 port 46086 ssh2 Jan 21 09:39:51 host sshd[5487]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:39:53 host sshd[5487]: Failed password for invalid user hi from 194.110.203.109 port 46086 ssh2 Jan 21 09:39:56 host sshd[5487]: Connection closed by 194.110.203.109 port 46086 [preauth] Jan 21 09:39:56 host sshd[5487]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 09:40:05 host sshd[5549]: Invalid user herbert from 107.189.30.59 port 37456 Jan 21 09:40:05 host sshd[5549]: input_userauth_request: invalid user herbert [preauth] Jan 21 09:40:05 host sshd[5549]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:40:05 host sshd[5549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 21 09:40:07 host sshd[5549]: Failed password for invalid user herbert from 107.189.30.59 port 37456 ssh2 Jan 21 09:40:08 host sshd[5549]: Connection closed by 107.189.30.59 port 37456 [preauth] Jan 21 09:40:49 host sshd[5641]: Invalid user dnsadmin from 107.175.221.233 port 41952 Jan 21 09:40:49 host sshd[5641]: input_userauth_request: invalid user dnsadmin [preauth] Jan 21 09:40:49 host sshd[5641]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:40:49 host sshd[5641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.221.233 Jan 21 09:40:50 host sshd[5641]: Failed password for invalid user dnsadmin from 107.175.221.233 port 41952 ssh2 Jan 21 09:40:51 host sshd[5641]: Received disconnect from 107.175.221.233 port 41952:11: Bye Bye [preauth] Jan 21 09:40:51 host sshd[5641]: Disconnected from 107.175.221.233 port 41952 [preauth] Jan 21 09:40:51 host sshd[5646]: Invalid user mailuser from 103.150.60.6 port 60804 Jan 21 09:40:51 host sshd[5646]: input_userauth_request: invalid user mailuser [preauth] Jan 21 09:40:51 host sshd[5646]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:40:51 host sshd[5646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.150.60.6 Jan 21 09:40:53 host sshd[5646]: Failed password for invalid user mailuser from 103.150.60.6 port 60804 ssh2 Jan 21 09:40:53 host sshd[5646]: Received disconnect from 103.150.60.6 port 60804:11: Bye Bye [preauth] Jan 21 09:40:53 host sshd[5646]: Disconnected from 103.150.60.6 port 60804 [preauth] Jan 21 09:43:18 host sshd[5963]: Invalid user phpmyadmin from 107.175.221.233 port 41650 Jan 21 09:43:18 host sshd[5963]: input_userauth_request: invalid user phpmyadmin [preauth] Jan 21 09:43:18 host sshd[5963]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:43:18 host sshd[5963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.221.233 Jan 21 09:43:20 host sshd[5963]: Failed password for invalid user phpmyadmin from 107.175.221.233 port 41650 ssh2 Jan 21 09:43:21 host sshd[5963]: Received disconnect from 107.175.221.233 port 41650:11: Bye Bye [preauth] Jan 21 09:43:21 host sshd[5963]: Disconnected from 107.175.221.233 port 41650 [preauth] Jan 21 09:50:28 host sshd[7185]: Invalid user Admin from 59.28.87.5 port 60925 Jan 21 09:50:28 host sshd[7185]: input_userauth_request: invalid user Admin [preauth] Jan 21 09:50:28 host sshd[7185]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:50:28 host sshd[7185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.28.87.5 Jan 21 09:50:30 host sshd[7185]: Failed password for invalid user Admin from 59.28.87.5 port 60925 ssh2 Jan 21 09:50:30 host sshd[7185]: Connection reset by 59.28.87.5 port 60925 [preauth] Jan 21 09:53:11 host sshd[7570]: Invalid user stats from 69.57.163.238 port 44050 Jan 21 09:53:11 host sshd[7570]: input_userauth_request: invalid user stats [preauth] Jan 21 09:53:11 host sshd[7570]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:53:11 host sshd[7570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.57.163.238 Jan 21 09:53:12 host sshd[7570]: Failed password for invalid user stats from 69.57.163.238 port 44050 ssh2 Jan 21 09:53:13 host sshd[7570]: Received disconnect from 69.57.163.238 port 44050:11: Bye Bye [preauth] Jan 21 09:53:13 host sshd[7570]: Disconnected from 69.57.163.238 port 44050 [preauth] Jan 21 09:54:04 host sshd[7713]: User mail from 91.121.85.25 not allowed because not listed in AllowUsers Jan 21 09:54:04 host sshd[7713]: input_userauth_request: invalid user mail [preauth] Jan 21 09:54:04 host unix_chkpwd[7716]: password check failed for user (mail) Jan 21 09:54:04 host sshd[7713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.85.25 user=mail Jan 21 09:54:04 host sshd[7713]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mail" Jan 21 09:54:06 host sshd[7713]: Failed password for invalid user mail from 91.121.85.25 port 52288 ssh2 Jan 21 09:54:06 host sshd[7713]: Received disconnect from 91.121.85.25 port 52288:11: Bye Bye [preauth] Jan 21 09:54:06 host sshd[7713]: Disconnected from 91.121.85.25 port 52288 [preauth] Jan 21 09:54:09 host sshd[7724]: Invalid user backups from 103.179.74.2 port 57962 Jan 21 09:54:09 host sshd[7724]: input_userauth_request: invalid user backups [preauth] Jan 21 09:54:09 host sshd[7724]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:54:09 host sshd[7724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.179.74.2 Jan 21 09:54:10 host sshd[7724]: Failed password for invalid user backups from 103.179.74.2 port 57962 ssh2 Jan 21 09:54:11 host sshd[7724]: Received disconnect from 103.179.74.2 port 57962:11: Bye Bye [preauth] Jan 21 09:54:11 host sshd[7724]: Disconnected from 103.179.74.2 port 57962 [preauth] Jan 21 09:55:50 host sshd[8102]: Invalid user pbsadmin from 167.71.0.227 port 45040 Jan 21 09:55:50 host sshd[8102]: input_userauth_request: invalid user pbsadmin [preauth] Jan 21 09:55:50 host sshd[8102]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:55:50 host sshd[8102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.0.227 Jan 21 09:55:53 host sshd[8102]: Failed password for invalid user pbsadmin from 167.71.0.227 port 45040 ssh2 Jan 21 09:55:53 host sshd[8102]: Received disconnect from 167.71.0.227 port 45040:11: Bye Bye [preauth] Jan 21 09:55:53 host sshd[8102]: Disconnected from 167.71.0.227 port 45040 [preauth] Jan 21 09:56:19 host sshd[8147]: User root from 106.10.122.53 not allowed because not listed in AllowUsers Jan 21 09:56:19 host sshd[8147]: input_userauth_request: invalid user root [preauth] Jan 21 09:56:19 host unix_chkpwd[8150]: password check failed for user (root) Jan 21 09:56:19 host sshd[8147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 user=root Jan 21 09:56:19 host sshd[8147]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 09:56:21 host sshd[8147]: Failed password for invalid user root from 106.10.122.53 port 51356 ssh2 Jan 21 09:56:21 host sshd[8147]: Connection closed by 106.10.122.53 port 51356 [preauth] Jan 21 09:57:38 host sshd[8350]: Invalid user test from 91.121.85.25 port 58616 Jan 21 09:57:38 host sshd[8350]: input_userauth_request: invalid user test [preauth] Jan 21 09:57:38 host sshd[8350]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:57:38 host sshd[8350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.85.25 Jan 21 09:57:40 host sshd[8350]: Failed password for invalid user test from 91.121.85.25 port 58616 ssh2 Jan 21 09:57:40 host sshd[8350]: Received disconnect from 91.121.85.25 port 58616:11: Bye Bye [preauth] Jan 21 09:57:40 host sshd[8350]: Disconnected from 91.121.85.25 port 58616 [preauth] Jan 21 09:58:59 host sshd[8531]: Invalid user linuxacademy from 103.179.74.2 port 49230 Jan 21 09:58:59 host sshd[8531]: input_userauth_request: invalid user linuxacademy [preauth] Jan 21 09:58:59 host sshd[8531]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:58:59 host sshd[8531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.179.74.2 Jan 21 09:59:02 host sshd[8531]: Failed password for invalid user linuxacademy from 103.179.74.2 port 49230 ssh2 Jan 21 09:59:02 host sshd[8531]: Received disconnect from 103.179.74.2 port 49230:11: Bye Bye [preauth] Jan 21 09:59:02 host sshd[8531]: Disconnected from 103.179.74.2 port 49230 [preauth] Jan 21 09:59:12 host sshd[8562]: Invalid user admin from 167.71.0.227 port 45196 Jan 21 09:59:12 host sshd[8562]: input_userauth_request: invalid user admin [preauth] Jan 21 09:59:12 host sshd[8562]: pam_unix(sshd:auth): check pass; user unknown Jan 21 09:59:12 host sshd[8562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.0.227 Jan 21 09:59:14 host sshd[8562]: Failed password for invalid user admin from 167.71.0.227 port 45196 ssh2 Jan 21 09:59:14 host sshd[8562]: Received disconnect from 167.71.0.227 port 45196:11: Bye Bye [preauth] Jan 21 09:59:14 host sshd[8562]: Disconnected from 167.71.0.227 port 45196 [preauth] Jan 21 10:00:29 host sshd[8768]: Invalid user sammyfiles from 167.71.0.227 port 45304 Jan 21 10:00:29 host sshd[8768]: input_userauth_request: invalid user sammyfiles [preauth] Jan 21 10:00:29 host sshd[8768]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:00:29 host sshd[8768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.0.227 Jan 21 10:00:31 host sshd[8768]: Failed password for invalid user sammyfiles from 167.71.0.227 port 45304 ssh2 Jan 21 10:00:32 host sshd[8779]: Invalid user steam from 103.179.74.2 port 48322 Jan 21 10:00:32 host sshd[8779]: input_userauth_request: invalid user steam [preauth] Jan 21 10:00:32 host sshd[8779]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:00:32 host sshd[8779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.179.74.2 Jan 21 10:00:34 host sshd[8779]: Failed password for invalid user steam from 103.179.74.2 port 48322 ssh2 Jan 21 10:00:34 host sshd[8779]: Received disconnect from 103.179.74.2 port 48322:11: Bye Bye [preauth] Jan 21 10:00:34 host sshd[8779]: Disconnected from 103.179.74.2 port 48322 [preauth] Jan 21 10:01:32 host sshd[9091]: Invalid user postgres from 69.57.163.238 port 34530 Jan 21 10:01:32 host sshd[9091]: input_userauth_request: invalid user postgres [preauth] Jan 21 10:01:32 host sshd[9091]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:01:32 host sshd[9091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.57.163.238 Jan 21 10:01:33 host sshd[9091]: Failed password for invalid user postgres from 69.57.163.238 port 34530 ssh2 Jan 21 10:01:33 host sshd[9091]: Received disconnect from 69.57.163.238 port 34530:11: Bye Bye [preauth] Jan 21 10:01:33 host sshd[9091]: Disconnected from 69.57.163.238 port 34530 [preauth] Jan 21 10:05:17 host sshd[9510]: Invalid user adminrig from 69.57.163.238 port 59710 Jan 21 10:05:17 host sshd[9510]: input_userauth_request: invalid user adminrig [preauth] Jan 21 10:05:17 host sshd[9510]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:05:17 host sshd[9510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.57.163.238 Jan 21 10:05:19 host sshd[9510]: Failed password for invalid user adminrig from 69.57.163.238 port 59710 ssh2 Jan 21 10:05:20 host sshd[9510]: Received disconnect from 69.57.163.238 port 59710:11: Bye Bye [preauth] Jan 21 10:05:20 host sshd[9510]: Disconnected from 69.57.163.238 port 59710 [preauth] Jan 21 10:11:24 host sshd[11348]: Invalid user halo from 43.159.49.49 port 36134 Jan 21 10:11:24 host sshd[11348]: input_userauth_request: invalid user halo [preauth] Jan 21 10:11:24 host sshd[11348]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:11:24 host sshd[11348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.49.49 Jan 21 10:11:26 host sshd[11348]: Failed password for invalid user halo from 43.159.49.49 port 36134 ssh2 Jan 21 10:11:26 host sshd[11348]: Received disconnect from 43.159.49.49 port 36134:11: Bye Bye [preauth] Jan 21 10:11:26 host sshd[11348]: Disconnected from 43.159.49.49 port 36134 [preauth] Jan 21 10:11:59 host sshd[11658]: Invalid user cadmin from 46.101.244.79 port 39616 Jan 21 10:11:59 host sshd[11658]: input_userauth_request: invalid user cadmin [preauth] Jan 21 10:11:59 host sshd[11658]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:11:59 host sshd[11658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.244.79 Jan 21 10:12:01 host sshd[11658]: Failed password for invalid user cadmin from 46.101.244.79 port 39616 ssh2 Jan 21 10:12:01 host sshd[11658]: Received disconnect from 46.101.244.79 port 39616:11: Bye Bye [preauth] Jan 21 10:12:01 host sshd[11658]: Disconnected from 46.101.244.79 port 39616 [preauth] Jan 21 10:12:17 host sshd[11749]: Invalid user taiga from 203.151.83.7 port 36686 Jan 21 10:12:17 host sshd[11749]: input_userauth_request: invalid user taiga [preauth] Jan 21 10:12:17 host sshd[11749]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:12:17 host sshd[11749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.151.83.7 Jan 21 10:12:18 host sshd[11749]: Failed password for invalid user taiga from 203.151.83.7 port 36686 ssh2 Jan 21 10:12:18 host sshd[11749]: Received disconnect from 203.151.83.7 port 36686:11: Bye Bye [preauth] Jan 21 10:12:18 host sshd[11749]: Disconnected from 203.151.83.7 port 36686 [preauth] Jan 21 10:12:23 host sshd[11830]: Invalid user test from 20.212.61.4 port 39768 Jan 21 10:12:23 host sshd[11830]: input_userauth_request: invalid user test [preauth] Jan 21 10:12:23 host sshd[11830]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:12:23 host sshd[11830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.212.61.4 Jan 21 10:12:25 host sshd[11830]: Failed password for invalid user test from 20.212.61.4 port 39768 ssh2 Jan 21 10:12:25 host sshd[11830]: Received disconnect from 20.212.61.4 port 39768:11: Bye Bye [preauth] Jan 21 10:12:25 host sshd[11830]: Disconnected from 20.212.61.4 port 39768 [preauth] Jan 21 10:13:06 host sshd[12210]: Invalid user nagiosadmin from 138.197.151.213 port 47040 Jan 21 10:13:06 host sshd[12210]: input_userauth_request: invalid user nagiosadmin [preauth] Jan 21 10:13:06 host sshd[12210]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:13:06 host sshd[12210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.151.213 Jan 21 10:13:09 host sshd[12210]: Failed password for invalid user nagiosadmin from 138.197.151.213 port 47040 ssh2 Jan 21 10:13:09 host sshd[12210]: Received disconnect from 138.197.151.213 port 47040:11: Bye Bye [preauth] Jan 21 10:13:09 host sshd[12210]: Disconnected from 138.197.151.213 port 47040 [preauth] Jan 21 10:13:36 host sshd[12499]: Invalid user fikifoouser from 188.170.13.225 port 43842 Jan 21 10:13:36 host sshd[12499]: input_userauth_request: invalid user fikifoouser [preauth] Jan 21 10:13:36 host sshd[12499]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:13:36 host sshd[12499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.170.13.225 Jan 21 10:13:38 host sshd[12499]: Failed password for invalid user fikifoouser from 188.170.13.225 port 43842 ssh2 Jan 21 10:13:39 host sshd[12499]: Received disconnect from 188.170.13.225 port 43842:11: Bye Bye [preauth] Jan 21 10:13:39 host sshd[12499]: Disconnected from 188.170.13.225 port 43842 [preauth] Jan 21 10:13:40 host sshd[12539]: Invalid user sebastien from 138.68.230.183 port 47804 Jan 21 10:13:40 host sshd[12539]: input_userauth_request: invalid user sebastien [preauth] Jan 21 10:13:40 host sshd[12539]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:13:40 host sshd[12539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.230.183 Jan 21 10:13:42 host sshd[12539]: Failed password for invalid user sebastien from 138.68.230.183 port 47804 ssh2 Jan 21 10:13:42 host sshd[12539]: Received disconnect from 138.68.230.183 port 47804:11: Bye Bye [preauth] Jan 21 10:13:42 host sshd[12539]: Disconnected from 138.68.230.183 port 47804 [preauth] Jan 21 10:16:04 host sshd[13729]: Invalid user backupadmin from 46.101.82.89 port 60232 Jan 21 10:16:04 host sshd[13729]: input_userauth_request: invalid user backupadmin [preauth] Jan 21 10:16:04 host sshd[13729]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:16:04 host sshd[13729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.82.89 Jan 21 10:16:05 host sshd[13729]: Failed password for invalid user backupadmin from 46.101.82.89 port 60232 ssh2 Jan 21 10:16:05 host sshd[13729]: Received disconnect from 46.101.82.89 port 60232:11: Bye Bye [preauth] Jan 21 10:16:05 host sshd[13729]: Disconnected from 46.101.82.89 port 60232 [preauth] Jan 21 10:16:10 host sshd[13829]: Invalid user cftest from 159.89.161.126 port 54194 Jan 21 10:16:10 host sshd[13829]: input_userauth_request: invalid user cftest [preauth] Jan 21 10:16:10 host sshd[13829]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:16:10 host sshd[13829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.161.126 Jan 21 10:16:12 host sshd[13829]: Failed password for invalid user cftest from 159.89.161.126 port 54194 ssh2 Jan 21 10:16:12 host sshd[13829]: Received disconnect from 159.89.161.126 port 54194:11: Bye Bye [preauth] Jan 21 10:16:12 host sshd[13829]: Disconnected from 159.89.161.126 port 54194 [preauth] Jan 21 10:16:42 host sshd[14201]: Invalid user steam from 91.89.132.76 port 34986 Jan 21 10:16:42 host sshd[14201]: input_userauth_request: invalid user steam [preauth] Jan 21 10:16:42 host sshd[14201]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:16:42 host sshd[14201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.89.132.76 Jan 21 10:16:44 host sshd[14201]: Failed password for invalid user steam from 91.89.132.76 port 34986 ssh2 Jan 21 10:16:44 host sshd[14201]: Received disconnect from 91.89.132.76 port 34986:11: Bye Bye [preauth] Jan 21 10:16:44 host sshd[14201]: Disconnected from 91.89.132.76 port 34986 [preauth] Jan 21 10:17:17 host sshd[14399]: Invalid user bkuser from 43.159.49.49 port 37076 Jan 21 10:17:17 host sshd[14399]: input_userauth_request: invalid user bkuser [preauth] Jan 21 10:17:17 host sshd[14399]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:17:17 host sshd[14399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.49.49 Jan 21 10:17:19 host sshd[14399]: Failed password for invalid user bkuser from 43.159.49.49 port 37076 ssh2 Jan 21 10:17:20 host sshd[14399]: Received disconnect from 43.159.49.49 port 37076:11: Bye Bye [preauth] Jan 21 10:17:20 host sshd[14399]: Disconnected from 43.159.49.49 port 37076 [preauth] Jan 21 10:17:42 host sshd[14469]: Invalid user data from 20.212.61.4 port 42142 Jan 21 10:17:42 host sshd[14469]: input_userauth_request: invalid user data [preauth] Jan 21 10:17:42 host sshd[14469]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:17:42 host sshd[14469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.212.61.4 Jan 21 10:17:44 host sshd[14469]: Failed password for invalid user data from 20.212.61.4 port 42142 ssh2 Jan 21 10:17:44 host sshd[14469]: Received disconnect from 20.212.61.4 port 42142:11: Bye Bye [preauth] Jan 21 10:17:44 host sshd[14469]: Disconnected from 20.212.61.4 port 42142 [preauth] Jan 21 10:17:49 host sshd[14476]: Invalid user benjamin from 203.151.83.7 port 34800 Jan 21 10:17:49 host sshd[14476]: input_userauth_request: invalid user benjamin [preauth] Jan 21 10:17:49 host sshd[14476]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:17:49 host sshd[14476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.151.83.7 Jan 21 10:17:51 host sshd[14476]: Failed password for invalid user benjamin from 203.151.83.7 port 34800 ssh2 Jan 21 10:17:51 host sshd[14476]: Received disconnect from 203.151.83.7 port 34800:11: Bye Bye [preauth] Jan 21 10:17:51 host sshd[14476]: Disconnected from 203.151.83.7 port 34800 [preauth] Jan 21 10:17:57 host sshd[14485]: Invalid user admin from 46.101.244.79 port 40084 Jan 21 10:17:57 host sshd[14485]: input_userauth_request: invalid user admin [preauth] Jan 21 10:17:57 host sshd[14485]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:17:57 host sshd[14485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.244.79 Jan 21 10:17:58 host sshd[14485]: Failed password for invalid user admin from 46.101.244.79 port 40084 ssh2 Jan 21 10:17:58 host sshd[14485]: Received disconnect from 46.101.244.79 port 40084:11: Bye Bye [preauth] Jan 21 10:17:58 host sshd[14485]: Disconnected from 46.101.244.79 port 40084 [preauth] Jan 21 10:18:02 host sshd[14494]: Invalid user jenkins from 167.71.198.42 port 55880 Jan 21 10:18:02 host sshd[14494]: input_userauth_request: invalid user jenkins [preauth] Jan 21 10:18:02 host sshd[14494]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:18:02 host sshd[14494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.198.42 Jan 21 10:18:04 host sshd[14494]: Failed password for invalid user jenkins from 167.71.198.42 port 55880 ssh2 Jan 21 10:18:04 host sshd[14494]: Received disconnect from 167.71.198.42 port 55880:11: Bye Bye [preauth] Jan 21 10:18:04 host sshd[14494]: Disconnected from 167.71.198.42 port 55880 [preauth] Jan 21 10:18:22 host sshd[14529]: Invalid user test03 from 138.197.151.213 port 41728 Jan 21 10:18:22 host sshd[14529]: input_userauth_request: invalid user test03 [preauth] Jan 21 10:18:22 host sshd[14529]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:18:22 host sshd[14529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.151.213 Jan 21 10:18:23 host sshd[14529]: Failed password for invalid user test03 from 138.197.151.213 port 41728 ssh2 Jan 21 10:18:24 host sshd[14529]: Received disconnect from 138.197.151.213 port 41728:11: Bye Bye [preauth] Jan 21 10:18:24 host sshd[14529]: Disconnected from 138.197.151.213 port 41728 [preauth] Jan 21 10:18:25 host sshd[14535]: Invalid user bitrix from 188.170.13.225 port 56062 Jan 21 10:18:25 host sshd[14535]: input_userauth_request: invalid user bitrix [preauth] Jan 21 10:18:25 host sshd[14535]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:18:25 host sshd[14535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.170.13.225 Jan 21 10:18:27 host sshd[14535]: Failed password for invalid user bitrix from 188.170.13.225 port 56062 ssh2 Jan 21 10:18:27 host sshd[14535]: Received disconnect from 188.170.13.225 port 56062:11: Bye Bye [preauth] Jan 21 10:18:27 host sshd[14535]: Disconnected from 188.170.13.225 port 56062 [preauth] Jan 21 10:18:31 host sshd[14580]: Invalid user znc-admin from 159.89.161.126 port 60184 Jan 21 10:18:31 host sshd[14580]: input_userauth_request: invalid user znc-admin [preauth] Jan 21 10:18:31 host sshd[14580]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:18:31 host sshd[14580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.161.126 Jan 21 10:18:33 host sshd[14583]: Invalid user postgres from 185.151.32.7 port 42589 Jan 21 10:18:33 host sshd[14583]: input_userauth_request: invalid user postgres [preauth] Jan 21 10:18:33 host sshd[14583]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:18:33 host sshd[14583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.151.32.7 Jan 21 10:18:34 host sshd[14580]: Failed password for invalid user znc-admin from 159.89.161.126 port 60184 ssh2 Jan 21 10:18:34 host sshd[14580]: Received disconnect from 159.89.161.126 port 60184:11: Bye Bye [preauth] Jan 21 10:18:34 host sshd[14580]: Disconnected from 159.89.161.126 port 60184 [preauth] Jan 21 10:18:34 host sshd[14587]: Invalid user fikifoouser from 46.101.82.89 port 39992 Jan 21 10:18:34 host sshd[14587]: input_userauth_request: invalid user fikifoouser [preauth] Jan 21 10:18:34 host sshd[14587]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:18:34 host sshd[14587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.82.89 Jan 21 10:18:34 host sshd[14583]: Failed password for invalid user postgres from 185.151.32.7 port 42589 ssh2 Jan 21 10:18:34 host sshd[14583]: Received disconnect from 185.151.32.7 port 42589:11: Bye Bye [preauth] Jan 21 10:18:34 host sshd[14583]: Disconnected from 185.151.32.7 port 42589 [preauth] Jan 21 10:18:35 host sshd[14587]: Failed password for invalid user fikifoouser from 46.101.82.89 port 39992 ssh2 Jan 21 10:18:35 host sshd[14587]: Received disconnect from 46.101.82.89 port 39992:11: Bye Bye [preauth] Jan 21 10:18:35 host sshd[14587]: Disconnected from 46.101.82.89 port 39992 [preauth] Jan 21 10:18:36 host sshd[14594]: Invalid user teamspeak from 43.159.49.49 port 35420 Jan 21 10:18:36 host sshd[14594]: input_userauth_request: invalid user teamspeak [preauth] Jan 21 10:18:36 host sshd[14594]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:18:36 host sshd[14594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.159.49.49 Jan 21 10:18:38 host sshd[14594]: Failed password for invalid user teamspeak from 43.159.49.49 port 35420 ssh2 Jan 21 10:18:53 host sshd[14664]: Invalid user znc-admin from 20.212.61.4 port 47178 Jan 21 10:18:53 host sshd[14664]: input_userauth_request: invalid user znc-admin [preauth] Jan 21 10:18:53 host sshd[14664]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:18:53 host sshd[14664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.212.61.4 Jan 21 10:18:55 host sshd[14664]: Failed password for invalid user znc-admin from 20.212.61.4 port 47178 ssh2 Jan 21 10:18:55 host sshd[14664]: Received disconnect from 20.212.61.4 port 47178:11: Bye Bye [preauth] Jan 21 10:18:55 host sshd[14664]: Disconnected from 20.212.61.4 port 47178 [preauth] Jan 21 10:18:55 host sshd[14667]: Invalid user user3 from 91.89.132.76 port 53374 Jan 21 10:18:55 host sshd[14667]: input_userauth_request: invalid user user3 [preauth] Jan 21 10:18:55 host sshd[14667]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:18:55 host sshd[14667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.89.132.76 Jan 21 10:18:57 host sshd[14667]: Failed password for invalid user user3 from 91.89.132.76 port 53374 ssh2 Jan 21 10:18:58 host sshd[14667]: Received disconnect from 91.89.132.76 port 53374:11: Bye Bye [preauth] Jan 21 10:18:58 host sshd[14667]: Disconnected from 91.89.132.76 port 53374 [preauth] Jan 21 10:19:03 host sshd[14729]: Invalid user soporte from 46.101.244.79 port 52236 Jan 21 10:19:03 host sshd[14729]: input_userauth_request: invalid user soporte [preauth] Jan 21 10:19:03 host sshd[14729]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:19:03 host sshd[14729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.244.79 Jan 21 10:19:05 host sshd[14729]: Failed password for invalid user soporte from 46.101.244.79 port 52236 ssh2 Jan 21 10:19:05 host sshd[14729]: Received disconnect from 46.101.244.79 port 52236:11: Bye Bye [preauth] Jan 21 10:19:05 host sshd[14729]: Disconnected from 46.101.244.79 port 52236 [preauth] Jan 21 10:19:12 host sshd[14772]: Invalid user xuser from 203.151.83.7 port 33144 Jan 21 10:19:12 host sshd[14772]: input_userauth_request: invalid user xuser [preauth] Jan 21 10:19:12 host sshd[14772]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:19:12 host sshd[14772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.151.83.7 Jan 21 10:19:13 host sshd[14772]: Failed password for invalid user xuser from 203.151.83.7 port 33144 ssh2 Jan 21 10:19:13 host sshd[14772]: Received disconnect from 203.151.83.7 port 33144:11: Bye Bye [preauth] Jan 21 10:19:13 host sshd[14772]: Disconnected from 203.151.83.7 port 33144 [preauth] Jan 21 10:19:32 host sshd[14866]: Invalid user developer2 from 167.71.198.42 port 54852 Jan 21 10:19:32 host sshd[14866]: input_userauth_request: invalid user developer2 [preauth] Jan 21 10:19:32 host sshd[14866]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:19:32 host sshd[14866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.198.42 Jan 21 10:19:32 host sshd[14864]: Invalid user phpmyadmin from 138.197.151.213 port 40658 Jan 21 10:19:32 host sshd[14864]: input_userauth_request: invalid user phpmyadmin [preauth] Jan 21 10:19:32 host sshd[14864]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:19:32 host sshd[14864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.151.213 Jan 21 10:19:34 host sshd[14869]: Invalid user postgres from 188.170.13.225 port 33452 Jan 21 10:19:34 host sshd[14869]: input_userauth_request: invalid user postgres [preauth] Jan 21 10:19:34 host sshd[14869]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:19:34 host sshd[14869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.170.13.225 Jan 21 10:19:34 host sshd[14866]: Failed password for invalid user developer2 from 167.71.198.42 port 54852 ssh2 Jan 21 10:19:34 host sshd[14866]: Received disconnect from 167.71.198.42 port 54852:11: Bye Bye [preauth] Jan 21 10:19:34 host sshd[14866]: Disconnected from 167.71.198.42 port 54852 [preauth] Jan 21 10:19:35 host sshd[14864]: Failed password for invalid user phpmyadmin from 138.197.151.213 port 40658 ssh2 Jan 21 10:19:35 host sshd[14864]: Received disconnect from 138.197.151.213 port 40658:11: Bye Bye [preauth] Jan 21 10:19:35 host sshd[14864]: Disconnected from 138.197.151.213 port 40658 [preauth] Jan 21 10:19:35 host sshd[14869]: Failed password for invalid user postgres from 188.170.13.225 port 33452 ssh2 Jan 21 10:19:36 host sshd[14869]: Received disconnect from 188.170.13.225 port 33452:11: Bye Bye [preauth] Jan 21 10:19:36 host sshd[14869]: Disconnected from 188.170.13.225 port 33452 [preauth] Jan 21 10:19:39 host sshd[14915]: Invalid user testssh from 46.101.82.89 port 38454 Jan 21 10:19:39 host sshd[14915]: input_userauth_request: invalid user testssh [preauth] Jan 21 10:19:39 host sshd[14915]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:19:39 host sshd[14915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.82.89 Jan 21 10:19:40 host sshd[14915]: Failed password for invalid user testssh from 46.101.82.89 port 38454 ssh2 Jan 21 10:19:40 host sshd[14915]: Received disconnect from 46.101.82.89 port 38454:11: Bye Bye [preauth] Jan 21 10:19:40 host sshd[14915]: Disconnected from 46.101.82.89 port 38454 [preauth] Jan 21 10:19:53 host sshd[14992]: Invalid user toni from 159.89.161.126 port 59230 Jan 21 10:19:53 host sshd[14992]: input_userauth_request: invalid user toni [preauth] Jan 21 10:19:53 host sshd[14992]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:19:53 host sshd[14992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.161.126 Jan 21 10:19:55 host sshd[14992]: Failed password for invalid user toni from 159.89.161.126 port 59230 ssh2 Jan 21 10:19:55 host sshd[14992]: Received disconnect from 159.89.161.126 port 59230:11: Bye Bye [preauth] Jan 21 10:19:55 host sshd[14992]: Disconnected from 159.89.161.126 port 59230 [preauth] Jan 21 10:20:09 host sshd[15078]: Invalid user pjsuser from 185.151.32.7 port 41054 Jan 21 10:20:09 host sshd[15078]: input_userauth_request: invalid user pjsuser [preauth] Jan 21 10:20:09 host sshd[15078]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:20:09 host sshd[15078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.151.32.7 Jan 21 10:20:11 host sshd[15078]: Failed password for invalid user pjsuser from 185.151.32.7 port 41054 ssh2 Jan 21 10:20:12 host sshd[15078]: Received disconnect from 185.151.32.7 port 41054:11: Bye Bye [preauth] Jan 21 10:20:12 host sshd[15078]: Disconnected from 185.151.32.7 port 41054 [preauth] Jan 21 10:20:26 host sshd[15103]: Invalid user testadmin from 91.89.132.76 port 41560 Jan 21 10:20:26 host sshd[15103]: input_userauth_request: invalid user testadmin [preauth] Jan 21 10:20:26 host sshd[15103]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:20:26 host sshd[15103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.89.132.76 Jan 21 10:20:29 host sshd[15103]: Failed password for invalid user testadmin from 91.89.132.76 port 41560 ssh2 Jan 21 10:20:59 host sshd[15218]: Invalid user admin from 167.71.198.42 port 53538 Jan 21 10:20:59 host sshd[15218]: input_userauth_request: invalid user admin [preauth] Jan 21 10:20:59 host sshd[15218]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:20:59 host sshd[15218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.198.42 Jan 21 10:21:01 host sshd[15218]: Failed password for invalid user admin from 167.71.198.42 port 53538 ssh2 Jan 21 10:21:01 host sshd[15218]: Received disconnect from 167.71.198.42 port 53538:11: Bye Bye [preauth] Jan 21 10:21:01 host sshd[15218]: Disconnected from 167.71.198.42 port 53538 [preauth] Jan 21 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=vfmassets user-2=wwwtestugo user-3=shalinijames user-4=pmcresources user-5=remysagr user-6=disposeat user-7=wwwkmaorg user-8=woodpeck user-9=wwwkapin user-10=gifterman user-11=palco123 user-12=kottayamcalldriv user-13=phmetals user-14=wwwnexidigital user-15=mrsclean user-16=bonifacegroup user-17=wwwevmhonda user-18=wwwletsstalkfood user-19=straightcurve user-20=dartsimp user-21=a2zgroup user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=wwwrmswll user-27=wwwresourcehunte user-28=keralaholi user-29=ugotscom user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 10:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WMXjMFdF9QQUQFgJ.~ Jan 21 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WMXjMFdF9QQUQFgJ.~' Jan 21 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WMXjMFdF9QQUQFgJ.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 10:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 10:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 10:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 10:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 10:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 10:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 10:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 10:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 10:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 10:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 10:21:09 host sshd[15396]: Invalid user Administrator from 195.226.194.242 port 51244 Jan 21 10:21:09 host sshd[15396]: input_userauth_request: invalid user Administrator [preauth] Jan 21 10:21:09 host sshd[15396]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:21:09 host sshd[15396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 Jan 21 10:21:11 host sshd[15396]: Failed password for invalid user Administrator from 195.226.194.242 port 51244 ssh2 Jan 21 10:21:11 host sshd[15396]: Received disconnect from 195.226.194.242 port 51244:11: Bye Bye [preauth] Jan 21 10:21:11 host sshd[15396]: Disconnected from 195.226.194.242 port 51244 [preauth] Jan 21 10:21:27 host sshd[15511]: Invalid user vpnoperator from 138.68.230.183 port 43590 Jan 21 10:21:27 host sshd[15511]: input_userauth_request: invalid user vpnoperator [preauth] Jan 21 10:21:27 host sshd[15511]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:21:27 host sshd[15511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.230.183 Jan 21 10:21:29 host sshd[15511]: Failed password for invalid user vpnoperator from 138.68.230.183 port 43590 ssh2 Jan 21 10:21:29 host sshd[15511]: Received disconnect from 138.68.230.183 port 43590:11: Bye Bye [preauth] Jan 21 10:21:29 host sshd[15511]: Disconnected from 138.68.230.183 port 43590 [preauth] Jan 21 10:21:37 host sshd[15553]: Invalid user wwadmin from 185.151.32.7 port 35197 Jan 21 10:21:37 host sshd[15553]: input_userauth_request: invalid user wwadmin [preauth] Jan 21 10:21:37 host sshd[15553]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:21:37 host sshd[15553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.151.32.7 Jan 21 10:21:39 host sshd[15553]: Failed password for invalid user wwadmin from 185.151.32.7 port 35197 ssh2 Jan 21 10:21:40 host sshd[15553]: Received disconnect from 185.151.32.7 port 35197:11: Bye Bye [preauth] Jan 21 10:21:40 host sshd[15553]: Disconnected from 185.151.32.7 port 35197 [preauth] Jan 21 10:23:05 host sshd[15737]: Invalid user scadmin from 138.68.230.183 port 38526 Jan 21 10:23:05 host sshd[15737]: input_userauth_request: invalid user scadmin [preauth] Jan 21 10:23:05 host sshd[15737]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:23:05 host sshd[15737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.230.183 Jan 21 10:23:07 host sshd[15737]: Failed password for invalid user scadmin from 138.68.230.183 port 38526 ssh2 Jan 21 10:23:07 host sshd[15737]: Received disconnect from 138.68.230.183 port 38526:11: Bye Bye [preauth] Jan 21 10:23:07 host sshd[15737]: Disconnected from 138.68.230.183 port 38526 [preauth] Jan 21 10:27:01 host sshd[16427]: invalid public DH value: >= p-1 [preauth] Jan 21 10:27:01 host sshd[16427]: ssh_dispatch_run_fatal: Connection from 203.127.161.82 port 35086: incomplete message [preauth] Jan 21 10:37:25 host sshd[18274]: User root from 220.135.92.236 not allowed because not listed in AllowUsers Jan 21 10:37:25 host sshd[18274]: input_userauth_request: invalid user root [preauth] Jan 21 10:37:25 host unix_chkpwd[18278]: password check failed for user (root) Jan 21 10:37:25 host sshd[18274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.92.236 user=root Jan 21 10:37:25 host sshd[18274]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 10:37:27 host sshd[18274]: Failed password for invalid user root from 220.135.92.236 port 33828 ssh2 Jan 21 10:37:28 host sshd[18274]: Connection reset by 220.135.92.236 port 33828 [preauth] Jan 21 10:46:38 host sshd[19570]: Invalid user lawrence from 209.141.56.48 port 58016 Jan 21 10:46:38 host sshd[19570]: input_userauth_request: invalid user lawrence [preauth] Jan 21 10:46:38 host sshd[19570]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:46:38 host sshd[19570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 21 10:46:41 host sshd[19570]: Failed password for invalid user lawrence from 209.141.56.48 port 58016 ssh2 Jan 21 10:46:41 host sshd[19570]: Connection closed by 209.141.56.48 port 58016 [preauth] Jan 21 10:46:52 host sshd[19591]: Invalid user admin from 114.35.41.135 port 56077 Jan 21 10:46:52 host sshd[19591]: input_userauth_request: invalid user admin [preauth] Jan 21 10:46:52 host sshd[19591]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:46:52 host sshd[19591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.41.135 Jan 21 10:46:54 host sshd[19591]: Failed password for invalid user admin from 114.35.41.135 port 56077 ssh2 Jan 21 10:46:54 host sshd[19591]: Connection reset by 114.35.41.135 port 56077 [preauth] Jan 21 10:48:39 host sshd[19786]: Invalid user testftp from 103.115.199.91 port 58313 Jan 21 10:48:39 host sshd[19786]: input_userauth_request: invalid user testftp [preauth] Jan 21 10:48:39 host sshd[19786]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:48:39 host sshd[19786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.199.91 Jan 21 10:48:41 host sshd[19786]: Failed password for invalid user testftp from 103.115.199.91 port 58313 ssh2 Jan 21 10:48:41 host sshd[19786]: Received disconnect from 103.115.199.91 port 58313:11: Bye Bye [preauth] Jan 21 10:48:41 host sshd[19786]: Disconnected from 103.115.199.91 port 58313 [preauth] Jan 21 10:51:20 host sshd[20182]: User root from 195.226.194.242 not allowed because not listed in AllowUsers Jan 21 10:51:20 host sshd[20182]: input_userauth_request: invalid user root [preauth] Jan 21 10:51:20 host unix_chkpwd[20185]: password check failed for user (root) Jan 21 10:51:20 host sshd[20182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.226.194.242 user=root Jan 21 10:51:20 host sshd[20182]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 10:51:23 host sshd[20182]: Failed password for invalid user root from 195.226.194.242 port 45724 ssh2 Jan 21 10:51:23 host sshd[20182]: Received disconnect from 195.226.194.242 port 45724:11: Bye Bye [preauth] Jan 21 10:51:23 host sshd[20182]: Disconnected from 195.226.194.242 port 45724 [preauth] Jan 21 10:51:53 host sshd[20381]: Invalid user test from 31.41.244.124 port 41397 Jan 21 10:51:53 host sshd[20381]: input_userauth_request: invalid user test [preauth] Jan 21 10:51:53 host sshd[20381]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:51:53 host sshd[20381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 21 10:51:56 host sshd[20381]: Failed password for invalid user test from 31.41.244.124 port 41397 ssh2 Jan 21 10:51:56 host sshd[20381]: Received disconnect from 31.41.244.124 port 41397:11: Client disconnecting normally [preauth] Jan 21 10:51:56 host sshd[20381]: Disconnected from 31.41.244.124 port 41397 [preauth] Jan 21 10:53:40 host sshd[20576]: Invalid user admin from 118.41.75.57 port 55151 Jan 21 10:53:40 host sshd[20576]: input_userauth_request: invalid user admin [preauth] Jan 21 10:53:40 host sshd[20576]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:53:40 host sshd[20576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.41.75.57 Jan 21 10:53:41 host sshd[20576]: Failed password for invalid user admin from 118.41.75.57 port 55151 ssh2 Jan 21 10:53:42 host sshd[20576]: Failed password for invalid user admin from 118.41.75.57 port 55151 ssh2 Jan 21 10:53:42 host sshd[20576]: Connection reset by 118.41.75.57 port 55151 [preauth] Jan 21 10:54:41 host sshd[20700]: Invalid user tadmin from 103.115.199.91 port 40631 Jan 21 10:54:41 host sshd[20700]: input_userauth_request: invalid user tadmin [preauth] Jan 21 10:54:41 host sshd[20700]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:54:41 host sshd[20700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.199.91 Jan 21 10:54:42 host sshd[20700]: Failed password for invalid user tadmin from 103.115.199.91 port 40631 ssh2 Jan 21 10:54:42 host sshd[20700]: Received disconnect from 103.115.199.91 port 40631:11: Bye Bye [preauth] Jan 21 10:54:42 host sshd[20700]: Disconnected from 103.115.199.91 port 40631 [preauth] Jan 21 10:56:25 host sshd[20875]: Invalid user guestuser from 103.115.199.91 port 36585 Jan 21 10:56:25 host sshd[20875]: input_userauth_request: invalid user guestuser [preauth] Jan 21 10:56:25 host sshd[20875]: pam_unix(sshd:auth): check pass; user unknown Jan 21 10:56:25 host sshd[20875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.199.91 Jan 21 10:56:26 host sshd[20875]: Failed password for invalid user guestuser from 103.115.199.91 port 36585 ssh2 Jan 21 10:56:27 host sshd[20875]: Received disconnect from 103.115.199.91 port 36585:11: Bye Bye [preauth] Jan 21 10:56:27 host sshd[20875]: Disconnected from 103.115.199.91 port 36585 [preauth] Jan 21 11:09:28 host sshd[22677]: Connection closed by 167.94.146.58 port 41256 [preauth] Jan 21 11:14:32 host sshd[23427]: Invalid user lawrence from 209.141.56.48 port 60816 Jan 21 11:14:32 host sshd[23427]: input_userauth_request: invalid user lawrence [preauth] Jan 21 11:14:32 host sshd[23427]: pam_unix(sshd:auth): check pass; user unknown Jan 21 11:14:32 host sshd[23427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 21 11:14:33 host sshd[23427]: Failed password for invalid user lawrence from 209.141.56.48 port 60816 ssh2 Jan 21 11:14:33 host sshd[23427]: Connection closed by 209.141.56.48 port 60816 [preauth] Jan 21 11:20:25 host sshd[24130]: Invalid user lawrence from 209.141.56.48 port 36084 Jan 21 11:20:25 host sshd[24130]: input_userauth_request: invalid user lawrence [preauth] Jan 21 11:20:25 host sshd[24130]: pam_unix(sshd:auth): check pass; user unknown Jan 21 11:20:25 host sshd[24130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.56.48 Jan 21 11:20:27 host sshd[24130]: Failed password for invalid user lawrence from 209.141.56.48 port 36084 ssh2 Jan 21 11:20:27 host sshd[24130]: Connection closed by 209.141.56.48 port 36084 [preauth] Jan 21 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=shalinijames user-2=wwwtestugo user-3=vfmassets user-4=pmcresources user-5=remysagr user-6=disposeat user-7=wwwkmaorg user-8=wwwkapin user-9=woodpeck user-10=phmetals user-11=kottayamcalldriv user-12=palco123 user-13=gifterman user-14=wwwnexidigital user-15=mrsclean user-16=wwwevmhonda user-17=bonifacegroup user-18=wwwletsstalkfood user-19=straightcurve user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=ugotscom user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 11:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vWQuH2CdfTKFKsuk.