Feb 9 21:22:23.553000 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 21:22:23.553012 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 21:22:23.553019 kernel: BIOS-provided physical RAM map: Feb 9 21:22:23.553023 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 9 21:22:23.553027 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 9 21:22:23.553030 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 9 21:22:23.553035 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 9 21:22:23.553039 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 9 21:22:23.553043 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000082589fff] usable Feb 9 21:22:23.553047 kernel: BIOS-e820: [mem 0x000000008258a000-0x000000008258afff] ACPI NVS Feb 9 21:22:23.553051 kernel: BIOS-e820: [mem 0x000000008258b000-0x000000008258bfff] reserved Feb 9 21:22:23.553055 kernel: BIOS-e820: [mem 0x000000008258c000-0x000000008afccfff] usable Feb 9 21:22:23.553059 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Feb 9 21:22:23.553063 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Feb 9 21:22:23.553068 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Feb 9 21:22:23.553073 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Feb 9 21:22:23.553077 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Feb 9 21:22:23.553081 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Feb 9 21:22:23.553086 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 9 21:22:23.553090 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 9 21:22:23.553094 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 9 21:22:23.553098 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 9 21:22:23.553102 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 9 21:22:23.553106 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Feb 9 21:22:23.553111 kernel: NX (Execute Disable) protection: active Feb 9 21:22:23.553115 kernel: SMBIOS 3.2.1 present. Feb 9 21:22:23.553120 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Feb 9 21:22:23.553124 kernel: tsc: Detected 3400.000 MHz processor Feb 9 21:22:23.553128 kernel: tsc: Detected 3399.906 MHz TSC Feb 9 21:22:23.553133 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 21:22:23.553137 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 21:22:23.553142 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Feb 9 21:22:23.553146 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 21:22:23.553150 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Feb 9 21:22:23.553155 kernel: Using GB pages for direct mapping Feb 9 21:22:23.553159 kernel: ACPI: Early table checksum verification disabled Feb 9 21:22:23.553164 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 9 21:22:23.553168 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 9 21:22:23.553173 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Feb 9 21:22:23.553177 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 9 21:22:23.553183 kernel: ACPI: FACS 0x000000008C66CF80 000040 Feb 9 21:22:23.553188 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Feb 9 21:22:23.553194 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Feb 9 21:22:23.553198 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 9 21:22:23.553203 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 9 21:22:23.553208 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 9 21:22:23.553212 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 9 21:22:23.553217 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 9 21:22:23.553222 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 9 21:22:23.553226 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 21:22:23.553232 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 9 21:22:23.553237 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 9 21:22:23.553241 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 21:22:23.553246 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 21:22:23.553250 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 9 21:22:23.553255 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 9 21:22:23.553260 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 21:22:23.553264 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 9 21:22:23.553270 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 9 21:22:23.553274 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Feb 9 21:22:23.553279 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 9 21:22:23.553284 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 9 21:22:23.553288 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 9 21:22:23.553293 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Feb 9 21:22:23.553298 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 9 21:22:23.553303 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 9 21:22:23.553307 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 9 21:22:23.553313 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 9 21:22:23.553317 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 9 21:22:23.553322 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Feb 9 21:22:23.553327 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Feb 9 21:22:23.553331 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Feb 9 21:22:23.553336 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Feb 9 21:22:23.553341 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Feb 9 21:22:23.553345 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Feb 9 21:22:23.553351 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Feb 9 21:22:23.553355 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Feb 9 21:22:23.553360 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Feb 9 21:22:23.553365 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Feb 9 21:22:23.553370 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Feb 9 21:22:23.553374 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Feb 9 21:22:23.553379 