~ Jan 21 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vWQuH2CdfTKFKsuk.~' Jan 21 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-vWQuH2CdfTKFKsuk.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 11:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 11:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 11:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 11:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 11:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 11:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 11:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 11:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 11:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 11:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 11:24:11 host sshd[24887]: Invalid user wangfang from 106.10.122.53 port 47508 Jan 21 11:24:11 host sshd[24887]: input_userauth_request: invalid user wangfang [preauth] Jan 21 11:24:11 host sshd[24887]: pam_unix(sshd:auth): check pass; user unknown Jan 21 11:24:11 host sshd[24887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 21 11:24:13 host sshd[24887]: Failed password for invalid user wangfang from 106.10.122.53 port 47508 ssh2 Jan 21 11:24:13 host sshd[24887]: Connection closed by 106.10.122.53 port 47508 [preauth] Jan 21 11:25:05 host sshd[25017]: Invalid user hj from 194.110.203.109 port 56182 Jan 21 11:25:05 host sshd[25017]: input_userauth_request: invalid user hj [preauth] Jan 21 11:25:05 host sshd[25017]: pam_unix(sshd:auth): check pass; user unknown Jan 21 11:25:05 host sshd[25017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 11:25:07 host sshd[25017]: Failed password for invalid user hj from 194.110.203.109 port 56182 ssh2 Jan 21 11:25:10 host sshd[25017]: pam_unix(sshd:auth): check pass; user unknown Jan 21 11:25:12 host sshd[25017]: Failed password for invalid user hj from 194.110.203.109 port 56182 ssh2 Jan 21 11:25:16 host sshd[25017]: pam_unix(sshd:auth): check pass; user unknown Jan 21 11:25:17 host sshd[25017]: Failed password for invalid user hj from 194.110.203.109 port 56182 ssh2 Jan 21 11:25:20 host sshd[25017]: Connection closed by 194.110.203.109 port 56182 [preauth] Jan 21 11:25:20 host sshd[25017]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 11:34:36 host sshd[26271]: User root from 125.229.55.183 not allowed because not listed in AllowUsers Jan 21 11:34:36 host sshd[26271]: input_userauth_request: invalid user root [preauth] Jan 21 11:34:36 host unix_chkpwd[26275]: password check failed for user (root) Jan 21 11:34:36 host sshd[26271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.55.183 user=root Jan 21 11:34:36 host sshd[26271]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 11:34:38 host sshd[26271]: Failed password for invalid user root from 125.229.55.183 port 38650 ssh2 Jan 21 11:34:38 host unix_chkpwd[26278]: password check failed for user (root) Jan 21 11:34:38 host sshd[26271]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 11:34:40 host sshd[26271]: Failed password for invalid user root from 125.229.55.183 port 38650 ssh2 Jan 21 11:34:41 host unix_chkpwd[26282]: password check failed for user (root) Jan 21 11:34:41 host sshd[26271]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 11:34:43 host sshd[26271]: Failed password for invalid user root from 125.229.55.183 port 38650 ssh2 Jan 21 11:34:44 host sshd[26271]: Connection reset by 125.229.55.183 port 38650 [preauth] Jan 21 11:34:44 host sshd[26271]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.229.55.183 user=root Jan 21 11:40:00 host sshd[26942]: Invalid user user from 59.126.125.72 port 34068 Jan 21 11:40:00 host sshd[26942]: input_userauth_request: invalid user user [preauth] Jan 21 11:40:00 host sshd[26942]: pam_unix(sshd:auth): check pass; user unknown Jan 21 11:40:00 host sshd[26942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.125.72 Jan 21 11:40:01 host sshd[26942]: Failed password for invalid user user from 59.126.125.72 port 34068 ssh2 Jan 21 11:40:02 host sshd[26942]: pam_unix(sshd:auth): check pass; user unknown Jan 21 11:40:04 host sshd[26942]: Failed password for invalid user user from 59.126.125.72 port 34068 ssh2 Jan 21 11:40:05 host sshd[26942]: pam_unix(sshd:auth): check pass; user unknown Jan 21 11:40:06 host sshd[26942]: Failed password for invalid user user from 59.126.125.72 port 34068 ssh2 Jan 21 11:40:07 host sshd[26942]: pam_unix(sshd:auth): check pass; user unknown Jan 21 11:40:08 host sshd[26942]: Failed password for invalid user user from 59.126.125.72 port 34068 ssh2 Jan 21 11:40:09 host sshd[26942]: pam_unix(sshd:auth): check pass; user unknown Jan 21 11:40:12 host sshd[26942]: Failed password for invalid user user from 59.126.125.72 port 34068 ssh2 Jan 21 11:41:11 host sshd[27279]: Invalid user admin from 159.196.112.220 port 55981 Jan 21 11:41:11 host sshd[27279]: input_userauth_request: invalid user admin [preauth] Jan 21 11:41:11 host sshd[27279]: pam_unix(sshd:auth): check pass; user unknown Jan 21 11:41:11 host sshd[27279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.196.112.220 Jan 21 11:41:12 host sshd[27279]: Failed password for invalid user admin from 159.196.112.220 port 55981 ssh2 Jan 21 11:49:12 host sshd[28293]: Invalid user viewer from 205.185.113.129 port 50328 Jan 21 11:49:12 host sshd[28293]: input_userauth_request: invalid user viewer [preauth] Jan 21 11:49:12 host sshd[28293]: pam_unix(sshd:auth): check pass; user unknown Jan 21 11:49:12 host sshd[28293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 21 11:49:15 host sshd[28293]: Failed password for invalid user viewer from 205.185.113.129 port 50328 ssh2 Jan 21 11:49:15 host sshd[28293]: Connection closed by 205.185.113.129 port 50328 [preauth] Jan 21 12:01:23 host sshd[30002]: User root from 220.133.122.152 not allowed because not listed in AllowUsers Jan 21 12:01:23 host sshd[30002]: input_userauth_request: invalid user root [preauth] Jan 21 12:01:24 host unix_chkpwd[30006]: password check failed for user (root) Jan 21 12:01:24 host sshd[30002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.122.152 user=root Jan 21 12:01:24 host sshd[30002]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 12:01:25 host sshd[30002]: Failed password for invalid user root from 220.133.122.152 port 42475 ssh2 Jan 21 12:01:26 host sshd[30002]: Connection reset by 220.133.122.152 port 42475 [preauth] Jan 21 12:03:54 host sshd[30281]: User root from 209.141.55.27 not allowed because not listed in AllowUsers Jan 21 12:03:54 host sshd[30281]: input_userauth_request: invalid user root [preauth] Jan 21 12:03:54 host unix_chkpwd[30284]: password check failed for user (root) Jan 21 12:03:54 host sshd[30281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 user=root Jan 21 12:03:54 host sshd[30281]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 12:03:56 host sshd[30281]: Failed password for invalid user root from 209.141.55.27 port 47670 ssh2 Jan 21 12:03:56 host sshd[30281]: Received disconnect from 209.141.55.27 port 47670:11: Normal Shutdown, Thank you for playing [preauth] Jan 21 12:03:56 host sshd[30281]: Disconnected from 209.141.55.27 port 47670 [preauth] Jan 21 12:05:55 host sshd[30620]: User root from 59.127.188.139 not allowed because not listed in AllowUsers Jan 21 12:05:55 host sshd[30620]: input_userauth_request: invalid user root [preauth] Jan 21 12:05:55 host unix_chkpwd[30625]: password check failed for user (root) Jan 21 12:05:55 host sshd[30620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.188.139 user=root Jan 21 12:05:55 host sshd[30620]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 12:05:57 host sshd[30620]: Failed password for invalid user root from 59.127.188.139 port 57640 ssh2 Jan 21 12:05:58 host sshd[30620]: Connection reset by 59.127.188.139 port 57640 [preauth] Jan 21 12:11:05 host sshd[31848]: Invalid user mailtest from 167.71.239.134 port 50220 Jan 21 12:11:05 host sshd[31848]: input_userauth_request: invalid user mailtest [preauth] Jan 21 12:11:05 host sshd[31848]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:11:05 host sshd[31848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.239.134 Jan 21 12:11:07 host sshd[31848]: Failed password for invalid user mailtest from 167.71.239.134 port 50220 ssh2 Jan 21 12:11:07 host sshd[31848]: Received disconnect from 167.71.239.134 port 50220:11: Bye Bye [preauth] Jan 21 12:11:07 host sshd[31848]: Disconnected from 167.71.239.134 port 50220 [preauth] Jan 21 12:12:36 host sshd[32396]: Invalid user cuser from 205.214.74.6 port 59100 Jan 21 12:12:36 host sshd[32396]: input_userauth_request: invalid user cuser [preauth] Jan 21 12:12:36 host sshd[32396]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:12:36 host sshd[32396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.214.74.6 Jan 21 12:12:38 host sshd[32396]: Failed password for invalid user cuser from 205.214.74.6 port 59100 ssh2 Jan 21 12:12:38 host sshd[32396]: Received disconnect from 205.214.74.6 port 59100:11: Bye Bye [preauth] Jan 21 12:12:38 host sshd[32396]: Disconnected from 205.214.74.6 port 59100 [preauth] Jan 21 12:12:55 host sshd[32432]: Invalid user testemail from 83.0.114.127 port 53579 Jan 21 12:12:55 host sshd[32432]: input_userauth_request: invalid user testemail [preauth] Jan 21 12:12:55 host sshd[32432]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:12:55 host sshd[32432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.0.114.127 Jan 21 12:12:56 host sshd[32432]: Failed password for invalid user testemail from 83.0.114.127 port 53579 ssh2 Jan 21 12:12:57 host sshd[32432]: Received disconnect from 83.0.114.127 port 53579:11: Bye Bye [preauth] Jan 21 12:12:57 host sshd[32432]: Disconnected from 83.0.114.127 port 53579 [preauth] Jan 21 12:13:18 host sshd[32474]: Invalid user scsadmin from 209.141.35.242 port 56724 Jan 21 12:13:18 host sshd[32474]: input_userauth_request: invalid user scsadmin [preauth] Jan 21 12:13:18 host sshd[32474]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:13:18 host sshd[32474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.35.242 Jan 21 12:13:20 host sshd[32474]: Failed password for invalid user scsadmin from 209.141.35.242 port 56724 ssh2 Jan 21 12:13:21 host sshd[32474]: Received disconnect from 209.141.35.242 port 56724:11: Bye Bye [preauth] Jan 21 12:13:21 host sshd[32474]: Disconnected from 209.141.35.242 port 56724 [preauth] Jan 21 12:14:28 host sshd[32716]: Invalid user andy from 64.227.140.134 port 26816 Jan 21 12:14:28 host sshd[32716]: input_userauth_request: invalid user andy [preauth] Jan 21 12:14:28 host sshd[32716]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:14:28 host sshd[32716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.140.134 Jan 21 12:14:29 host sshd[32716]: Failed password for invalid user andy from 64.227.140.134 port 26816 ssh2 Jan 21 12:14:29 host sshd[32716]: Received disconnect from 64.227.140.134 port 26816:11: Bye Bye [preauth] Jan 21 12:14:29 host sshd[32716]: Disconnected from 64.227.140.134 port 26816 [preauth] Jan 21 12:16:00 host sshd[627]: Invalid user devops from 37.193.112.180 port 59544 Jan 21 12:16:00 host sshd[627]: input_userauth_request: invalid user devops [preauth] Jan 21 12:16:00 host sshd[627]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:16:00 host sshd[627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.193.112.180 Jan 21 12:16:02 host sshd[627]: Failed password for invalid user devops from 37.193.112.180 port 59544 ssh2 Jan 21 12:16:02 host sshd[627]: Received disconnect from 37.193.112.180 port 59544:11: Bye Bye [preauth] Jan 21 12:16:02 host sshd[627]: Disconnected from 37.193.112.180 port 59544 [preauth] Jan 21 12:16:10 host sshd[669]: Invalid user ntadmin from 83.0.114.127 port 43145 Jan 21 12:16:10 host sshd[669]: input_userauth_request: invalid user ntadmin [preauth] Jan 21 12:16:10 host sshd[669]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:16:10 host sshd[669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.0.114.127 Jan 21 12:16:12 host sshd[669]: Failed password for invalid user ntadmin from 83.0.114.127 port 43145 ssh2 Jan 21 12:16:12 host sshd[669]: Received disconnect from 83.0.114.127 port 43145:11: Bye Bye [preauth] Jan 21 12:16:12 host sshd[669]: Disconnected from 83.0.114.127 port 43145 [preauth] Jan 21 12:16:45 host sshd[772]: Invalid user test2 from 209.141.35.242 port 42750 Jan 21 12:16:45 host sshd[772]: input_userauth_request: invalid user test2 [preauth] Jan 21 12:16:45 host sshd[772]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:16:45 host sshd[772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.35.242 Jan 21 12:16:46 host sshd[776]: Invalid user sk from 167.71.239.134 port 49272 Jan 21 12:16:46 host sshd[776]: input_userauth_request: invalid user sk [preauth] Jan 21 12:16:46 host sshd[776]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:16:46 host sshd[776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.239.134 Jan 21 12:16:46 host sshd[772]: Failed password for invalid user test2 from 209.141.35.242 port 42750 ssh2 Jan 21 12:16:46 host sshd[772]: Received disconnect from 209.141.35.242 port 42750:11: Bye Bye [preauth] Jan 21 12:16:46 host sshd[772]: Disconnected from 209.141.35.242 port 42750 [preauth] Jan 21 12:16:47 host sshd[776]: Failed password for invalid user sk from 167.71.239.134 port 49272 ssh2 Jan 21 12:16:47 host sshd[776]: Received disconnect from 167.71.239.134 port 49272:11: Bye Bye [preauth] Jan 21 12:16:47 host sshd[776]: Disconnected from 167.71.239.134 port 49272 [preauth] Jan 21 12:17:19 host sshd[822]: Invalid user mftuser from 83.0.114.127 port 57305 Jan 21 12:17:19 host sshd[822]: input_userauth_request: invalid user mftuser [preauth] Jan 21 12:17:19 host sshd[822]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:17:19 host sshd[822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.0.114.127 Jan 21 12:17:22 host sshd[822]: Failed password for invalid user mftuser from 83.0.114.127 port 57305 ssh2 Jan 21 12:17:43 host sshd[904]: Invalid user Administrator from 37.193.112.180 port 57756 Jan 21 12:17:43 host sshd[904]: input_userauth_request: invalid user Administrator [preauth] Jan 21 12:17:43 host sshd[904]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:17:43 host sshd[904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.193.112.180 Jan 21 12:17:45 host sshd[904]: Failed password for invalid user Administrator from 37.193.112.180 port 57756 ssh2 Jan 21 12:17:45 host sshd[904]: Received disconnect from 37.193.112.180 port 57756:11: Bye Bye [preauth] Jan 21 12:17:45 host sshd[904]: Disconnected from 37.193.112.180 port 57756 [preauth] Jan 21 12:17:53 host sshd[923]: Invalid user cloud_user from 209.141.35.242 port 41464 Jan 21 12:17:53 host sshd[923]: input_userauth_request: invalid user cloud_user [preauth] Jan 21 12:17:53 host sshd[923]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:17:53 host sshd[923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.35.242 Jan 21 12:17:55 host sshd[923]: Failed password for invalid user cloud_user from 209.141.35.242 port 41464 ssh2 Jan 21 12:17:55 host sshd[923]: Received disconnect from 209.141.35.242 port 41464:11: Bye Bye [preauth] Jan 21 12:17:55 host sshd[923]: Disconnected from 209.141.35.242 port 41464 [preauth] Jan 21 12:17:58 host sshd[966]: Invalid user magento from 64.227.140.134 port 32470 Jan 21 12:17:58 host sshd[966]: input_userauth_request: invalid user magento [preauth] Jan 21 12:17:58 host sshd[966]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:17:58 host sshd[966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.140.134 Jan 21 12:18:00 host sshd[966]: Failed password for invalid user magento from 64.227.140.134 port 32470 ssh2 Jan 21 12:18:00 host sshd[966]: Received disconnect from 64.227.140.134 port 32470:11: Bye Bye [preauth] Jan 21 12:18:00 host sshd[966]: Disconnected from 64.227.140.134 port 32470 [preauth] Jan 21 12:18:06 host sshd[992]: Invalid user magento_user from 167.71.239.134 port 47544 Jan 21 12:18:06 host sshd[992]: input_userauth_request: invalid user magento_user [preauth] Jan 21 12:18:06 host sshd[992]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:18:06 host sshd[992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.239.134 Jan 21 12:18:07 host sshd[992]: Failed password for invalid user magento_user from 167.71.239.134 port 47544 ssh2 Jan 21 12:18:07 host sshd[992]: Received disconnect from 167.71.239.134 port 47544:11: Bye Bye [preauth] Jan 21 12:18:07 host sshd[992]: Disconnected from 167.71.239.134 port 47544 [preauth] Jan 21 12:18:21 host sshd[1038]: Invalid user sshtest from 205.214.74.6 port 52536 Jan 21 12:18:21 host sshd[1038]: input_userauth_request: invalid user sshtest [preauth] Jan 21 12:18:21 host sshd[1038]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:18:21 host sshd[1038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.214.74.6 Jan 21 12:18:23 host sshd[1038]: Failed password for invalid user sshtest from 205.214.74.6 port 52536 ssh2 Jan 21 12:18:24 host sshd[1038]: Received disconnect from 205.214.74.6 port 52536:11: Bye Bye [preauth] Jan 21 12:18:24 host sshd[1038]: Disconnected from 205.214.74.6 port 52536 [preauth] Jan 21 12:18:59 host sshd[1110]: Invalid user test from 37.193.112.180 port 52778 Jan 21 12:18:59 host sshd[1110]: input_userauth_request: invalid user test [preauth] Jan 21 12:18:59 host sshd[1110]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:18:59 host sshd[1110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.193.112.180 Jan 21 12:19:01 host sshd[1110]: Failed password for invalid user test from 37.193.112.180 port 52778 ssh2 Jan 21 12:19:26 host sshd[1185]: Invalid user www from 64.227.140.134 port 17072 Jan 21 12:19:26 host sshd[1185]: input_userauth_request: invalid user www [preauth] Jan 21 12:19:26 host sshd[1185]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:19:26 host sshd[1185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.140.134 Jan 21 12:19:28 host sshd[1185]: Failed password for invalid user www from 64.227.140.134 port 17072 ssh2 Jan 21 12:19:28 host sshd[1185]: Received disconnect from 64.227.140.134 port 17072:11: Bye Bye [preauth] Jan 21 12:19:28 host sshd[1185]: Disconnected from 64.227.140.134 port 17072 [preauth] Jan 21 12:19:30 host sshd[1211]: Invalid user bondtest from 205.214.74.6 port 46836 Jan 21 12:19:30 host sshd[1211]: input_userauth_request: invalid user bondtest [preauth] Jan 21 12:19:30 host sshd[1211]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:19:30 host sshd[1211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.214.74.6 Jan 21 12:19:32 host sshd[1211]: Failed password for invalid user bondtest from 205.214.74.6 port 46836 ssh2 Jan 21 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=ugotscom user-3=wwwrmswll user-4=wwwresourcehunte user-5=keralaholi user-6=travelboniface user-7=wwwkaretakers user-8=cochintaxi user-9=laundryboniface user-10=dartsimp user-11=a2zgroup user-12=straightcurve user-13=wwwletsstalkfood user-14=wwwevmhonda user-15=bonifacegroup user-16=wwwnexidigital user-17=mrsclean user-18=phmetals user-19=kottayamcalldriv user-20=gifterman user-21=palco123 user-22=woodpeck user-23=wwwkapin user-24=disposeat user-25=remysagr user-26=wwwkmaorg user-27=pmcresources user-28=wwwtestugo user-29=shalinijames user-30=vfmassets feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 12:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jnwJWBmCgEfjloAP.~ Jan 21 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jnwJWBmCgEfjloAP.~' Jan 21 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-jnwJWBmCgEfjloAP.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 12:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 12:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 12:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 12:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 12:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 12:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 12:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 12:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 12:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 12:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 12:21:52 host sshd[1918]: Connection closed by 45.79.181.179 port 51890 [preauth] Jan 21 12:21:54 host sshd[1922]: Connection closed by 45.79.181.179 port 51894 [preauth] Jan 21 12:21:56 host sshd[1925]: Connection closed by 45.79.181.179 port 51910 [preauth] Jan 21 12:29:09 host sshd[2841]: invalid public DH value: >= p-1 [preauth] Jan 21 12:29:09 host sshd[2841]: ssh_dispatch_run_fatal: Connection from 171.248.39.17 port 41728: incomplete message [preauth] Jan 21 12:44:14 host sshd[4780]: Did not receive identification string from 167.71.166.243 port 49916 Jan 21 12:46:08 host sshd[5106]: Connection closed by 167.71.166.243 port 44412 [preauth] Jan 21 12:49:03 host sshd[5452]: User root from 62.233.50.248 not allowed because not listed in AllowUsers Jan 21 12:49:03 host sshd[5452]: input_userauth_request: invalid user root [preauth] Jan 21 12:49:03 host unix_chkpwd[5454]: password check failed for user (root) Jan 21 12:49:03 host sshd[5452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 user=root Jan 21 12:49:03 host sshd[5452]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 12:49:05 host sshd[5452]: Failed password for invalid user root from 62.233.50.248 port 39746 ssh2 Jan 21 12:49:05 host sshd[5452]: Received disconnect from 62.233.50.248 port 39746:11: Client disconnecting normally [preauth] Jan 21 12:49:05 host sshd[5452]: Disconnected from 62.233.50.248 port 39746 [preauth] Jan 21 12:52:15 host sshd[5939]: Invalid user oracle from 59.25.189.150 port 54649 Jan 21 12:52:15 host sshd[5939]: input_userauth_request: invalid user oracle [preauth] Jan 21 12:52:15 host sshd[5939]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:52:15 host sshd[5939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.189.150 Jan 21 12:52:16 host sshd[5939]: Failed password for invalid user oracle from 59.25.189.150 port 54649 ssh2 Jan 21 12:52:18 host sshd[5939]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:52:20 host sshd[5939]: Failed password for invalid user oracle from 59.25.189.150 port 54649 ssh2 Jan 21 12:52:22 host sshd[5939]: Connection reset by 59.25.189.150 port 54649 [preauth] Jan 21 12:52:22 host sshd[5939]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.189.150 Jan 21 12:52:23 host sshd[5950]: Invalid user hhd from 106.10.122.53 port 59030 Jan 21 12:52:23 host sshd[5950]: input_userauth_request: invalid user hhd [preauth] Jan 21 12:52:23 host sshd[5950]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:52:23 host sshd[5950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 21 12:52:25 host sshd[5950]: Failed password for invalid user hhd from 106.10.122.53 port 59030 ssh2 Jan 21 12:52:25 host sshd[5950]: Connection closed by 106.10.122.53 port 59030 [preauth] Jan 21 12:57:06 host sshd[6796]: Invalid user sysop from 108.28.163.143 port 52574 Jan 21 12:57:06 host sshd[6796]: input_userauth_request: invalid user sysop [preauth] Jan 21 12:57:06 host sshd[6796]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:57:06 host sshd[6796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.28.163.143 Jan 21 12:57:07 host sshd[6796]: Failed password for invalid user sysop from 108.28.163.143 port 52574 ssh2 Jan 21 12:57:08 host sshd[6796]: Received disconnect from 108.28.163.143 port 52574:11: Bye Bye [preauth] Jan 21 12:57:08 host sshd[6796]: Disconnected from 108.28.163.143 port 52574 [preauth] Jan 21 12:59:03 host sshd[7202]: Connection closed by 192.241.222.31 port 36788 [preauth] Jan 21 12:59:32 host sshd[7317]: Invalid user an from 3.110.6.147 port 45542 Jan 21 12:59:32 host sshd[7317]: input_userauth_request: invalid user an [preauth] Jan 21 12:59:32 host sshd[7317]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:59:32 host sshd[7317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.110.6.147 Jan 21 12:59:34 host sshd[7317]: Failed password for invalid user an from 3.110.6.147 port 45542 ssh2 Jan 21 12:59:34 host sshd[7317]: Received disconnect from 3.110.6.147 port 45542:11: Bye Bye [preauth] Jan 21 12:59:34 host sshd[7317]: Disconnected from 3.110.6.147 port 45542 [preauth] Jan 21 12:59:34 host sshd[7321]: Invalid user dev from 178.128.37.95 port 53446 Jan 21 12:59:34 host sshd[7321]: input_userauth_request: invalid user dev [preauth] Jan 21 12:59:34 host sshd[7321]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:59:34 host sshd[7321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.37.95 Jan 21 12:59:36 host sshd[7321]: Failed password for invalid user dev from 178.128.37.95 port 53446 ssh2 Jan 21 12:59:36 host sshd[7321]: Received disconnect from 178.128.37.95 port 53446:11: Bye Bye [preauth] Jan 21 12:59:36 host sshd[7321]: Disconnected from 178.128.37.95 port 53446 [preauth] Jan 21 12:59:45 host sshd[7339]: Invalid user mftuser from 178.39.224.188 port 50656 Jan 21 12:59:45 host sshd[7339]: input_userauth_request: invalid user mftuser [preauth] Jan 21 12:59:45 host sshd[7339]: pam_unix(sshd:auth): check pass; user unknown Jan 21 12:59:45 host sshd[7339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.39.224.188 Jan 21 12:59:48 host sshd[7339]: Failed password for invalid user mftuser from 178.39.224.188 port 50656 ssh2 Jan 21 12:59:48 host sshd[7339]: Received disconnect from 178.39.224.188 port 50656:11: Bye Bye [preauth] Jan 21 12:59:48 host sshd[7339]: Disconnected from 178.39.224.188 port 50656 [preauth] Jan 21 13:00:53 host sshd[7510]: Invalid user docker from 51.195.146.178 port 49150 Jan 21 13:00:53 host sshd[7510]: input_userauth_request: invalid user docker [preauth] Jan 21 13:00:53 host sshd[7510]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:00:53 host sshd[7510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.195.146.178 Jan 21 13:00:55 host sshd[7510]: Failed password for invalid user docker from 51.195.146.178 port 49150 ssh2 Jan 21 13:00:56 host sshd[7510]: Received disconnect from 51.195.146.178 port 49150:11: Bye Bye [preauth] Jan 21 13:00:56 host sshd[7510]: Disconnected from 51.195.146.178 port 49150 [preauth] Jan 21 13:01:02 host sshd[7528]: Invalid user tbadmin from 24.199.104.139 port 51146 Jan 21 13:01:02 host sshd[7528]: input_userauth_request: invalid user tbadmin [preauth] Jan 21 13:01:02 host sshd[7528]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:01:02 host sshd[7528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.104.139 Jan 21 13:01:04 host sshd[7528]: Failed password for invalid user tbadmin from 24.199.104.139 port 51146 ssh2 Jan 21 13:01:04 host sshd[7528]: Received disconnect from 24.199.104.139 port 51146:11: Bye Bye [preauth] Jan 21 13:01:04 host sshd[7528]: Disconnected from 24.199.104.139 port 51146 [preauth] Jan 21 13:01:29 host sshd[7624]: Invalid user radmin from 75.119.145.220 port 35670 Jan 21 13:01:29 host sshd[7624]: input_userauth_request: invalid user radmin [preauth] Jan 21 13:01:29 host sshd[7624]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:01:29 host sshd[7624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.119.145.220 Jan 21 13:01:31 host sshd[7624]: Failed password for invalid user radmin from 75.119.145.220 port 35670 ssh2 Jan 21 13:01:31 host sshd[7624]: Received disconnect from 75.119.145.220 port 35670:11: Bye Bye [preauth] Jan 21 13:01:31 host sshd[7624]: Disconnected from 75.119.145.220 port 35670 [preauth] Jan 21 13:02:18 host sshd[7724]: Invalid user git from 158.160.6.234 port 57418 Jan 21 13:02:18 host sshd[7724]: input_userauth_request: invalid user git [preauth] Jan 21 13:02:18 host sshd[7724]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:02:18 host sshd[7724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.6.234 Jan 21 13:02:20 host sshd[7724]: Failed password for invalid user git from 158.160.6.234 port 57418 ssh2 Jan 21 13:02:20 host sshd[7724]: Received disconnect from 158.160.6.234 port 57418:11: Bye Bye [preauth] Jan 21 13:02:20 host sshd[7724]: Disconnected from 158.160.6.234 port 57418 [preauth] Jan 21 13:02:42 host sshd[7795]: Invalid user user from 62.117.65.188 port 39868 Jan 21 13:02:42 host sshd[7795]: input_userauth_request: invalid user user [preauth] Jan 21 13:02:42 host sshd[7795]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:02:42 host sshd[7795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.117.65.188 Jan 21 13:02:43 host sshd[7795]: Failed password for invalid user user from 62.117.65.188 port 39868 ssh2 Jan 21 13:02:43 host sshd[7801]: Invalid user steam from 3.110.6.147 port 57108 Jan 21 13:02:43 host sshd[7801]: input_userauth_request: invalid user steam [preauth] Jan 21 13:02:43 host sshd[7801]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:02:43 host sshd[7801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.110.6.147 Jan 21 13:02:43 host sshd[7795]: Received disconnect from 62.117.65.188 port 39868:11: Bye Bye [preauth] Jan 21 13:02:43 host sshd[7795]: Disconnected from 62.117.65.188 port 39868 [preauth] Jan 21 13:02:45 host sshd[7801]: Failed password for invalid user steam from 3.110.6.147 port 57108 ssh2 Jan 21 13:02:45 host sshd[7801]: Received disconnect from 3.110.6.147 port 57108:11: Bye Bye [preauth] Jan 21 13:02:45 host sshd[7801]: Disconnected from 3.110.6.147 port 57108 [preauth] Jan 21 13:03:45 host sshd[8061]: Invalid user admin from 108.28.163.143 port 52756 Jan 21 13:03:45 host sshd[8061]: input_userauth_request: invalid user admin [preauth] Jan 21 13:03:45 host sshd[8061]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:03:45 host sshd[8061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.28.163.143 Jan 21 13:03:47 host sshd[8061]: Failed password for invalid user admin from 108.28.163.143 port 52756 ssh2 Jan 21 13:03:48 host sshd[8061]: Received disconnect from 108.28.163.143 port 52756:11: Bye Bye [preauth] Jan 21 13:03:48 host sshd[8061]: Disconnected from 108.28.163.143 port 52756 [preauth] Jan 21 13:03:57 host sshd[8075]: Invalid user sistemas from 3.110.6.147 port 55874 Jan 21 13:03:57 host sshd[8075]: input_userauth_request: invalid user sistemas [preauth] Jan 21 13:03:57 host sshd[8075]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:03:57 host sshd[8075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.110.6.147 Jan 21 13:03:59 host sshd[8075]: Failed password for invalid user sistemas from 3.110.6.147 port 55874 ssh2 Jan 21 13:03:59 host sshd[8075]: Received disconnect from 3.110.6.147 port 55874:11: Bye Bye [preauth] Jan 21 13:03:59 host sshd[8075]: Disconnected from 3.110.6.147 port 55874 [preauth] Jan 21 13:04:10 host sshd[8130]: Invalid user test from 192.241.255.97 port 44576 Jan 21 13:04:10 host sshd[8130]: input_userauth_request: invalid user test [preauth] Jan 21 13:04:10 host sshd[8130]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:04:10 host sshd[8130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.255.97 Jan 21 13:04:12 host sshd[8130]: Failed password for invalid user test from 192.241.255.97 port 44576 ssh2 Jan 21 13:04:12 host sshd[8130]: Received disconnect from 192.241.255.97 port 44576:11: Bye Bye [preauth] Jan 21 13:04:12 host sshd[8130]: Disconnected from 192.241.255.97 port 44576 [preauth] Jan 21 13:04:18 host sshd[8146]: Invalid user sgeadmin from 170.106.117.160 port 47930 Jan 21 13:04:18 host sshd[8146]: input_userauth_request: invalid user sgeadmin [preauth] Jan 21 13:04:18 host sshd[8146]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:04:18 host sshd[8146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.117.160 Jan 21 13:04:20 host sshd[8146]: Failed password for invalid user sgeadmin from 170.106.117.160 port 47930 ssh2 Jan 21 13:04:20 host sshd[8146]: Received disconnect from 170.106.117.160 port 47930:11: Bye Bye [preauth] Jan 21 13:04:20 host sshd[8146]: Disconnected from 170.106.117.160 port 47930 [preauth] Jan 21 13:04:52 host sshd[8215]: Invalid user wp-admin from 108.28.163.143 port 52822 Jan 21 13:04:52 host sshd[8215]: input_userauth_request: invalid user wp-admin [preauth] Jan 21 13:04:52 host sshd[8215]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:04:52 host sshd[8215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.28.163.143 Jan 21 13:04:52 host sshd[8217]: Invalid user tempuser from 178.128.37.95 port 48070 Jan 21 13:04:52 host sshd[8217]: input_userauth_request: invalid user tempuser [preauth] Jan 21 13:04:52 host sshd[8217]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:04:52 host sshd[8217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.37.95 Jan 21 13:04:53 host sshd[8215]: Failed password for invalid user wp-admin from 108.28.163.143 port 52822 ssh2 Jan 21 13:04:53 host sshd[8217]: Failed password for invalid user tempuser from 178.128.37.95 port 48070 ssh2 Jan 21 13:04:54 host sshd[8217]: Received disconnect from 178.128.37.95 port 48070:11: Bye Bye [preauth] Jan 21 13:04:54 host sshd[8217]: Disconnected from 178.128.37.95 port 48070 [preauth] Jan 21 13:05:13 host sshd[8312]: Invalid user adminweb from 24.199.104.139 port 39258 Jan 21 13:05:13 host sshd[8312]: input_userauth_request: invalid user adminweb [preauth] Jan 21 13:05:13 host sshd[8312]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:05:13 host sshd[8312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.104.139 Jan 21 13:05:15 host sshd[8312]: Failed password for invalid user adminweb from 24.199.104.139 port 39258 ssh2 Jan 21 13:05:16 host sshd[8312]: Received disconnect from 24.199.104.139 port 39258:11: Bye Bye [preauth] Jan 21 13:05:16 host sshd[8312]: Disconnected from 24.199.104.139 port 39258 [preauth] Jan 21 13:05:43 host sshd[8384]: Invalid user mftuser from 62.117.65.188 port 54962 Jan 21 13:05:43 host sshd[8384]: input_userauth_request: invalid user mftuser [preauth] Jan 21 13:05:43 host sshd[8384]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:05:43 host sshd[8384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.117.65.188 Jan 21 13:05:45 host sshd[8384]: Failed password for invalid user mftuser from 62.117.65.188 port 54962 ssh2 Jan 21 13:05:46 host sshd[8384]: Received disconnect from 62.117.65.188 port 54962:11: Bye Bye [preauth] Jan 21 13:05:46 host sshd[8384]: Disconnected from 62.117.65.188 port 54962 [preauth] Jan 21 13:05:49 host sshd[8398]: Invalid user ftptest from 158.160.6.234 port 53590 Jan 21 13:05:49 host sshd[8398]: input_userauth_request: invalid user ftptest [preauth] Jan 21 13:05:49 host sshd[8398]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:05:49 host sshd[8398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.6.234 Jan 21 13:05:51 host sshd[8398]: Failed password for invalid user ftptest from 158.160.6.234 port 53590 ssh2 Jan 21 13:05:51 host sshd[8398]: Received disconnect from 158.160.6.234 port 53590:11: Bye Bye [preauth] Jan 21 13:05:51 host sshd[8398]: Disconnected from 158.160.6.234 port 53590 [preauth] Jan 21 13:05:57 host sshd[8411]: Invalid user administrador from 178.128.37.95 port 42932 Jan 21 13:05:57 host sshd[8411]: input_userauth_request: invalid user administrador [preauth] Jan 21 13:05:57 host sshd[8411]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:05:57 host sshd[8411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.37.95 Jan 21 13:05:59 host sshd[8445]: Invalid user max from 178.39.224.188 port 46440 Jan 21 13:05:59 host sshd[8445]: input_userauth_request: invalid user max [preauth] Jan 21 13:05:59 host sshd[8445]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:05:59 host sshd[8445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.39.224.188 Jan 21 13:05:59 host sshd[8411]: Failed password for invalid user administrador from 178.128.37.95 port 42932 ssh2 Jan 21 13:06:01 host sshd[8445]: Failed password for invalid user max from 178.39.224.188 port 46440 ssh2 Jan 21 13:06:01 host sshd[8445]: Received disconnect from 178.39.224.188 port 46440:11: Bye Bye [preauth] Jan 21 13:06:01 host sshd[8445]: Disconnected from 178.39.224.188 port 46440 [preauth] Jan 21 13:06:24 host sshd[8480]: Invalid user jenkins from 51.195.146.178 port 59286 Jan 21 13:06:24 host sshd[8480]: input_userauth_request: invalid user jenkins [preauth] Jan 21 13:06:24 host sshd[8480]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:06:24 host sshd[8480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.195.146.178 Jan 21 13:06:26 host sshd[8480]: Failed password for invalid user jenkins from 51.195.146.178 port 59286 ssh2 Jan 21 13:06:26 host sshd[8480]: Received disconnect from 51.195.146.178 port 59286:11: Bye Bye [preauth] Jan 21 13:06:26 host sshd[8480]: Disconnected from 51.195.146.178 port 59286 [preauth] Jan 21 13:06:28 host sshd[8498]: Invalid user ttuser from 24.199.104.139 port 60198 Jan 21 13:06:28 host sshd[8498]: input_userauth_request: invalid user ttuser [preauth] Jan 21 13:06:28 host sshd[8498]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:06:28 host sshd[8498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.199.104.139 Jan 21 13:06:28 host sshd[8500]: Invalid user ghostuser from 192.241.255.97 port 45504 Jan 21 13:06:28 host sshd[8500]: input_userauth_request: invalid user ghostuser [preauth] Jan 21 13:06:28 host sshd[8500]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:06:28 host sshd[8500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.255.97 Jan 21 13:06:29 host sshd[8498]: Failed password for invalid user ttuser from 24.199.104.139 port 60198 ssh2 Jan 21 13:06:30 host sshd[8498]: Received disconnect from 24.199.104.139 port 60198:11: Bye Bye [preauth] Jan 21 13:06:30 host sshd[8498]: Disconnected from 24.199.104.139 port 60198 [preauth] Jan 21 13:06:30 host sshd[8500]: Failed password for invalid user ghostuser from 192.241.255.97 port 45504 ssh2 Jan 21 13:06:30 host sshd[8500]: Received disconnect from 192.241.255.97 port 45504:11: Bye Bye [preauth] Jan 21 13:06:30 host sshd[8500]: Disconnected from 192.241.255.97 port 45504 [preauth] Jan 21 13:06:34 host sshd[8565]: Invalid user panda from 75.119.145.220 port 47486 Jan 21 13:06:34 host sshd[8565]: input_userauth_request: invalid user panda [preauth] Jan 21 13:06:34 host sshd[8565]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:06:34 host sshd[8565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.119.145.220 Jan 21 13:06:36 host sshd[8565]: Failed password for invalid user panda from 75.119.145.220 port 47486 ssh2 Jan 21 13:06:36 host sshd[8565]: Received disconnect from 75.119.145.220 port 47486:11: Bye Bye [preauth] Jan 21 13:06:36 host sshd[8565]: Disconnected from 75.119.145.220 port 47486 [preauth] Jan 21 13:06:58 host sshd[8615]: Invalid user ftptest from 62.117.65.188 port 33906 Jan 21 13:06:58 host sshd[8615]: input_userauth_request: invalid user ftptest [preauth] Jan 21 13:06:58 host sshd[8615]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:06:58 host sshd[8615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.117.65.188 Jan 21 13:07:00 host sshd[8615]: Failed password for invalid user ftptest from 62.117.65.188 port 33906 ssh2 Jan 21 13:07:00 host sshd[8615]: Received disconnect from 62.117.65.188 port 33906:11: Bye Bye [preauth] Jan 21 13:07:00 host sshd[8615]: Disconnected from 62.117.65.188 port 33906 [preauth] Jan 21 13:07:06 host sshd[8678]: Invalid user max from 158.160.6.234 port 46188 Jan 21 13:07:06 host sshd[8678]: input_userauth_request: invalid user max [preauth] Jan 21 13:07:06 host sshd[8678]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:07:06 host sshd[8678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.160.6.234 Jan 21 13:07:07 host sshd[8678]: Failed password for invalid user max from 158.160.6.234 port 46188 ssh2 Jan 21 13:07:07 host sshd[8678]: Received disconnect from 158.160.6.234 port 46188:11: Bye Bye [preauth] Jan 21 13:07:07 host sshd[8678]: Disconnected from 158.160.6.234 port 46188 [preauth] Jan 21 13:07:19 host sshd[8743]: Invalid user ftptest from 178.39.224.188 port 40922 Jan 21 13:07:19 host sshd[8743]: input_userauth_request: invalid user ftptest [preauth] Jan 21 13:07:19 host sshd[8743]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:07:19 host sshd[8743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.39.224.188 Jan 21 13:07:21 host sshd[8743]: Failed password for invalid user ftptest from 178.39.224.188 port 40922 ssh2 Jan 21 13:07:22 host sshd[8743]: Received disconnect from 178.39.224.188 port 40922:11: Bye Bye [preauth] Jan 21 13:07:22 host sshd[8743]: Disconnected from 178.39.224.188 port 40922 [preauth] Jan 21 13:07:28 host sshd[8789]: Invalid user git from 170.106.117.160 port 42924 Jan 21 13:07:28 host sshd[8789]: input_userauth_request: invalid user git [preauth] Jan 21 13:07:28 host sshd[8789]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:07:28 host sshd[8789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.117.160 Jan 21 13:07:29 host sshd[8789]: Failed password for invalid user git from 170.106.117.160 port 42924 ssh2 Jan 21 13:07:29 host sshd[8789]: Received disconnect from 170.106.117.160 port 42924:11: Bye Bye [preauth] Jan 21 13:07:29 host sshd[8789]: Disconnected from 170.106.117.160 port 42924 [preauth] Jan 21 13:07:41 host sshd[8841]: Invalid user admin from 192.241.255.97 port 40166 Jan 21 13:07:41 host sshd[8841]: input_userauth_request: invalid user admin [preauth] Jan 21 13:07:41 host sshd[8841]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:07:41 host sshd[8841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.255.97 Jan 21 13:07:42 host sshd[8841]: Failed password for invalid user admin from 192.241.255.97 port 40166 ssh2 Jan 21 13:07:42 host sshd[8841]: Received disconnect from 192.241.255.97 port 40166:11: Bye Bye [preauth] Jan 21 13:07:42 host sshd[8841]: Disconnected from 192.241.255.97 port 40166 [preauth] Jan 21 13:07:49 host sshd[8885]: Invalid user mailadmin from 75.119.145.220 port 45550 Jan 21 13:07:49 host sshd[8885]: input_userauth_request: invalid user mailadmin [preauth] Jan 21 13:07:49 host sshd[8885]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:07:49 host sshd[8885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.119.145.220 Jan 21 13:07:50 host sshd[8885]: Failed password for invalid user mailadmin from 75.119.145.220 port 45550 ssh2 Jan 21 13:07:51 host sshd[8885]: Received disconnect from 75.119.145.220 port 45550:11: Bye Bye [preauth] Jan 21 13:07:51 host sshd[8885]: Disconnected from 75.119.145.220 port 45550 [preauth] Jan 21 13:08:32 host sshd[9011]: Invalid user test from 170.106.117.160 port 37698 Jan 21 13:08:32 host sshd[9011]: input_userauth_request: invalid user test [preauth] Jan 21 13:08:32 host sshd[9011]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:08:32 host sshd[9011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.106.117.160 Jan 21 13:08:35 host sshd[9011]: Failed password for invalid user test from 170.106.117.160 port 37698 ssh2 Jan 21 13:08:35 host sshd[9011]: Received disconnect from 170.106.117.160 port 37698:11: Bye Bye [preauth] Jan 21 13:08:35 host sshd[9011]: Disconnected from 170.106.117.160 port 37698 [preauth] Jan 21 13:10:18 host sshd[9272]: Invalid user hk from 194.110.203.109 port 40934 Jan 21 13:10:18 host sshd[9272]: input_userauth_request: invalid user hk [preauth] Jan 21 13:10:18 host sshd[9272]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:10:18 host sshd[9272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 13:10:19 host sshd[9272]: Failed password for invalid user hk from 194.110.203.109 port 40934 ssh2 Jan 21 13:10:23 host sshd[9272]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:10:25 host sshd[9272]: Failed password for invalid user hk from 194.110.203.109 port 40934 ssh2 Jan 21 13:10:28 host sshd[9272]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:10:30 host sshd[9272]: Failed password for invalid user hk from 194.110.203.109 port 40934 ssh2 Jan 21 13:10:34 host sshd[9272]: Connection closed by 194.110.203.109 port 40934 [preauth] Jan 21 13:10:34 host sshd[9272]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 13:10:36 host sshd[9302]: Invalid user mftuser from 51.195.146.178 port 48678 Jan 21 13:10:36 host sshd[9302]: input_userauth_request: invalid user mftuser [preauth] Jan 21 13:10:36 host sshd[9302]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:10:36 host sshd[9302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.195.146.178 Jan 21 13:10:37 host sshd[9302]: Failed password for invalid user mftuser from 51.195.146.178 port 48678 ssh2 Jan 21 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkmaorg user-2=disposeat user-3=remysagr user-4=wwwkapin user-5=woodpeck user-6=shalinijames user-7=wwwtestugo user-8=vfmassets user-9=pmcresources user-10=wwwevmhonda user-11=bonifacegroup user-12=wwwletsstalkfood user-13=straightcurve user-14=phmetals user-15=kottayamcalldriv user-16=palco123 user-17=gifterman user-18=mrsclean user-19=wwwnexidigital user-20=wwwkaretakers user-21=cochintaxi user-22=a2zgroup user-23=dartsimp user-24=laundryboniface user-25=wwwpmcresource user-26=travelboniface user-27=ugotscom user-28=wwwresourcehunte user-29=keralaholi user-30=wwwrmswll feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 13:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6NZ3ShJAblDCykyX.~ Jan 21 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6NZ3ShJAblDCykyX.~' Jan 21 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-6NZ3ShJAblDCykyX.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 13:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 13:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 13:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 13:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 13:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 13:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 13:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 13:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 13:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 13:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 13:21:29 host sshd[11077]: Invalid user sFTPUser from 103.196.232.44 port 39804 Jan 21 13:21:29 host sshd[11077]: input_userauth_request: invalid user sFTPUser [preauth] Jan 21 13:21:29 host sshd[11077]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:21:29 host sshd[11077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.196.232.44 Jan 21 13:21:31 host sshd[11077]: Failed password for invalid user sFTPUser from 103.196.232.44 port 39804 ssh2 Jan 21 13:21:31 host sshd[11077]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:21:33 host sshd[11077]: Failed password for invalid user sFTPUser from 103.196.232.44 port 39804 ssh2 Jan 21 13:21:33 host sshd[11077]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:21:35 host sshd[11077]: Failed password for invalid user sFTPUser from 103.196.232.44 port 39804 ssh2 Jan 21 13:21:35 host sshd[11077]: Connection reset by 103.196.232.44 port 39804 [preauth] Jan 21 13:21:35 host sshd[11077]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.196.232.44 Jan 21 13:32:09 host sshd[12529]: Did not receive identification string from 154.89.5.216 port 37642 Jan 21 13:32:24 host sshd[12530]: Connection closed by 154.89.5.216 port 37724 [preauth] Jan 21 13:33:17 host sshd[12637]: Did not receive identification string from 125.74.239.20 port 36316 Jan 21 13:33:21 host sshd[12639]: User ftp from 125.74.239.20 not allowed because not listed in AllowUsers Jan 21 13:33:21 host sshd[12639]: input_userauth_request: invalid user ftp [preauth] Jan 21 13:33:21 host unix_chkpwd[12699]: password check failed for user (ftp) Jan 21 13:33:21 host sshd[12639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 user=ftp Jan 21 13:33:21 host sshd[12639]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 21 13:33:22 host sshd[12644]: Invalid user es from 125.74.239.20 port 14763 Jan 21 13:33:22 host sshd[12644]: input_userauth_request: invalid user es [preauth] Jan 21 13:33:22 host sshd[12645]: Invalid user testuser from 125.74.239.20 port 14737 Jan 21 13:33:22 host sshd[12645]: input_userauth_request: invalid user testuser [preauth] Jan 21 13:33:22 host sshd[12643]: Invalid user steam from 125.74.239.20 port 14761 Jan 21 13:33:22 host sshd[12643]: input_userauth_request: invalid user steam [preauth] Jan 21 13:33:22 host sshd[12646]: Invalid user ansadmin from 125.74.239.20 port 14716 Jan 21 13:33:22 host sshd[12646]: input_userauth_request: invalid user ansadmin [preauth] Jan 21 13:33:22 host sshd[12651]: Invalid user testuser from 125.74.239.20 port 14775 Jan 21 13:33:22 host sshd[12651]: input_userauth_request: invalid user testuser [preauth] Jan 21 13:33:22 host sshd[12650]: Invalid user ansadmin from 125.74.239.20 port 14777 Jan 21 13:33:22 host sshd[12650]: input_userauth_request: invalid user ansadmin [preauth] Jan 21 13:33:22 host sshd[12649]: Invalid user steam from 125.74.239.20 port 14754 Jan 21 13:33:22 host sshd[12649]: input_userauth_request: invalid user steam [preauth] Jan 21 13:33:22 host sshd[12647]: Invalid user linux from 125.74.239.20 port 14733 Jan 21 13:33:22 host sshd[12647]: input_userauth_request: invalid user linux [preauth] Jan 21 13:33:22 host sshd[12655]: User centos from 125.74.239.20 not allowed because not listed in AllowUsers Jan 21 13:33:22 host sshd[12653]: Invalid user guest from 125.74.239.20 port 14723 Jan 21 13:33:22 host sshd[12655]: input_userauth_request: invalid user centos [preauth] Jan 21 13:33:22 host sshd[12653]: input_userauth_request: invalid user guest [preauth] Jan 21 13:33:22 host sshd[12662]: User ftp from 125.74.239.20 not allowed because not listed in AllowUsers Jan 21 13:33:22 host sshd[12662]: input_userauth_request: invalid user ftp [preauth] Jan 21 13:33:22 host sshd[12648]: Invalid user ubuntu from 125.74.239.20 port 14780 Jan 21 13:33:22 host sshd[12648]: input_userauth_request: invalid user ubuntu [preauth] Jan 21 13:33:22 host sshd[12654]: Invalid user ftpuser from 125.74.239.20 port 14734 Jan 21 13:33:22 host sshd[12654]: input_userauth_request: invalid user ftpuser [preauth] Jan 21 13:33:22 host sshd[12658]: Invalid user teamspeak from 125.74.239.20 port 14715 Jan 21 13:33:22 host sshd[12658]: input_userauth_request: invalid user teamspeak [preauth] Jan 21 13:33:22 host sshd[12657]: Invalid user linux from 125.74.239.20 port 14791 Jan 21 13:33:22 host sshd[12657]: input_userauth_request: invalid user linux [preauth] Jan 21 13:33:22 host sshd[12652]: Invalid user ubuntu from 125.74.239.20 port 14779 Jan 21 13:33:22 host sshd[12652]: input_userauth_request: invalid user ubuntu [preauth] Jan 21 13:33:22 host sshd[12659]: Invalid user ansadmin from 125.74.239.20 port 14765 Jan 21 13:33:22 host sshd[12659]: input_userauth_request: invalid user ansadmin [preauth] Jan 21 13:33:22 host sshd[12656]: Invalid user zjw from 125.74.239.20 port 14729 Jan 21 13:33:22 host sshd[12656]: input_userauth_request: invalid user zjw [preauth] Jan 21 13:33:22 host sshd[12666]: Invalid user posiflex from 125.74.239.20 port 14731 Jan 21 13:33:22 host sshd[12666]: input_userauth_request: invalid user posiflex [preauth] Jan 21 13:33:22 host sshd[12660]: Invalid user ansadmin from 125.74.239.20 port 14753 Jan 21 13:33:22 host sshd[12660]: input_userauth_request: invalid user ansadmin [preauth] Jan 21 13:33:22 host sshd[12661]: Invalid user git from 125.74.239.20 port 14757 Jan 21 13:33:22 host sshd[12661]: input_userauth_request: invalid user git [preauth] Jan 21 13:33:22 host sshd[12665]: Invalid user steam from 125.74.239.20 port 14725 Jan 21 13:33:22 host sshd[12665]: input_userauth_request: invalid user steam [preauth] Jan 21 13:33:22 host sshd[12667]: User ftp from 125.74.239.20 not allowed because not listed in AllowUsers Jan 21 13:33:22 host sshd[12667]: input_userauth_request: invalid user ftp [preauth] Jan 21 13:33:22 host sshd[12668]: Invalid user oracle from 125.74.239.20 port 14789 Jan 21 13:33:22 host sshd[12668]: input_userauth_request: invalid user oracle [preauth] Jan 21 13:33:22 host sshd[12672]: Invalid user guest from 125.74.239.20 port 14749 Jan 21 13:33:22 host sshd[12673]: Invalid user admin from 125.74.239.20 port 14747 Jan 21 13:33:22 host sshd[12672]: input_userauth_request: invalid user guest [preauth] Jan 21 13:33:22 host sshd[12673]: input_userauth_request: invalid user admin [preauth] Jan 21 13:33:22 host sshd[12679]: User mysql from 125.74.239.20 not allowed because not listed in AllowUsers Jan 21 13:33:22 host sshd[12679]: input_userauth_request: invalid user mysql [preauth] Jan 21 13:33:22 host sshd[12674]: Invalid user posiflex from 125.74.239.20 port 14741 Jan 21 13:33:22 host sshd[12674]: input_userauth_request: invalid user posiflex [preauth] Jan 21 13:33:22 host sshd[12644]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12643]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12645]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12646]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12651]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12649]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12650]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12647]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12653]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host unix_chkpwd[12701]: password check failed for user (centos) Jan 21 13:33:22 host sshd[12655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 user=centos Jan 21 13:33:22 host sshd[12654]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host unix_chkpwd[12702]: password check failed for user (ftp) Jan 21 13:33:22 host sshd[12662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 user=ftp Jan 21 13:33:22 host sshd[12662]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 21 13:33:22 host sshd[12648]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12658]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12657]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12652]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12656]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12659]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12666]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12660]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12661]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12665]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host unix_chkpwd[12703]: password check failed for user (ftp) Jan 21 13:33:22 host sshd[12667]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 user=ftp Jan 21 13:33:22 host sshd[12667]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 21 13:33:22 host sshd[12672]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12668]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12673]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host sshd[12674]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:33:22 host sshd[12674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 Jan 21 13:33:22 host unix_chkpwd[12704]: password check failed for user (mysql) Jan 21 13:33:22 host sshd[12679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.239.20 user=mysql Jan 21 13:33:22 host sshd[12679]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "mysql" Jan 21 13:33:23 host sshd[12639]: Failed password for invalid user ftp from 125.74.239.20 port 14787 ssh2 Jan 21 13:33:23 host sshd[12639]: Connection closed by 125.74.239.20 port 14787 [preauth] Jan 21 13:33:24 host sshd[12644]: Failed password for invalid user es from 125.74.239.20 port 14763 ssh2 Jan 21 13:33:24 host sshd[12643]: Failed password for invalid user steam from 125.74.239.20 port 14761 ssh2 Jan 21 13:33:24 host sshd[12645]: Failed password for invalid user testuser from 125.74.239.20 port 14737 ssh2 Jan 21 13:33:24 host sshd[12646]: Failed password for invalid user ansadmin from 125.74.239.20 port 14716 ssh2 Jan 21 13:33:24 host sshd[12651]: Failed password for invalid user testuser from 125.74.239.20 port 14775 ssh2 Jan 21 13:33:24 host sshd[12649]: Failed password for invalid user steam from 125.74.239.20 port 14754 ssh2 Jan 21 13:33:24 host sshd[12650]: Failed password for invalid user ansadmin from 125.74.239.20 port 14777 ssh2 Jan 21 13:33:24 host sshd[12647]: Failed password for invalid user linux from 125.74.239.20 port 14733 ssh2 Jan 21 13:33:24 host sshd[12653]: Failed password for invalid user guest from 125.74.239.20 port 14723 ssh2 Jan 21 13:33:24 host sshd[12654]: Failed password for invalid user ftpuser from 125.74.239.20 port 14734 ssh2 Jan 21 13:33:24 host sshd[12655]: Failed password for invalid user centos from 125.74.239.20 port 14745 ssh2 Jan 21 13:33:24 host sshd[12662]: Failed password for invalid user ftp from 125.74.239.20 port 14713 ssh2 Jan 21 13:33:24 host sshd[12648]: Failed password for invalid user ubuntu from 125.74.239.20 port 14780 ssh2 Jan 21 13:33:24 host sshd[12658]: Failed password for invalid user teamspeak from 125.74.239.20 port 14715 ssh2 Jan 21 13:33:24 host sshd[12657]: Failed password for invalid user linux from 125.74.239.20 port 14791 ssh2 Jan 21 13:33:24 host sshd[12652]: Failed password for invalid user ubuntu from 125.74.239.20 port 14779 ssh2 Jan 21 13:33:24 host sshd[12656]: Failed password for invalid user zjw from 125.74.239.20 port 14729 ssh2 Jan 21 13:33:24 host sshd[12659]: Failed password for invalid user ansadmin from 125.74.239.20 port 14765 ssh2 Jan 21 13:33:24 host sshd[12666]: Failed password for invalid user posiflex from 125.74.239.20 port 14731 ssh2 Jan 21 13:33:24 host sshd[12660]: Failed password for invalid user ansadmin from 125.74.239.20 port 14753 ssh2 Jan 21 13:33:24 host sshd[12661]: Failed password for invalid user git from 125.74.239.20 port 14757 ssh2 Jan 21 13:33:24 host sshd[12665]: Failed password for invalid user steam from 125.74.239.20 port 14725 ssh2 Jan 21 13:33:24 host sshd[12667]: Failed password for invalid user ftp from 125.74.239.20 port 14739 ssh2 Jan 21 13:33:24 host sshd[12672]: Failed password for invalid user guest from 125.74.239.20 port 14749 ssh2 Jan 21 13:33:24 host sshd[12668]: Failed password for invalid user oracle from 125.74.239.20 port 14789 ssh2 Jan 21 13:33:24 host sshd[12673]: Failed password for invalid user admin from 125.74.239.20 port 14747 ssh2 Jan 21 13:33:24 host sshd[12674]: Failed password for invalid user posiflex from 125.74.239.20 port 14741 ssh2 Jan 21 13:33:24 host sshd[12679]: Failed password for invalid user mysql from 125.74.239.20 port 14759 ssh2 Jan 21 13:34:19 host sshd[12961]: Invalid user platform from 162.218.126.136 port 47408 Jan 21 13:34:19 host sshd[12961]: input_userauth_request: invalid user platform [preauth] Jan 21 13:34:19 host sshd[12961]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:34:19 host sshd[12961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Jan 21 13:34:21 host sshd[12961]: Failed password for invalid user platform from 162.218.126.136 port 47408 ssh2 Jan 21 13:34:22 host sshd[12961]: Connection closed by 162.218.126.136 port 47408 [preauth] Jan 21 13:40:10 host sshd[13613]: Invalid user zyfwp from 101.113.91.53 port 39934 Jan 21 13:40:10 host sshd[13613]: input_userauth_request: invalid user zyfwp [preauth] Jan 21 13:40:10 host sshd[13613]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:40:10 host sshd[13613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.113.91.53 Jan 21 13:40:11 host sshd[13613]: Failed password for invalid user zyfwp from 101.113.91.53 port 39934 ssh2 Jan 21 13:40:12 host sshd[13613]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:40:13 host sshd[13613]: Failed password for invalid user zyfwp from 101.113.91.53 port 39934 ssh2 Jan 21 13:41:53 host sshd[13924]: Invalid user nginx from 211.223.185.206 port 63923 Jan 21 13:41:53 host sshd[13924]: input_userauth_request: invalid user nginx [preauth] Jan 21 13:41:53 host sshd[13924]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:41:53 host sshd[13924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.223.185.206 Jan 21 13:41:54 host sshd[13924]: Failed password for invalid user nginx from 211.223.185.206 port 63923 ssh2 Jan 21 13:41:55 host sshd[13924]: pam_unix(sshd:auth): check pass; user unknown Jan 21 13:41:56 host sshd[13924]: Failed password for invalid user nginx from 211.223.185.206 port 63923 ssh2 Jan 21 13:41:57 host sshd[13924]: Connection reset by 211.223.185.206 port 63923 [preauth] Jan 21 13:41:57 host sshd[13924]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.223.185.206 Jan 21 13:42:47 host sshd[14021]: User root from 59.25.112.205 not allowed because not listed in AllowUsers Jan 21 13:42:47 host sshd[14021]: input_userauth_request: invalid user root [preauth] Jan 21 13:42:47 host unix_chkpwd[14028]: password check failed for user (root) Jan 21 13:42:47 host sshd[14021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.112.205 user=root Jan 21 13:42:47 host sshd[14021]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 13:42:49 host sshd[14021]: Failed password for invalid user root from 59.25.112.205 port 61138 ssh2 Jan 21 13:42:49 host unix_chkpwd[14036]: password check failed for user (root) Jan 21 13:42:49 host sshd[14021]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 13:42:52 host sshd[14021]: Failed password for invalid user root from 59.25.112.205 port 61138 ssh2 Jan 21 13:42:52 host sshd[14021]: Connection reset by 59.25.112.205 port 61138 [preauth] Jan 21 13:42:52 host sshd[14021]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.112.205 user=root Jan 21 13:49:46 host sshd[15347]: Did not receive identification string from 178.79.177.104 port 34740 Jan 21 14:12:40 host sshd[18661]: User root from 219.85.53.188 not allowed because not listed in AllowUsers Jan 21 14:12:40 host sshd[18661]: input_userauth_request: invalid user root [preauth] Jan 21 14:12:40 host unix_chkpwd[18664]: password check failed for user (root) Jan 21 14:12:40 host sshd[18661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.85.53.188 user=root Jan 21 14:12:40 host sshd[18661]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 14:12:41 host sshd[18661]: Failed password for invalid user root from 219.85.53.188 port 57921 ssh2 Jan 21 14:12:42 host unix_chkpwd[18669]: password check failed for user (root) Jan 21 14:12:42 host sshd[18661]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 14:12:44 host sshd[18661]: Failed password for invalid user root from 219.85.53.188 port 57921 ssh2 Jan 21 14:12:45 host sshd[18661]: Connection reset by 219.85.53.188 port 57921 [preauth] Jan 21 14:12:45 host sshd[18661]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.85.53.188 user=root Jan 21 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwpmcresource user-2=keralaholi user-3=wwwresourcehunte user-4=wwwrmswll user-5=ugotscom user-6=travelboniface user-7=cochintaxi user-8=wwwkaretakers user-9=laundryboniface user-10=a2zgroup user-11=dartsimp user-12=straightcurve user-13=wwwletsstalkfood user-14=bonifacegroup user-15=wwwevmhonda user-16=mrsclean user-17=wwwnexidigital user-18=palco123 user-19=gifterman user-20=kottayamcalldriv user-21=phmetals user-22=woodpeck user-23=wwwkapin user-24=wwwkmaorg user-25=disposeat user-26=remysagr user-27=pmcresources user-28=vfmassets user-29=shalinijames user-30=wwwtestugo feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 14:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WOWqEIdzd741Yazx.~ Jan 21 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WOWqEIdzd741Yazx.~' Jan 21 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-WOWqEIdzd741Yazx.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 14:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 14:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 14:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 14:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 14:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 14:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 14:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 14:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 14:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 14:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 14:22:04 host sshd[20082]: Invalid user pcxu from 106.10.122.53 port 48560 Jan 21 14:22:04 host sshd[20082]: input_userauth_request: invalid user pcxu [preauth] Jan 21 14:22:04 host sshd[20082]: pam_unix(sshd:auth): check pass; user unknown Jan 21 14:22:04 host sshd[20082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 21 14:22:06 host sshd[20082]: Failed password for invalid user pcxu from 106.10.122.53 port 48560 ssh2 Jan 21 14:22:06 host sshd[20082]: Connection closed by 106.10.122.53 port 48560 [preauth] Jan 21 14:26:10 host sshd[20638]: Invalid user pi from 202.130.123.190 port 36593 Jan 21 14:26:10 host sshd[20638]: input_userauth_request: invalid user pi [preauth] Jan 21 14:26:10 host sshd[20638]: pam_unix(sshd:auth): check pass; user unknown Jan 21 14:26:10 host sshd[20638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.130.123.190 Jan 21 14:26:11 host sshd[20638]: Failed password for invalid user pi from 202.130.123.190 port 36593 ssh2 Jan 21 14:26:12 host sshd[20638]: pam_unix(sshd:auth): check pass; user unknown Jan 21 14:26:14 host sshd[20638]: Failed password for invalid user pi from 202.130.123.190 port 36593 ssh2 Jan 21 14:26:14 host sshd[20638]: pam_unix(sshd:auth): check pass; user unknown Jan 21 14:26:16 host sshd[20638]: Failed password for invalid user pi from 202.130.123.190 port 36593 ssh2 Jan 21 14:26:16 host sshd[20638]: pam_unix(sshd:auth): check pass; user unknown Jan 21 14:26:18 host sshd[20638]: Failed password for invalid user pi from 202.130.123.190 port 36593 ssh2 Jan 21 14:26:18 host sshd[20638]: pam_unix(sshd:auth): check pass; user unknown Jan 21 14:26:20 host sshd[20638]: Failed password for invalid user pi from 202.130.123.190 port 36593 ssh2 Jan 21 14:35:18 host sshd[21935]: Invalid user vadmin from 218.158.27.85 port 62505 Jan 21 14:35:18 host sshd[21935]: input_userauth_request: invalid user vadmin [preauth] Jan 21 14:35:18 host sshd[21935]: pam_unix(sshd:auth): check pass; user unknown Jan 21 14:35:18 host sshd[21935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.158.27.85 Jan 21 14:35:20 host sshd[21935]: Failed password for invalid user vadmin from 218.158.27.85 port 62505 ssh2 Jan 21 14:35:21 host sshd[21935]: pam_unix(sshd:auth): check pass; user unknown Jan 21 14:35:23 host sshd[21935]: Failed password for invalid user vadmin from 218.158.27.85 port 62505 ssh2 Jan 21 14:36:27 host sshd[22157]: Invalid user vadmin from 221.160.148.227 port 62245 Jan 21 14:36:27 host sshd[22157]: input_userauth_request: invalid user vadmin [preauth] Jan 21 14:36:27 host sshd[22157]: pam_unix(sshd:auth): check pass; user unknown Jan 21 14:36:27 host sshd[22157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.160.148.227 Jan 21 14:36:30 host sshd[22157]: Failed password for invalid user vadmin from 221.160.148.227 port 62245 ssh2 Jan 21 14:36:31 host sshd[22157]: pam_unix(sshd:auth): check pass; user unknown Jan 21 14:36:33 host sshd[22157]: Failed password for invalid user vadmin from 221.160.148.227 port 62245 ssh2 Jan 21 14:36:33 host sshd[22157]: Failed password for invalid user vadmin from 221.160.148.227 port 62245 ssh2 Jan 21 14:41:48 host sshd[22874]: Invalid user frederick from 107.189.30.59 port 52148 Jan 21 14:41:48 host sshd[22874]: input_userauth_request: invalid user frederick [preauth] Jan 21 14:41:48 host sshd[22874]: pam_unix(sshd:auth): check pass; user unknown Jan 21 14:41:48 host sshd[22874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 21 14:41:50 host sshd[22874]: Failed password for invalid user frederick from 107.189.30.59 port 52148 ssh2 Jan 21 14:41:50 host sshd[22874]: Connection closed by 107.189.30.59 port 52148 [preauth] Jan 21 14:59:13 host sshd[25322]: Invalid user hl from 194.110.203.109 port 57064 Jan 21 14:59:13 host sshd[25322]: input_userauth_request: invalid user hl [preauth] Jan 21 14:59:13 host sshd[25322]: pam_unix(sshd:auth): check pass; user unknown Jan 21 14:59:13 host sshd[25322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 14:59:15 host sshd[25322]: Failed password for invalid user hl from 194.110.203.109 port 57064 ssh2 Jan 21 14:59:17 host sshd[25333]: User root from 80.76.51.143 not allowed because not listed in AllowUsers Jan 21 14:59:17 host sshd[25333]: input_userauth_request: invalid user root [preauth] Jan 21 14:59:17 host unix_chkpwd[25336]: password check failed for user (root) Jan 21 14:59:17 host sshd[25333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.76.51.143 user=root Jan 21 14:59:17 host sshd[25333]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 14:59:18 host sshd[25322]: pam_unix(sshd:auth): check pass; user unknown Jan 21 14:59:19 host sshd[25333]: Failed password for invalid user root from 80.76.51.143 port 34166 ssh2 Jan 21 14:59:19 host sshd[25333]: Connection closed by 80.76.51.143 port 34166 [preauth] Jan 21 14:59:20 host sshd[25322]: Failed password for invalid user hl from 194.110.203.109 port 57064 ssh2 Jan 21 14:59:23 host sshd[25322]: pam_unix(sshd:auth): check pass; user unknown Jan 21 14:59:25 host sshd[25322]: Failed password for invalid user hl from 194.110.203.109 port 57064 ssh2 Jan 21 14:59:28 host sshd[25322]: Connection closed by 194.110.203.109 port 57064 [preauth] Jan 21 14:59:28 host sshd[25322]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 15:03:54 host sshd[25976]: Invalid user sonaruser from 91.54.163.172 port 52370 Jan 21 15:03:54 host sshd[25976]: input_userauth_request: invalid user sonaruser [preauth] Jan 21 15:03:54 host sshd[25976]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:03:54 host sshd[25976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.54.163.172 Jan 21 15:03:56 host sshd[25976]: Failed password for invalid user sonaruser from 91.54.163.172 port 52370 ssh2 Jan 21 15:03:56 host sshd[25976]: Received disconnect from 91.54.163.172 port 52370:11: Bye Bye [preauth] Jan 21 15:03:56 host sshd[25976]: Disconnected from 91.54.163.172 port 52370 [preauth] Jan 21 15:04:27 host sshd[26018]: Invalid user admin from 121.179.150.231 port 40349 Jan 21 15:04:27 host sshd[26018]: input_userauth_request: invalid user admin [preauth] Jan 21 15:04:27 host sshd[26018]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:04:27 host sshd[26018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.179.150.231 Jan 21 15:04:30 host sshd[26018]: Failed password for invalid user admin from 121.179.150.231 port 40349 ssh2 Jan 21 15:04:31 host sshd[26018]: Connection closed by 121.179.150.231 port 40349 [preauth] Jan 21 15:04:49 host sshd[26087]: Invalid user safeuser from 106.245.234.10 port 53874 Jan 21 15:04:49 host sshd[26087]: input_userauth_request: invalid user safeuser [preauth] Jan 21 15:04:49 host sshd[26087]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:04:49 host sshd[26087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.245.234.10 Jan 21 15:04:51 host sshd[26087]: Failed password for invalid user safeuser from 106.245.234.10 port 53874 ssh2 Jan 21 15:04:52 host sshd[26087]: Received disconnect from 106.245.234.10 port 53874:11: Bye Bye [preauth] Jan 21 15:04:52 host sshd[26087]: Disconnected from 106.245.234.10 port 53874 [preauth] Jan 21 15:05:49 host sshd[26217]: Invalid user normaluser from 46.101.110.253 port 55748 Jan 21 15:05:49 host sshd[26217]: input_userauth_request: invalid user normaluser [preauth] Jan 21 15:05:49 host sshd[26217]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:05:49 host sshd[26217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.110.253 Jan 21 15:05:51 host sshd[26217]: Failed password for invalid user normaluser from 46.101.110.253 port 55748 ssh2 Jan 21 15:05:51 host sshd[26217]: Received disconnect from 46.101.110.253 port 55748:11: Bye Bye [preauth] Jan 21 15:05:51 host sshd[26217]: Disconnected from 46.101.110.253 port 55748 [preauth] Jan 21 15:06:00 host sshd[26229]: Invalid user sFTPUser from 220.135.149.117 port 38637 Jan 21 15:06:00 host sshd[26229]: input_userauth_request: invalid user sFTPUser [preauth] Jan 21 15:06:00 host sshd[26229]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:06:00 host sshd[26229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.149.117 Jan 21 15:06:01 host sshd[26232]: Invalid user admin from 220.135.149.117 port 38648 Jan 21 15:06:01 host sshd[26232]: input_userauth_request: invalid user admin [preauth] Jan 21 15:06:01 host sshd[26232]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:06:01 host sshd[26232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.135.149.117 Jan 21 15:06:02 host sshd[26229]: Failed password for invalid user sFTPUser from 220.135.149.117 port 38637 ssh2 Jan 21 15:06:03 host sshd[26232]: Failed password for invalid user admin from 220.135.149.117 port 38648 ssh2 Jan 21 15:06:03 host sshd[26229]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:06:04 host sshd[26232]: Failed password for invalid user admin from 220.135.149.117 port 38648 ssh2 Jan 21 15:06:05 host sshd[26232]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:06:06 host sshd[26229]: Failed password for invalid user sFTPUser from 220.135.149.117 port 38637 ssh2 Jan 21 15:06:06 host sshd[26232]: Failed password for invalid user admin from 220.135.149.117 port 38648 ssh2 Jan 21 15:06:09 host sshd[26281]: Invalid user wwwadmin from 45.232.73.83 port 38026 Jan 21 15:06:09 host sshd[26281]: input_userauth_request: invalid user wwwadmin [preauth] Jan 21 15:06:09 host sshd[26281]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:06:09 host sshd[26281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.232.73.83 Jan 21 15:06:12 host sshd[26281]: Failed password for invalid user wwwadmin from 45.232.73.83 port 38026 ssh2 Jan 21 15:06:12 host sshd[26281]: Received disconnect from 45.232.73.83 port 38026:11: Bye Bye [preauth] Jan 21 15:06:12 host sshd[26281]: Disconnected from 45.232.73.83 port 38026 [preauth] Jan 21 15:06:33 host sshd[26333]: Invalid user ibmuser from 159.89.48.42 port 48696 Jan 21 15:06:33 host sshd[26333]: input_userauth_request: invalid user ibmuser [preauth] Jan 21 15:06:33 host sshd[26333]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:06:33 host sshd[26333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.48.42 Jan 21 15:06:35 host sshd[26339]: Invalid user support from 103.170.122.206 port 33688 Jan 21 15:06:35 host sshd[26339]: input_userauth_request: invalid user support [preauth] Jan 21 15:06:35 host sshd[26339]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:06:35 host sshd[26339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.170.122.206 Jan 21 15:06:36 host sshd[26333]: Failed password for invalid user ibmuser from 159.89.48.42 port 48696 ssh2 Jan 21 15:06:36 host sshd[26333]: Received disconnect from 159.89.48.42 port 48696:11: Bye Bye [preauth] Jan 21 15:06:36 host sshd[26333]: Disconnected from 159.89.48.42 port 48696 [preauth] Jan 21 15:06:37 host sshd[26339]: Failed password for invalid user support from 103.170.122.206 port 33688 ssh2 Jan 21 15:06:37 host sshd[26339]: Received disconnect from 103.170.122.206 port 33688:11: Bye Bye [preauth] Jan 21 15:06:37 host sshd[26339]: Disconnected from 103.170.122.206 port 33688 [preauth] Jan 21 15:07:11 host sshd[26401]: Invalid user nadmin from 103.226.138.216 port 38886 Jan 21 15:07:11 host sshd[26401]: input_userauth_request: invalid user nadmin [preauth] Jan 21 15:07:11 host sshd[26401]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:07:11 host sshd[26401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.226.138.216 Jan 21 15:07:12 host sshd[26401]: Failed password for invalid user nadmin from 103.226.138.216 port 38886 ssh2 Jan 21 15:07:12 host sshd[26401]: Received disconnect from 103.226.138.216 port 38886:11: Bye Bye [preauth] Jan 21 15:07:12 host sshd[26401]: Disconnected from 103.226.138.216 port 38886 [preauth] Jan 21 15:07:14 host sshd[26408]: Invalid user oracle from 159.65.132.73 port 44172 Jan 21 15:07:14 host sshd[26408]: input_userauth_request: invalid user oracle [preauth] Jan 21 15:07:14 host sshd[26408]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:07:14 host sshd[26408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.132.73 Jan 21 15:07:16 host sshd[26408]: Failed password for invalid user oracle from 159.65.132.73 port 44172 ssh2 Jan 21 15:07:16 host sshd[26408]: Received disconnect from 159.65.132.73 port 44172:11: Bye Bye [preauth] Jan 21 15:07:16 host sshd[26408]: Disconnected from 159.65.132.73 port 44172 [preauth] Jan 21 15:07:41 host sshd[26477]: Invalid user ec2-user from 49.247.22.240 port 33142 Jan 21 15:07:41 host sshd[26477]: input_userauth_request: invalid user ec2-user [preauth] Jan 21 15:07:41 host sshd[26477]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:07:41 host sshd[26477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.22.240 Jan 21 15:07:43 host sshd[26477]: Failed password for invalid user ec2-user from 49.247.22.240 port 33142 ssh2 Jan 21 15:07:43 host sshd[26477]: Received disconnect from 49.247.22.240 port 33142:11: Bye Bye [preauth] Jan 21 15:07:43 host sshd[26477]: Disconnected from 49.247.22.240 port 33142 [preauth] Jan 21 15:08:07 host sshd[26516]: Invalid user userx from 1.229.203.234 port 51770 Jan 21 15:08:07 host sshd[26516]: input_userauth_request: invalid user userx [preauth] Jan 21 15:08:07 host sshd[26516]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:08:07 host sshd[26516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.229.203.234 Jan 21 15:08:09 host sshd[26516]: Failed password for invalid user userx from 1.229.203.234 port 51770 ssh2 Jan 21 15:08:09 host sshd[26516]: Received disconnect from 1.229.203.234 port 51770:11: Bye Bye [preauth] Jan 21 15:08:09 host sshd[26516]: Disconnected from 1.229.203.234 port 51770 [preauth] Jan 21 15:08:27 host sshd[26546]: Invalid user testowy from 104.131.46.166 port 52755 Jan 21 15:08:27 host sshd[26546]: input_userauth_request: invalid user testowy [preauth] Jan 21 15:08:27 host sshd[26546]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:08:27 host sshd[26546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.46.166 Jan 21 15:08:29 host sshd[26546]: Failed password for invalid user testowy from 104.131.46.166 port 52755 ssh2 Jan 21 15:08:29 host sshd[26546]: Received disconnect from 104.131.46.166 port 52755:11: Bye Bye [preauth] Jan 21 15:08:29 host sshd[26546]: Disconnected from 104.131.46.166 port 52755 [preauth] Jan 21 15:08:59 host sshd[26612]: Invalid user test from 157.7.64.249 port 40524 Jan 21 15:08:59 host sshd[26612]: input_userauth_request: invalid user test [preauth] Jan 21 15:08:59 host sshd[26612]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:08:59 host sshd[26612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.7.64.249 Jan 21 15:09:00 host sshd[26612]: Failed password for invalid user test from 157.7.64.249 port 40524 ssh2 Jan 21 15:09:01 host sshd[26612]: Received disconnect from 157.7.64.249 port 40524:11: Bye Bye [preauth] Jan 21 15:09:01 host sshd[26612]: Disconnected from 157.7.64.249 port 40524 [preauth] Jan 21 15:09:08 host sshd[26645]: Invalid user lighthouse from 64.227.180.17 port 37546 Jan 21 15:09:08 host sshd[26645]: input_userauth_request: invalid user lighthouse [preauth] Jan 21 15:09:08 host sshd[26645]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:09:08 host sshd[26645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.180.17 Jan 21 15:09:10 host sshd[26645]: Failed password for invalid user lighthouse from 64.227.180.17 port 37546 ssh2 Jan 21 15:09:10 host sshd[26645]: Received disconnect from 64.227.180.17 port 37546:11: Bye Bye [preauth] Jan 21 15:09:10 host sshd[26645]: Disconnected from 64.227.180.17 port 37546 [preauth] Jan 21 15:09:21 host sshd[26661]: Invalid user gpadmin from 137.184.37.163 port 54916 Jan 21 15:09:21 host sshd[26661]: input_userauth_request: invalid user gpadmin [preauth] Jan 21 15:09:21 host sshd[26661]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:09:21 host sshd[26661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.37.163 Jan 21 15:09:23 host sshd[26661]: Failed password for invalid user gpadmin from 137.184.37.163 port 54916 ssh2 Jan 21 15:09:23 host sshd[26661]: Received disconnect from 137.184.37.163 port 54916:11: Bye Bye [preauth] Jan 21 15:09:23 host sshd[26661]: Disconnected from 137.184.37.163 port 54916 [preauth] Jan 21 15:09:27 host sshd[26671]: Invalid user jenns from 104.131.46.166 port 34550 Jan 21 15:09:27 host sshd[26671]: input_userauth_request: invalid user jenns [preauth] Jan 21 15:09:27 host sshd[26671]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:09:27 host sshd[26671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.46.166 Jan 21 15:09:29 host sshd[26671]: Failed password for invalid user jenns from 104.131.46.166 port 34550 ssh2 Jan 21 15:09:30 host sshd[26671]: Received disconnect from 104.131.46.166 port 34550:11: Bye Bye [preauth] Jan 21 15:09:30 host sshd[26671]: Disconnected from 104.131.46.166 port 34550 [preauth] Jan 21 15:09:39 host sshd[26713]: Invalid user fptuser from 91.54.163.172 port 43462 Jan 21 15:09:39 host sshd[26713]: input_userauth_request: invalid user fptuser [preauth] Jan 21 15:09:39 host sshd[26713]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:09:39 host sshd[26713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.54.163.172 Jan 21 15:09:42 host sshd[26713]: Failed password for invalid user fptuser from 91.54.163.172 port 43462 ssh2 Jan 21 15:09:42 host sshd[26713]: Received disconnect from 91.54.163.172 port 43462:11: Bye Bye [preauth] Jan 21 15:09:42 host sshd[26713]: Disconnected from 91.54.163.172 port 43462 [preauth] Jan 21 15:10:07 host sshd[26768]: Invalid user pacs from 206.189.213.126 port 52614 Jan 21 15:10:07 host sshd[26768]: input_userauth_request: invalid user pacs [preauth] Jan 21 15:10:07 host sshd[26768]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:10:07 host sshd[26768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.213.126 Jan 21 15:10:08 host sshd[26768]: Failed password for invalid user pacs from 206.189.213.126 port 52614 ssh2 Jan 21 15:10:09 host sshd[26768]: Received disconnect from 206.189.213.126 port 52614:11: Bye Bye [preauth] Jan 21 15:10:09 host sshd[26768]: Disconnected from 206.189.213.126 port 52614 [preauth] Jan 21 15:10:22 host sshd[26863]: Invalid user digitalizacion from 104.131.46.166 port 44445 Jan 21 15:10:22 host sshd[26863]: input_userauth_request: invalid user digitalizacion [preauth] Jan 21 15:10:22 host sshd[26863]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:10:22 host sshd[26863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.46.166 Jan 21 15:10:24 host sshd[26906]: Invalid user ssluser from 106.245.234.10 port 47706 Jan 21 15:10:24 host sshd[26906]: input_userauth_request: invalid user ssluser [preauth] Jan 21 15:10:24 host sshd[26906]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:10:24 host sshd[26906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.245.234.10 Jan 21 15:10:24 host sshd[26863]: Failed password for invalid user digitalizacion from 104.131.46.166 port 44445 ssh2 Jan 21 15:10:25 host sshd[26863]: Received disconnect from 104.131.46.166 port 44445:11: Bye Bye [preauth] Jan 21 15:10:25 host sshd[26863]: Disconnected from 104.131.46.166 port 44445 [preauth] Jan 