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Feb 9 21:22:23.553383 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Feb 9 21:22:23.553388 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Feb 9 21:22:23.553394 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Feb 9 21:22:23.553398 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Feb 9 21:22:23.553403 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Feb 9 21:22:23.553407 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Feb 9 21:22:23.553412 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Feb 9 21:22:23.553417 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Feb 9 21:22:23.553421 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Feb 9 21:22:23.553426 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Feb 9 21:22:23.553430 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Feb 9 21:22:23.553436 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Feb 9 21:22:23.553440 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Feb 9 21:22:23.553445 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Feb 9 21:22:23.553450 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Feb 9 21:22:23.553457 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Feb 9 21:22:23.553462 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Feb 9 21:22:23.553467 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Feb 9 21:22:23.553471 kernel: No NUMA configuration found Feb 9 21:22:23.553476 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Feb 9 21:22:23.553481 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Feb 9 21:22:23.553486 kernel: Zone ranges: Feb 9 21:22:23.553491 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 21:22:23.553496 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 21:22:23.553500 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Feb 9 21:22:23.553505 kernel: Movable zone start for each node Feb 9 21:22:23.553509 kernel: Early memory node ranges Feb 9 21:22:23.553514 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 9 21:22:23.553519 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 9 21:22:23.553524 kernel: node 0: [mem 0x0000000040400000-0x0000000082589fff] Feb 9 21:22:23.553529 kernel: node 0: [mem 0x000000008258c000-0x000000008afccfff] Feb 9 21:22:23.553534 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Feb 9 21:22:23.553538 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Feb 9 21:22:23.553543 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Feb 9 21:22:23.553548 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Feb 9 21:22:23.553552 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 21:22:23.553560 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 9 21:22:23.553566 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 9 21:22:23.553571 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 9 21:22:23.553576 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Feb 9 21:22:23.553582 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Feb 9 21:22:23.553587 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Feb 9 21:22:23.553592 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Feb 9 21:22:23.553597 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 9 21:22:23.553602 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 9 21:22:23.553607 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 9 21:22:23.553612 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 9 21:22:23.553618 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 9 21:22:23.553623 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 9 21:22:23.553628 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 9 21:22:23.553633 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 9 21:22:23.553638 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 9 21:22:23.553643 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 9 21:22:23.553648 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 9 21:22:23.553653 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 9 21:22:23.553658 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 9 21:22:23.553663 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 9 21:22:23.553668 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 9 21:22:23.553673 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 9 21:22:23.553678 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 9 21:22:23.553683 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 9 21:22:23.553688 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 21:22:23.553693 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 21:22:23.553698 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 21:22:23.553703 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 21:22:23.553709 kernel: TSC deadline timer available Feb 9 21:22:23.553714 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 9 21:22:23.553719 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Feb 9 21:22:23.553724 kernel: Booting paravirtualized kernel on bare hardware Feb 9 21:22:23.553729 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 21:22:23.553734 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 9 21:22:23.553739 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 9 21:22:23.553744 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 9 21:22:23.553749 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 9 21:22:23.553755 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Feb 9 21:22:23.553760 kernel: Policy zone: Normal Feb 9 21:22:23.553765 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 21:22:23.553771 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 21:22:23.553775 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 9 21:22:23.553780 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 9 21:22:23.553786 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 21:22:23.553791 kernel: Memory: 32724720K/33452980K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 9 21:22:23.553797 