21 15:10:26 host sshd[26906]: Failed password for invalid user ssluser from 106.245.234.10 port 47706 ssh2 Jan 21 15:10:26 host sshd[26906]: Received disconnect from 106.245.234.10 port 47706:11: Bye Bye [preauth] Jan 21 15:10:26 host sshd[26906]: Disconnected from 106.245.234.10 port 47706 [preauth] Jan 21 15:10:30 host sshd[26965]: Invalid user ftpuser from 45.232.73.83 port 51464 Jan 21 15:10:30 host sshd[26965]: input_userauth_request: invalid user ftpuser [preauth] Jan 21 15:10:30 host sshd[26965]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:10:30 host sshd[26965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.232.73.83 Jan 21 15:10:32 host sshd[26965]: Failed password for invalid user ftpuser from 45.232.73.83 port 51464 ssh2 Jan 21 15:10:32 host sshd[26965]: Received disconnect from 45.232.73.83 port 51464:11: Bye Bye [preauth] Jan 21 15:10:32 host sshd[26965]: Disconnected from 45.232.73.83 port 51464 [preauth] Jan 21 15:10:33 host sshd[26971]: Invalid user techuser from 46.101.110.253 port 58654 Jan 21 15:10:33 host sshd[26971]: input_userauth_request: invalid user techuser [preauth] Jan 21 15:10:33 host sshd[26971]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:10:33 host sshd[26971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.110.253 Jan 21 15:10:35 host sshd[26971]: Failed password for invalid user techuser from 46.101.110.253 port 58654 ssh2 Jan 21 15:10:35 host sshd[26971]: Received disconnect from 46.101.110.253 port 58654:11: Bye Bye [preauth] Jan 21 15:10:35 host sshd[26971]: Disconnected from 46.101.110.253 port 58654 [preauth] Jan 21 15:10:52 host sshd[27010]: Invalid user fiscal from 91.54.163.172 port 57278 Jan 21 15:10:52 host sshd[27010]: input_userauth_request: invalid user fiscal [preauth] Jan 21 15:10:52 host sshd[27010]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:10:52 host sshd[27010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.54.163.172 Jan 21 15:10:53 host sshd[27013]: Invalid user master from 59.3.76.218 port 35552 Jan 21 15:10:53 host sshd[27013]: input_userauth_request: invalid user master [preauth] Jan 21 15:10:53 host sshd[27013]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:10:53 host sshd[27013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.3.76.218 Jan 21 15:10:54 host sshd[27010]: Failed password for invalid user fiscal from 91.54.163.172 port 57278 ssh2 Jan 21 15:10:54 host sshd[27010]: Received disconnect from 91.54.163.172 port 57278:11: Bye Bye [preauth] Jan 21 15:10:54 host sshd[27010]: Disconnected from 91.54.163.172 port 57278 [preauth] Jan 21 15:10:54 host sshd[27013]: Failed password for invalid user master from 59.3.76.218 port 35552 ssh2 Jan 21 15:10:55 host sshd[27013]: Received disconnect from 59.3.76.218 port 35552:11: Bye Bye [preauth] Jan 21 15:10:55 host sshd[27013]: Disconnected from 59.3.76.218 port 35552 [preauth] Jan 21 15:11:02 host sshd[27068]: Invalid user vagrant from 1.229.203.234 port 45482 Jan 21 15:11:02 host sshd[27068]: input_userauth_request: invalid user vagrant [preauth] Jan 21 15:11:02 host sshd[27068]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:11:02 host sshd[27068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.229.203.234 Jan 21 15:11:03 host sshd[27071]: Invalid user e from 137.184.112.37 port 35070 Jan 21 15:11:03 host sshd[27071]: input_userauth_request: invalid user e [preauth] Jan 21 15:11:03 host sshd[27071]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:11:03 host sshd[27071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.112.37 Jan 21 15:11:04 host sshd[27068]: Failed password for invalid user vagrant from 1.229.203.234 port 45482 ssh2 Jan 21 15:11:04 host sshd[27068]: Received disconnect from 1.229.203.234 port 45482:11: Bye Bye [preauth] Jan 21 15:11:04 host sshd[27068]: Disconnected from 1.229.203.234 port 45482 [preauth] Jan 21 15:11:05 host sshd[27071]: Failed password for invalid user e from 137.184.112.37 port 35070 ssh2 Jan 21 15:11:06 host sshd[27071]: Received disconnect from 137.184.112.37 port 35070:11: Bye Bye [preauth] Jan 21 15:11:06 host sshd[27071]: Disconnected from 137.184.112.37 port 35070 [preauth] Jan 21 15:11:29 host sshd[27120]: Invalid user erpuser from 159.89.48.42 port 40390 Jan 21 15:11:29 host sshd[27120]: input_userauth_request: invalid user erpuser [preauth] Jan 21 15:11:29 host sshd[27120]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:11:29 host sshd[27120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.48.42 Jan 21 15:11:30 host sshd[27123]: User root from 114.32.46.110 not allowed because not listed in AllowUsers Jan 21 15:11:30 host sshd[27123]: input_userauth_request: invalid user root [preauth] Jan 21 15:11:30 host unix_chkpwd[27127]: password check failed for user (root) Jan 21 15:11:30 host sshd[27123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.46.110 user=root Jan 21 15:11:30 host sshd[27123]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 15:11:31 host sshd[27120]: Failed password for invalid user erpuser from 159.89.48.42 port 40390 ssh2 Jan 21 15:11:31 host sshd[27120]: Received disconnect from 159.89.48.42 port 40390:11: Bye Bye [preauth] Jan 21 15:11:31 host sshd[27120]: Disconnected from 159.89.48.42 port 40390 [preauth] Jan 21 15:11:32 host sshd[27130]: Invalid user admin from 103.170.122.206 port 60114 Jan 21 15:11:32 host sshd[27130]: input_userauth_request: invalid user admin [preauth] Jan 21 15:11:32 host sshd[27130]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:11:32 host sshd[27130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.170.122.206 Jan 21 15:11:32 host sshd[27123]: Failed password for invalid user root from 114.32.46.110 port 40401 ssh2 Jan 21 15:11:34 host unix_chkpwd[27133]: password check failed for user (root) Jan 21 15:11:34 host sshd[27123]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 15:11:34 host sshd[27130]: Failed password for invalid user admin from 103.170.122.206 port 60114 ssh2 Jan 21 15:11:34 host sshd[27130]: Received disconnect from 103.170.122.206 port 60114:11: Bye Bye [preauth] Jan 21 15:11:34 host sshd[27130]: Disconnected from 103.170.122.206 port 60114 [preauth] Jan 21 15:11:36 host sshd[27123]: Failed password for invalid user root from 114.32.46.110 port 40401 ssh2 Jan 21 15:11:37 host unix_chkpwd[27142]: password check failed for user (root) Jan 21 15:11:37 host sshd[27123]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 15:11:39 host sshd[27123]: Failed password for invalid user root from 114.32.46.110 port 40401 ssh2 Jan 21 15:11:40 host unix_chkpwd[27146]: password check failed for user (root) Jan 21 15:11:40 host sshd[27123]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 15:11:42 host sshd[27149]: Invalid user osboxes from 106.245.234.10 port 42160 Jan 21 15:11:42 host sshd[27149]: input_userauth_request: invalid user osboxes [preauth] Jan 21 15:11:42 host sshd[27149]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:11:42 host sshd[27149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.245.234.10 Jan 21 15:11:42 host sshd[27145]: Invalid user test from 45.232.73.83 port 38132 Jan 21 15:11:42 host sshd[27145]: input_userauth_request: invalid user test [preauth] Jan 21 15:11:42 host sshd[27145]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:11:42 host sshd[27145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.232.73.83 Jan 21 15:11:42 host sshd[27123]: Failed password for invalid user root from 114.32.46.110 port 40401 ssh2 Jan 21 15:11:44 host sshd[27149]: Failed password for invalid user osboxes from 106.245.234.10 port 42160 ssh2 Jan 21 15:11:44 host sshd[27149]: Received disconnect from 106.245.234.10 port 42160:11: Bye Bye [preauth] Jan 21 15:11:44 host sshd[27149]: Disconnected from 106.245.234.10 port 42160 [preauth] Jan 21 15:11:44 host sshd[27145]: Failed password for invalid user test from 45.232.73.83 port 38132 ssh2 Jan 21 15:11:44 host sshd[27184]: Invalid user deploy from 46.101.110.253 port 47164 Jan 21 15:11:44 host sshd[27184]: input_userauth_request: invalid user deploy [preauth] Jan 21 15:11:44 host sshd[27184]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:11:44 host sshd[27184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.110.253 Jan 21 15:11:44 host sshd[27145]: Received disconnect from 45.232.73.83 port 38132:11: Bye Bye [preauth] Jan 21 15:11:44 host sshd[27145]: Disconnected from 45.232.73.83 port 38132 [preauth] Jan 21 15:11:45 host sshd[27190]: Invalid user import from 64.227.180.17 port 37678 Jan 21 15:11:45 host sshd[27190]: input_userauth_request: invalid user import [preauth] Jan 21 15:11:45 host sshd[27190]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:11:45 host sshd[27190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.180.17 Jan 21 15:11:45 host sshd[27192]: Invalid user qadmin from 159.65.132.73 port 33124 Jan 21 15:11:45 host sshd[27192]: input_userauth_request: invalid user qadmin [preauth] Jan 21 15:11:45 host sshd[27192]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:11:45 host sshd[27192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.132.73 Jan 21 15:11:47 host sshd[27184]: Failed password for invalid user deploy from 46.101.110.253 port 47164 ssh2 Jan 21 15:11:47 host sshd[27190]: Failed password for invalid user import from 64.227.180.17 port 37678 ssh2 Jan 21 15:11:47 host sshd[27190]: Received disconnect from 64.227.180.17 port 37678:11: Bye Bye [preauth] Jan 21 15:11:47 host sshd[27190]: Disconnected from 64.227.180.17 port 37678 [preauth] Jan 21 15:11:47 host sshd[27192]: Failed password for invalid user qadmin from 159.65.132.73 port 33124 ssh2 Jan 21 15:11:47 host sshd[27192]: Received disconnect from 159.65.132.73 port 33124:11: Bye Bye [preauth] Jan 21 15:11:47 host sshd[27192]: Disconnected from 159.65.132.73 port 33124 [preauth] Jan 21 15:11:49 host sshd[27186]: Invalid user ible from 125.163.181.2 port 46856 Jan 21 15:11:49 host sshd[27186]: input_userauth_request: invalid user ible [preauth] Jan 21 15:11:49 host sshd[27186]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:11:49 host sshd[27186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.163.181.2 Jan 21 15:11:51 host sshd[27186]: Failed password for invalid user ible from 125.163.181.2 port 46856 ssh2 Jan 21 15:11:52 host sshd[27186]: Received disconnect from 125.163.181.2 port 46856:11: Bye Bye [preauth] Jan 21 15:11:52 host sshd[27186]: Disconnected from 125.163.181.2 port 46856 [preauth] Jan 21 15:12:11 host sshd[27316]: Invalid user ftpuser from 206.189.213.126 port 53156 Jan 21 15:12:11 host sshd[27316]: input_userauth_request: invalid user ftpuser [preauth] Jan 21 15:12:11 host sshd[27316]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:12:11 host sshd[27316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.213.126 Jan 21 15:12:13 host sshd[27316]: Failed password for invalid user ftpuser from 206.189.213.126 port 53156 ssh2 Jan 21 15:12:13 host sshd[27320]: Invalid user cuser from 137.184.37.163 port 55394 Jan 21 15:12:13 host sshd[27320]: input_userauth_request: invalid user cuser [preauth] Jan 21 15:12:13 host sshd[27320]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:12:13 host sshd[27320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.37.163 Jan 21 15:12:13 host sshd[27316]: Received disconnect from 206.189.213.126 port 53156:11: Bye Bye [preauth] Jan 21 15:12:13 host sshd[27316]: Disconnected from 206.189.213.126 port 53156 [preauth] Jan 21 15:12:15 host sshd[27320]: Failed password for invalid user cuser from 137.184.37.163 port 55394 ssh2 Jan 21 15:12:15 host sshd[27320]: Received disconnect from 137.184.37.163 port 55394:11: Bye Bye [preauth] Jan 21 15:12:15 host sshd[27320]: Disconnected from 137.184.37.163 port 55394 [preauth] Jan 21 15:12:16 host sshd[27325]: Invalid user tickwsuser from 137.184.112.37 port 53540 Jan 21 15:12:16 host sshd[27325]: input_userauth_request: invalid user tickwsuser [preauth] Jan 21 15:12:16 host sshd[27325]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:12:16 host sshd[27325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.112.37 Jan 21 15:12:18 host sshd[27329]: Invalid user duser from 1.229.203.234 port 34674 Jan 21 15:12:18 host sshd[27329]: input_userauth_request: invalid user duser [preauth] Jan 21 15:12:18 host sshd[27329]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:12:18 host sshd[27329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.229.203.234 Jan 21 15:12:18 host sshd[27325]: Failed password for invalid user tickwsuser from 137.184.112.37 port 53540 ssh2 Jan 21 15:12:19 host sshd[27325]: Received disconnect from 137.184.112.37 port 53540:11: Bye Bye [preauth] Jan 21 15:12:19 host sshd[27325]: Disconnected from 137.184.112.37 port 53540 [preauth] Jan 21 15:12:19 host sshd[27329]: Failed password for invalid user duser from 1.229.203.234 port 34674 ssh2 Jan 21 15:12:19 host sshd[27329]: Received disconnect from 1.229.203.234 port 34674:11: Bye Bye [preauth] Jan 21 15:12:19 host sshd[27329]: Disconnected from 1.229.203.234 port 34674 [preauth] Jan 21 15:12:27 host sshd[27368]: Invalid user djangoadmin from 103.226.138.216 port 48330 Jan 21 15:12:27 host sshd[27368]: input_userauth_request: invalid user djangoadmin [preauth] Jan 21 15:12:27 host sshd[27368]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:12:27 host sshd[27368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.226.138.216 Jan 21 15:12:29 host sshd[27395]: Invalid user cacheuser from 59.3.76.218 port 60466 Jan 21 15:12:29 host sshd[27395]: input_userauth_request: invalid user cacheuser [preauth] Jan 21 15:12:29 host sshd[27395]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:12:29 host sshd[27395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.3.76.218 Jan 21 15:12:29 host sshd[27368]: Failed password for invalid user djangoadmin from 103.226.138.216 port 48330 ssh2 Jan 21 15:12:29 host sshd[27368]: Received disconnect from 103.226.138.216 port 48330:11: Bye Bye [preauth] Jan 21 15:12:29 host sshd[27368]: Disconnected from 103.226.138.216 port 48330 [preauth] Jan 21 15:12:31 host sshd[27395]: Failed password for invalid user cacheuser from 59.3.76.218 port 60466 ssh2 Jan 21 15:12:31 host sshd[27395]: Received disconnect from 59.3.76.218 port 60466:11: Bye Bye [preauth] Jan 21 15:12:31 host sshd[27395]: Disconnected from 59.3.76.218 port 60466 [preauth] Jan 21 15:12:34 host sshd[27407]: Invalid user testdev from 159.89.48.42 port 34934 Jan 21 15:12:34 host sshd[27407]: input_userauth_request: invalid user testdev [preauth] Jan 21 15:12:34 host sshd[27407]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:12:34 host sshd[27407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.48.42 Jan 21 15:12:36 host sshd[27407]: Failed password for invalid user testdev from 159.89.48.42 port 34934 ssh2 Jan 21 15:12:36 host sshd[27407]: Received disconnect from 159.89.48.42 port 34934:11: Bye Bye [preauth] Jan 21 15:12:36 host sshd[27407]: Disconnected from 159.89.48.42 port 34934 [preauth] Jan 21 15:12:57 host sshd[27480]: Invalid user aitest from 157.7.64.249 port 33830 Jan 21 15:12:57 host sshd[27480]: input_userauth_request: invalid user aitest [preauth] Jan 21 15:12:57 host sshd[27480]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:12:57 host sshd[27480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.7.64.249 Jan 21 15:12:58 host sshd[27483]: Invalid user safeuser from 103.170.122.206 port 56896 Jan 21 15:12:58 host sshd[27483]: input_userauth_request: invalid user safeuser [preauth] Jan 21 15:12:58 host sshd[27483]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:12:58 host sshd[27483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.170.122.206 Jan 21 15:13:00 host sshd[27480]: Failed password for invalid user aitest from 157.7.64.249 port 33830 ssh2 Jan 21 15:13:00 host sshd[27480]: Received disconnect from 157.7.64.249 port 33830:11: Bye Bye [preauth] Jan 21 15:13:00 host sshd[27480]: Disconnected from 157.7.64.249 port 33830 [preauth] Jan 21 15:13:01 host sshd[27483]: Failed password for invalid user safeuser from 103.170.122.206 port 56896 ssh2 Jan 21 15:13:01 host sshd[27483]: Received disconnect from 103.170.122.206 port 56896:11: Bye Bye [preauth] Jan 21 15:13:01 host sshd[27483]: Disconnected from 103.170.122.206 port 56896 [preauth] Jan 21 15:13:02 host sshd[27539]: Invalid user testuser from 64.227.180.17 port 37778 Jan 21 15:13:02 host sshd[27539]: input_userauth_request: invalid user testuser [preauth] Jan 21 15:13:02 host sshd[27539]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:13:02 host sshd[27539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.180.17 Jan 21 15:13:05 host sshd[27539]: Failed password for invalid user testuser from 64.227.180.17 port 37778 ssh2 Jan 21 15:13:05 host sshd[27539]: Received disconnect from 64.227.180.17 port 37778:11: Bye Bye [preauth] Jan 21 15:13:05 host sshd[27539]: Disconnected from 64.227.180.17 port 37778 [preauth] Jan 21 15:13:15 host sshd[27581]: Invalid user systest from 206.189.213.126 port 47288 Jan 21 15:13:15 host sshd[27581]: input_userauth_request: invalid user systest [preauth] Jan 21 15:13:15 host sshd[27581]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:13:15 host sshd[27581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.213.126 Jan 21 15:13:16 host sshd[27605]: Invalid user db2user from 159.65.132.73 port 60216 Jan 21 15:13:16 host sshd[27605]: input_userauth_request: invalid user db2user [preauth] Jan 21 15:13:16 host sshd[27605]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:13:16 host sshd[27605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.132.73 Jan 21 15:13:17 host sshd[27581]: Failed password for invalid user systest from 206.189.213.126 port 47288 ssh2 Jan 21 15:13:18 host sshd[27605]: Failed password for invalid user db2user from 159.65.132.73 port 60216 ssh2 Jan 21 15:13:18 host sshd[27605]: Received disconnect from 159.65.132.73 port 60216:11: Bye Bye [preauth] Jan 21 15:13:18 host sshd[27605]: Disconnected from 159.65.132.73 port 60216 [preauth] Jan 21 15:13:25 host sshd[27655]: Invalid user crmadmin from 49.247.22.240 port 55574 Jan 21 15:13:25 host sshd[27655]: input_userauth_request: invalid user crmadmin [preauth] Jan 21 15:13:25 host sshd[27655]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:13:25 host sshd[27655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.22.240 Jan 21 15:13:27 host sshd[27655]: Failed password for invalid user crmadmin from 49.247.22.240 port 55574 ssh2 Jan 21 15:13:27 host sshd[27655]: Received disconnect from 49.247.22.240 port 55574:11: Bye Bye [preauth] Jan 21 15:13:27 host sshd[27655]: Disconnected from 49.247.22.240 port 55574 [preauth] Jan 21 15:13:28 host sshd[27662]: Invalid user admin from 137.184.112.37 port 51626 Jan 21 15:13:28 host sshd[27662]: input_userauth_request: invalid user admin [preauth] Jan 21 15:13:28 host sshd[27662]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:13:28 host sshd[27662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.112.37 Jan 21 15:13:30 host sshd[27662]: Failed password for invalid user admin from 137.184.112.37 port 51626 ssh2 Jan 21 15:13:30 host sshd[27662]: Received disconnect from 137.184.112.37 port 51626:11: Bye Bye [preauth] Jan 21 15:13:30 host sshd[27662]: Disconnected from 137.184.112.37 port 51626 [preauth] Jan 21 15:13:37 host sshd[27723]: User root from 59.20.251.86 not allowed because not listed in AllowUsers Jan 21 15:13:37 host sshd[27723]: input_userauth_request: invalid user root [preauth] Jan 21 15:13:37 host unix_chkpwd[27732]: password check failed for user (root) Jan 21 15:13:37 host sshd[27723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.20.251.86 user=root Jan 21 15:13:37 host sshd[27723]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 15:13:39 host sshd[27723]: Failed password for invalid user root from 59.20.251.86 port 61779 ssh2 Jan 21 15:13:40 host sshd[27723]: Connection reset by 59.20.251.86 port 61779 [preauth] Jan 21 15:13:46 host sshd[27741]: Invalid user mailtest from 59.3.76.218 port 55078 Jan 21 15:13:46 host sshd[27741]: input_userauth_request: invalid user mailtest [preauth] Jan 21 15:13:46 host sshd[27741]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:13:46 host sshd[27741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.3.76.218 Jan 21 15:13:48 host sshd[27741]: Failed password for invalid user mailtest from 59.3.76.218 port 55078 ssh2 Jan 21 15:13:49 host sshd[27741]: Received disconnect from 59.3.76.218 port 55078:11: Bye Bye [preauth] Jan 21 15:13:49 host sshd[27741]: Disconnected from 59.3.76.218 port 55078 [preauth] Jan 21 15:13:53 host sshd[27779]: Invalid user testmail from 103.226.138.216 port 51256 Jan 21 15:13:53 host sshd[27779]: input_userauth_request: invalid user testmail [preauth] Jan 21 15:13:53 host sshd[27779]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:13:53 host sshd[27779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.226.138.216 Jan 21 15:13:55 host sshd[27779]: Failed password for invalid user testmail from 103.226.138.216 port 51256 ssh2 Jan 21 15:13:55 host sshd[27779]: Received disconnect from 103.226.138.216 port 51256:11: Bye Bye [preauth] Jan 21 15:13:55 host sshd[27779]: Disconnected from 103.226.138.216 port 51256 [preauth] Jan 21 15:14:16 host sshd[27855]: Invalid user master from 157.7.64.249 port 51902 Jan 21 15:14:16 host sshd[27855]: input_userauth_request: invalid user master [preauth] Jan 21 15:14:16 host sshd[27855]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:14:16 host sshd[27855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.7.64.249 Jan 21 15:14:18 host sshd[27855]: Failed password for invalid user master from 157.7.64.249 port 51902 ssh2 Jan 21 15:14:18 host sshd[27855]: Received disconnect from 157.7.64.249 port 51902:11: Bye Bye [preauth] Jan 21 15:14:18 host sshd[27855]: Disconnected from 157.7.64.249 port 51902 [preauth] Jan 21 15:14:48 host sshd[27950]: invalid public DH value: >= p-1 [preauth] Jan 21 15:14:48 host sshd[27950]: ssh_dispatch_run_fatal: Connection from 159.196.98.221 port 46695: incomplete message [preauth] Jan 21 15:14:51 host sshd[27954]: Invalid user postgres from 49.247.22.240 port 50376 Jan 21 15:14:51 host sshd[27954]: input_userauth_request: invalid user postgres [preauth] Jan 21 15:14:51 host sshd[27954]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:14:51 host sshd[27954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.22.240 Jan 21 15:14:53 host sshd[27954]: Failed password for invalid user postgres from 49.247.22.240 port 50376 ssh2 Jan 21 15:14:54 host sshd[27954]: Received disconnect from 49.247.22.240 port 50376:11: Bye Bye [preauth] Jan 21 15:14:54 host sshd[27954]: Disconnected from 49.247.22.240 port 50376 [preauth] Jan 21 15:15:49 host sshd[28205]: invalid public DH value: >= p-1 [preauth] Jan 21 15:15:49 host sshd[28205]: ssh_dispatch_run_fatal: Connection from 128.106.199.144 port 41930: incomplete message [preauth] Jan 21 15:16:38 host sshd[28299]: Invalid user ftp_user from 137.184.37.163 port 45030 Jan 21 15:16:38 host sshd[28299]: input_userauth_request: invalid user ftp_user [preauth] Jan 21 15:16:38 host sshd[28299]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:16:38 host sshd[28299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.184.37.163 Jan 21 15:16:40 host sshd[28299]: Failed password for invalid user ftp_user from 137.184.37.163 port 45030 ssh2 Jan 21 15:16:40 host sshd[28299]: Received disconnect from 137.184.37.163 port 45030:11: Bye Bye [preauth] Jan 21 15:16:40 host sshd[28299]: Disconnected from 137.184.37.163 port 45030 [preauth] Jan 21 15:19:32 host sshd[28615]: Connection closed by 125.163.181.2 port 5900 [preauth] Jan 21 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=kottayamcalldriv user-2=phmetals user-3=palco123 user-4=gifterman user-5=wwwnexidigital user-6=mrsclean user-7=wwwevmhonda user-8=bonifacegroup user-9=wwwletsstalkfood user-10=straightcurve user-11=shalinijames user-12=wwwtestugo user-13=vfmassets user-14=pmcresources user-15=wwwkmaorg user-16=disposeat user-17=remysagr user-18=woodpeck user-19=wwwkapin user-20=travelboniface user-21=ugotscom user-22=wwwresourcehunte user-23=keralaholi user-24=wwwrmswll user-25=wwwpmcresource user-26=a2zgroup user-27=dartsimp user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 15:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Q6J5KwKbrsxnoqFP.~ Jan 21 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Q6J5KwKbrsxnoqFP.~' Jan 21 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-Q6J5KwKbrsxnoqFP.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 15:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 15:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 15:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 15:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 15:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 15:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 15:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 15:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 15:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 15:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 15:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 15:22:50 host sshd[29415]: Connection reset by 125.163.181.2 port 53064 [preauth] Jan 21 15:26:16 host sshd[29794]: Invalid user cake from 1.161.195.144 port 60900 Jan 21 15:26:16 host sshd[29794]: input_userauth_request: invalid user cake [preauth] Jan 21 15:26:16 host sshd[29794]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:26:16 host sshd[29794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.161.195.144 Jan 21 15:26:18 host sshd[29794]: Failed password for invalid user cake from 1.161.195.144 port 60900 ssh2 Jan 21 15:26:18 host sshd[29794]: Connection closed by 1.161.195.144 port 60900 [preauth] Jan 21 15:26:30 host sshd[29810]: Connection closed by 125.163.181.2 port 20024 [preauth] Jan 21 15:32:52 host sshd[30906]: Did not receive identification string from 217.115.58.242 port 51836 Jan 21 15:33:12 host sshd[30940]: Bad protocol version identification 'MGLNDD_167.71.234.10_22' from 192.241.229.23 port 58996 Jan 21 15:35:30 host sshd[31262]: Invalid user usr from 59.126.18.50 port 55577 Jan 21 15:35:30 host sshd[31262]: input_userauth_request: invalid user usr [preauth] Jan 21 15:35:30 host sshd[31262]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:35:30 host sshd[31262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.18.50 Jan 21 15:35:32 host sshd[31262]: Failed password for invalid user usr from 59.126.18.50 port 55577 ssh2 Jan 21 15:35:34 host sshd[31262]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:35:35 host sshd[31262]: Failed password for invalid user usr from 59.126.18.50 port 55577 ssh2 Jan 21 15:35:36 host sshd[31262]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:35:38 host sshd[31262]: Failed password for invalid user usr from 59.126.18.50 port 55577 ssh2 Jan 21 15:35:39 host sshd[31262]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:35:42 host sshd[31262]: Failed password for invalid user usr from 59.126.18.50 port 55577 ssh2 Jan 21 15:35:43 host sshd[31262]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:35:45 host sshd[31262]: Failed password for invalid user usr from 59.126.18.50 port 55577 ssh2 Jan 21 15:35:46 host sshd[31262]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:35:47 host sshd[31262]: Failed password for invalid user usr from 59.126.18.50 port 55577 ssh2 Jan 21 15:35:47 host sshd[31262]: error: maximum authentication attempts exceeded for invalid user usr from 59.126.18.50 port 55577 ssh2 [preauth] Jan 21 15:35:47 host sshd[31262]: Disconnecting: Too many authentication failures [preauth] Jan 21 15:35:47 host sshd[31262]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.18.50 Jan 21 15:35:47 host sshd[31262]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 21 15:37:30 host sshd[31607]: Invalid user teste from 125.163.181.2 port 33992 Jan 21 15:37:30 host sshd[31607]: input_userauth_request: invalid user teste [preauth] Jan 21 15:37:30 host sshd[31607]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:37:30 host sshd[31607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.163.181.2 Jan 21 15:37:32 host sshd[31607]: Failed password for invalid user teste from 125.163.181.2 port 33992 ssh2 Jan 21 15:37:38 host sshd[31607]: Received disconnect from 125.163.181.2 port 33992:11: Bye Bye [preauth] Jan 21 15:37:38 host sshd[31607]: Disconnected from 125.163.181.2 port 33992 [preauth] Jan 21 15:41:09 host sshd[32110]: Connection closed by 125.163.181.2 port 57462 [preauth] Jan 21 15:43:21 host sshd[32455]: Did not receive identification string from 213.170.135.30 port 32856 Jan 21 15:43:56 host sshd[32523]: Invalid user admin from 213.170.135.30 port 33496 Jan 21 15:43:56 host sshd[32523]: input_userauth_request: invalid user admin [preauth] Jan 21 15:43:56 host sshd[32523]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:43:56 host sshd[32523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.170.135.30 Jan 21 15:43:58 host sshd[32523]: Failed password for invalid user admin from 213.170.135.30 port 33496 ssh2 Jan 21 15:43:59 host sshd[32523]: Connection closed by 213.170.135.30 port 33496 [preauth] Jan 21 15:44:43 host sshd[32616]: Invalid user admin from 213.170.135.30 port 58522 Jan 21 15:44:43 host sshd[32616]: input_userauth_request: invalid user admin [preauth] Jan 21 15:44:43 host sshd[32616]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:44:43 host sshd[32616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.170.135.30 Jan 21 15:44:45 host sshd[32616]: Failed password for invalid user admin from 213.170.135.30 port 58522 ssh2 Jan 21 15:44:45 host sshd[32616]: Connection closed by 213.170.135.30 port 58522 [preauth] Jan 21 15:44:50 host sshd[32618]: Connection closed by 125.163.181.2 port 52700 [preauth] Jan 21 15:44:50 host sshd[32656]: Invalid user fengbo from 106.10.122.53 port 41614 Jan 21 15:44:50 host sshd[32656]: input_userauth_request: invalid user fengbo [preauth] Jan 21 15:44:50 host sshd[32656]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:44:50 host sshd[32656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 21 15:44:52 host sshd[32656]: Failed password for invalid user fengbo from 106.10.122.53 port 41614 ssh2 Jan 21 15:44:52 host sshd[32656]: Connection closed by 106.10.122.53 port 41614 [preauth] Jan 21 15:44:57 host sshd[32669]: invalid public DH value: >= p-1 [preauth] Jan 21 15:44:57 host sshd[32669]: ssh_dispatch_run_fatal: Connection from 122.116.46.241 port 56875: incomplete message [preauth] Jan 21 15:48:33 host sshd[580]: Invalid user mapadmin from 125.163.181.2 port 47930 Jan 21 15:48:33 host sshd[580]: input_userauth_request: invalid user mapadmin [preauth] Jan 21 15:48:33 host sshd[580]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:48:33 host sshd[580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.163.181.2 Jan 21 15:48:35 host sshd[580]: Failed password for invalid user mapadmin from 125.163.181.2 port 47930 ssh2 Jan 21 15:51:56 host sshd[1202]: Invalid user pi from 122.117.63.117 port 35382 Jan 21 15:51:56 host sshd[1202]: input_userauth_request: invalid user pi [preauth] Jan 21 15:51:56 host sshd[1202]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:51:56 host sshd[1202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.63.117 Jan 21 15:51:59 host sshd[1202]: Failed password for invalid user pi from 122.117.63.117 port 35382 ssh2 Jan 21 15:51:59 host sshd[1202]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:52:01 host sshd[1202]: Failed password for invalid user pi from 122.117.63.117 port 35382 ssh2 Jan 21 15:52:01 host sshd[1202]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:52:03 host sshd[1202]: Failed password for invalid user pi from 122.117.63.117 port 35382 ssh2 Jan 21 15:52:04 host sshd[1202]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:52:06 host sshd[1202]: Failed password for invalid user pi from 122.117.63.117 port 35382 ssh2 Jan 21 15:52:06 host sshd[1202]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:52:08 host sshd[1202]: Failed password for invalid user pi from 122.117.63.117 port 35382 ssh2 Jan 21 15:56:59 host sshd[1920]: User root from 122.117.0.142 not allowed because not listed in AllowUsers Jan 21 15:56:59 host sshd[1920]: input_userauth_request: invalid user root [preauth] Jan 21 15:56:59 host unix_chkpwd[1926]: password check failed for user (root) Jan 21 15:56:59 host sshd[1920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.0.142 user=root Jan 21 15:56:59 host sshd[1920]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 15:57:00 host sshd[1920]: Failed password for invalid user root from 122.117.0.142 port 34845 ssh2 Jan 21 15:57:01 host sshd[1920]: Connection reset by 122.117.0.142 port 34845 [preauth] Jan 21 15:57:57 host sshd[2046]: User root from 141.98.11.66 not allowed because not listed in AllowUsers Jan 21 15:57:57 host sshd[2046]: input_userauth_request: invalid user root [preauth] Jan 21 15:57:57 host unix_chkpwd[2050]: password check failed for user (root) Jan 21 15:57:57 host sshd[2046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.66 user=root Jan 21 15:57:57 host sshd[2046]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 15:57:59 host sshd[2046]: Failed password for invalid user root from 141.98.11.66 port 57118 ssh2 Jan 21 15:57:59 host sshd[2046]: Received disconnect from 141.98.11.66 port 57118:11: Normal Shutdown, Thank you for playing [preauth] Jan 21 15:57:59 host sshd[2046]: Disconnected from 141.98.11.66 port 57118 [preauth] Jan 21 15:58:17 host sshd[2103]: Invalid user pooja from 124.187.103.196 port 44271 Jan 21 15:58:17 host sshd[2103]: input_userauth_request: invalid user pooja [preauth] Jan 21 15:58:17 host sshd[2103]: pam_unix(sshd:auth): check pass; user unknown Jan 21 15:58:17 host sshd[2103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.187.103.196 Jan 21 15:58:19 host sshd[2103]: Failed password for invalid user pooja from 124.187.103.196 port 44271 ssh2 Jan 21 15:58:19 host sshd[2103]: Connection closed by 124.187.103.196 port 44271 [preauth] Jan 21 16:00:16 host sshd[2370]: User root from 31.41.244.124 not allowed because not listed in AllowUsers Jan 21 16:00:16 host sshd[2370]: input_userauth_request: invalid user root [preauth] Jan 21 16:00:16 host unix_chkpwd[2373]: password check failed for user (root) Jan 21 16:00:16 host sshd[2370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 user=root Jan 21 16:00:16 host sshd[2370]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 16:00:17 host sshd[2370]: Failed password for invalid user root from 31.41.244.124 port 25574 ssh2 Jan 21 16:00:18 host sshd[2370]: Received disconnect from 31.41.244.124 port 25574:11: Client disconnecting normally [preauth] Jan 21 16:00:18 host sshd[2370]: Disconnected from 31.41.244.124 port 25574 [preauth] Jan 21 16:04:49 host sshd[3028]: User root from 141.98.11.66 not allowed because not listed in AllowUsers Jan 21 16:04:49 host sshd[3028]: input_userauth_request: invalid user root [preauth] Jan 21 16:04:49 host unix_chkpwd[3032]: password check failed for user (root) Jan 21 16:04:49 host sshd[3028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.66 user=root Jan 21 16:04:49 host sshd[3028]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 16:04:51 host sshd[3028]: Failed password for invalid user root from 141.98.11.66 port 44158 ssh2 Jan 21 16:04:51 host sshd[3028]: Received disconnect from 141.98.11.66 port 44158:11: Normal Shutdown, Thank you for playing [preauth] Jan 21 16:04:51 host sshd[3028]: Disconnected from 141.98.11.66 port 44158 [preauth] Jan 21 16:16:47 host sshd[4683]: User root from 118.33.24.72 not allowed because not listed in AllowUsers Jan 21 16:16:47 host sshd[4683]: input_userauth_request: invalid user root [preauth] Jan 21 16:16:47 host unix_chkpwd[4688]: password check failed for user (root) Jan 21 16:16:47 host sshd[4683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.33.24.72 user=root Jan 21 16:16:47 host sshd[4683]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 16:16:50 host sshd[4683]: Failed password for invalid user root from 118.33.24.72 port 39195 ssh2 Jan 21 16:16:52 host unix_chkpwd[4693]: password check failed for user (root) Jan 21 16:16:52 host sshd[4683]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 16:16:54 host sshd[4683]: Failed password for invalid user root from 118.33.24.72 port 39195 ssh2 Jan 21 16:16:54 host sshd[4683]: Connection reset by 118.33.24.72 port 39195 [preauth] Jan 21 16:16:54 host sshd[4683]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.33.24.72 user=root Jan 21 16:19:46 host sshd[5088]: Invalid user jincm from 162.218.126.136 port 33494 Jan 21 16:19:46 host sshd[5088]: input_userauth_request: invalid user jincm [preauth] Jan 21 16:19:47 host sshd[5088]: pam_unix(sshd:auth): check pass; user unknown Jan 21 16:19:47 host sshd[5088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Jan 21 16:19:49 host sshd[5088]: Failed password for invalid user jincm from 162.218.126.136 port 33494 ssh2 Jan 21 16:19:49 host sshd[5088]: Connection closed by 162.218.126.136 port 33494 [preauth] Jan 21 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=wwwresourcehunte user-8=keralaholi user-9=wwwrmswll user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=pmcresources user-16=wwwkmaorg user-17=disposeat user-18=remysagr user-19=wwwkapin user-20=woodpeck user-21=palco123 user-22=gifterman user-23=phmetals user-24=kottayamcalldriv user-25=wwwnexidigital user-26=mrsclean user-27=bonifacegroup user-28=wwwevmhonda user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 16:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7V2cRA9ek4Pn9JTz.~ Jan 21 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7V2cRA9ek4Pn9JTz.~' Jan 21 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-7V2cRA9ek4Pn9JTz.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 16:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 16:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 16:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 16:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 16:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 16:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 16:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 16:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 16:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 16:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 16:26:25 host sshd[6157]: Invalid user vadmin from 220.133.200.227 port 58218 Jan 21 16:26:25 host sshd[6157]: input_userauth_request: invalid user vadmin [preauth] Jan 21 16:26:25 host sshd[6157]: pam_unix(sshd:auth): check pass; user unknown Jan 21 16:26:25 host sshd[6157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.200.227 Jan 21 16:26:27 host sshd[6157]: Failed password for invalid user vadmin from 220.133.200.227 port 58218 ssh2 Jan 21 16:26:28 host sshd[6157]: pam_unix(sshd:auth): check pass; user unknown Jan 21 16:26:30 host sshd[6157]: Failed password for invalid user vadmin from 220.133.200.227 port 58218 ssh2 Jan 21 16:26:31 host sshd[6157]: Failed password for invalid user vadmin from 220.133.200.227 port 58218 ssh2 Jan 21 16:26:31 host sshd[6157]: Connection closed by 220.133.200.227 port 58218 [preauth] Jan 21 16:26:31 host sshd[6157]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.200.227 Jan 21 16:27:37 host sshd[6294]: User root from 89.31.32.115 not allowed because not listed in AllowUsers Jan 21 16:27:37 host sshd[6294]: input_userauth_request: invalid user root [preauth] Jan 21 16:27:37 host unix_chkpwd[6298]: password check failed for user (root) Jan 21 16:27:37 host sshd[6294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.31.32.115 user=root Jan 21 16:27:37 host sshd[6294]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 16:27:39 host sshd[6294]: Failed password for invalid user root from 89.31.32.115 port 47089 ssh2 Jan 21 16:27:41 host sshd[6294]: Connection reset by 89.31.32.115 port 47089 [preauth] Jan 21 16:32:31 host sshd[6922]: Invalid user zyfwp from 121.185.203.56 port 63354 Jan 21 16:32:31 host sshd[6922]: input_userauth_request: invalid user zyfwp [preauth] Jan 21 16:32:31 host sshd[6922]: pam_unix(sshd:auth): check pass; user unknown Jan 21 16:32:31 host sshd[6922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.185.203.56 Jan 21 16:32:34 host sshd[6922]: Failed password for invalid user zyfwp from 121.185.203.56 port 63354 ssh2 Jan 21 16:32:34 host sshd[6922]: Connection reset by 121.185.203.56 port 63354 [preauth] Jan 21 16:36:18 host sshd[7321]: Invalid user usr from 119.195.226.143 port 63989 Jan 21 16:36:18 host sshd[7321]: input_userauth_request: invalid user usr [preauth] Jan 21 16:36:18 host sshd[7321]: pam_unix(sshd:auth): check pass; user unknown Jan 21 16:36:18 host sshd[7321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.195.226.143 Jan 21 16:36:19 host sshd[7321]: Failed password for invalid user usr from 119.195.226.143 port 63989 ssh2 Jan 21 16:36:20 host sshd[7321]: pam_unix(sshd:auth): check pass; user unknown Jan 21 16:36:22 host sshd[7321]: Failed password for invalid user usr from 119.195.226.143 port 63989 ssh2 Jan 21 16:39:13 host sshd[7797]: User root from 45.90.161.125 not allowed because not listed in AllowUsers Jan 21 16:39:13 host sshd[7797]: input_userauth_request: invalid user root [preauth] Jan 21 16:39:13 host unix_chkpwd[7800]: password check failed for user (root) Jan 21 16:39:13 host sshd[7797]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.90.161.125 user=root Jan 21 16:39:13 host sshd[7797]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 16:39:14 host sshd[7797]: Failed password for invalid user root from 45.90.161.125 port 39426 ssh2 Jan 21 16:39:15 host sshd[7797]: Received disconnect from 45.90.161.125 port 39426:11: Bye Bye [preauth] Jan 21 16:39:15 host sshd[7797]: Disconnected from 45.90.161.125 port 39426 [preauth] Jan 21 16:39:16 host sshd[7803]: Invalid user telnet from 45.90.161.125 port 43148 Jan 21 16:39:16 host sshd[7803]: input_userauth_request: invalid user telnet [preauth] Jan 21 16:39:16 host sshd[7803]: pam_unix(sshd:auth): check pass; user unknown Jan 21 16:39:16 host sshd[7803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.90.161.125 Jan 21 16:39:18 host sshd[7803]: Failed password for invalid user telnet from 45.90.161.125 port 43148 ssh2 Jan 21 16:39:18 host sshd[7803]: Received disconnect from 45.90.161.125 port 43148:11: Bye Bye [preauth] Jan 21 16:39:18 host sshd[7803]: Disconnected from 45.90.161.125 port 43148 [preauth] Jan 21 16:41:20 host sshd[8071]: User root from 59.126.87.108 not allowed because not listed in AllowUsers Jan 21 16:41:20 host sshd[8071]: input_userauth_request: invalid user root [preauth] Jan 21 16:41:20 host unix_chkpwd[8076]: password check failed for user (root) Jan 21 16:41:20 host sshd[8071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.87.108 user=root Jan 21 16:41:20 host sshd[8071]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 16:41:22 host sshd[8071]: Failed password for invalid user root from 59.126.87.108 port 47962 ssh2 Jan 21 16:41:23 host unix_chkpwd[8079]: password check failed for user (root) Jan 21 16:41:23 host sshd[8071]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 16:41:25 host sshd[8071]: Failed password for invalid user root from 59.126.87.108 port 47962 ssh2 Jan 21 16:41:26 host unix_chkpwd[8082]: password check failed for user (root) Jan 21 16:41:26 host sshd[8071]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 16:41:28 host sshd[8071]: Failed password for invalid user root from 59.126.87.108 port 47962 ssh2 Jan 21 16:41:29 host unix_chkpwd[8125]: password check failed for user (root) Jan 21 16:41:29 host sshd[8071]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 16:41:31 host sshd[8071]: Failed password for invalid user root from 59.126.87.108 port 47962 ssh2 Jan 21 16:46:28 host sshd[8743]: Invalid user ec2-user from 121.148.215.114 port 61006 Jan 21 16:46:28 host sshd[8743]: input_userauth_request: invalid user ec2-user [preauth] Jan 21 16:46:28 host sshd[8743]: pam_unix(sshd:auth): check pass; user unknown Jan 21 16:46:28 host sshd[8743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.148.215.114 Jan 21 16:46:30 host sshd[8743]: Failed password for invalid user ec2-user from 121.148.215.114 port 61006 ssh2 Jan 21 16:46:31 host sshd[8743]: pam_unix(sshd:auth): check pass; user unknown Jan 21 16:46:32 host sshd[8743]: Failed password for invalid user ec2-user from 121.148.215.114 port 61006 ssh2 Jan 21 16:46:33 host sshd[8743]: pam_unix(sshd:auth): check pass; user unknown Jan 21 16:46:35 host sshd[8743]: Failed password for invalid user ec2-user from 121.148.215.114 port 61006 ssh2 Jan 21 16:46:36 host sshd[8743]: Failed password for invalid user ec2-user from 121.148.215.114 port 61006 ssh2 Jan 21 16:46:37 host sshd[8743]: Connection reset by 121.148.215.114 port 61006 [preauth] Jan 21 16:46:37 host sshd[8743]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.148.215.114 Jan 21 16:48:21 host sshd[9090]: Invalid user hm from 194.110.203.109 port 34070 Jan 21 16:48:21 host sshd[9090]: input_userauth_request: invalid user hm [preauth] Jan 21 16:48:21 host sshd[9090]: pam_unix(sshd:auth): check pass; user unknown Jan 21 16:48:21 host sshd[9090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 16:48:22 host sshd[9090]: Failed password for invalid user hm from 194.110.203.109 port 34070 ssh2 Jan 21 16:48:26 host sshd[9090]: pam_unix(sshd:auth): check pass; user unknown Jan 21 16:48:28 host sshd[9090]: Failed password for invalid user hm from 194.110.203.109 port 34070 ssh2 Jan 21 16:48:31 host sshd[9090]: pam_unix(sshd:auth): check pass; user unknown Jan 21 16:48:33 host sshd[9090]: Failed password for invalid user hm from 194.110.203.109 port 34070 ssh2 Jan 21 16:48:36 host sshd[9090]: Connection closed by 194.110.203.109 port 34070 [preauth] Jan 21 16:48:36 host sshd[9090]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 16:51:38 host sshd[9527]: Did not receive identification string from 3.10.171.191 port 21345 Jan 21 16:51:44 host sshd[9544]: Did not receive identification string from 3.10.171.191 port 21345 Jan 21 16:53:14 host sshd[9822]: Did not receive identification string from 206.189.23.129 port 61000 Jan 21 16:55:19 host sshd[10108]: Did not receive identification string from 3.10.171.191 port 21345 Jan 21 16:55:25 host sshd[10117]: Did not receive identification string from 3.10.171.191 port 21345 Jan 21 16:55:25 host sshd[10117]: Did not receive identification string from 3.10.171.191 port 21345 Jan 21 16:55:25 host sshd[10117]: Did not receive identification string from 3.10.171.191 port 21345 Jan 21 16:58:21 host sshd[10488]: Did not receive identification string from 58.72.18.130 port 20542 Jan 21 16:58:34 host sshd[10570]: User sshd from 194.169.175.102 not allowed because not listed in AllowUsers Jan 21 16:58:34 host sshd[10570]: input_userauth_request: invalid user sshd [preauth] Jan 21 16:58:34 host unix_chkpwd[10632]: password check failed for user (sshd) Jan 21 16:58:34 host sshd[10570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.169.175.102 user=sshd Jan 21 16:58:34 host sshd[10570]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "sshd" Jan 21 16:58:36 host sshd[10570]: Failed password for invalid user sshd from 194.169.175.102 port 51893 ssh2 Jan 21 16:58:36 host sshd[10570]: Received disconnect from 194.169.175.102 port 51893:11: Client disconnecting normally [preauth] Jan 21 16:58:36 host sshd[10570]: Disconnected from 194.169.175.102 port 51893 [preauth] Jan 21 17:01:33 host sshd[11047]: User root from 61.61.22.2 not allowed because not listed in AllowUsers Jan 21 17:01:33 host sshd[11047]: input_userauth_request: invalid user root [preauth] Jan 21 17:01:33 host unix_chkpwd[11061]: password check failed for user (root) Jan 21 17:01:33 host sshd[11047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.61.22.2 user=root Jan 21 17:01:33 host sshd[11047]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 17:01:35 host sshd[11047]: Failed password for invalid user root from 61.61.22.2 port 58689 ssh2 Jan 21 17:01:36 host unix_chkpwd[11071]: password check failed for user (root) Jan 21 17:01:36 host sshd[11047]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 17:01:38 host sshd[11047]: Failed password for invalid user root from 61.61.22.2 port 58689 ssh2 Jan 21 17:01:38 host sshd[11047]: Connection reset by 61.61.22.2 port 58689 [preauth] Jan 21 17:01:38 host sshd[11047]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.61.22.2 user=root Jan 21 17:06:19 host sshd[11739]: Invalid user changxu from 106.10.122.53 port 45712 Jan 21 17:06:19 host sshd[11739]: input_userauth_request: invalid user changxu [preauth] Jan 21 17:06:19 host sshd[11739]: pam_unix(sshd:auth): check pass; user unknown Jan 21 17:06:19 host sshd[11739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 21 17:06:21 host sshd[11739]: Failed password for invalid user changxu from 106.10.122.53 port 45712 ssh2 Jan 21 17:06:21 host sshd[11739]: Connection closed by 106.10.122.53 port 45712 [preauth] Jan 21 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 17:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=gifterman user-2=palco123 user-3=kottayamcalldriv user-4=phmetals user-5=wwwnexidigital user-6=mrsclean user-7=bonifacegroup user-8=wwwevmhonda user-9=wwwletsstalkfood user-10=straightcurve user-11=vfmassets user-12=wwwtestugo user-13=shalinijames user-14=pmcresources user-15=remysagr user-16=disposeat user-17=wwwkmaorg user-18=wwwkapin user-19=woodpeck user-20=travelboniface user-21=wwwrmswll user-22=keralaholi user-23=wwwresourcehunte user-24=ugotscom user-25=wwwpmcresource user-26=dartsimp user-27=a2zgroup user-28=laundryboniface user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 17:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KowzRwbo8gtRMgPu.~ Jan 21 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KowzRwbo8gtRMgPu.~' Jan 21 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-KowzRwbo8gtRMgPu.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 17:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 17:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 17:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 17:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 17:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 17:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 17:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 17:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 17:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 17:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 17:37:47 host sshd[16600]: Invalid user pi from 49.213.227.42 port 51066 Jan 21 17:37:47 host sshd[16600]: input_userauth_request: invalid user pi [preauth] Jan 21 17:37:47 host sshd[16600]: pam_unix(sshd:auth): check pass; user unknown Jan 21 17:37:47 host sshd[16600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.213.227.42 Jan 21 17:37:49 host sshd[16600]: Failed password for invalid user pi from 49.213.227.42 port 51066 ssh2 Jan 21 17:37:49 host sshd[16600]: pam_unix(sshd:auth): check pass; user unknown Jan 21 17:37:51 host sshd[16600]: Failed password for invalid user pi from 49.213.227.42 port 51066 ssh2 Jan 21 17:37:51 host sshd[16600]: pam_unix(sshd:auth): check pass; user unknown Jan 21 17:37:53 host sshd[16600]: Failed password for invalid user pi from 49.213.227.42 port 51066 ssh2 Jan 21 17:37:54 host sshd[16600]: pam_unix(sshd:auth): check pass; user unknown Jan 21 17:37:56 host sshd[16600]: Failed password for invalid user pi from 49.213.227.42 port 51066 ssh2 Jan 21 17:37:57 host sshd[16600]: pam_unix(sshd:auth): check pass; user unknown Jan 21 17:37:59 host sshd[16600]: Failed password for invalid user pi from 49.213.227.42 port 51066 ssh2 Jan 21 17:38:00 host sshd[16600]: pam_unix(sshd:auth): check pass; user unknown Jan 21 17:38:02 host sshd[16600]: Failed password for invalid user pi from 49.213.227.42 port 51066 ssh2 Jan 21 17:38:02 host sshd[16600]: error: maximum authentication attempts exceeded for invalid user pi from 49.213.227.42 port 51066 ssh2 [preauth] Jan 21 17:38:02 host sshd[16600]: Disconnecting: Too many authentication failures [preauth] Jan 21 17:38:02 host sshd[16600]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.213.227.42 Jan 21 17:38:02 host sshd[16600]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 21 17:50:44 host sshd[18597]: Invalid user ubnt from 222.112.66.163 port 60755 Jan 21 17:50:44 host sshd[18597]: input_userauth_request: invalid user ubnt [preauth] Jan 21 17:50:44 host sshd[18597]: pam_unix(sshd:auth): check pass; user unknown Jan 21 17:50:44 host sshd[18597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.112.66.163 Jan 21 17:50:45 host sshd[18597]: Failed password for invalid user ubnt from 222.112.66.163 port 60755 ssh2 Jan 21 17:50:46 host sshd[18597]: pam_unix(sshd:auth): check pass; user unknown Jan 21 17:50:48 host sshd[18597]: Failed password for invalid user ubnt from 222.112.66.163 port 60755 ssh2 Jan 21 17:50:50 host sshd[18597]: Failed password for invalid user ubnt from 222.112.66.163 port 60755 ssh2 Jan 21 17:50:50 host sshd[18597]: pam_unix(sshd:auth): check pass; user unknown Jan 21 17:50:52 host sshd[18597]: Failed password for invalid user ubnt from 222.112.66.163 port 60755 ssh2 Jan 21 17:50:53 host sshd[18597]: pam_unix(sshd:auth): check pass; user unknown Jan 21 17:50:55 host sshd[18597]: Failed password for invalid user ubnt from 222.112.66.163 port 60755 ssh2 Jan 21 17:50:55 host sshd[18597]: Connection reset by 222.112.66.163 port 60755 [preauth] Jan 21 17:50:55 host sshd[18597]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.112.66.163 Jan 21 17:50:55 host sshd[18597]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 21 17:56:10 host sshd[19308]: Invalid user zyfwp from 121.136.127.58 port 63585 Jan 21 17:56:10 host sshd[19308]: input_userauth_request: invalid user zyfwp [preauth] Jan 21 17:56:10 host sshd[19308]: pam_unix(sshd:auth): check pass; user unknown Jan 21 17:56:10 host sshd[19308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.136.127.58 Jan 21 17:56:12 host sshd[19308]: Failed password for invalid user zyfwp from 121.136.127.58 port 63585 ssh2 Jan 21 17:56:12 host sshd[19308]: pam_unix(sshd:auth): check pass; user unknown Jan 21 17:56:14 host sshd[19308]: Failed password for invalid user zyfwp from 121.136.127.58 port 63585 ssh2 Jan 21 17:56:15 host sshd[19308]: pam_unix(sshd:auth): check pass; user unknown Jan 21 17:56:17 host sshd[19308]: Failed password for invalid user zyfwp from 121.136.127.58 port 63585 ssh2 Jan 21 17:56:17 host sshd[19308]: Connection closed by 121.136.127.58 port 63585 [preauth] Jan 21 17:56:17 host sshd[19308]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.136.127.58 Jan 21 17:57:35 host sshd[19478]: Invalid user postgres from 175.204.208.193 port 60404 Jan 21 17:57:35 host sshd[19478]: input_userauth_request: invalid user postgres [preauth] Jan 21 17:57:35 host sshd[19478]: pam_unix(sshd:auth): check pass; user unknown Jan 21 17:57:35 host sshd[19478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.204.208.193 Jan 21 17:57:37 host sshd[19478]: Failed password for invalid user postgres from 175.204.208.193 port 60404 ssh2 Jan 21 17:57:38 host sshd[19478]: pam_unix(sshd:auth): check pass; user unknown Jan 21 17:57:40 host sshd[19478]: Failed password for invalid user postgres from 175.204.208.193 port 60404 ssh2 Jan 21 17:57:41 host sshd[19478]: Connection reset by 175.204.208.193 port 60404 [preauth] Jan 21 17:57:41 host sshd[19478]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.204.208.193 Jan 21 18:00:38 host sshd[19842]: Invalid user admin from 62.233.50.248 port 58101 Jan 21 18:00:38 host sshd[19842]: input_userauth_request: invalid user admin [preauth] Jan 21 18:00:38 host sshd[19842]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:00:38 host sshd[19842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 Jan 21 18:00:40 host sshd[19842]: Failed password for invalid user admin from 62.233.50.248 port 58101 ssh2 Jan 21 18:00:40 host sshd[19842]: Received disconnect from 62.233.50.248 port 58101:11: Client disconnecting normally [preauth] Jan 21 18:00:40 host sshd[19842]: Disconnected from 62.233.50.248 port 58101 [preauth] Jan 21 18:03:49 host sshd[20402]: User root from 107.189.1.133 not allowed because not listed in AllowUsers Jan 21 18:03:49 host sshd[20402]: input_userauth_request: invalid user root [preauth] Jan 21 18:03:49 host unix_chkpwd[20413]: password check failed for user (root) Jan 21 18:03:49 host sshd[20402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.1.133 user=root Jan 21 18:03:49 host sshd[20402]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 18:03:51 host sshd[20402]: Failed password for invalid user root from 107.189.1.133 port 38834 ssh2 Jan 21 18:03:51 host sshd[20402]: Connection closed by 107.189.1.133 port 38834 [preauth] Jan 21 18:08:45 host sshd[21124]: Invalid user admin from 72.209.29.177 port 44189 Jan 21 18:08:45 host sshd[21124]: input_userauth_request: invalid user admin [preauth] Jan 21 18:08:45 host sshd[21124]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:08:45 host sshd[21124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.209.29.177 Jan 21 18:08:46 host sshd[21124]: Failed password for invalid user admin from 72.209.29.177 port 44189 ssh2 Jan 21 18:08:47 host sshd[21124]: Failed password for invalid user admin from 72.209.29.177 port 44189 ssh2 Jan 21 18:08:47 host sshd[21124]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:08:49 host sshd[21124]: Failed password for invalid user admin from 72.209.29.177 port 44189 ssh2 Jan 21 18:08:50 host sshd[21124]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:08:52 host sshd[21124]: Failed password for invalid user admin from 72.209.29.177 port 44189 ssh2 Jan 21 18:08:53 host sshd[21124]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:08:55 host sshd[21124]: Failed password for invalid user admin from 72.209.29.177 port 44189 ssh2 Jan 21 18:08:55 host sshd[21124]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:08:57 host sshd[21124]: Failed password for invalid user admin from 72.209.29.177 port 44189 ssh2 Jan 21 18:08:57 host sshd[21124]: error: maximum authentication attempts exceeded for invalid user admin from 72.209.29.177 port 44189 ssh2 [preauth] Jan 21 18:08:57 host sshd[21124]: Disconnecting: Too many authentication failures [preauth] Jan 21 18:08:57 host sshd[21124]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.209.29.177 Jan 21 18:08:57 host sshd[21124]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 21 18:09:54 host sshd[21284]: User root from 222.103.25.111 not allowed because not listed in AllowUsers Jan 21 18:09:54 host sshd[21284]: input_userauth_request: invalid user root [preauth] Jan 21 18:09:54 host unix_chkpwd[21298]: password check failed for user (root) Jan 21 18:09:54 host sshd[21284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.103.25.111 user=root Jan 21 18:09:54 host sshd[21284]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 18:09:57 host sshd[21284]: Failed password for invalid user root from 222.103.25.111 port 60555 ssh2 Jan 21 18:09:58 host unix_chkpwd[21302]: password check failed for user (root) Jan 21 18:09:58 host sshd[21284]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 18:09:59 host sshd[21284]: Failed password for invalid user root from 222.103.25.111 port 60555 ssh2 Jan 21 18:10:01 host unix_chkpwd[21306]: password check failed for user (root) Jan 21 18:10:01 host sshd[21284]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 18:10:02 host sshd[21284]: Failed password for invalid user root from 222.103.25.111 port 60555 ssh2 Jan 21 18:10:03 host unix_chkpwd[21333]: password check failed for user (root) Jan 21 18:10:03 host sshd[21284]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 18:10:05 host sshd[21284]: Failed password for invalid user root from 222.103.25.111 port 60555 ssh2 Jan 21 18:10:06 host unix_chkpwd[21340]: password check failed for user (root) Jan 21 18:10:06 host sshd[21284]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 18:10:09 host sshd[21284]: Failed password for invalid user root from 222.103.25.111 port 60555 ssh2 Jan 21 18:10:52 host sshd[21499]: Invalid user wzw from 162.218.126.136 port 56572 Jan 21 18:10:52 host sshd[21499]: input_userauth_request: invalid user wzw [preauth] Jan 21 18:10:52 host sshd[21499]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:10:52 host sshd[21499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.218.126.136 Jan 21 18:10:54 host sshd[21499]: Failed password for invalid user wzw from 162.218.126.136 port 56572 ssh2 Jan 21 18:10:54 host sshd[21499]: Connection closed by 162.218.126.136 port 56572 [preauth] Jan 21 18:17:05 host sshd[22337]: Invalid user admin from 59.120.90.33 port 54985 Jan 21 18:17:05 host sshd[22337]: input_userauth_request: invalid user admin [preauth] Jan 21 18:17:05 host sshd[22337]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:17:05 host sshd[22337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.90.33 Jan 21 18:17:08 host sshd[22337]: Failed password for invalid user admin from 59.120.90.33 port 54985 ssh2 Jan 21 18:17:08 host sshd[22337]: Connection reset by 59.120.90.33 port 54985 [preauth] Jan 21 18:18:21 host sshd[22496]: Invalid user admin from 1.214.29.246 port 61237 Jan 21 18:18:21 host sshd[22496]: input_userauth_request: invalid user admin [preauth] Jan 21 18:18:21 host sshd[22496]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:18:21 host sshd[22496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.214.29.246 Jan 21 18:18:23 host sshd[22496]: Failed password for invalid user admin from 1.214.29.246 port 61237 ssh2 Jan 21 18:18:24 host sshd[22496]: Failed password for invalid user admin from 1.214.29.246 port 61237 ssh2 Jan 21 18:18:24 host sshd[22496]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:18:27 host sshd[22496]: Failed password for invalid user admin from 1.214.29.246 port 61237 ssh2 Jan 21 18:18:27 host sshd[22496]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:18:29 host sshd[22496]: Failed password for invalid user admin from 1.214.29.246 port 61237 ssh2 Jan 21 18:18:30 host sshd[22496]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:18:32 host sshd[22496]: Failed password for invalid user admin from 1.214.29.246 port 61237 ssh2 Jan 21 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 18:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=mrsclean user-2=wwwnexidigital user-3=palco123 user-4=gifterman user-5=phmetals user-6=kottayamcalldriv user-7=straightcurve user-8=wwwletsstalkfood user-9=bonifacegroup user-10=wwwevmhonda user-11=pmcresources user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=wwwkapin user-16=woodpeck user-17=wwwkmaorg user-18=disposeat user-19=remysagr user-20=wwwresourcehunte user-21=keralaholi user-22=wwwrmswll user-23=ugotscom user-24=travelboniface user-25=wwwpmcresource user-26=laundryboniface user-27=a2zgroup user-28=dartsimp user-29=wwwkaretakers user-30=cochintaxi feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 18:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PXFnfZYmuwvsd9fI.~ Jan 21 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PXFnfZYmuwvsd9fI.~' Jan 21 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-PXFnfZYmuwvsd9fI.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 18:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 18:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 18:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 18:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 18:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 18:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 18:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 18:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 18:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 18:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 18:24:23 host sshd[23610]: Invalid user ckh from 106.10.122.53 port 37126 Jan 21 18:24:23 host sshd[23610]: input_userauth_request: invalid user ckh [preauth] Jan 21 18:24:23 host sshd[23610]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:24:23 host sshd[23610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 21 18:24:24 host sshd[23610]: Failed password for invalid user ckh from 106.10.122.53 port 37126 ssh2 Jan 21 18:24:25 host sshd[23610]: Connection closed by 106.10.122.53 port 37126 [preauth] Jan 21 18:28:41 host sshd[24118]: Connection reset by 198.235.24.30 port 64978 [preauth] Jan 21 18:29:40 host sshd[24267]: Did not receive identification string from 192.155.90.220 port 10584 Jan 21 18:29:41 host sshd[24269]: Did not receive identification string from 192.155.90.220 port 10596 Jan 21 18:29:42 host sshd[24273]: Did not receive identification string from 192.155.90.220 port 10406 Jan 21 18:33:09 host sshd[24864]: Invalid user hn from 194.110.203.109 port 54236 Jan 21 18:33:09 host sshd[24864]: input_userauth_request: invalid user hn [preauth] Jan 21 18:33:09 host sshd[24864]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:33:09 host sshd[24864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 18:33:11 host sshd[24864]: Failed password for invalid user hn from 194.110.203.109 port 54236 ssh2 Jan 21 18:33:14 host sshd[24864]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:33:16 host sshd[24864]: Failed password for invalid user hn from 194.110.203.109 port 54236 ssh2 Jan 21 18:33:20 host sshd[24864]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:33:21 host sshd[24864]: Failed password for invalid user hn from 194.110.203.109 port 54236 ssh2 Jan 21 18:33:24 host sshd[24864]: Connection closed by 194.110.203.109 port 54236 [preauth] Jan 21 18:33:24 host sshd[24864]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 18:54:06 host sshd[27753]: Invalid user zyfwp from 220.133.146.111 port 46912 Jan 21 18:54:06 host sshd[27753]: input_userauth_request: invalid user zyfwp [preauth] Jan 21 18:54:06 host sshd[27753]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:54:06 host sshd[27753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.146.111 Jan 21 18:54:08 host sshd[27753]: Failed password for invalid user zyfwp from 220.133.146.111 port 46912 ssh2 Jan 21 18:54:09 host sshd[27753]: pam_unix(sshd:auth): check pass; user unknown Jan 21 18:54:11 host sshd[27753]: Failed password for invalid user zyfwp from 220.133.146.111 port 46912 ssh2 Jan 21 18:54:11 host sshd[27753]: Connection reset by 220.133.146.111 port 46912 [preauth] Jan 21 18:54:11 host sshd[27753]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.146.111 Jan 21 18:56:28 host sshd[28157]: Did not receive identification string from 141.105.66.212 port 45044 Jan 21 18:57:46 host sshd[28520]: Did not receive identification string from 141.105.66.212 port 42886 Jan 21 18:57:46 host sshd[28512]: Protocol major versions differ for 141.105.66.212 port 42840: SSH-2.0-OpenSSH_7.4 vs. SSH-1.5-NmapNSE_1.0 Jan 21 19:02:40 host sshd[29250]: Connection reset by 220.133.203.74 port 46401 [preauth] Jan 21 19:02:44 host sshd[29266]: Did not receive identification string from 115.146.122.211 port 57608 Jan 21 19:02:44 host sshd[29267]: Invalid user www from 115.146.122.211 port 60294 Jan 21 19:02:44 host sshd[29267]: input_userauth_request: invalid user www [preauth] Jan 21 19:02:44 host sshd[29268]: Invalid user ubuntu from 115.146.122.211 port 60332 Jan 21 19:02:44 host sshd[29268]: input_userauth_request: invalid user ubuntu [preauth] Jan 21 19:02:44 host sshd[29272]: Invalid user admin from 115.146.122.211 port 60302 Jan 21 19:02:44 host sshd[29272]: input_userauth_request: invalid user admin [preauth] Jan 21 19:02:44 host sshd[29269]: Invalid user admin from 115.146.122.211 port 60336 Jan 21 19:02:44 host sshd[29269]: input_userauth_request: invalid user admin [preauth] Jan 21 19:02:44 host sshd[29276]: Invalid user admin from 115.146.122.211 port 60418 Jan 21 19:02:44 host sshd[29276]: input_userauth_request: invalid user admin [preauth] Jan 21 19:02:44 host sshd[29277]: User root from 115.146.122.211 not allowed because not listed in AllowUsers Jan 21 19:02:44 host sshd[29277]: input_userauth_request: invalid user root [preauth] Jan 21 19:02:44 host sshd[29279]: User root from 115.146.122.211 not allowed because not listed in AllowUsers Jan 21 19:02:44 host sshd[29279]: input_userauth_request: invalid user root [preauth] Jan 21 19:02:44 host sshd[29278]: User root from 115.146.122.211 not allowed because not listed in AllowUsers Jan 21 19:02:44 host sshd[29278]: input_userauth_request: invalid user root [preauth] Jan 21 19:02:44 host sshd[29273]: Invalid user admin from 115.146.122.211 port 60394 Jan 21 19:02:44 host sshd[29273]: input_userauth_request: invalid user admin [preauth] Jan 21 19:02:45 host sshd[29284]: Invalid user devops from 115.146.122.211 port 60386 Jan 21 19:02:45 host sshd[29284]: input_userauth_request: invalid user devops [preauth] Jan 21 19:02:45 host sshd[29275]: Invalid user web from 115.146.122.211 port 60298 Jan 21 19:02:45 host sshd[29275]: input_userauth_request: invalid user web [preauth] Jan 21 19:02:45 host sshd[29271]: User root from 115.146.122.211 not allowed because not listed in AllowUsers Jan 21 19:02:45 host sshd[29289]: User root from 115.146.122.211 not allowed because not listed in AllowUsers Jan 21 19:02:45 host sshd[29271]: input_userauth_request: invalid user root [preauth] Jan 21 19:02:45 host sshd[29289]: input_userauth_request: invalid user root [preauth] Jan 21 19:02:45 host sshd[29280]: User root from 115.146.122.211 not allowed because not listed in AllowUsers Jan 21 19:02:45 host sshd[29280]: input_userauth_request: invalid user root [preauth] Jan 21 19:02:45 host sshd[29291]: Invalid user admin from 115.146.122.211 port 60406 Jan 21 19:02:45 host sshd[29283]: Invalid user ubnt from 115.146.122.211 port 60416 Jan 21 19:02:45 host sshd[29291]: input_userauth_request: invalid user admin [preauth] Jan 21 19:02:45 host sshd[29286]: User root from 115.146.122.211 not allowed because not listed in AllowUsers Jan 21 19:02:45 host sshd[29286]: input_userauth_request: invalid user root [preauth] Jan 21 19:02:45 host sshd[29283]: input_userauth_request: invalid user ubnt [preauth] Jan 21 19:02:45 host sshd[29290]: Invalid user admin from 115.146.122.211 port 60348 Jan 21 19:02:45 host sshd[29290]: input_userauth_request: invalid user admin [preauth] Jan 21 19:02:45 host sshd[29292]: Invalid user oracle from 115.146.122.211 port 60398 Jan 21 19:02:45 host sshd[29292]: input_userauth_request: invalid user oracle [preauth] Jan 21 19:02:45 host sshd[29274]: Invalid user ansible from 115.146.122.211 port 60362 Jan 21 19:02:45 host sshd[29274]: input_userauth_request: invalid user ansible [preauth] Jan 21 19:02:45 host sshd[29282]: User root from 115.146.122.211 not allowed because not listed in AllowUsers Jan 21 19:02:45 host sshd[29282]: input_userauth_request: invalid user root [preauth] Jan 21 19:02:45 host sshd[29285]: User root from 115.146.122.211 not allowed because not listed in AllowUsers Jan 21 19:02:45 host sshd[29285]: input_userauth_request: invalid user root [preauth] Jan 21 19:02:45 host sshd[29294]: Invalid user es from 115.146.122.211 port 60430 Jan 21 19:02:45 host sshd[29294]: input_userauth_request: invalid user es [preauth] Jan 21 19:02:45 host sshd[29267]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host sshd[29288]: User root from 115.146.122.211 not allowed because not listed in AllowUsers Jan 21 19:02:45 host sshd[29288]: input_userauth_request: invalid user root [preauth] Jan 21 19:02:45 host sshd[29287]: Invalid user postgres from 115.146.122.211 port 60290 Jan 21 19:02:45 host sshd[29287]: input_userauth_request: invalid user postgres [preauth] Jan 21 19:02:45 host sshd[29293]: Invalid user pi from 115.146.122.211 port 60434 Jan 21 19:02:45 host sshd[29293]: input_userauth_request: invalid user pi [preauth] Jan 21 19:02:45 host sshd[29295]: Invalid user ansible from 115.146.122.211 port 60316 Jan 21 19:02:45 host sshd[29268]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host sshd[29295]: input_userauth_request: invalid user ansible [preauth] Jan 21 19:02:45 host sshd[29272]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host sshd[29269]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host sshd[29276]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host sshd[29273]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host sshd[29284]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host sshd[29275]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host unix_chkpwd[29327]: password check failed for user (root) Jan 21 19:02:45 host sshd[29279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 user=root Jan 21 19:02:45 host sshd[29279]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 19:02:45 host sshd[29281]: Invalid user steam from 115.146.122.211 port 60320 Jan 21 19:02:45 host unix_chkpwd[29326]: password check failed for user (root) Jan 21 19:02:45 host sshd[29281]: input_userauth_request: invalid user steam [preauth] Jan 21 19:02:45 host sshd[29277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 user=root Jan 21 19:02:45 host sshd[29277]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 19:02:45 host sshd[29291]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host unix_chkpwd[29328]: password check failed for user (root) Jan 21 19:02:45 host sshd[29278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 user=root Jan 21 19:02:45 host sshd[29278]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 19:02:45 host sshd[29283]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host sshd[29290]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host sshd[29292]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host sshd[29274]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host unix_chkpwd[29329]: password check failed for user (root) Jan 21 19:02:45 host sshd[29274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host sshd[29271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 user=root Jan 21 19:02:45 host sshd[29271]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 19:02:45 host sshd[29287]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host unix_chkpwd[29330]: password check failed for user (root) Jan 21 19:02:45 host sshd[29293]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host sshd[29289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 user=root Jan 21 19:02:45 host sshd[29289]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 19:02:45 host sshd[29294]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host unix_chkpwd[29331]: password check failed for user (root) Jan 21 19:02:45 host sshd[29280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 user=root Jan 21 19:02:45 host sshd[29280]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 19:02:45 host sshd[29295]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host unix_chkpwd[29332]: password check failed for user (root) Jan 21 19:02:45 host sshd[29286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 user=root Jan 21 19:02:45 host sshd[29286]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 19:02:45 host unix_chkpwd[29333]: password check failed for user (root) Jan 21 19:02:45 host sshd[29282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 user=root Jan 21 19:02:45 host sshd[29282]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 19:02:45 host unix_chkpwd[29334]: password check failed for user (root) Jan 21 19:02:45 host sshd[29288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 user=root Jan 21 19:02:45 host sshd[29288]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 19:02:45 host sshd[29281]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host sshd[29270]: Invalid user admin from 115.146.122.211 port 60328 Jan 21 19:02:45 host sshd[29270]: input_userauth_request: invalid user admin [preauth] Jan 21 19:02:45 host sshd[29270]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:02:45 host sshd[29270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 Jan 21 19:02:45 host unix_chkpwd[29335]: password check failed for user (root) Jan 21 19:02:45 host sshd[29285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.146.122.211 user=root Jan 21 19:02:45 host sshd[29285]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 19:02:47 host sshd[29267]: Failed password for invalid user www from 115.146.122.211 port 60294 ssh2 Jan 21 19:02:47 host sshd[29268]: Failed password for invalid user ubuntu from 115.146.122.211 port 60332 ssh2 Jan 21 19:02:47 host sshd[29272]: Failed password for invalid user admin from 115.146.122.211 port 60302 ssh2 Jan 21 19:02:47 host sshd[29269]: Failed password for invalid user admin from 115.146.122.211 port 60336 ssh2 Jan 21 19:02:47 host sshd[29276]: Failed password for invalid user admin from 115.146.122.211 port 60418 ssh2 Jan 21 19:02:47 host sshd[29273]: Failed password for invalid user admin from 115.146.122.211 port 60394 ssh2 Jan 21 19:02:47 host sshd[29284]: Failed password for invalid user devops from 115.146.122.211 port 60386 ssh2 Jan 21 19:02:47 host sshd[29275]: Failed password for invalid user web from 115.146.122.211 port 60298 ssh2 Jan 21 19:02:47 host sshd[29279]: Failed password for invalid user root from 115.146.122.211 port 60356 ssh2 Jan 21 19:02:47 host sshd[29277]: Failed password for invalid user root from 115.146.122.211 port 60344 ssh2 Jan 21 19:02:47 host sshd[29291]: Failed password for invalid user admin from 115.146.122.211 port 60406 ssh2 Jan 21 19:02:47 host sshd[29278]: Failed password for invalid user root from 115.146.122.211 port 60306 ssh2 Jan 21 19:02:47 host sshd[29283]: Failed password for invalid user ubnt from 115.146.122.211 port 60416 ssh2 Jan 21 19:02:47 host sshd[29290]: Failed password for invalid user admin from 115.146.122.211 port 60348 ssh2 Jan 21 19:02:47 host sshd[29267]: Connection closed by 115.146.122.211 port 60294 [preauth] Jan 21 19:02:47 host sshd[29292]: Failed password for invalid user oracle from 115.146.122.211 port 60398 ssh2 Jan 21 19:02:47 host sshd[29268]: Connection closed by 115.146.122.211 port 60332 [preauth] Jan 21 19:02:47 host sshd[29274]: Failed password for invalid user ansible from 115.146.122.211 port 60362 ssh2 Jan 21 19:02:47 host sshd[29271]: Failed password for invalid user root from 115.146.122.211 port 60324 ssh2 Jan 21 19:02:47 host sshd[29293]: Failed password for invalid user pi from 115.146.122.211 port 60434 ssh2 Jan 21 19:02:47 host sshd[29287]: Failed password for invalid user postgres from 115.146.122.211 port 60290 ssh2 Jan 21 19:02:47 host sshd[29289]: Failed password for invalid user root from 115.146.122.211 port 60402 ssh2 Jan 21 19:02:47 host sshd[29294]: Failed password for invalid user es from 115.146.122.211 port 60430 ssh2 Jan 21 19:02:47 host sshd[29272]: Connection closed by 115.146.122.211 port 60302 [preauth] Jan 21 19:02:47 host sshd[29280]: Failed password for invalid user root from 115.146.122.211 port 60378 ssh2 Jan 21 19:02:47 host sshd[29269]: Connection closed by 115.146.122.211 port 60336 [preauth] Jan 21 19:02:47 host sshd[29295]: Failed password for invalid user ansible from 115.146.122.211 port 60316 ssh2 Jan 21 19:02:47 host sshd[29276]: Connection closed by 115.146.122.211 port 60418 [preauth] Jan 21 19:02:47 host sshd[29286]: Failed password for invalid user root from 115.146.122.211 port 60376 ssh2 Jan 21 19:02:47 host sshd[29282]: Failed password for invalid user root from 115.146.122.211 port 60312 ssh2 Jan 21 19:02:47 host sshd[29288]: Failed password for invalid user root from 115.146.122.211 port 60390 ssh2 Jan 21 19:02:47 host sshd[29273]: Connection closed by 115.146.122.211 port 60394 [preauth] Jan 21 19:02:47 host sshd[29284]: Connection closed by 115.146.122.211 port 60386 [preauth] Jan 21 19:02:47 host sshd[29275]: Connection closed by 115.146.122.211 port 60298 [preauth] Jan 21 19:02:47 host sshd[29279]: Connection closed by 115.146.122.211 port 60356 [preauth] Jan 21 19:02:47 host sshd[29277]: Connection closed by 115.146.122.211 port 60344 [preauth] Jan 21 19:02:47 host sshd[29281]: Failed password for invalid user steam from 115.146.122.211 port 60320 ssh2 Jan 21 19:02:47 host sshd[29291]: Connection closed by 115.146.122.211 port 60406 [preauth] Jan 21 19:02:47 host sshd[29278]: Connection closed by 115.146.122.211 port 60306 [preauth] Jan 21 19:02:47 host sshd[29283]: Connection closed by 115.146.122.211 port 60416 [preauth] Jan 21 19:02:47 host sshd[29290]: Connection closed by 115.146.122.211 port 60348 [preauth] Jan 21 19:02:47 host sshd[29292]: Connection closed by 115.146.122.211 port 60398 [preauth] Jan 21 19:02:47 host sshd[29274]: Connection closed by 115.146.122.211 port 60362 [preauth] Jan 21 19:02:47 host sshd[29271]: Connection closed by 115.146.122.211 port 60324 [preauth] Jan 21 19:02:47 host sshd[29287]: Connection closed by 115.146.122.211 port 60290 [preauth] Jan 21 19:02:47 host sshd[29289]: Connection closed by 115.146.122.211 port 60402 [preauth] Jan 21 19:02:47 host sshd[29294]: Connection closed by 115.146.122.211 port 60430 [preauth] Jan 21 19:02:47 host sshd[29280]: Connection closed by 115.146.122.211 port 60378 [preauth] Jan 21 19:02:47 host sshd[29293]: Connection closed by 115.146.122.211 port 60434 [preauth] Jan 21 19:02:47 host sshd[29295]: Connection closed by 115.146.122.211 port 60316 [preauth] Jan 21 19:02:47 host sshd[29286]: Connection closed by 115.146.122.211 port 60376 [preauth] Jan 21 19:02:47 host sshd[29282]: Connection closed by 115.146.122.211 port 60312 [preauth] Jan 21 19:02:47 host sshd[29288]: Connection closed by 115.146.122.211 port 60390 [preauth] Jan 21 19:02:47 host sshd[29281]: Connection closed by 115.146.122.211 port 60320 [preauth] Jan 21 19:02:47 host sshd[29270]: Failed password for invalid user admin from 115.146.122.211 port 60328 ssh2 Jan 21 19:02:48 host sshd[29285]: Failed password for invalid user root from 115.146.122.211 port 60368 ssh2 Jan 21 19:02:48 host sshd[29270]: Connection closed by 115.146.122.211 port 60328 [preauth] Jan 21 19:02:48 host sshd[29285]: Connection closed by 115.146.122.211 port 60368 [preauth] Jan 21 19:06:09 host sshd[29739]: Did not receive identification string from 117.50.66.128 port 41828 Jan 21 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=ugotscom user-2=wwwrmswll user-3=keralaholi user-4=wwwresourcehunte user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=dartsimp user-9=a2zgroup user-10=wwwkaretakers user-11=cochintaxi user-12=mrsclean user-13=wwwnexidigital user-14=kottayamcalldriv user-15=phmetals user-16=gifterman user-17=palco123 user-18=wwwletsstalkfood user-19=straightcurve user-20=wwwevmhonda user-21=bonifacegroup user-22=pmcresources user-23=wwwtestugo user-24=shalinijames user-25=vfmassets user-26=woodpeck user-27=wwwkapin user-28=remysagr user-29=disposeat user-30=wwwkmaorg feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 19:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-pD8gV8T3DNx8Nq7G.~ Jan 21 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-pD8gV8T3DNx8Nq7G.~' Jan 21 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-pD8gV8T3DNx8Nq7G.