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 9 21:22:23.553802 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 21:22:23.553807 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 21:22:23.553812 kernel: rcu: Hierarchical RCU implementation. Feb 9 21:22:23.553817 kernel: rcu: RCU event tracing is enabled. Feb 9 21:22:23.553822 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 9 21:22:23.553827 kernel: Rude variant of Tasks RCU enabled. Feb 9 21:22:23.553832 kernel: Tracing variant of Tasks RCU enabled. Feb 9 21:22:23.553837 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 21:22:23.553843 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 9 21:22:23.553848 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 9 21:22:23.553853 kernel: random: crng init done Feb 9 21:22:23.553858 kernel: Console: colour dummy device 80x25 Feb 9 21:22:23.553863 kernel: printk: console [tty0] enabled Feb 9 21:22:23.553868 kernel: printk: console [ttyS1] enabled Feb 9 21:22:23.553873 kernel: ACPI: Core revision 20210730 Feb 9 21:22:23.553878 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Feb 9 21:22:23.553883 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 21:22:23.553889 kernel: DMAR: Host address width 39 Feb 9 21:22:23.553894 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 9 21:22:23.553899 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 9 21:22:23.553904 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Feb 9 21:22:23.553909 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Feb 9 21:22:23.553914 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 9 21:22:23.553919 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 9 21:22:23.553924 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 9 21:22:23.553929 kernel: x2apic enabled Feb 9 21:22:23.553935 kernel: Switched APIC routing to cluster x2apic. Feb 9 21:22:23.553940 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 9 21:22:23.553945 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 9 21:22:23.553950 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 9 21:22:23.553955 kernel: process: using mwait in idle threads Feb 9 21:22:23.553960 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 21:22:23.553965 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 21:22:23.553970 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 21:22:23.553975 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 9 21:22:23.553981 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 9 21:22:23.553986 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 21:22:23.553990 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 9 21:22:23.553995 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 9 21:22:23.554000 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 21:22:23.554005 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 21:22:23.554010 kernel: TAA: Mitigation: TSX disabled Feb 9 21:22:23.554015 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 9 21:22:23.554020 kernel: SRBDS: Mitigation: Microcode Feb 9 21:22:23.554025 kernel: GDS: Vulnerable: No microcode Feb 9 21:22:23.554030 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 21:22:23.554036 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 21:22:23.554041 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 21:22:23.554046 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 21:22:23.554051 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 21:22:23.554056 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 21:22:23.554060 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 21:22:23.554065 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 21:22:23.554070 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 9 21:22:23.554075 kernel: Freeing SMP alternatives memory: 32K Feb 9 21:22:23.554080 kernel: pid_max: default: 32768 minimum: 301 Feb 9 21:22:23.554085 kernel: LSM: Security Framework initializing Feb 9 21:22:23.554090 kernel: SELinux: Initializing. Feb 9 21:22:23.554096 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 21:22:23.554101 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 21:22:23.554105 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 9 21:22:23.554110 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 9 21:22:23.554115 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 9 21:22:23.554120 kernel: ... version: 4 Feb 9 21:22:23.554125 kernel: ... bit width: 48 Feb 9 21:22:23.554130 kernel: ... generic registers: 4 Feb 9 21:22:23.554135 kernel: ... value mask: 0000ffffffffffff Feb 9 21:22:23.554140 kernel: ... max period: 00007fffffffffff Feb 9 21:22:23.554146 kernel: ... fixed-purpose events: 3 Feb 9 21:22:23.554151 kernel: ... event mask: 000000070000000f Feb 9 21:22:23.554156 kernel: signal: max sigframe size: 2032 Feb 9 21:22:23.554161 kernel: rcu: Hierarchical SRCU implementation. Feb 9 21:22:23.554166 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 9 21:22:23.554171 kernel: smp: Bringing up secondary CPUs ... Feb 9 21:22:23.554176 kernel: x86: Booting SMP configuration: Feb 9 21:22:23.554181 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 9 21:22:23.554186 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 21:22:23.554192 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 9 21:22:23.554197 kernel: smp: Brought up 1 node, 16 CPUs Feb 9 21:22:23.554202 kernel: smpboot: Max logical packages: 1 Feb 9 21:22:23.554207 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 9 21:22:23.554212 kernel: devtmpfs: initialized Feb 9 21:22:23.554217 kernel: x86/mm: Memory block size: 128MB Feb 9 21:22:23.554222 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8258a000-0x8258afff] (4096 bytes) Feb 9 21:22:23.554227 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Feb 9 21:22:23.554233 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 21:22:23.554238 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 9 21:22:23.554243 