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 19:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 19:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 19:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 19:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 19:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 19:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 19:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 19:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 19:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 19:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 19:22:49 host sshd[32039]: Invalid user admin from 1.34.76.241 port 48415 Jan 21 19:22:49 host sshd[32039]: input_userauth_request: invalid user admin [preauth] Jan 21 19:22:49 host sshd[32039]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:22:49 host sshd[32039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.76.241 Jan 21 19:22:51 host sshd[32039]: Failed password for invalid user admin from 1.34.76.241 port 48415 ssh2 Jan 21 19:22:52 host sshd[32039]: Failed password for invalid user admin from 1.34.76.241 port 48415 ssh2 Jan 21 19:22:52 host sshd[32039]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:22:54 host sshd[32039]: Failed password for invalid user admin from 1.34.76.241 port 48415 ssh2 Jan 21 19:22:54 host sshd[32039]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:22:56 host sshd[32039]: Failed password for invalid user admin from 1.34.76.241 port 48415 ssh2 Jan 21 19:22:57 host sshd[32039]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:22:59 host sshd[32039]: Failed password for invalid user admin from 1.34.76.241 port 48415 ssh2 Jan 21 19:22:59 host sshd[32039]: Connection reset by 1.34.76.241 port 48415 [preauth] Jan 21 19:22:59 host sshd[32039]: PAM 3 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.76.241 Jan 21 19:22:59 host sshd[32039]: PAM service(sshd) ignoring max retries; 4 > 3 Jan 21 19:33:24 host sshd[983]: User root from 165.22.190.158 not allowed because not listed in AllowUsers Jan 21 19:33:24 host sshd[983]: input_userauth_request: invalid user root [preauth] Jan 21 19:33:24 host unix_chkpwd[987]: password check failed for user (root) Jan 21 19:33:24 host sshd[983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.190.158 user=root Jan 21 19:33:24 host sshd[983]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 19:33:27 host sshd[983]: Failed password for invalid user root from 165.22.190.158 port 43200 ssh2 Jan 21 19:33:28 host sshd[983]: Connection closed by 165.22.190.158 port 43200 [preauth] Jan 21 19:41:03 host sshd[2171]: Invalid user bytenest_dev from 106.10.122.53 port 36390 Jan 21 19:41:03 host sshd[2171]: input_userauth_request: invalid user bytenest_dev [preauth] Jan 21 19:41:03 host sshd[2171]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:41:03 host sshd[2171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 21 19:41:05 host sshd[2171]: Failed password for invalid user bytenest_dev from 106.10.122.53 port 36390 ssh2 Jan 21 19:41:06 host sshd[2171]: Connection closed by 106.10.122.53 port 36390 [preauth] Jan 21 19:48:03 host sshd[3546]: User root from 122.117.80.89 not allowed because not listed in AllowUsers Jan 21 19:48:03 host sshd[3546]: input_userauth_request: invalid user root [preauth] Jan 21 19:48:04 host unix_chkpwd[3553]: password check failed for user (root) Jan 21 19:48:04 host sshd[3546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.117.80.89 user=root Jan 21 19:48:04 host sshd[3546]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 19:48:06 host sshd[3546]: Failed password for invalid user root from 122.117.80.89 port 48810 ssh2 Jan 21 19:48:07 host unix_chkpwd[3561]: password check failed for user (root) Jan 21 19:48:07 host sshd[3546]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 19:48:09 host sshd[3546]: Failed password for invalid user root from 122.117.80.89 port 48810 ssh2 Jan 21 19:48:10 host unix_chkpwd[3566]: password check failed for user (root) Jan 21 19:48:10 host sshd[3546]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 19:48:12 host sshd[3546]: Failed password for invalid user root from 122.117.80.89 port 48810 ssh2 Jan 21 19:48:13 host unix_chkpwd[3570]: password check failed for user (root) Jan 21 19:48:13 host sshd[3546]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 19:48:14 host sshd[3546]: Failed password for invalid user root from 122.117.80.89 port 48810 ssh2 Jan 21 19:49:46 host sshd[3897]: Connection reset by 59.126.108.104 port 51888 [preauth] Jan 21 19:49:59 host sshd[3926]: Invalid user Admin from 211.216.68.180 port 61078 Jan 21 19:49:59 host sshd[3926]: input_userauth_request: invalid user Admin [preauth] Jan 21 19:49:59 host sshd[3926]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:49:59 host sshd[3926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.216.68.180 Jan 21 19:50:01 host sshd[3926]: Failed password for invalid user Admin from 211.216.68.180 port 61078 ssh2 Jan 21 19:50:01 host sshd[3926]: Connection reset by 211.216.68.180 port 61078 [preauth] Jan 21 19:51:01 host sshd[4084]: Invalid user admin from 118.41.26.226 port 62970 Jan 21 19:51:01 host sshd[4084]: input_userauth_request: invalid user admin [preauth] Jan 21 19:51:01 host sshd[4084]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:51:01 host sshd[4084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.41.26.226 Jan 21 19:51:02 host sshd[4084]: Failed password for invalid user admin from 118.41.26.226 port 62970 ssh2 Jan 21 19:51:04 host sshd[4084]: Failed password for invalid user admin from 118.41.26.226 port 62970 ssh2 Jan 21 19:51:04 host sshd[4084]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:51:07 host sshd[4084]: Failed password for invalid user admin from 118.41.26.226 port 62970 ssh2 Jan 21 19:51:08 host sshd[4084]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:51:09 host sshd[4084]: Failed password for invalid user admin from 118.41.26.226 port 62970 ssh2 Jan 21 19:51:10 host sshd[4084]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:51:12 host sshd[4084]: Failed password for invalid user admin from 118.41.26.226 port 62970 ssh2 Jan 21 19:52:13 host sshd[4297]: Invalid user ray from 107.189.30.59 port 38608 Jan 21 19:52:13 host sshd[4297]: input_userauth_request: invalid user ray [preauth] Jan 21 19:52:13 host sshd[4297]: pam_unix(sshd:auth): check pass; user unknown Jan 21 19:52:13 host sshd[4297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 21 19:52:16 host sshd[4297]: Failed password for invalid user ray from 107.189.30.59 port 38608 ssh2 Jan 21 19:52:16 host sshd[4297]: Connection closed by 107.189.30.59 port 38608 [preauth] Jan 21 19:59:56 host sshd[5499]: User root from 59.127.88.52 not allowed because not listed in AllowUsers Jan 21 19:59:56 host sshd[5499]: input_userauth_request: invalid user root [preauth] Jan 21 19:59:57 host unix_chkpwd[5504]: password check failed for user (root) Jan 21 19:59:57 host sshd[5499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.88.52 user=root Jan 21 19:59:57 host sshd[5499]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 19:59:58 host sshd[5499]: Failed password for invalid user root from 59.127.88.52 port 52157 ssh2 Jan 21 19:59:59 host unix_chkpwd[5507]: password check failed for user (root) Jan 21 19:59:59 host sshd[5499]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 20:00:02 host sshd[5499]: Failed password for invalid user root from 59.127.88.52 port 52157 ssh2 Jan 21 20:00:02 host sshd[5499]: Connection reset by 59.127.88.52 port 52157 [preauth] Jan 21 20:00:02 host sshd[5499]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.127.88.52 user=root Jan 21 20:04:50 host sshd[6162]: User root from 183.103.215.209 not allowed because not listed in AllowUsers Jan 21 20:04:50 host sshd[6162]: input_userauth_request: invalid user root [preauth] Jan 21 20:04:50 host unix_chkpwd[6166]: password check failed for user (root) Jan 21 20:04:50 host sshd[6162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.103.215.209 user=root Jan 21 20:04:50 host sshd[6162]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 20:04:52 host sshd[6162]: Failed password for invalid user root from 183.103.215.209 port 60512 ssh2 Jan 21 20:04:52 host unix_chkpwd[6171]: password check failed for user (root) Jan 21 20:04:52 host sshd[6162]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 20:04:54 host sshd[6162]: Failed password for invalid user root from 183.103.215.209 port 60512 ssh2 Jan 21 20:05:25 host sshd[6245]: User ftp from 79.25.182.73 not allowed because not listed in AllowUsers Jan 21 20:05:25 host sshd[6245]: input_userauth_request: invalid user ftp [preauth] Jan 21 20:05:25 host unix_chkpwd[6251]: password check failed for user (ftp) Jan 21 20:05:25 host sshd[6245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.25.182.73 user=ftp Jan 21 20:05:25 host sshd[6245]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 21 20:05:27 host sshd[6245]: Failed password for invalid user ftp from 79.25.182.73 port 56346 ssh2 Jan 21 20:05:27 host unix_chkpwd[6256]: password check failed for user (ftp) Jan 21 20:05:27 host sshd[6245]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 21 20:05:29 host sshd[6245]: Failed password for invalid user ftp from 79.25.182.73 port 56346 ssh2 Jan 21 20:05:30 host unix_chkpwd[6283]: password check failed for user (ftp) Jan 21 20:05:30 host sshd[6245]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 21 20:05:32 host sshd[6245]: Failed password for invalid user ftp from 79.25.182.73 port 56346 ssh2 Jan 21 20:05:32 host sshd[6245]: Failed password for invalid user ftp from 79.25.182.73 port 56346 ssh2 Jan 21 20:05:33 host unix_chkpwd[6287]: password check failed for user (ftp) Jan 21 20:05:33 host sshd[6245]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 21 20:05:35 host sshd[6245]: Failed password for invalid user ftp from 79.25.182.73 port 56346 ssh2 Jan 21 20:06:05 host sshd[6487]: Invalid user ubnt from 5.181.80.142 port 54174 Jan 21 20:06:05 host sshd[6487]: input_userauth_request: invalid user ubnt [preauth] Jan 21 20:06:05 host sshd[6487]: pam_unix(sshd:auth): check pass; user unknown Jan 21 20:06:05 host sshd[6487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.181.80.142 Jan 21 20:06:07 host sshd[6487]: Failed password for invalid user ubnt from 5.181.80.142 port 54174 ssh2 Jan 21 20:06:07 host sshd[6487]: Received disconnect from 5.181.80.142 port 54174:11: Bye Bye [preauth] Jan 21 20:06:07 host sshd[6487]: Disconnected from 5.181.80.142 port 54174 [preauth] Jan 21 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwkapin user-2=woodpeck user-3=wwwkmaorg user-4=disposeat user-5=remysagr user-6=pmcresources user-7=shalinijames user-8=wwwtestugo user-9=vfmassets user-10=wwwletsstalkfood user-11=straightcurve user-12=wwwevmhonda user-13=bonifacegroup user-14=wwwnexidigital user-15=mrsclean user-16=kottayamcalldriv user-17=phmetals user-18=palco123 user-19=gifterman user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=a2zgroup user-24=dartsimp user-25=wwwpmcresource user-26=ugotscom user-27=wwwresourcehunte user-28=keralaholi user-29=wwwrmswll user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 20:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5meeGPTc7wHtR7DG.~ Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5meeGPTc7wHtR7DG.~' Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-5meeGPTc7wHtR7DG.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 20:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 20:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 20:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 20:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 20:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 20:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 20:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 20:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 20:22:23 host sshd[9045]: Invalid user ho from 194.110.203.109 port 53448 Jan 21 20:22:23 host sshd[9045]: input_userauth_request: invalid user ho [preauth] Jan 21 20:22:23 host sshd[9045]: pam_unix(sshd:auth): check pass; user unknown Jan 21 20:22:23 host sshd[9045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 20:22:25 host sshd[9045]: Failed password for invalid user ho from 194.110.203.109 port 53448 ssh2 Jan 21 20:22:28 host sshd[9045]: pam_unix(sshd:auth): check pass; user unknown Jan 21 20:22:30 host sshd[9045]: Failed password for invalid user ho from 194.110.203.109 port 53448 ssh2 Jan 21 20:22:33 host sshd[9045]: pam_unix(sshd:auth): check pass; user unknown Jan 21 20:22:35 host sshd[9045]: Failed password for invalid user ho from 194.110.203.109 port 53448 ssh2 Jan 21 20:22:38 host sshd[9045]: Connection closed by 194.110.203.109 port 53448 [preauth] Jan 21 20:22:38 host sshd[9045]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 20:31:27 host sshd[10341]: Connection reset by 210.242.252.24 port 54102 [preauth] Jan 21 20:37:35 host sshd[11169]: User root from 59.6.245.86 not allowed because not listed in AllowUsers Jan 21 20:37:35 host sshd[11169]: input_userauth_request: invalid user root [preauth] Jan 21 20:37:35 host unix_chkpwd[11174]: password check failed for user (root) Jan 21 20:37:35 host sshd[11169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.6.245.86 user=root Jan 21 20:37:35 host sshd[11169]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 20:37:37 host sshd[11169]: Failed password for invalid user root from 59.6.245.86 port 63731 ssh2 Jan 21 20:37:38 host unix_chkpwd[11178]: password check failed for user (root) Jan 21 20:37:38 host sshd[11169]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 20:37:40 host sshd[11169]: Failed password for invalid user root from 59.6.245.86 port 63731 ssh2 Jan 21 20:37:41 host unix_chkpwd[11183]: password check failed for user (root) Jan 21 20:37:41 host sshd[11169]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 20:37:43 host sshd[11169]: Failed password for invalid user root from 59.6.245.86 port 63731 ssh2 Jan 21 20:55:34 host sshd[13653]: Invalid user usr from 122.116.194.28 port 48638 Jan 21 20:55:34 host sshd[13653]: input_userauth_request: invalid user usr [preauth] Jan 21 20:55:34 host sshd[13653]: pam_unix(sshd:auth): check pass; user unknown Jan 21 20:55:34 host sshd[13653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.194.28 Jan 21 20:55:36 host sshd[13653]: Failed password for invalid user usr from 122.116.194.28 port 48638 ssh2 Jan 21 20:55:36 host sshd[13653]: pam_unix(sshd:auth): check pass; user unknown Jan 21 20:55:39 host sshd[13653]: Failed password for invalid user usr from 122.116.194.28 port 48638 ssh2 Jan 21 20:55:39 host sshd[13653]: pam_unix(sshd:auth): check pass; user unknown Jan 21 20:55:41 host sshd[13653]: Failed password for invalid user usr from 122.116.194.28 port 48638 ssh2 Jan 21 20:55:42 host sshd[13653]: pam_unix(sshd:auth): check pass; user unknown Jan 21 20:55:44 host sshd[13653]: Failed password for invalid user usr from 122.116.194.28 port 48638 ssh2 Jan 21 20:55:45 host sshd[13653]: pam_unix(sshd:auth): check pass; user unknown Jan 21 20:55:46 host sshd[13653]: Failed password for invalid user usr from 122.116.194.28 port 48638 ssh2 Jan 21 20:55:47 host sshd[13653]: pam_unix(sshd:auth): check pass; user unknown Jan 21 20:55:49 host sshd[13653]: Failed password for invalid user usr from 122.116.194.28 port 48638 ssh2 Jan 21 20:55:49 host sshd[13653]: error: maximum authentication attempts exceeded for invalid user usr from 122.116.194.28 port 48638 ssh2 [preauth] Jan 21 20:55:49 host sshd[13653]: Disconnecting: Too many authentication failures [preauth] Jan 21 20:55:49 host sshd[13653]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.194.28 Jan 21 20:55:49 host sshd[13653]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 21 20:57:07 host sshd[13857]: Invalid user wangbuyiyi from 106.10.122.53 port 59088 Jan 21 20:57:07 host sshd[13857]: input_userauth_request: invalid user wangbuyiyi [preauth] Jan 21 20:57:07 host sshd[13857]: pam_unix(sshd:auth): check pass; user unknown Jan 21 20:57:07 host sshd[13857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 21 20:57:09 host sshd[13857]: Failed password for invalid user wangbuyiyi from 106.10.122.53 port 59088 ssh2 Jan 21 20:57:10 host sshd[13857]: Connection closed by 106.10.122.53 port 59088 [preauth] Jan 21 20:57:57 host sshd[13940]: Connection closed by 34.224.33.91 port 42998 [preauth] Jan 21 21:10:26 host sshd[15553]: Invalid user test from 31.41.244.124 port 30529 Jan 21 21:10:26 host sshd[15553]: input_userauth_request: invalid user test [preauth] Jan 21 21:10:26 host sshd[15553]: pam_unix(sshd:auth): check pass; user unknown Jan 21 21:10:26 host sshd[15553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 21 21:10:27 host sshd[15553]: Failed password for invalid user test from 31.41.244.124 port 30529 ssh2 Jan 21 21:10:28 host sshd[15553]: Received disconnect from 31.41.244.124 port 30529:11: Client disconnecting normally [preauth] Jan 21 21:10:28 host sshd[15553]: Disconnected from 31.41.244.124 port 30529 [preauth] Jan 21 21:13:24 host sshd[15997]: Invalid user cer1 from 102.68.141.170 port 57992 Jan 21 21:13:24 host sshd[15997]: input_userauth_request: invalid user cer1 [preauth] Jan 21 21:13:25 host sshd[15997]: pam_unix(sshd:auth): check pass; user unknown Jan 21 21:13:25 host sshd[15997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.68.141.170 Jan 21 21:13:26 host sshd[15997]: Failed password for invalid user cer1 from 102.68.141.170 port 57992 ssh2 Jan 21 21:13:27 host sshd[15997]: Connection closed by 102.68.141.170 port 57992 [preauth] Jan 21 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 21:21:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 21:21:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=a2zgroup user-2=dartsimp user-3=laundryboniface user-4=wwwkaretakers user-5=cochintaxi user-6=travelboniface user-7=keralaholi user-8=wwwresourcehunte user-9=wwwrmswll user-10=ugotscom user-11=wwwpmcresource user-12=vfmassets user-13=shalinijames user-14=wwwtestugo user-15=pmcresources user-16=disposeat user-17=wwwkmaorg user-18=remysagr user-19=woodpeck user-20=wwwkapin user-21=palco123 user-22=gifterman user-23=phmetals user-24=kottayamcalldriv user-25=mrsclean user-26=wwwnexidigital user-27=bonifacegroup user-28=wwwevmhonda user-29=wwwletsstalkfood user-30=straightcurve feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 21:21:22 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 21:21:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 21:21:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-NqCQLEdg4DgyhtQG.~ Jan 21 21:21:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-NqCQLEdg4DgyhtQG.~' Jan 21 21:21:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-NqCQLEdg4DgyhtQG.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 21:21:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 21:21:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 21:21:23 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 21:21:23 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 21:21:23 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 21:21:23 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:23 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 21:21:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 21:21:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 21:21:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:21:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 21:21:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 21:21:25 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 21:28:26 host sshd[18136]: User root from 165.22.190.158 not allowed because not listed in AllowUsers Jan 21 21:28:26 host sshd[18136]: input_userauth_request: invalid user root [preauth] Jan 21 21:28:26 host unix_chkpwd[18140]: password check failed for user (root) Jan 21 21:28:26 host sshd[18136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.190.158 user=root Jan 21 21:28:26 host sshd[18136]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 21:28:28 host sshd[18136]: Failed password for invalid user root from 165.22.190.158 port 50376 ssh2 Jan 21 21:28:29 host sshd[18136]: Connection closed by 165.22.190.158 port 50376 [preauth] Jan 21 21:29:10 host sshd[18230]: Did not receive identification string from 101.206.243.239 port 45706 Jan 21 21:29:12 host sshd[18231]: User root from 101.206.243.239 not allowed because not listed in AllowUsers Jan 21 21:29:12 host sshd[18231]: input_userauth_request: invalid user root [preauth] Jan 21 21:29:12 host sshd[18234]: User root from 101.206.243.239 not allowed because not listed in AllowUsers Jan 21 21:29:12 host sshd[18234]: input_userauth_request: invalid user root [preauth] Jan 21 21:29:12 host sshd[18236]: User root from 101.206.243.239 not allowed because not listed in AllowUsers Jan 21 21:29:12 host sshd[18236]: input_userauth_request: invalid user root [preauth] Jan 21 21:29:12 host sshd[18232]: Invalid user admin from 101.206.243.239 port 45888 Jan 21 21:29:12 host sshd[18232]: input_userauth_request: invalid user admin [preauth] Jan 21 21:29:12 host sshd[18237]: User root from 101.206.243.239 not allowed because not listed in AllowUsers Jan 21 21:29:12 host sshd[18237]: input_userauth_request: invalid user root [preauth] Jan 21 21:29:12 host sshd[18241]: Invalid user pi from 101.206.243.239 port 45912 Jan 21 21:29:12 host sshd[18241]: input_userauth_request: invalid user pi [preauth] Jan 21 21:29:12 host sshd[18238]: User root from 101.206.243.239 not allowed because not listed in AllowUsers Jan 21 21:29:12 host sshd[18238]: input_userauth_request: invalid user root [preauth] Jan 21 21:29:12 host sshd[18245]: User root from 101.206.243.239 not allowed because not listed in AllowUsers Jan 21 21:29:12 host sshd[18245]: input_userauth_request: invalid user root [preauth] Jan 21 21:29:12 host sshd[18244]: User root from 101.206.243.239 not allowed because not listed in AllowUsers Jan 21 21:29:12 host sshd[18244]: input_userauth_request: invalid user root [preauth] Jan 21 21:29:12 host unix_chkpwd[18261]: password check failed for user (root) Jan 21 21:29:12 host sshd[18231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.206.243.239 user=root Jan 21 21:29:12 host sshd[18231]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 21:29:12 host unix_chkpwd[18263]: password check failed for user (root) Jan 21 21:29:12 host unix_chkpwd[18262]: password check failed for user (root) Jan 21 21:29:12 host sshd[18236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.206.243.239 user=root Jan 21 21:29:12 host sshd[18236]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 21:29:12 host sshd[18234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.206.243.239 user=root Jan 21 21:29:12 host sshd[18234]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 21:29:12 host sshd[18241]: pam_unix(sshd:auth): check pass; user unknown Jan 21 21:29:12 host sshd[18241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.206.243.239 Jan 21 21:29:12 host unix_chkpwd[18268]: password check failed for user (root) Jan 21 21:29:12 host sshd[18238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.206.243.239 user=root Jan 21 21:29:12 host sshd[18238]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 21:29:12 host unix_chkpwd[18269]: password check failed for user (root) Jan 21 21:29:12 host sshd[18244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.206.243.239 user=root Jan 21 21:29:12 host sshd[18244]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 21:29:12 host unix_chkpwd[18270]: password check failed for user (root) Jan 21 21:29:12 host sshd[18245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.206.243.239 user=root Jan 21 21:29:12 host sshd[18245]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 21:29:13 host sshd[18254]: Invalid user user from 101.206.243.239 port 45786 Jan 21 21:29:13 host sshd[18254]: input_userauth_request: invalid user user [preauth] Jan 21 21:29:13 host sshd[18239]: Invalid user admin from 101.206.243.239 port 45994 Jan 21 21:29:13 host sshd[18239]: input_userauth_request: invalid user admin [preauth] Jan 21 21:29:13 host sshd[18256]: Invalid user guest from 101.206.243.239 port 45988 Jan 21 21:29:13 host sshd[18256]: input_userauth_request: invalid user guest [preauth] Jan 21 21:29:13 host sshd[18257]: Invalid user admin from 101.206.243.239 port 45744 Jan 21 21:29:13 host sshd[18257]: input_userauth_request: invalid user admin [preauth] Jan 21 21:29:13 host sshd[18232]: pam_unix(sshd:auth): check pass; user unknown Jan 21 21:29:13 host sshd[18232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.206.243.239 Jan 21 21:29:13 host unix_chkpwd[18292]: password check failed for user (root) Jan 21 21:29:13 host sshd[18237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.206.243.239 user=root Jan 21 21:29:13 host sshd[18237]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 21:29:14 host sshd[18231]: Failed password for invalid user root from 101.206.243.239 port 46076 ssh2 Jan 21 21:29:14 host sshd[18236]: Failed password for invalid user root from 101.206.243.239 port 45958 ssh2 Jan 21 21:29:14 host sshd[18234]: Failed password for invalid user root from 101.206.243.239 port 45720 ssh2 Jan 21 21:29:14 host sshd[18241]: Failed password for invalid user pi from 101.206.243.239 port 45912 ssh2 Jan 21 21:29:15 host sshd[18238]: Failed password for invalid user root from 101.206.243.239 port 45820 ssh2 Jan 21 21:29:15 host sshd[18244]: Failed password for invalid user root from 101.206.243.239 port 45832 ssh2 Jan 21 21:29:15 host sshd[18245]: Failed password for invalid user root from 101.206.243.239 port 45894 ssh2 Jan 21 21:29:15 host sshd[18232]: Failed password for invalid user admin from 101.206.243.239 port 45888 ssh2 Jan 21 21:29:15 host sshd[18237]: Failed password for invalid user root from 101.206.243.239 port 46042 ssh2 Jan 21 21:32:46 host sshd[18782]: invalid public DH value: >= p-1 [preauth] Jan 21 21:32:46 host sshd[18782]: ssh_dispatch_run_fatal: Connection from 69.176.58.253 port 58407: incomplete message [preauth] Jan 21 21:33:19 host sshd[18838]: Did not receive identification string from 69.176.58.253 port 58400 Jan 21 21:36:11 host sshd[19266]: Invalid user support from 222.114.116.228 port 60214 Jan 21 21:36:11 host sshd[19266]: input_userauth_request: invalid user support [preauth] Jan 21 21:36:11 host sshd[19266]: pam_unix(sshd:auth): check pass; user unknown Jan 21 21:36:11 host sshd[19266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.114.116.228 Jan 21 21:36:13 host sshd[19266]: Failed password for invalid user support from 222.114.116.228 port 60214 ssh2 Jan 21 21:36:13 host sshd[19266]: pam_unix(sshd:auth): check pass; user unknown Jan 21 21:36:15 host sshd[19266]: Failed password for invalid user support from 222.114.116.228 port 60214 ssh2 Jan 21 21:36:16 host sshd[19266]: pam_unix(sshd:auth): check pass; user unknown Jan 21 21:36:18 host sshd[19266]: Failed password for invalid user support from 222.114.116.228 port 60214 ssh2 Jan 21 21:36:18 host sshd[19266]: Failed password for invalid user support from 222.114.116.228 port 60214 ssh2 Jan 21 21:36:19 host sshd[19266]: Connection reset by 222.114.116.228 port 60214 [preauth] Jan 21 21:36:19 host sshd[19266]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.114.116.228 Jan 21 21:59:12 host sshd[22181]: User root from 59.92.106.29 not allowed because not listed in AllowUsers Jan 21 21:59:12 host sshd[22181]: input_userauth_request: invalid user root [preauth] Jan 21 21:59:12 host unix_chkpwd[22184]: password check failed for user (root) Jan 21 21:59:12 host sshd[22181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.92.106.29 user=root Jan 21 21:59:12 host sshd[22181]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 21:59:14 host sshd[22181]: Failed password for invalid user root from 59.92.106.29 port 48220 ssh2 Jan 21 21:59:14 host unix_chkpwd[22186]: password check failed for user (root) Jan 21 21:59:14 host sshd[22181]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 21:59:16 host sshd[22181]: Failed password for invalid user root from 59.92.106.29 port 48220 ssh2 Jan 21 21:59:16 host unix_chkpwd[22190]: password check failed for user (root) Jan 21 21:59:16 host sshd[22181]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 21:59:18 host sshd[22181]: Failed password for invalid user root from 59.92.106.29 port 48220 ssh2 Jan 21 21:59:18 host unix_chkpwd[22199]: password check failed for user (root) Jan 21 21:59:18 host sshd[22181]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 21:59:20 host sshd[22181]: Failed password for invalid user root from 59.92.106.29 port 48220 ssh2 Jan 21 22:06:33 host sshd[23455]: Invalid user hp from 194.110.203.109 port 47848 Jan 21 22:06:33 host sshd[23455]: input_userauth_request: invalid user hp [preauth] Jan 21 22:06:33 host sshd[23455]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:06:33 host sshd[23455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 22:06:35 host sshd[23455]: Failed password for invalid user hp from 194.110.203.109 port 47848 ssh2 Jan 21 22:06:38 host sshd[23455]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:06:41 host sshd[23455]: Failed password for invalid user hp from 194.110.203.109 port 47848 ssh2 Jan 21 22:06:44 host sshd[23455]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:06:45 host sshd[23455]: Failed password for invalid user hp from 194.110.203.109 port 47848 ssh2 Jan 21 22:06:49 host sshd[23455]: Connection closed by 194.110.203.109 port 47848 [preauth] Jan 21 22:06:49 host sshd[23455]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 22:13:05 host sshd[24543]: Invalid user polycom from 106.10.122.53 port 58126 Jan 21 22:13:05 host sshd[24543]: input_userauth_request: invalid user polycom [preauth] Jan 21 22:13:05 host sshd[24543]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:13:05 host sshd[24543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 21 22:13:07 host sshd[24543]: Failed password for invalid user polycom from 106.10.122.53 port 58126 ssh2 Jan 21 22:13:07 host sshd[24543]: Connection closed by 106.10.122.53 port 58126 [preauth] Jan 21 22:17:29 host sshd[25191]: Invalid user pi from 14.7.132.246 port 62574 Jan 21 22:17:29 host sshd[25191]: input_userauth_request: invalid user pi [preauth] Jan 21 22:17:29 host sshd[25191]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:17:29 host sshd[25191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.7.132.246 Jan 21 22:17:31 host sshd[25191]: Failed password for invalid user pi from 14.7.132.246 port 62574 ssh2 Jan 21 22:17:32 host sshd[25191]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:17:34 host sshd[25191]: Failed password for invalid user pi from 14.7.132.246 port 62574 ssh2 Jan 21 22:17:34 host sshd[25191]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:17:36 host sshd[25191]: Failed password for invalid user pi from 14.7.132.246 port 62574 ssh2 Jan 21 22:17:37 host sshd[25191]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:17:39 host sshd[25191]: Failed password for invalid user pi from 14.7.132.246 port 62574 ssh2 Jan 21 22:17:39 host sshd[25191]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:17:41 host sshd[25191]: Failed password for invalid user pi from 14.7.132.246 port 62574 ssh2 Jan 21 22:17:44 host sshd[25191]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:17:45 host sshd[25191]: Failed password for invalid user pi from 14.7.132.246 port 62574 ssh2 Jan 21 22:17:45 host sshd[25191]: error: maximum authentication attempts exceeded for invalid user pi from 14.7.132.246 port 62574 ssh2 [preauth] Jan 21 22:17:45 host sshd[25191]: Disconnecting: Too many authentication failures [preauth] Jan 21 22:17:45 host sshd[25191]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.7.132.246 Jan 21 22:17:45 host sshd[25191]: PAM service(sshd) ignoring max retries; 6 > 3 Jan 21 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 22:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 22:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=laundryboniface user-2=dartsimp user-3=a2zgroup user-4=wwwkaretakers user-5=cochintaxi user-6=ugotscom user-7=wwwrmswll user-8=wwwresourcehunte user-9=keralaholi user-10=travelboniface user-11=wwwpmcresource user-12=pmcresources user-13=wwwtestugo user-14=shalinijames user-15=vfmassets user-16=woodpeck user-17=wwwkapin user-18=disposeat user-19=wwwkmaorg user-20=remysagr user-21=mrsclean user-22=wwwnexidigital user-23=kottayamcalldriv user-24=phmetals user-25=gifterman user-26=palco123 user-27=wwwletsstalkfood user-28=straightcurve user-29=wwwevmhonda user-30=bonifacegroup feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 22:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OykIuDTx7PiTAoM4.~ Jan 21 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OykIuDTx7PiTAoM4.~' Jan 21 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-OykIuDTx7PiTAoM4.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 22:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 22:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 22:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 22:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 22:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 22:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 22:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 22:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 22:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 22:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 22:24:20 host sshd[26387]: User root from 201.33.192.17 not allowed because not listed in AllowUsers Jan 21 22:24:20 host sshd[26387]: input_userauth_request: invalid user root [preauth] Jan 21 22:24:20 host unix_chkpwd[26394]: password check failed for user (root) Jan 21 22:24:20 host sshd[26387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.33.192.17 user=root Jan 21 22:24:20 host sshd[26387]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 22:24:22 host sshd[26387]: Failed password for invalid user root from 201.33.192.17 port 45346 ssh2 Jan 21 22:24:22 host sshd[26387]: Received disconnect from 201.33.192.17 port 45346:11: Bye Bye [preauth] Jan 21 22:24:22 host sshd[26387]: Disconnected from 201.33.192.17 port 45346 [preauth] Jan 21 22:24:25 host sshd[26398]: User root from 201.33.192.17 not allowed because not listed in AllowUsers Jan 21 22:24:25 host sshd[26398]: input_userauth_request: invalid user root [preauth] Jan 21 22:24:25 host unix_chkpwd[26403]: password check failed for user (root) Jan 21 22:24:25 host sshd[26398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.33.192.17 user=root Jan 21 22:24:25 host sshd[26398]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 22:24:27 host sshd[26398]: Failed password for invalid user root from 201.33.192.17 port 45564 ssh2 Jan 21 22:24:27 host sshd[26398]: Received disconnect from 201.33.192.17 port 45564:11: Bye Bye [preauth] Jan 21 22:24:27 host sshd[26398]: Disconnected from 201.33.192.17 port 45564 [preauth] Jan 21 22:24:29 host sshd[26408]: Invalid user ubnt from 201.33.192.17 port 45776 Jan 21 22:24:29 host sshd[26408]: input_userauth_request: invalid user ubnt [preauth] Jan 21 22:24:29 host sshd[26408]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:24:29 host sshd[26408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.33.192.17 Jan 21 22:24:31 host sshd[26408]: Failed password for invalid user ubnt from 201.33.192.17 port 45776 ssh2 Jan 21 22:26:08 host sshd[26796]: invalid public DH value: >= p-1 [preauth] Jan 21 22:26:08 host sshd[26796]: ssh_dispatch_run_fatal: Connection from 115.37.136.219 port 60566: incomplete message [preauth] Jan 21 22:40:29 host sshd[28664]: Invalid user ubnt from 59.24.233.251 port 49370 Jan 21 22:40:29 host sshd[28664]: input_userauth_request: invalid user ubnt [preauth] Jan 21 22:40:29 host sshd[28664]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:40:29 host sshd[28664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.24.233.251 Jan 21 22:40:32 host sshd[28664]: Failed password for invalid user ubnt from 59.24.233.251 port 49370 ssh2 Jan 21 22:40:32 host sshd[28664]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:40:34 host sshd[28664]: Failed password for invalid user ubnt from 59.24.233.251 port 49370 ssh2 Jan 21 22:40:36 host sshd[28664]: Failed password for invalid user ubnt from 59.24.233.251 port 49370 ssh2 Jan 21 22:40:36 host sshd[28664]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:40:38 host sshd[28664]: Failed password for invalid user ubnt from 59.24.233.251 port 49370 ssh2 Jan 21 22:40:39 host sshd[28664]: Connection reset by 59.24.233.251 port 49370 [preauth] Jan 21 22:40:39 host sshd[28664]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.24.233.251 Jan 21 22:48:27 host sshd[29634]: Invalid user admin from 183.100.69.205 port 40834 Jan 21 22:48:27 host sshd[29634]: input_userauth_request: invalid user admin [preauth] Jan 21 22:48:27 host sshd[29634]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:48:27 host sshd[29634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.100.69.205 Jan 21 22:48:29 host sshd[29634]: Failed password for invalid user admin from 183.100.69.205 port 40834 ssh2 Jan 21 22:48:29 host sshd[29634]: Connection reset by 183.100.69.205 port 40834 [preauth] Jan 21 22:48:56 host sshd[29687]: Invalid user ts from 209.141.55.27 port 34310 Jan 21 22:48:56 host sshd[29687]: input_userauth_request: invalid user ts [preauth] Jan 21 22:48:56 host sshd[29687]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:48:56 host sshd[29687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.55.27 Jan 21 22:48:57 host sshd[29687]: Failed password for invalid user ts from 209.141.55.27 port 34310 ssh2 Jan 21 22:48:57 host sshd[29687]: Received disconnect from 209.141.55.27 port 34310:11: Normal Shutdown, Thank you for playing [preauth] Jan 21 22:48:57 host sshd[29687]: Disconnected from 209.141.55.27 port 34310 [preauth] Jan 21 22:49:24 host sshd[29736]: invalid public DH value: >= p-1 [preauth] Jan 21 22:49:24 host sshd[29736]: ssh_dispatch_run_fatal: Connection from 122.116.44.235 port 54595: incomplete message [preauth] Jan 21 22:51:45 host sshd[30135]: Did not receive identification string from 115.241.167.73 port 57372 Jan 21 22:51:46 host sshd[30137]: Invalid user teamspeak from 115.241.167.73 port 57440 Jan 21 22:51:46 host sshd[30137]: input_userauth_request: invalid user teamspeak [preauth] Jan 21 22:51:46 host sshd[30136]: User root from 115.241.167.73 not allowed because not listed in AllowUsers Jan 21 22:51:46 host sshd[30136]: input_userauth_request: invalid user root [preauth] Jan 21 22:51:46 host sshd[30139]: Invalid user admin from 115.241.167.73 port 57636 Jan 21 22:51:46 host sshd[30139]: input_userauth_request: invalid user admin [preauth] Jan 21 22:51:46 host sshd[30147]: Invalid user ubnt from 115.241.167.73 port 57612 Jan 21 22:51:46 host sshd[30147]: input_userauth_request: invalid user ubnt [preauth] Jan 21 22:51:46 host sshd[30142]: User root from 115.241.167.73 not allowed because not listed in AllowUsers Jan 21 22:51:46 host sshd[30142]: input_userauth_request: invalid user root [preauth] Jan 21 22:51:46 host sshd[30144]: Invalid user admin from 115.241.167.73 port 57592 Jan 21 22:51:46 host sshd[30144]: input_userauth_request: invalid user admin [preauth] Jan 21 22:51:46 host sshd[30138]: User root from 115.241.167.73 not allowed because not listed in AllowUsers Jan 21 22:51:46 host sshd[30138]: input_userauth_request: invalid user root [preauth] Jan 21 22:51:46 host sshd[30143]: Invalid user ftpuser from 115.241.167.73 port 57428 Jan 21 22:51:46 host sshd[30143]: input_userauth_request: invalid user ftpuser [preauth] Jan 21 22:51:46 host sshd[30140]: Invalid user devops from 115.241.167.73 port 57530 Jan 21 22:51:46 host sshd[30140]: input_userauth_request: invalid user devops [preauth] Jan 21 22:51:46 host sshd[30148]: Invalid user devops from 115.241.167.73 port 57616 Jan 21 22:51:46 host sshd[30148]: input_userauth_request: invalid user devops [preauth] Jan 21 22:51:46 host sshd[30162]: User root from 115.241.167.73 not allowed because not listed in AllowUsers Jan 21 22:51:46 host sshd[30162]: input_userauth_request: invalid user root [preauth] Jan 21 22:51:46 host sshd[30145]: Invalid user halo from 115.241.167.73 port 57532 Jan 21 22:51:46 host sshd[30145]: input_userauth_request: invalid user halo [preauth] Jan 21 22:51:46 host sshd[30156]: Invalid user ftpuser from 115.241.167.73 port 57674 Jan 21 22:51:46 host sshd[30156]: input_userauth_request: invalid user ftpuser [preauth] Jan 21 22:51:46 host sshd[30146]: User root from 115.241.167.73 not allowed because not listed in AllowUsers Jan 21 22:51:46 host sshd[30146]: input_userauth_request: invalid user root [preauth] Jan 21 22:51:46 host sshd[30151]: Invalid user steam from 115.241.167.73 port 57478 Jan 21 22:51:46 host sshd[30150]: Invalid user oracle from 115.241.167.73 port 57578 Jan 21 22:51:46 host sshd[30151]: input_userauth_request: invalid user steam [preauth] Jan 21 22:51:46 host sshd[30150]: input_userauth_request: invalid user oracle [preauth] Jan 21 22:51:46 host sshd[30152]: Invalid user admin from 115.241.167.73 port 57442 Jan 21 22:51:46 host sshd[30152]: input_userauth_request: invalid user admin [preauth] Jan 21 22:51:46 host sshd[30161]: Invalid user admin from 115.241.167.73 port 57650 Jan 21 22:51:46 host sshd[30161]: input_userauth_request: invalid user admin [preauth] Jan 21 22:51:46 host sshd[30141]: Invalid user pi from 115.241.167.73 port 57566 Jan 21 22:51:46 host sshd[30158]: User root from 115.241.167.73 not allowed because not listed in AllowUsers Jan 21 22:51:46 host sshd[30141]: input_userauth_request: invalid user pi [preauth] Jan 21 22:51:46 host sshd[30158]: input_userauth_request: invalid user root [preauth] Jan 21 22:51:46 host sshd[30154]: User root from 115.241.167.73 not allowed because not listed in AllowUsers Jan 21 22:51:46 host sshd[30154]: input_userauth_request: invalid user root [preauth] Jan 21 22:51:46 host sshd[30153]: Invalid user pi from 115.241.167.73 port 57464 Jan 21 22:51:46 host sshd[30137]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30153]: input_userauth_request: invalid user pi [preauth] Jan 21 22:51:46 host sshd[30137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host sshd[30149]: Invalid user vagrant from 115.241.167.73 port 57460 Jan 21 22:51:46 host sshd[30139]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host sshd[30149]: input_userauth_request: invalid user vagrant [preauth] Jan 21 22:51:46 host sshd[30165]: Invalid user ansadmin from 115.241.167.73 port 57570 Jan 21 22:51:46 host sshd[30157]: Invalid user vagrant from 115.241.167.73 port 57554 Jan 21 22:51:46 host sshd[30165]: input_userauth_request: invalid user ansadmin [preauth] Jan 21 22:51:46 host sshd[30157]: input_userauth_request: invalid user vagrant [preauth] Jan 21 22:51:46 host sshd[30155]: User root from 115.241.167.73 not allowed because not listed in AllowUsers Jan 21 22:51:46 host sshd[30159]: Invalid user es from 115.241.167.73 port 57422 Jan 21 22:51:46 host sshd[30155]: input_userauth_request: invalid user root [preauth] Jan 21 22:51:46 host sshd[30147]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host sshd[30159]: input_userauth_request: invalid user es [preauth] Jan 21 22:51:46 host unix_chkpwd[30193]: password check failed for user (root) Jan 21 22:51:46 host sshd[30144]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host sshd[30136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 user=root Jan 21 22:51:46 host sshd[30136]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 22:51:46 host sshd[30166]: Invalid user pi from 115.241.167.73 port 57550 Jan 21 22:51:46 host sshd[30166]: input_userauth_request: invalid user pi [preauth] Jan 21 22:51:46 host sshd[30143]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host sshd[30140]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host unix_chkpwd[30194]: password check failed for user (root) Jan 21 22:51:46 host sshd[30142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 user=root Jan 21 22:51:46 host sshd[30142]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 22:51:46 host sshd[30148]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host unix_chkpwd[30195]: password check failed for user (root) Jan 21 22:51:46 host sshd[30138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 user=root Jan 21 22:51:46 host sshd[30138]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 22:51:46 host sshd[30145]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30156]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host sshd[30156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host sshd[30150]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host sshd[30151]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host sshd[30152]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host sshd[30161]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host sshd[30141]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host unix_chkpwd[30196]: password check failed for user (root) Jan 21 22:51:46 host sshd[30162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 user=root Jan 21 22:51:46 host sshd[30162]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 22:51:46 host unix_chkpwd[30197]: password check failed for user (root) Jan 21 22:51:46 host sshd[30146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 user=root Jan 21 22:51:46 host sshd[30146]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 22:51:46 host sshd[30153]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host sshd[30149]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host unix_chkpwd[30198]: password check failed for user (root) Jan 21 22:51:46 host sshd[30158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 user=root Jan 21 22:51:46 host sshd[30158]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 22:51:46 host unix_chkpwd[30199]: password check failed for user (root) Jan 21 22:51:46 host sshd[30165]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host sshd[30157]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host sshd[30154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 user=root Jan 21 22:51:46 host sshd[30154]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 22:51:46 host sshd[30159]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host unix_chkpwd[30200]: password check failed for user (root) Jan 21 22:51:46 host sshd[30155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 user=root Jan 21 22:51:46 host sshd[30155]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 22:51:46 host sshd[30166]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host sshd[30201]: Invalid user admin from 115.241.167.73 port 57600 Jan 21 22:51:46 host sshd[30201]: input_userauth_request: invalid user admin [preauth] Jan 21 22:51:46 host sshd[30202]: User root from 115.241.167.73 not allowed because not listed in AllowUsers Jan 21 22:51:46 host sshd[30202]: input_userauth_request: invalid user root [preauth] Jan 21 22:51:46 host sshd[30203]: User root from 115.241.167.73 not allowed because not listed in AllowUsers Jan 21 22:51:46 host sshd[30203]: input_userauth_request: invalid user root [preauth] Jan 21 22:51:46 host sshd[30201]: pam_unix(sshd:auth): check pass; user unknown Jan 21 22:51:46 host sshd[30201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 Jan 21 22:51:46 host unix_chkpwd[30208]: password check failed for user (root) Jan 21 22:51:46 host sshd[30202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 user=root Jan 21 22:51:46 host sshd[30202]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 22:51:47 host unix_chkpwd[30209]: password check failed for user (root) Jan 21 22:51:47 host sshd[30203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.241.167.73 user=root Jan 21 22:51:47 host sshd[30203]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 22:51:48 host sshd[30137]: Failed password for invalid user teamspeak from 115.241.167.73 port 57440 ssh2 Jan 21 22:51:48 host sshd[30139]: Failed password for invalid user admin from 115.241.167.73 port 57636 ssh2 Jan 21 22:51:48 host sshd[30147]: Failed password for invalid user ubnt from 115.241.167.73 port 57612 ssh2 Jan 21 22:51:48 host sshd[30144]: Failed password for invalid user admin from 115.241.167.73 port 57592 ssh2 Jan 21 22:51:48 host sshd[30136]: Failed password for invalid user root from 115.241.167.73 port 57666 ssh2 Jan 21 22:51:48 host sshd[30143]: Failed password for invalid user ftpuser from 115.241.167.73 port 57428 ssh2 Jan 21 22:51:48 host sshd[30140]: Failed password for invalid user devops from 115.241.167.73 port 57530 ssh2 Jan 21 22:51:48 host sshd[30142]: Failed password for invalid user root from 115.241.167.73 port 57380 ssh2 Jan 21 22:51:48 host sshd[30148]: Failed password for invalid user devops from 115.241.167.73 port 57616 ssh2 Jan 21 22:51:48 host sshd[30138]: Failed password for invalid user root from 115.241.167.73 port 57542 ssh2 Jan 21 22:51:48 host sshd[30145]: Failed password for invalid user halo from 115.241.167.73 port 57532 ssh2 Jan 21 22:51:48 host sshd[30156]: Failed password for invalid user ftpuser from 115.241.167.73 port 57674 ssh2 Jan 21 22:51:48 host sshd[30150]: Failed password for invalid user oracle from 115.241.167.73 port 57578 ssh2 Jan 21 22:51:48 host sshd[30152]: Failed password for invalid user admin from 115.241.167.73 port 57442 ssh2 Jan 21 22:51:48 host sshd[30151]: Failed password for invalid user steam from 115.241.167.73 port 57478 ssh2 Jan 21 22:51:48 host sshd[30161]: Failed password for invalid user admin from 115.241.167.73 port 57650 ssh2 Jan 21 22:51:48 host sshd[30141]: Failed password for invalid user pi from 115.241.167.73 port 57566 ssh2 Jan 21 22:51:48 host sshd[30162]: Failed password for invalid user root from 115.241.167.73 port 57634 ssh2 Jan 21 22:51:48 host sshd[30146]: Failed password for invalid user root from 115.241.167.73 port 57610 ssh2 Jan 21 22:51:48 host sshd[30153]: Failed password for invalid user pi from 115.241.167.73 port 57464 ssh2 Jan 21 22:51:48 host sshd[30149]: Failed password for invalid user vagrant from 115.241.167.73 port 57460 ssh2 Jan 21 22:51:48 host sshd[30158]: Failed password for invalid user root from 115.241.167.73 port 57450 ssh2 Jan 21 22:51:48 host sshd[30137]: Connection closed by 115.241.167.73 port 57440 [preauth] Jan 21 22:51:48 host sshd[30165]: Failed password for invalid user ansadmin from 115.241.167.73 port 57570 ssh2 Jan 21 22:51:48 host sshd[30157]: Failed password for invalid user vagrant from 115.241.167.73 port 57554 ssh2 Jan 21 22:51:48 host sshd[30139]: Connection closed by 115.241.167.73 port 57636 [preauth] Jan 21 22:51:48 host sshd[30154]: Failed password for invalid user root from 115.241.167.73 port 57516 ssh2 Jan 21 22:51:48 host sshd[30147]: Connection closed by 115.241.167.73 port 57612 [preauth] Jan 21 22:51:48 host sshd[30159]: Failed password for invalid user es from 115.241.167.73 port 57422 ssh2 Jan 21 22:51:48 host sshd[30136]: Connection closed by 115.241.167.73 port 57666 [preauth] Jan 21 22:51:48 host sshd[30144]: Connection closed by 115.241.167.73 port 57592 [preauth] Jan 21 22:51:48 host sshd[30155]: Failed password for invalid user root from 115.241.167.73 port 57502 ssh2 Jan 21 22:51:48 host sshd[30140]: Connection closed by 115.241.167.73 port 57530 [preauth] Jan 21 22:51:48 host sshd[30166]: Failed password for invalid user pi from 115.241.167.73 port 57550 ssh2 Jan 21 22:51:48 host sshd[30143]: Connection closed by 115.241.167.73 port 57428 [preauth] Jan 21 22:51:48 host sshd[30148]: Connection closed by 115.241.167.73 port 57616 [preauth] Jan 21 22:51:48 host sshd[30142]: Connection closed by 115.241.167.73 port 57380 [preauth] Jan 21 22:51:48 host sshd[30138]: Connection closed by 115.241.167.73 port 57542 [preauth] Jan 21 22:51:48 host sshd[30145]: Connection closed by 115.241.167.73 port 57532 [preauth] Jan 21 22:51:48 host sshd[30156]: Connection closed by 115.241.167.73 port 57674 [preauth] Jan 21 22:51:48 host sshd[30152]: Connection closed by 115.241.167.73 port 57442 [preauth] Jan 21 22:51:48 host sshd[30150]: Connection closed by 115.241.167.73 port 57578 [preauth] Jan 21 22:51:48 host sshd[30161]: Connection closed by 115.241.167.73 port 57650 [preauth] Jan 21 22:51:48 host sshd[30151]: Connection closed by 115.241.167.73 port 57478 [preauth] Jan 21 22:51:48 host sshd[30162]: Connection closed by 115.241.167.73 port 57634 [preauth] Jan 21 22:51:48 host sshd[30141]: Connection closed by 115.241.167.73 port 57566 [preauth] Jan 21 22:51:48 host sshd[30146]: Connection closed by 115.241.167.73 port 57610 [preauth] Jan 21 22:51:48 host sshd[30153]: Connection closed by 115.241.167.73 port 57464 [preauth] Jan 21 22:51:48 host sshd[30158]: Connection closed by 115.241.167.73 port 57450 [preauth] Jan 21 22:51:48 host sshd[30149]: Connection closed by 115.241.167.73 port 57460 [preauth] Jan 21 22:51:48 host sshd[30154]: Connection closed by 115.241.167.73 port 57516 [preauth] Jan 21 22:51:48 host sshd[30165]: Connection closed by 115.241.167.73 port 57570 [preauth] Jan 21 22:51:48 host sshd[30157]: Connection closed by 115.241.167.73 port 57554 [preauth] Jan 21 22:51:48 host sshd[30159]: Connection closed by 115.241.167.73 port 57422 [preauth] Jan 21 22:51:48 host sshd[30155]: Connection closed by 115.241.167.73 port 57502 [preauth] Jan 21 22:51:48 host sshd[30166]: Connection closed by 115.241.167.73 port 57550 [preauth] Jan 21 22:51:49 host sshd[30201]: Failed password for invalid user admin from 115.241.167.73 port 57600 ssh2 Jan 21 22:51:49 host sshd[30202]: Failed password for invalid user root from 115.241.167.73 port 57392 ssh2 Jan 21 22:51:49 host sshd[30203]: Failed password for invalid user root from 115.241.167.73 port 57540 ssh2 Jan 21 22:51:49 host sshd[30201]: Connection closed by 115.241.167.73 port 57600 [preauth] Jan 21 22:51:49 host sshd[30202]: Connection closed by 115.241.167.73 port 57392 [preauth] Jan 21 22:51:49 host sshd[30203]: Connection closed by 115.241.167.73 port 57540 [preauth] Jan 21 23:12:48 host sshd[378]: User tomcat from 62.233.50.248 not allowed because not listed in AllowUsers Jan 21 23:12:48 host sshd[378]: input_userauth_request: invalid user tomcat [preauth] Jan 21 23:12:48 host unix_chkpwd[381]: password check failed for user (tomcat) Jan 21 23:12:48 host sshd[378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.233.50.248 user=tomcat Jan 21 23:12:48 host sshd[378]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "tomcat" Jan 21 23:12:49 host sshd[378]: Failed password for invalid user tomcat from 62.233.50.248 port 39453 ssh2 Jan 21 23:12:49 host sshd[378]: Received disconnect from 62.233.50.248 port 39453:11: Client disconnecting normally [preauth] Jan 21 23:12:49 host sshd[378]: Disconnected from 62.233.50.248 port 39453 [preauth] Jan 21 23:12:53 host sshd[355]: User ftp from 114.32.170.28 not allowed because not listed in AllowUsers Jan 21 23:12:53 host sshd[355]: input_userauth_request: invalid user ftp [preauth] Jan 21 23:12:53 host unix_chkpwd[391]: password check failed for user (ftp) Jan 21 23:12:53 host sshd[355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.32.170.28 user=ftp Jan 21 23:12:53 host sshd[355]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 21 23:12:55 host sshd[355]: Failed password for invalid user ftp from 114.32.170.28 port 54471 ssh2 Jan 21 23:12:56 host sshd[355]: Connection reset by 114.32.170.28 port 54471 [preauth] Jan 21 23:19:30 host sshd[1268]: Did not receive identification string from 164.92.94.46 port 43412 Jan 21 23:19:32 host sshd[1269]: User root from 164.92.94.46 not allowed because not listed in AllowUsers Jan 21 23:19:32 host sshd[1269]: input_userauth_request: invalid user root [preauth] Jan 21 23:19:32 host sshd[1270]: Invalid user teamspeak from 164.92.94.46 port 43520 Jan 21 23:19:32 host sshd[1270]: input_userauth_request: invalid user teamspeak [preauth] Jan 21 23:19:32 host sshd[1271]: Invalid user steam from 164.92.94.46 port 43420 Jan 21 23:19:32 host sshd[1271]: input_userauth_request: invalid user steam [preauth] Jan 21 23:19:32 host sshd[1280]: Invalid user admin from 164.92.94.46 port 43454 Jan 21 23:19:32 host sshd[1277]: Invalid user ansadmin from 164.92.94.46 port 43496 Jan 21 23:19:32 host sshd[1280]: input_userauth_request: invalid user admin [preauth] Jan 21 23:19:32 host sshd[1277]: input_userauth_request: invalid user ansadmin [preauth] Jan 21 23:19:32 host sshd[1273]: Invalid user teamspeak from 164.92.94.46 port 43632 Jan 21 23:19:32 host sshd[1273]: input_userauth_request: invalid user teamspeak [preauth] Jan 21 23:19:32 host sshd[1275]: User root from 164.92.94.46 not allowed because not listed in AllowUsers Jan 21 23:19:32 host sshd[1275]: input_userauth_request: invalid user root [preauth] Jan 21 23:19:32 host sshd[1278]: Invalid user admin from 164.92.94.46 port 43588 Jan 21 23:19:32 host sshd[1278]: input_userauth_request: invalid user admin [preauth] Jan 21 23:19:32 host sshd[1281]: User root from 164.92.94.46 not allowed because not listed in AllowUsers Jan 21 23:19:32 host sshd[1281]: input_userauth_request: invalid user root [preauth] Jan 21 23:19:32 host sshd[1274]: Invalid user admin from 164.92.94.46 port 43736 Jan 21 23:19:32 host sshd[1274]: input_userauth_request: invalid user admin [preauth] Jan 21 23:19:32 host sshd[1282]: User root from 164.92.94.46 not allowed because not listed in AllowUsers Jan 21 23:19:32 host sshd[1282]: input_userauth_request: invalid user root [preauth] Jan 21 23:19:32 host sshd[1285]: User root from 164.92.94.46 not allowed because not listed in AllowUsers Jan 21 23:19:32 host sshd[1285]: input_userauth_request: invalid user root [preauth] Jan 21 23:19:32 host sshd[1295]: User root from 164.92.94.46 not allowed because not listed in AllowUsers Jan 21 23:19:32 host sshd[1295]: input_userauth_request: invalid user root [preauth] Jan 21 23:19:32 host sshd[1289]: User root from 164.92.94.46 not allowed because not listed in AllowUsers Jan 21 23:19:32 host sshd[1284]: Invalid user testuser from 164.92.94.46 port 43562 Jan 21 23:19:32 host sshd[1289]: input_userauth_request: invalid user root [preauth] Jan 21 23:19:32 host sshd[1284]: input_userauth_request: invalid user testuser [preauth] Jan 21 23:19:32 host sshd[1276]: Invalid user admin from 164.92.94.46 port 43560 Jan 21 23:19:32 host sshd[1276]: input_userauth_request: invalid user admin [preauth] Jan 21 23:19:32 host sshd[1299]: Invalid user postgres from 164.92.94.46 port 43604 Jan 21 23:19:32 host sshd[1299]: input_userauth_request: invalid user postgres [preauth] Jan 21 23:19:32 host sshd[1288]: Invalid user pi from 164.92.94.46 port 43482 Jan 21 23:19:32 host sshd[1288]: input_userauth_request: invalid user pi [preauth] Jan 21 23:19:32 host sshd[1272]: Invalid user steam from 164.92.94.46 port 43616 Jan 21 23:19:32 host sshd[1272]: input_userauth_request: invalid user steam [preauth] Jan 21 23:19:32 host sshd[1286]: Invalid user admin from 164.92.94.46 port 43444 Jan 21 23:19:32 host sshd[1286]: input_userauth_request: invalid user admin [preauth] Jan 21 23:19:32 host sshd[1283]: Invalid user admin from 164.92.94.46 port 43614 Jan 21 23:19:32 host sshd[1283]: input_userauth_request: invalid user admin [preauth] Jan 21 23:19:32 host sshd[1294]: Invalid user ansadmin from 164.92.94.46 port 43466 Jan 21 23:19:32 host sshd[1294]: input_userauth_request: invalid user ansadmin [preauth] Jan 21 23:19:32 host sshd[1279]: User root from 164.92.94.46 not allowed because not listed in AllowUsers Jan 21 23:19:32 host sshd[1279]: input_userauth_request: invalid user root [preauth] Jan 21 23:19:32 host sshd[1290]: User root from 164.92.94.46 not allowed because not listed in AllowUsers Jan 21 23:19:32 host sshd[1290]: input_userauth_request: invalid user root [preauth] Jan 21 23:19:32 host sshd[1292]: User centos from 164.92.94.46 not allowed because not listed in AllowUsers Jan 21 23:19:32 host sshd[1292]: input_userauth_request: invalid user centos [preauth] Jan 21 23:19:32 host sshd[1287]: Invalid user ubnt from 164.92.94.46 port 43674 Jan 21 23:19:32 host sshd[1287]: input_userauth_request: invalid user ubnt [preauth] Jan 21 23:19:32 host sshd[1296]: Invalid user user from 164.92.94.46 port 43696 Jan 21 23:19:32 host sshd[1296]: input_userauth_request: invalid user user [preauth] Jan 21 23:19:32 host sshd[1293]: User root from 164.92.94.46 not allowed because not listed in AllowUsers Jan 21 23:19:32 host sshd[1293]: input_userauth_request: invalid user root [preauth] Jan 21 23:19:32 host sshd[1300]: User root from 164.92.94.46 not allowed because not listed in AllowUsers Jan 21 23:19:32 host sshd[1300]: input_userauth_request: invalid user root [preauth] Jan 21 23:19:32 host sshd[1306]: Invalid user admin from 164.92.94.46 port 43508 Jan 21 23:19:32 host sshd[1306]: input_userauth_request: invalid user admin [preauth] Jan 21 23:19:32 host sshd[1307]: User root from 164.92.94.46 not allowed because not listed in AllowUsers Jan 21 23:19:32 host sshd[1307]: input_userauth_request: invalid user root [preauth] Jan 21 23:19:32 host sshd[1297]: Invalid user devops from 164.92.94.46 port 43734 Jan 21 23:19:32 host sshd[1297]: input_userauth_request: invalid user devops [preauth] Jan 21 23:19:32 host sshd[1273]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host sshd[1280]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host sshd[1277]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host sshd[1271]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host sshd[1278]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host sshd[1270]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host sshd[1274]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host sshd[1284]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host sshd[1276]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host unix_chkpwd[1344]: password check failed for user (root) Jan 21 23:19:32 host sshd[1299]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host sshd[1272]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host sshd[1269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 user=root Jan 21 23:19:32 host sshd[1269]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 23:19:32 host sshd[1286]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host sshd[1288]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host sshd[1283]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host sshd[1294]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host unix_chkpwd[1346]: password check failed for user (root) Jan 21 23:19:32 host sshd[1281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 user=root Jan 21 23:19:32 host sshd[1281]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 23:19:32 host sshd[1287]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host unix_chkpwd[1345]: password check failed for user (root) Jan 21 23:19:32 host unix_chkpwd[1350]: password check failed for user (root) Jan 21 23:19:32 host sshd[1296]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host sshd[1275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 user=root Jan 21 23:19:32 host sshd[1275]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 23:19:32 host unix_chkpwd[1349]: password check failed for user (root) Jan 21 23:19:32 host sshd[1295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 user=root Jan 21 23:19:32 host sshd[1289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 user=root Jan 21 23:19:32 host sshd[1295]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 23:19:32 host sshd[1289]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 23:19:32 host sshd[1306]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host sshd[1297]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:19:32 host sshd[1297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 Jan 21 23:19:32 host unix_chkpwd[1347]: password check failed for user (root) Jan 21 23:19:32 host sshd[1282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 user=root Jan 21 23:19:32 host sshd[1282]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 23:19:32 host unix_chkpwd[1351]: password check failed for user (root) Jan 21 23:19:32 host unix_chkpwd[1356]: password check failed for user (root) Jan 21 23:19:32 host unix_chkpwd[1352]: password check failed for user (centos) Jan 21 23:19:32 host sshd[1307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 user=root Jan 21 23:19:32 host sshd[1307]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 23:19:32 host sshd[1292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 user=centos Jan 21 23:19:32 host sshd[1279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 user=root Jan 21 23:19:32 host sshd[1279]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 23:19:32 host unix_chkpwd[1355]: password check failed for user (root) Jan 21 23:19:32 host sshd[1293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 user=root Jan 21 23:19:32 host sshd[1293]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 23:19:32 host unix_chkpwd[1353]: password check failed for user (root) Jan 21 23:19:32 host unix_chkpwd[1348]: password check failed for user (root) Jan 21 23:19:32 host sshd[1290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 user=root Jan 21 23:19:32 host sshd[1290]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 23:19:32 host sshd[1285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 user=root Jan 21 23:19:32 host sshd[1285]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 23:19:32 host unix_chkpwd[1354]: password check failed for user (root) Jan 21 23:19:32 host sshd[1300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.92.94.46 user=root Jan 21 23:19:32 host sshd[1300]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 23:19:34 host sshd[1273]: Failed password for invalid user teamspeak from 164.92.94.46 port 43632 ssh2 Jan 21 23:19:34 host sshd[1280]: Failed password for invalid user admin from 164.92.94.46 port 43454 ssh2 Jan 21 23:19:34 host sshd[1271]: Failed password for invalid user steam from 164.92.94.46 port 43420 ssh2 Jan 21 23:19:34 host sshd[1277]: Failed password for invalid user ansadmin from 164.92.94.46 port 43496 ssh2 Jan 21 23:19:34 host sshd[1278]: Failed password for invalid user admin from 164.92.94.46 port 43588 ssh2 Jan 21 23:19:34 host sshd[1270]: Failed password for invalid user teamspeak from 164.92.94.46 port 43520 ssh2 Jan 21 23:19:34 host sshd[1274]: Failed password for invalid user admin from 164.92.94.46 port 43736 ssh2 Jan 21 23:19:34 host sshd[1284]: Failed password for invalid user testuser from 164.92.94.46 port 43562 ssh2 Jan 21 23:19:34 host sshd[1276]: Failed password for invalid user admin from 164.92.94.46 port 43560 ssh2 Jan 21 23:19:34 host sshd[1299]: Failed password for invalid user postgres from 164.92.94.46 port 43604 ssh2 Jan 21 23:19:34 host sshd[1272]: Failed password for invalid user steam from 164.92.94.46 port 43616 ssh2 Jan 21 23:19:34 host sshd[1269]: Failed password for invalid user root from 164.92.94.46 port 43436 ssh2 Jan 21 23:19:34 host sshd[1286]: Failed password for invalid user admin from 164.92.94.46 port 43444 ssh2 Jan 21 23:19:34 host sshd[1288]: Failed password for invalid user pi from 164.92.94.46 port 43482 ssh2 Jan 21 23:19:34 host sshd[1283]: Failed password for invalid user admin from 164.92.94.46 port 43614 ssh2 Jan 21 23:19:34 host sshd[1294]: Failed password for invalid user ansadmin from 164.92.94.46 port 43466 ssh2 Jan 21 23:19:34 host sshd[1281]: Failed password for invalid user root from 164.92.94.46 port 43670 ssh2 Jan 21 23:19:34 host sshd[1287]: Failed password for invalid user ubnt from 164.92.94.46 port 43674 ssh2 Jan 21 23:19:34 host sshd[1296]: Failed password for invalid user user from 164.92.94.46 port 43696 ssh2 Jan 21 23:19:34 host sshd[1275]: Failed password for invalid user root from 164.92.94.46 port 43538 ssh2 Jan 21 23:19:34 host sshd[1295]: Failed password for invalid user root from 164.92.94.46 port 43540 ssh2 Jan 21 23:19:34 host sshd[1289]: Failed password for invalid user root from 164.92.94.46 port 43602 ssh2 Jan 21 23:19:34 host sshd[1306]: Failed password for invalid user admin from 164.92.94.46 port 43508 ssh2 Jan 21 23:19:34 host sshd[1297]: Failed password for invalid user devops from 164.92.94.46 port 43734 ssh2 Jan 21 23:19:34 host sshd[1282]: Failed password for invalid user root from 164.92.94.46 port 43702 ssh2 Jan 21 23:19:34 host sshd[1307]: Failed password for invalid user root from 164.92.94.46 port 43536 ssh2 Jan 21 23:19:34 host sshd[1292]: Failed password for invalid user centos from 164.92.94.46 port 43682 ssh2 Jan 21 23:19:34 host sshd[1279]: Failed password for invalid user root from 164.92.94.46 port 43598 ssh2 Jan 21 23:19:34 host sshd[1293]: Failed password for invalid user root from 164.92.94.46 port 43658 ssh2 Jan 21 23:19:34 host sshd[1290]: Failed password for invalid user root from 164.92.94.46 port 43648 ssh2 Jan 21 23:19:34 host sshd[1285]: Failed password for invalid user root from 164.92.94.46 port 43712 ssh2 Jan 21 23:19:34 host sshd[1300]: Failed password for invalid user root from 164.92.94.46 port 43576 ssh2 Jan 21 23:19:35 host sshd[1296]: Connection closed by 164.92.94.46 port 43696 [preauth] Jan 21 23:19:35 host sshd[1269]: Connection closed by 164.92.94.46 port 43436 [preauth] Jan 21 23:19:35 host sshd[1276]: Connection closed by 164.92.94.46 port 43560 [preauth] Jan 21 23:19:35 host sshd[1272]: Connection closed by 164.92.94.46 port 43616 [preauth] Jan 21 23:19:35 host sshd[1287]: Connection closed by 164.92.94.46 port 43674 [preauth] Jan 21 23:19:35 host sshd[1295]: Connection closed by 164.92.94.46 port 43540 [preauth] Jan 21 23:19:35 host sshd[1283]: Connection closed by 164.92.94.46 port 43614 [preauth] Jan 21 23:19:35 host sshd[1306]: Connection closed by 164.92.94.46 port 43508 [preauth] Jan 21 23:19:35 host sshd[1284]: Connection closed by 164.92.94.46 port 43562 [preauth] Jan 21 23:19:35 host sshd[1288]: Connection closed by 164.92.94.46 port 43482 [preauth] Jan 21 23:19:35 host sshd[1281]: Connection closed by 164.92.94.46 port 43670 [preauth] Jan 21 23:19:35 host sshd[1286]: Connection closed by 164.92.94.46 port 43444 [preauth] Jan 21 23:19:35 host sshd[1294]: Connection closed by 164.92.94.46 port 43466 [preauth] Jan 21 23:19:35 host sshd[1299]: Connection closed by 164.92.94.46 port 43604 [preauth] Jan 21 23:19:35 host sshd[1289]: Connection closed by 164.92.94.46 port 43602 [preauth] Jan 21 23:19:35 host sshd[1297]: Connection closed by 164.92.94.46 port 43734 [preauth] Jan 21 23:19:35 host sshd[1282]: Connection closed by 164.92.94.46 port 43702 [preauth] Jan 21 23:19:35 host sshd[1307]: Connection closed by 164.92.94.46 port 43536 [preauth] Jan 21 23:19:35 host sshd[1275]: Connection closed by 164.92.94.46 port 43538 [preauth] Jan 21 23:19:35 host sshd[1279]: Connection closed by 164.92.94.46 port 43598 [preauth] Jan 21 23:19:35 host sshd[1290]: Connection closed by 164.92.94.46 port 43648 [preauth] Jan 21 23:19:35 host sshd[1285]: Connection closed by 164.92.94.46 port 43712 [preauth] Jan 21 23:19:35 host sshd[1292]: Connection closed by 164.92.94.46 port 43682 [preauth] Jan 21 23:19:35 host sshd[1293]: Connection closed by 164.92.94.46 port 43658 [preauth] Jan 21 23:19:35 host sshd[1274]: Connection closed by 164.92.94.46 port 43736 [preauth] Jan 21 23:19:35 host sshd[1278]: Connection closed by 164.92.94.46 port 43588 [preauth] Jan 21 23:19:35 host sshd[1270]: Connection closed by 164.92.94.46 port 43520 [preauth] Jan 21 23:19:35 host sshd[1271]: Connection closed by 164.92.94.46 port 43420 [preauth] Jan 21 23:19:35 host sshd[1277]: Connection closed by 164.92.94.46 port 43496 [preauth] Jan 21 23:19:35 host sshd[1280]: Connection closed by 164.92.94.46 port 43454 [preauth] Jan 21 23:19:35 host sshd[1273]: Connection closed by 164.92.94.46 port 43632 [preauth] Jan 21 23:19:35 host sshd[1300]: Connection closed by 164.92.94.46 port 43576 [preauth] Jan 21 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 21 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 21 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 21 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 21 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 21 23:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 21 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 21 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 21 23:21:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 21 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=cochintaxi user-2=wwwkaretakers user-3=laundryboniface user-4=dartsimp user-5=a2zgroup user-6=wwwpmcresource user-7=ugotscom user-8=wwwrmswll user-9=keralaholi user-10=wwwresourcehunte user-11=travelboniface user-12=woodpeck user-13=wwwkapin user-14=wwwkmaorg user-15=disposeat user-16=remysagr user-17=pmcresources user-18=wwwtestugo user-19=shalinijames user-20=vfmassets user-21=wwwletsstalkfood user-22=straightcurve user-23=wwwevmhonda user-24=bonifacegroup user-25=wwwnexidigital user-26=mrsclean user-27=kottayamcalldriv user-28=phmetals user-29=gifterman user-30=palco123 feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 21 23:21:06 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 21 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-FwS6awTWuDrgMAIA.~ Jan 21 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-FwS6awTWuDrgMAIA.~' Jan 21 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-FwS6awTWuDrgMAIA.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 21 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 21 23:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 21 23:21:07 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 21 23:21:07 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 21 23:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 21 23:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 21 23:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 21 23:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 21 23:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 21 23:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 21 23:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 21 23:22:52 host sshd[2127]: User root from 165.22.190.158 not allowed because not listed in AllowUsers Jan 21 23:22:52 host sshd[2127]: input_userauth_request: invalid user root [preauth] Jan 21 23:22:52 host unix_chkpwd[2136]: password check failed for user (root) Jan 21 23:22:52 host sshd[2127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.190.158 user=root Jan 21 23:22:52 host sshd[2127]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 21 23:22:55 host sshd[2127]: Failed password for invalid user root from 165.22.190.158 port 47986 ssh2 Jan 21 23:22:55 host sshd[2127]: Connection closed by 165.22.190.158 port 47986 [preauth] Jan 21 23:26:21 host sshd[2610]: Invalid user admin from 92.33.231.219 port 34727 Jan 21 23:26:21 host sshd[2610]: input_userauth_request: invalid user admin [preauth] Jan 21 23:26:21 host sshd[2610]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:26:21 host sshd[2610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.33.231.219 Jan 21 23:26:23 host sshd[2610]: Failed password for invalid user admin from 92.33.231.219 port 34727 ssh2 Jan 21 23:26:23 host sshd[2610]: Failed password for invalid user admin from 92.33.231.219 port 34727 ssh2 Jan 21 23:26:23 host sshd[2610]: Connection reset by 92.33.231.219 port 34727 [preauth] Jan 21 23:28:47 host sshd[2889]: Invalid user hadmin from 106.10.122.53 port 34314 Jan 21 23:28:47 host sshd[2889]: input_userauth_request: invalid user hadmin [preauth] Jan 21 23:28:47 host sshd[2889]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:28:47 host sshd[2889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 21 23:28:49 host sshd[2889]: Failed password for invalid user hadmin from 106.10.122.53 port 34314 ssh2 Jan 21 23:28:49 host sshd[2889]: Connection closed by 106.10.122.53 port 34314 [preauth] Jan 21 23:39:49 host sshd[4325]: Invalid user sFTPUser from 114.35.38.115 port 39284 Jan 21 23:39:49 host sshd[4325]: input_userauth_request: invalid user sFTPUser [preauth] Jan 21 23:39:49 host sshd[4325]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:39:49 host sshd[4325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.38.115 Jan 21 23:39:51 host sshd[4325]: Failed password for invalid user sFTPUser from 114.35.38.115 port 39284 ssh2 Jan 21 23:39:52 host sshd[4325]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:39:53 host sshd[4325]: Failed password for invalid user sFTPUser from 114.35.38.115 port 39284 ssh2 Jan 21 23:39:54 host sshd[4325]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:39:56 host sshd[4325]: Failed password for invalid user sFTPUser from 114.35.38.115 port 39284 ssh2 Jan 21 23:39:57 host sshd[4325]: Connection reset by 114.35.38.115 port 39284 [preauth] Jan 21 23:39:57 host sshd[4325]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.35.38.115 Jan 21 23:47:58 host sshd[5532]: Invalid user admin from 216.15.70.66 port 58605 Jan 21 23:47:58 host sshd[5532]: input_userauth_request: invalid user admin [preauth] Jan 21 23:47:58 host sshd[5532]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:47:58 host sshd[5532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.15.70.66 Jan 21 23:48:00 host sshd[5532]: Failed password for invalid user admin from 216.15.70.66 port 58605 ssh2 Jan 21 23:48:00 host sshd[5532]: Failed password for invalid user admin from 216.15.70.66 port 58605 ssh2 Jan 21 23:48:03 host sshd[5532]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:48:05 host sshd[5532]: Failed password for invalid user admin from 216.15.70.66 port 58605 ssh2 Jan 21 23:48:06 host sshd[5532]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:48:09 host sshd[5532]: Failed password for invalid user admin from 216.15.70.66 port 58605 ssh2 Jan 21 23:48:11 host sshd[5532]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:48:12 host sshd[5532]: Failed password for invalid user admin from 216.15.70.66 port 58605 ssh2 Jan 21 23:48:15 host sshd[5601]: Invalid user zengyuanqi from 92.46.108.20 port 59100 Jan 21 23:48:15 host sshd[5601]: input_userauth_request: invalid user zengyuanqi [preauth] Jan 21 23:48:16 host sshd[5601]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:48:16 host sshd[5601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.108.20 Jan 21 23:48:18 host sshd[5601]: Failed password for invalid user zengyuanqi from 92.46.108.20 port 59100 ssh2 Jan 21 23:48:18 host sshd[5601]: Connection closed by 92.46.108.20 port 59100 [preauth] Jan 21 23:54:32 host sshd[6446]: Invalid user hq from 194.110.203.109 port 48720 Jan 21 23:54:32 host sshd[6446]: input_userauth_request: invalid user hq [preauth] Jan 21 23:54:32 host sshd[6446]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:54:32 host sshd[6446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 21 23:54:34 host sshd[6446]: Failed password for invalid user hq from 194.110.203.109 port 48720 ssh2 Jan 21 23:54:37 host sshd[6446]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:54:40 host sshd[6446]: Failed password for invalid user hq from 194.110.203.109 port 48720 ssh2 Jan 21 23:54:43 host sshd[6446]: pam_unix(sshd:auth): check pass; user unknown Jan 21 23:54:45 host sshd[6446]: Failed password for invalid user hq from 194.110.203.109 port 48720 ssh2 Jan 21 23:54:49 host sshd[6446]: Connection closed by 194.110.203.109 port 48720 [preauth] Jan 21 23:54:49 host sshd[6446]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 22 00:01:15 host sshd[7573]: Invalid user admin from 125.228.115.190 port 42768 Jan 22 00:01:15 host sshd[7573]: input_userauth_request: invalid user admin [preauth] Jan 22 00:01:15 host sshd[7573]: pam_unix(sshd:auth): check pass; user unknown Jan 22 00:01:15 host sshd[7573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.115.190 Jan 22 00:01:17 host sshd[7573]: Failed password for invalid user admin from 125.228.115.190 port 42768 ssh2 Jan 22 00:01:18 host sshd[7573]: Failed password for invalid user admin from 125.228.115.190 port 42768 ssh2 Jan 22 00:01:18 host sshd[7573]: pam_unix(sshd:auth): check pass; user unknown Jan 22 00:01:21 host sshd[7573]: Failed password for invalid user admin from 125.228.115.190 port 42768 ssh2 Jan 22 00:01:22 host sshd[7573]: Connection reset by 125.228.115.190 port 42768 [preauth] Jan 22 00:01:22 host sshd[7573]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.228.115.190 Jan 22 00:02:08 host sshd[7673]: Invalid user bigipuser3 from 220.133.142.148 port 59286 Jan 22 00:02:08 host sshd[7673]: input_userauth_request: invalid user bigipuser3 [preauth] Jan 22 00:02:08 host sshd[7673]: pam_unix(sshd:auth): check pass; user unknown Jan 22 00:02:08 host sshd[7673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.142.148 Jan 22 00:02:10 host sshd[7673]: Failed password for invalid user bigipuser3 from 220.133.142.148 port 59286 ssh2 Jan 22 00:02:11 host sshd[7673]: pam_unix(sshd:auth): check pass; user unknown Jan 22 00:02:13 host sshd[7673]: Failed password for invalid user bigipuser3 from 220.133.142.148 port 59286 ssh2 Jan 22 00:02:14 host sshd[7673]: pam_unix(sshd:auth): check pass; user unknown Jan 22 00:02:16 host sshd[7673]: Failed password for invalid user bigipuser3 from 220.133.142.148 port 59286 ssh2 Jan 22 00:02:17 host sshd[7673]: Failed password for invalid user bigipuser3 from 220.133.142.148 port 59286 ssh2 Jan 22 00:02:17 host sshd[7673]: Connection closed by 220.133.142.148 port 59286 [preauth] Jan 22 00:02:17 host sshd[7673]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.133.142.148 Jan 22 00:12:00 host sshd[9418]: Invalid user pi from 122.116.138.31 port 50904 Jan 22 00:12:00 host sshd[9418]: input_userauth_request: invalid user pi [preauth] Jan 22 00:12:00 host sshd[9418]: pam_unix(sshd:auth): check pass; user unknown Jan 22 00:12:00 host sshd[9418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.138.31 Jan 22 00:12:01 host sshd[9418]: Failed password for invalid user pi from 122.116.138.31 port 50904 ssh2 Jan 22 00:12:02 host sshd[9418]: Connection reset by 122.116.138.31 port 50904 [preauth] Jan 22 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 22 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 22 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=shalinijames user-2=wwwtestugo user-3=vfmassets user-4=pmcresources user-5=wwwkmaorg user-6=disposeat user-7=remysagr user-8=woodpeck user-9=wwwkapin user-10=phmetals user-11=kottayamcalldriv user-12=palco123 user-13=gifterman user-14=mrsclean user-15=wwwnexidigital user-16=wwwevmhonda user-17=bonifacegroup user-18=straightcurve user-19=wwwletsstalkfood user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=cochintaxi user-24=wwwkaretakers user-25=travelboniface user-26=ugotscom user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 22 00:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 22 00:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 22 00:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iqzdVDKsP4ejjxNz.~ Jan 22 00:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iqzdVDKsP4ejjxNz.~' Jan 22 00:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-iqzdVDKsP4ejjxNz.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 22 00:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 22 00:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 22 00:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 22 00:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 22 00:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 22 00:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 22 00:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 22 00:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 22 00:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 22 00:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 00:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 00:23:16 host sshd[12476]: Invalid user pi from 114.33.61.103 port 38165 Jan 22 00:23:16 host sshd[12476]: input_userauth_request: invalid user pi [preauth] Jan 22 00:23:16 host sshd[12476]: pam_unix(sshd:auth): check pass; user unknown Jan 22 00:23:16 host sshd[12476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.61.103 Jan 22 00:23:17 host sshd[12476]: Failed password for invalid user pi from 114.33.61.103 port 38165 ssh2 Jan 22 00:23:18 host sshd[12476]: pam_unix(sshd:auth): check pass; user unknown Jan 22 00:23:20 host sshd[12476]: Failed password for invalid user pi from 114.33.61.103 port 38165 ssh2 Jan 22 00:23:21 host sshd[12476]: Connection reset by 114.33.61.103 port 38165 [preauth] Jan 22 00:23:21 host sshd[12476]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.61.103 Jan 22 00:24:04 host sshd[12565]: Connection closed by 172.104.11.51 port 15472 [preauth] Jan 22 00:24:06 host sshd[12574]: Connection closed by 172.104.11.51 port 15478 [preauth] Jan 22 00:24:08 host sshd[12580]: Connection closed by 172.104.11.51 port 15486 [preauth] Jan 22 00:24:08 host sshd[12577]: Invalid user corecess from 205.185.113.129 port 37940 Jan 22 00:24:08 host sshd[12577]: input_userauth_request: invalid user corecess [preauth] Jan 22 00:24:08 host sshd[12577]: pam_unix(sshd:auth): check pass; user unknown Jan 22 00:24:08 host sshd[12577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=205.185.113.129 Jan 22 00:24:09 host sshd[12577]: Failed password for invalid user corecess from 205.185.113.129 port 37940 ssh2 Jan 22 00:24:10 host sshd[12577]: Connection closed by 205.185.113.129 port 37940 [preauth] Jan 22 00:28:32 host sshd[13183]: Connection reset by 112.172.237.26 port 61127 [preauth] Jan 22 00:44:08 host sshd[15330]: Invalid user disk from 106.10.122.53 port 42720 Jan 22 00:44:08 host sshd[15330]: input_userauth_request: invalid user disk [preauth] Jan 22 00:44:08 host sshd[15330]: pam_unix(sshd:auth): check pass; user unknown Jan 22 00:44:08 host sshd[15330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 22 00:44:10 host sshd[15330]: Failed password for invalid user disk from 106.10.122.53 port 42720 ssh2 Jan 22 00:44:10 host sshd[15330]: Connection closed by 106.10.122.53 port 42720 [preauth] Jan 22 00:47:28 host sshd[15807]: Did not receive identification string from 206.189.23.129 port 61000 Jan 22 00:57:59 host sshd[17176]: Invalid user joel from 107.189.30.59 port 53300 Jan 22 00:57:59 host sshd[17176]: input_userauth_request: invalid user joel [preauth] Jan 22 00:57:59 host sshd[17176]: pam_unix(sshd:auth): check pass; user unknown Jan 22 00:57:59 host sshd[17176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.30.59 Jan 22 00:58:00 host sshd[17176]: Failed password for invalid user joel from 107.189.30.59 port 53300 ssh2 Jan 22 00:58:01 host sshd[17176]: Connection closed by 107.189.30.59 port 53300 [preauth] Jan 22 01:00:08 host sshd[17433]: User ftp from 121.188.160.55 not allowed because not listed in AllowUsers Jan 22 01:00:08 host sshd[17433]: input_userauth_request: invalid user ftp [preauth] Jan 22 01:00:08 host unix_chkpwd[17436]: password check failed for user (ftp) Jan 22 01:00:08 host sshd[17433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.188.160.55 user=ftp Jan 22 01:00:08 host sshd[17433]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "ftp" Jan 22 01:00:10 host sshd[17433]: Failed password for invalid user ftp from 121.188.160.55 port 60752 ssh2 Jan 22 01:04:24 host sshd[17949]: Did not receive identification string from 43.153.95.137 port 22960 Jan 22 01:06:24 host sshd[18274]: Invalid user admin from 43.153.95.137 port 38050 Jan 22 01:06:24 host sshd[18274]: input_userauth_request: invalid user admin [preauth] Jan 22 01:06:24 host sshd[18274]: pam_unix(sshd:auth): check pass; user unknown Jan 22 01:06:24 host sshd[18274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.95.137 Jan 22 01:06:27 host sshd[18274]: Failed password for invalid user admin from 43.153.95.137 port 38050 ssh2 Jan 22 01:06:27 host sshd[18274]: Connection closed by 43.153.95.137 port 38050 [preauth] Jan 22 01:08:32 host sshd[18509]: User centos from 43.153.95.137 not allowed because not listed in AllowUsers Jan 22 01:08:32 host sshd[18509]: input_userauth_request: invalid user centos [preauth] Jan 22 01:08:32 host unix_chkpwd[18514]: password check failed for user (centos) Jan 22 01:08:32 host sshd[18509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.95.137 user=centos Jan 22 01:08:34 host sshd[18509]: Failed password for invalid user centos from 43.153.95.137 port 28282 ssh2 Jan 22 01:08:35 host sshd[18509]: Connection closed by 43.153.95.137 port 28282 [preauth] Jan 22 01:16:11 host sshd[19624]: Connection reset by 59.126.66.1 port 46644 [preauth] Jan 22 01:17:13 host sshd[19733]: User root from 165.22.190.158 not allowed because not listed in AllowUsers Jan 22 01:17:13 host sshd[19733]: input_userauth_request: invalid user root [preauth] Jan 22 01:17:13 host unix_chkpwd[19737]: password check failed for user (root) Jan 22 01:17:13 host sshd[19733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.190.158 user=root Jan 22 01:17:13 host sshd[19733]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 22 01:17:16 host sshd[19733]: Failed password for invalid user root from 165.22.190.158 port 60882 ssh2 Jan 22 01:17:16 host sshd[19733]: Connection closed by 165.22.190.158 port 60882 [preauth] Jan 22 01:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 22 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 22 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:05 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:05 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=wwwresourcehunte user-2=keralaholi user-3=wwwrmswll user-4=ugotscom user-5=travelboniface user-6=wwwpmcresource user-7=laundryboniface user-8=a2zgroup user-9=dartsimp user-10=cochintaxi user-11=wwwkaretakers user-12=wwwnexidigital user-13=mrsclean user-14=palco123 user-15=gifterman user-16=kottayamcalldriv user-17=phmetals user-18=straightcurve user-19=wwwletsstalkfood user-20=bonifacegroup user-21=wwwevmhonda user-22=pmcresources user-23=vfmassets user-24=shalinijames user-25=wwwtestugo user-26=wwwkapin user-27=woodpeck user-28=disposeat user-29=remysagr user-30=wwwkmaorg feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 22 01:21:05 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 22 01:21:05 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 22 01:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-JNFQ5CGCcPVrah7L.~ Jan 22 01:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-JNFQ5CGCcPVrah7L.~' Jan 22 01:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-JNFQ5CGCcPVrah7L.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 22 01:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 22 01:21:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 22 01:21:06 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 22 01:21:06 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 22 01:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 22 01:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 22 01:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 22 01:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:07 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 22 01:21:07 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:07 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:21:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 22 01:21:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 01:21:08 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 01:28:56 host sshd[21491]: User root from 160.155.57.46 not allowed because not listed in AllowUsers Jan 22 01:28:56 host sshd[21491]: input_userauth_request: invalid user root [preauth] Jan 22 01:28:57 host unix_chkpwd[21503]: password check failed for user (root) Jan 22 01:28:57 host sshd[21491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.155.57.46 user=root Jan 22 01:28:57 host sshd[21491]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 22 01:28:59 host sshd[21491]: Failed password for invalid user root from 160.155.57.46 port 34816 ssh2 Jan 22 01:28:59 host sshd[21491]: Connection closed by 160.155.57.46 port 34816 [preauth] Jan 22 01:29:00 host sshd[21507]: User root from 160.155.57.46 not allowed because not listed in AllowUsers Jan 22 01:29:00 host sshd[21507]: input_userauth_request: invalid user root [preauth] Jan 22 01:29:00 host unix_chkpwd[21512]: password check failed for user (root) Jan 22 01:29:00 host sshd[21507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.155.57.46 user=root Jan 22 01:29:00 host sshd[21507]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 22 01:29:03 host sshd[21507]: Failed password for invalid user root from 160.155.57.46 port 47822 ssh2 Jan 22 01:29:03 host sshd[21507]: Connection closed by 160.155.57.46 port 47822 [preauth] Jan 22 01:29:04 host sshd[21525]: User root from 160.155.57.46 not allowed because not listed in AllowUsers Jan 22 01:29:04 host sshd[21525]: input_userauth_request: invalid user root [preauth] Jan 22 01:29:04 host unix_chkpwd[21528]: password check failed for user (root) Jan 22 01:29:04 host sshd[21525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.155.57.46 user=root Jan 22 01:29:04 host sshd[21525]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 22 01:29:06 host sshd[21525]: Failed password for invalid user root from 160.155.57.46 port 47834 ssh2 Jan 22 01:42:08 host sshd[23428]: Invalid user hr from 194.110.203.109 port 53050 Jan 22 01:42:08 host sshd[23428]: input_userauth_request: invalid user hr [preauth] Jan 22 01:42:08 host sshd[23428]: pam_unix(sshd:auth): check pass; user unknown Jan 22 01:42:08 host sshd[23428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 22 01:42:09 host sshd[23428]: Failed password for invalid user hr from 194.110.203.109 port 53050 ssh2 Jan 22 01:42:13 host sshd[23428]: pam_unix(sshd:auth): check pass; user unknown Jan 22 01:42:15 host sshd[23428]: Failed password for invalid user hr from 194.110.203.109 port 53050 ssh2 Jan 22 01:42:18 host sshd[23428]: pam_unix(sshd:auth): check pass; user unknown Jan 22 01:42:20 host sshd[23428]: Failed password for invalid user hr from 194.110.203.109 port 53050 ssh2 Jan 22 01:42:24 host sshd[23428]: Connection closed by 194.110.203.109 port 53050 [preauth] Jan 22 01:42:24 host sshd[23428]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.110.203.109 Jan 22 01:49:19 host sshd[24719]: Invalid user user from 46.19.136.138 port 33674 Jan 22 01:49:19 host sshd[24719]: input_userauth_request: invalid user user [preauth] Jan 22 01:49:19 host sshd[24719]: pam_unix(sshd:auth): check pass; user unknown Jan 22 01:49:19 host sshd[24719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.19.136.138 Jan 22 01:49:21 host sshd[24719]: Failed password for invalid user user from 46.19.136.138 port 33674 ssh2 Jan 22 01:49:22 host sshd[24719]: Connection closed by 46.19.136.138 port 33674 [preauth] Jan 22 01:49:22 host sshd[24725]: Invalid user user from 46.19.136.138 port 56076 Jan 22 01:49:22 host sshd[24725]: input_userauth_request: invalid user user [preauth] Jan 22 01:49:22 host sshd[24725]: pam_unix(sshd:auth): check pass; user unknown Jan 22 01:49:22 host sshd[24725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.19.136.138 Jan 22 01:49:24 host sshd[24725]: Failed password for invalid user user from 46.19.136.138 port 56076 ssh2 Jan 22 01:49:24 host sshd[24725]: Connection closed by 46.19.136.138 port 56076 [preauth] Jan 22 01:49:25 host sshd[24729]: Invalid user user from 46.19.136.138 port 56088 Jan 22 01:49:25 host sshd[24729]: input_userauth_request: invalid user user [preauth] Jan 22 01:49:25 host sshd[24729]: pam_unix(sshd:auth): check pass; user unknown Jan 22 01:49:25 host sshd[24729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.19.136.138 Jan 22 01:49:27 host sshd[24729]: Failed password for invalid user user from 46.19.136.138 port 56088 ssh2 Jan 22 01:54:14 host sshd[25514]: Invalid user ubuntu from 1.34.194.19 port 52299 Jan 22 01:54:14 host sshd[25514]: input_userauth_request: invalid user ubuntu [preauth] Jan 22 01:54:14 host sshd[25514]: pam_unix(sshd:auth): check pass; user unknown Jan 22 01:54:14 host sshd[25514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.194.19 Jan 22 01:54:16 host sshd[25514]: Failed password for invalid user ubuntu from 1.34.194.19 port 52299 ssh2 Jan 22 01:54:17 host sshd[25514]: pam_unix(sshd:auth): check pass; user unknown Jan 22 01:54:19 host sshd[25514]: Failed password for invalid user ubuntu from 1.34.194.19 port 52299 ssh2 Jan 22 01:54:20 host sshd[25514]: pam_unix(sshd:auth): check pass; user unknown Jan 22 01:54:22 host sshd[25514]: Failed password for invalid user ubuntu from 1.34.194.19 port 52299 ssh2 Jan 22 01:54:23 host sshd[25514]: Failed password for invalid user ubuntu from 1.34.194.19 port 52299 ssh2 Jan 22 01:54:23 host sshd[25514]: pam_unix(sshd:auth): check pass; user unknown Jan 22 01:54:25 host sshd[25514]: Failed password for invalid user ubuntu from 1.34.194.19 port 52299 ssh2 Jan 22 01:54:26 host sshd[25514]: pam_unix(sshd:auth): check pass; user unknown Jan 22 01:54:29 host sshd[25514]: Failed password for invalid user ubuntu from 1.34.194.19 port 52299 ssh2 Jan 22 01:54:29 host sshd[25514]: error: maximum authentication attempts exceeded for invalid user ubuntu from 1.34.194.19 port 52299 ssh2 [preauth] Jan 22 01:54:29 host sshd[25514]: Disconnecting: Too many authentication failures [preauth] Jan 22 01:54:29 host sshd[25514]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.34.194.19 Jan 22 01:54:29 host sshd[25514]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 22 01:59:13 host sshd[26496]: Invalid user szy from 106.10.122.53 port 48680 Jan 22 01:59:13 host sshd[26496]: input_userauth_request: invalid user szy [preauth] Jan 22 01:59:13 host sshd[26496]: pam_unix(sshd:auth): check pass; user unknown Jan 22 01:59:13 host sshd[26496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.10.122.53 Jan 22 01:59:15 host sshd[26496]: Failed password for invalid user szy from 106.10.122.53 port 48680 ssh2 Jan 22 01:59:15 host sshd[26496]: Connection closed by 106.10.122.53 port 48680 [preauth] Jan 22 02:06:22 host sshd[27602]: Connection closed by 192.241.218.42 port 43126 [preauth] Jan 22 02:06:46 host sshd[27659]: invalid public DH value: >= p-1 [preauth] Jan 22 02:06:46 host sshd[27659]: ssh_dispatch_run_fatal: Connection from 117.110.169.82 port 53341: incomplete message [preauth] Jan 22 02:08:48 host sshd[27960]: Invalid user oracle from 175.112.214.17 port 60702 Jan 22 02:08:48 host sshd[27960]: input_userauth_request: invalid user oracle [preauth] Jan 22 02:08:48 host sshd[27960]: pam_unix(sshd:auth): check pass; user unknown Jan 22 02:08:48 host sshd[27960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.112.214.17 Jan 22 02:08:50 host sshd[27960]: Failed password for invalid user oracle from 175.112.214.17 port 60702 ssh2 Jan 22 02:08:51 host sshd[27960]: pam_unix(sshd:auth): check pass; user unknown Jan 22 02:08:53 host sshd[27960]: Failed password for invalid user oracle from 175.112.214.17 port 60702 ssh2 Jan 22 02:08:54 host sshd[27960]: pam_unix(sshd:auth): check pass; user unknown Jan 22 02:08:55 host sshd[27960]: Failed password for invalid user oracle from 175.112.214.17 port 60702 ssh2 Jan 22 02:08:56 host sshd[27960]: Failed password for invalid user oracle from 175.112.214.17 port 60702 ssh2 Jan 22 02:08:57 host sshd[27960]: pam_unix(sshd:auth): check pass; user unknown Jan 22 02:08:59 host sshd[27960]: Failed password for invalid user oracle from 175.112.214.17 port 60702 ssh2 Jan 22 02:09:00 host sshd[27960]: pam_unix(sshd:auth): check pass; user unknown Jan 22 02:09:03 host sshd[27960]: Failed password for invalid user oracle from 175.112.214.17 port 60702 ssh2 Jan 22 02:09:03 host sshd[27960]: error: maximum authentication attempts exceeded for invalid user oracle from 175.112.214.17 port 60702 ssh2 [preauth] Jan 22 02:09:03 host sshd[27960]: Disconnecting: Too many authentication failures [preauth] Jan 22 02:09:03 host sshd[27960]: PAM 4 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.112.214.17 Jan 22 02:09:03 host sshd[27960]: PAM service(sshd) ignoring max retries; 5 > 3 Jan 22 02:15:40 host sshd[28949]: Invalid user zyfwp from 122.116.40.252 port 32799 Jan 22 02:15:40 host sshd[28949]: input_userauth_request: invalid user zyfwp [preauth] Jan 22 02:15:40 host sshd[28949]: pam_unix(sshd:auth): check pass; user unknown Jan 22 02:15:40 host sshd[28949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.40.252 Jan 22 02:15:43 host sshd[28949]: Failed password for invalid user zyfwp from 122.116.40.252 port 32799 ssh2 Jan 22 02:15:44 host sshd[28949]: pam_unix(sshd:auth): check pass; user unknown Jan 22 02:15:46 host sshd[28949]: Failed password for invalid user zyfwp from 122.116.40.252 port 32799 ssh2 Jan 22 02:15:47 host sshd[28949]: pam_unix(sshd:auth): check pass; user unknown Jan 22 02:15:50 host sshd[28949]: Failed password for invalid user zyfwp from 122.116.40.252 port 32799 ssh2 Jan 22 02:15:50 host sshd[28949]: Connection closed by 122.116.40.252 port 32799 [preauth] Jan 22 02:15:50 host sshd[28949]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.116.40.252 Jan 22 02:18:30 host sshd[29266]: Invalid user admin from 31.41.244.124 port 49793 Jan 22 02:18:30 host sshd[29266]: input_userauth_request: invalid user admin [preauth] Jan 22 02:18:30 host sshd[29266]: pam_unix(sshd:auth): check pass; user unknown Jan 22 02:18:30 host sshd[29266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.41.244.124 Jan 22 02:18:33 host sshd[29266]: Failed password for invalid user admin from 31.41.244.124 port 49793 ssh2 Jan 22 02:18:33 host sshd[29266]: Received disconnect from 31.41.244.124 port 49793:11: Client disconnecting normally [preauth] Jan 22 02:18:33 host sshd[29266]: Disconnected from 31.41.244.124 port 49793 [preauth] Jan 22 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/debian_version Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/redhat-release Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/redhat-release Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /opt/psa Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/psa Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/psa Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /usr/local/cpanel Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /usr/local/cpanel/version Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 22 02:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 22 02:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=shalinijames user-2=wwwtestugo user-3=vfmassets user-4=pmcresources user-5=wwwkmaorg user-6=disposeat user-7=remysagr user-8=wwwkapin user-9=woodpeck user-10=kottayamcalldriv user-11=phmetals user-12=palco123 user-13=gifterman user-14=wwwnexidigital user-15=mrsclean user-16=wwwevmhonda user-17=bonifacegroup user-18=straightcurve user-19=wwwletsstalkfood user-20=a2zgroup user-21=dartsimp user-22=laundryboniface user-23=wwwkaretakers user-24=cochintaxi user-25=travelboniface user-26=ugotscom user-27=keralaholi user-28=wwwresourcehunte user-29=wwwrmswll user-30=wwwpmcresource feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 22 02:21:09 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 22 02:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -f /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 22 02:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:09 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GnU2doYDWD9svTlF.~ Jan 22 02:21:09 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c cat > '/etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GnU2doYDWD9svTlF.~' Jan 22 02:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/mv /etc/logrotate.d/wp-toolkit-action-logs-wpt-tmp-GnU2doYDWD9svTlF.~ /etc/logrotate.d/wp-toolkit-action-logs.~ Jan 22 02:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c mv '/etc/logrotate.d/wp-toolkit-action-logs.~' /etc/logrotate.d/wp-toolkit-action-logs Jan 22 02:21:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:10 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 22 02:21:10 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 22 02:21:10 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 22 02:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 22 02:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 22 02:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 22 02:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_tweaksetting key=server_locale --output=json Jan 22 02:21:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:21:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 22 02:21:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:21:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:28:41 host sshd[30793]: User root from 220.134.123.145 not allowed because not listed in AllowUsers Jan 22 02:28:41 host sshd[30793]: input_userauth_request: invalid user root [preauth] Jan 22 02:28:41 host unix_chkpwd[30796]: password check failed for user (root) Jan 22 02:28:41 host sshd[30793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.123.145 user=root Jan 22 02:28:41 host sshd[30793]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 22 02:28:43 host sshd[30793]: Failed password for invalid user root from 220.134.123.145 port 59491 ssh2 Jan 22 02:28:44 host unix_chkpwd[30800]: password check failed for user (root) Jan 22 02:28:44 host sshd[30793]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 22 02:28:46 host sshd[30793]: Failed password for invalid user root from 220.134.123.145 port 59491 ssh2 Jan 22 02:28:47 host unix_chkpwd[30804]: password check failed for user (root) Jan 22 02:28:47 host sshd[30793]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 22 02:28:49 host sshd[30793]: Failed password for invalid user root from 220.134.123.145 port 59491 ssh2 Jan 22 02:28:49 host unix_chkpwd[30808]: password check failed for user (root) Jan 22 02:28:49 host sshd[30793]: pam_succeed_if(sshd:auth): requirement "uid >= 1000" not met by user "root" Jan 22 02:28:52 host sshd[30793]: Failed password for invalid user root from 220.134.123.145 port 59491 ssh2 Jan 22 02:29:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/passwd Jan 22 02:29:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/passwd Jan 22 02:29:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /root/.wp-toolkit-identifier Jan 22 02:29:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 listaccts --output=json Jan 22 02:29:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_domain_info --output=json Jan 22 02:29:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_features_settings user-1=woodpeck user-2=wwwkapin user-3=wwwkmaorg user-4=disposeat user-5=remysagr user-6=pmcresources user-7=vfmassets user-8=wwwtestugo user-9=shalinijames user-10=straightcurve user-11=wwwletsstalkfood user-12=bonifacegroup user-13=wwwevmhonda user-14=wwwnexidigital user-15=mrsclean user-16=gifterman user-17=palco123 user-18=kottayamcalldriv user-19=phmetals user-20=cochintaxi user-21=wwwkaretakers user-22=laundryboniface user-23=dartsimp user-24=a2zgroup user-25=wwwpmcresource user-26=wwwrmswll user-27=keralaholi user-28=wwwresourcehunte user-29=ugotscom user-30=travelboniface feature-1=filemanager feature-2=backup feature-3=cron feature-4=phpmyadmin feature-5=mysql feature-6=multiphp feature-7=addondomains feature-8=subdomains feature-9=webprotect feature-10=sslinstall feature-11=wp-toolkit Jan 22 02:29:03 host sudo: wp-toolkit : (command continued) feature-12=wp-toolkit-deluxe --output=json Jan 22 02:29:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:03 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwevmhonda --output=json Jan 22 02:29:03 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:03 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwevmhonda ; COMMAND=/bin/sh -c cd /home/wwwevmhonda/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 22 02:29:11 host sudo: pam_unix(sudo:session): session opened for user wwwevmhonda by (uid=0) Jan 22 02:29:11 host sudo: pam_unix(sudo:session): session closed for user wwwevmhonda Jan 22 02:29:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwevmhonda LangPHP php_get_vhost_versions --output=json Jan 22 02:29:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 package_manager_get_package_info package-0=ea-php72 --output=json Jan 22 02:29:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:13 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwletsstalkfood --output=json Jan 22 02:29:13 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:13 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwletsstalkfood ; COMMAND=/bin/sh -c cd /home/wwwletsstalkfood/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 22 02:29:25 host sudo: pam_unix(sudo:session): session opened for user wwwletsstalkfood by (uid=0) Jan 22 02:29:25 host sudo: pam_unix(sudo:session): session closed for user wwwletsstalkfood Jan 22 02:29:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood LangPHP php_get_vhost_versions --output=json Jan 22 02:29:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:25 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DomainInfo single_domain_data domain=letsstalkfood.com return_https_redirect_status=1 --output=json Jan 22 02:29:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_vhost_ssl_components --output=json Jan 22 02:29:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 fetch_ssl_vhosts --output=json Jan 22 02:29:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:26 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood Mime list_redirects --output=json Jan 22 02:29:26 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:26 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwletsstalkfood DirectoryPrivacy is_directory_protected dir=/home/wwwletsstalkfood/public_html --output=json Jan 22 02:29:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:40 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=mrsclean --output=json Jan 22 02:29:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean DomainInfo single_domain_data domain=mrsclean.co.in return_https_redirect_status=1 --output=json Jan 22 02:29:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean Mime list_redirects --output=json Jan 22 02:29:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 22 02:29:46 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 22 02:29:46 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 22 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=mrsclean LangPHP php_get_vhost_versions --output=json Jan 22 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/cat /home/ugotscom/.wp-toolkit-identifier Jan 22 02:29:46 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 22 02:29:46 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 22 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=mrsclean ; COMMAND=/bin/sh -c cd /home/mrsclean/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 22 02:29:46 host sudo: pam_unix(sudo:session): session opened for user mrsclean by (uid=0) Jan 22 02:29:46 host sudo: pam_unix(sudo:session): session closed for user mrsclean Jan 22 02:29:46 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=shalinijames --output=json Jan 22 02:29:46 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:46 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=shalinijames ; COMMAND=/bin/sh -c cd /home/shalinijames/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 22 02:29:55 host sudo: pam_unix(sudo:session): session opened for user shalinijames by (uid=0) Jan 22 02:29:55 host sudo: pam_unix(sudo:session): session closed for user shalinijames Jan 22 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames LangPHP php_get_vhost_versions --output=json Jan 22 02:29:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DomainInfo single_domain_data domain=shalinijames.com return_https_redirect_status=1 --output=json Jan 22 02:29:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:55 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:29:55 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames Mime list_redirects --output=json Jan 22 02:29:55 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:29:56 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:30:04 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=shalinijames DirectoryPrivacy is_directory_protected dir=/home/shalinijames/public_html --output=json Jan 22 02:30:04 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:30:04 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:30:08 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwtestugo --output=json Jan 22 02:30:08 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:30:09 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 22 02:30:15 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 22 02:30:15 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 22 02:30:15 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo LangPHP php_get_vhost_versions --output=json Jan 22 02:30:15 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:30:15 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:30:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DomainInfo single_domain_data domain=testugo.in return_https_redirect_status=1 --output=json Jan 22 02:30:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:30:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:30:16 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo Mime list_redirects --output=json Jan 22 02:30:16 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:30:16 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:30:22 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt1 --output=json Jan 22 02:30:22 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:30:22 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:30:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 22 02:30:43 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 22 02:30:43 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 22 02:30:50 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/tt --output=json Jan 22 02:30:50 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:30:50 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:31:00 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwtestugo ; COMMAND=/bin/sh -c cd /home/wwwtestugo/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 22 02:31:00 host sudo: pam_unix(sudo:session): session opened for user wwwtestugo by (uid=0) Jan 22 02:31:00 host sudo: pam_unix(sudo:session): session closed for user wwwtestugo Jan 22 02:31:06 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwtestugo DirectoryPrivacy is_directory_protected dir=/home/wwwtestugo/public_html/HYPE --output=json Jan 22 02:31:06 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:31:06 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:31:10 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=ugotscom --output=json Jan 22 02:31:10 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:31:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DomainInfo single_domain_data domain=ugotechnologies.com return_https_redirect_status=1 --output=json Jan 22 02:31:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:31:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom Mime list_redirects --output=json Jan 22 02:31:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:31:11 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 22 02:31:11 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 22 02:31:11 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 22 02:31:11 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom LangPHP php_get_vhost_versions --output=json Jan 22 02:31:11 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:31:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:31:19 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 22 02:31:19 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 22 02:31:19 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 22 02:31:27 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/UGOCRM/ugo_blg --output=json Jan 22 02:31:27 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:31:27 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:31:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=ugotscom ; COMMAND=/bin/sh -c cd /home/ugotscom/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 22 02:31:35 host sudo: pam_unix(sudo:session): session opened for user ugotscom by (uid=0) Jan 22 02:31:35 host sudo: pam_unix(sudo:session): session closed for user ugotscom Jan 22 02:31:40 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=ugotscom DirectoryPrivacy is_directory_protected dir=/home/ugotscom/public_html/old/site --output=json Jan 22 02:31:40 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:31:40 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=woodpeck --output=json Jan 22 02:31:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:31:44 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck DomainInfo single_domain_data domain=woodpeckerindia.com return_https_redirect_status=1 --output=json Jan 22 02:31:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:31:44 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck Mime list_redirects --output=json Jan 22 02:31:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:31:44 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=woodpeck ; COMMAND=/bin/sh -c cd /home/woodpeck/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 22 02:31:44 host sudo: pam_unix(sudo:session): session opened for user woodpeck by (uid=0) Jan 22 02:31:44 host sudo: pam_unix(sudo:session): session closed for user woodpeck Jan 22 02:31:44 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck LangPHP php_get_vhost_versions --output=json Jan 22 02:31:44 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:31:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:31:45 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=palco123 --output=json Jan 22 02:31:45 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:31:45 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:31:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=palco123 ; COMMAND=/bin/sh -c cd /home/palco123/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 22 02:31:58 host sudo: pam_unix(sudo:session): session opened for user palco123 by (uid=0) Jan 22 02:31:58 host sudo: pam_unix(sudo:session): session closed for user palco123 Jan 22 02:31:58 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 LangPHP php_get_vhost_versions --output=json Jan 22 02:31:58 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:31:58 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DomainInfo single_domain_data domain=panlys.com return_https_redirect_status=1 --output=json Jan 22 02:31:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:31:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:31:59 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 Mime list_redirects --output=json Jan 22 02:31:59 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:31:59 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:12 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=palco123 DirectoryPrivacy is_directory_protected dir=/home/palco123/public_html --output=json Jan 22 02:32:12 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:12 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:17 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c whmapi1 get_users_links user=wwwresourcehunte --output=json Jan 22 02:32:17 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:17 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=wwwresourcehunte ; COMMAND=/bin/sh -c cd /home/wwwresourcehunte/public_html && /usr/local/bin/php -d display_errors=0 -r 'echo PHP_MAJOR_VERSION.'"'"'.'"'"'.PHP_MINOR_VERSION.'"'"'.'"'"'.PHP_RELEASE_VERSION;' Jan 22 02:32:24 host sudo: pam_unix(sudo:session): session opened for user wwwresourcehunte by (uid=0) Jan 22 02:32:24 host sudo: pam_unix(sudo:session): session closed for user wwwresourcehunte Jan 22 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte LangPHP php_get_vhost_versions --output=json Jan 22 02:32:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:24 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:24 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DomainInfo single_domain_data domain=resourcehunters.com return_https_redirect_status=1 --output=json Jan 22 02:32:24 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:25 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:25 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte Mime list_redirects --output=json Jan 22 02:32:25 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:25 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:31 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=wwwresourcehunte DirectoryPrivacy is_directory_protected dir=/home/wwwresourcehunte/public_html --output=json Jan 22 02:32:31 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:31 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:35 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c uapi --user=woodpeck WpToolkitNotification send_admin_auto_updates_notification 'available_updates_text=<br/><br/>Updates are available for the following items:<br/><br/>' 'available_updates_list=1. Plugin "Country & Phone Field Contact Form 7" on Panlys (https://www.panlys.com). Installed version: 2.2.7. Available version: 2.4.2.<br/><br/>' installed_updates_text= installed_updates_list= 'failure_updates_text=Updates were not installed for the following items:<br/><br/>' 'failure_updates_list=1. Website "EVM Honda Cochin" (http://www.evmhonda.com): Failed to reset cache for the instance #1: Fatal error: Uncaught Error: Call to undefined function cardealer_is_wpml_active() in /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php:1041#012Stack trace:#012#0 Jan 22 02:32:35 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-init.php(22): require_once()#012#1 /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/cardealer-helper-library.php(183): require_once('"'"'/home/wwwevmhon...'"'"')#012#2 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(287): cdhl_include_admin_files('"'"''"'"')#012#3 /home/wwwevmhonda/public_html/wp-includes/class-wp-hook.php(311): WP_Hook->apply_filters(NULL, Array)#012#4 /home/wwwevmhonda/public_html/wp-includes/plugin.php(478): WP_Hook->do_action(Array)#012#5 /home/wwwevmhonda/public_html/wp-settings.php(546): do_action('"'"'init'"'"')#012#6 /usr/local/cpanel/3rdparty/wp-toolkit/plib/vendor/wp-cli/vendor/wp-cli/wp-cli/php/WP_CLI/Runner.php(1356): require('"'"'/home/wwwevmhon...'"'"')#012#7 /usr/local/cpanel/3rdparty/wp-toolkit/plib/ve in Jan 22 02:32:35 host sudo: wp-toolkit : (command continued) /home/wwwevmhonda/public_html/wp-content/plugins/cardealer-helper-library/includes/redux/redux-options.php on line 1041#012Error: There has been a critical error on your website.Learn more about debugging in WordPress. There has been a critical error on your website.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>2. Website "/home/mrsclean/public_html/backup" (http://mrsclean.co.in/backup): Failed to reset cache for the instance #5: Error: Error establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>3. Website "/home/mrsclean/public_html/blog" (http://mrsclean.co.in/blog): Failed to reset cache for the instance #6: Error: Error Jan 22 02:32:35 host sudo: wp-toolkit : (command continued) establishing a database connection. This either means that the username and password information in your `wp-config.php` file is incorrect or we can’t contact the database server at `localhost`. This could mean your host’s database server is down.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>4. Website "/home/ugotscom/public_html/boniface/blog" (http://ugotechnologies.com/boniface/blog): Failed to reset cache for the instance #13: Error: Error establishing a database connection.#012[error]FailedToExecuteWpCliCommand: exit status 1[/error]#012<br/><br/>5. Website "/home/woodpeck/public_html/wp" (http://woodpeckerindia.com/wp): Failed to reset cache for the instance #16: [error]FailedToExecuteWpCliCommand: chdir /home/woodpeck/public_html/wp: no such file or directory[/error]#012<br/><br/>' --output=json Jan 22 02:32:35 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:35 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/sh -c httpd -v Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwevmhonda/evmhonda.com/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwletsstalkfood/letsstalkfood.com/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/shalinijames/shalinijames.com/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/shalinijames/shalinijames.com/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwtestugo/testugo.in/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwtestugo/testugo.in/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:42 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:42 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/ugotscom/ugotechnologies.com/wp-toolkit.conf Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/palco123/panlys.com/wp-toolkit.conf Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/palco123/panlys.com/wp-toolkit.conf Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/palco123/panlys.com/wp-toolkit.conf Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/ssl/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/apache2/conf.d/userdata/std/2_4/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/test -e /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:32:43 host sudo: wp-toolkit : TTY=unknown ; PWD=/usr/local/cpanel/3rdparty/wp-toolkit/scripts ; USER=root ; COMMAND=/bin/cat /etc/nginx/conf.d/users/wwwresourcehunte/resourcehunters.com/wp-toolkit.conf Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session opened for user root by (uid=0) Jan 22 02:32:43 host sudo: pam_unix(sudo:session): session closed for user root Jan 22 02:49:59 host sshd[4104]: invalid public DH value: >= p-1 [preauth] Jan 22 02:49:59 host sshd[4104]: ssh_dispatch_run_fatal: Connection from 59.127.82.132 port 53942: incomplete message [preauth] Jan 22 03:01:40 host sshd[6482]: Invalid user pi from 82.66.77.8 port 37052 Jan 22 03:01:40 host sshd[6482]: input_userauth_request: invalid user pi [preauth] Jan 22 03:01:40 host sshd[6483]: Invalid user pi from 82.66.77.8 port 37050 Jan 22 03:01:40 host sshd[6483]: input_userauth_request: invalid user pi [preauth] Jan 22 03:01:40 host sshd[6482]: pam_unix(sshd:auth): check pass; user unknown Jan 22 03:01:40 host sshd[6482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.66.77.8 Jan 22 03:01:40 host sshd[6483]: pam_unix(sshd:auth): check pass; user unknown Jan 22 03:01:40 host sshd[6483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.66.77.8 Jan 22 03:01:42 host sshd[6482]: Failed password for invalid user pi from 82.66.77.8 port 37052 ssh2 Jan 22 03:01:42 host sshd[6483]: Failed password for invalid user pi from 82.66.77.8 port 37050 ssh2 Jan 22 03:01:42 host sshd[6482]: Connection closed by 82.66.77.8 port 37052 [preauth] Jan 22 03:01:42 host sshd[6483]: Connection closed by 82.66.77.8 port 37050 [preauth]