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 21:22:23.554248 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 21:22:23.554253 kernel: audit: initializing netlink subsys (disabled) Feb 9 21:22:23.554258 kernel: audit: type=2000 audit(1707513738.040:1): state=initialized audit_enabled=0 res=1 Feb 9 21:22:23.554263 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 21:22:23.554268 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 21:22:23.554273 kernel: cpuidle: using governor menu Feb 9 21:22:23.554279 kernel: ACPI: bus type PCI registered Feb 9 21:22:23.554284 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 21:22:23.554289 kernel: dca service started, version 1.12.1 Feb 9 21:22:23.554294 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 9 21:22:23.554299 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 9 21:22:23.554304 kernel: PCI: Using configuration type 1 for base access Feb 9 21:22:23.554309 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 9 21:22:23.554313 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 21:22:23.554318 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 21:22:23.554324 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 21:22:23.554329 kernel: ACPI: Added _OSI(Module Device) Feb 9 21:22:23.554334 kernel: ACPI: Added _OSI(Processor Device) Feb 9 21:22:23.554339 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 21:22:23.554344 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 21:22:23.554349 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 21:22:23.554354 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 21:22:23.554359 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 21:22:23.554364 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 9 21:22:23.554370 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:22:23.554375 kernel: ACPI: SSDT 0xFFFF9B7500213A00 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 9 21:22:23.554380 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 9 21:22:23.554385 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:22:23.554390 kernel: ACPI: SSDT 0xFFFF9B7501AE6000 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 9 21:22:23.554395 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:22:23.554400 kernel: ACPI: SSDT 0xFFFF9B7501A5F800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 9 21:22:23.554405 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:22:23.554410 kernel: ACPI: SSDT 0xFFFF9B7501A5D800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 9 21:22:23.554415 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:22:23.554420 kernel: ACPI: SSDT 0xFFFF9B750014A000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 9 21:22:23.554425 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:22:23.554430 kernel: ACPI: SSDT 0xFFFF9B7501AE2800 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 9 21:22:23.554435 kernel: ACPI: Interpreter enabled Feb 9 21:22:23.554440 kernel: ACPI: PM: (supports S0 S5) Feb 9 21:22:23.554445 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 21:22:23.554450 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 9 21:22:23.554457 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 9 21:22:23.554462 kernel: HEST: Table parsing has been initialized. Feb 9 21:22:23.554467 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 9 21:22:23.554473 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 21:22:23.554478 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 9 21:22:23.554482 kernel: ACPI: PM: Power Resource [USBC] Feb 9 21:22:23.554487 kernel: ACPI: PM: Power Resource [V0PR] Feb 9 21:22:23.554492 kernel: ACPI: PM: Power Resource [V1PR] Feb 9 21:22:23.554497 kernel: ACPI: PM: Power Resource [V2PR] Feb 9 21:22:23.554502 kernel: ACPI: PM: Power Resource [WRST] Feb 9 21:22:23.554507 kernel: ACPI: PM: Power Resource [FN00] Feb 9 21:22:23.554513 kernel: ACPI: PM: Power Resource [FN01] Feb 9 21:22:23.554518 kernel: ACPI: PM: Power Resource [FN02] Feb 9 21:22:23.554523 kernel: ACPI: PM: Power Resource [FN03] Feb 9 21:22:23.554528 kernel: ACPI: PM: Power Resource [FN04] Feb 9 21:22:23.554533 kernel: ACPI: PM: Power Resource [PIN] Feb 9 21:22:23.554538 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 9 21:22:23.554604 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 21:22:23.554649 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 9 21:22:23.554692 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 9 21:22:23.554699 kernel: PCI host bridge to bus 0000:00 Feb 9 21:22:23.554742 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 21:22:23.554779 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 21:22:23.554815 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 21:22:23.554852 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Feb 9 21:22:23.554887 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 9 21:22:23.554925 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 9 21:22:23.554975 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 9 21:22:23.555022 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 9 21:22:23.555064 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 9 21:22:23.555111 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 9 21:22:23.555152 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Feb 9 21:22:23.555201 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 9 21:22:23.555244 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Feb 9 21:22:23.555289 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 9 21:22:23.555330 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Feb 9 21:22:23.555374 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 9 21:22:23.555419 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 9 21:22:23.555466 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Feb 9 21:22:23.555507 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Feb 9 21:22:23.555551 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 9 21:22:23.555593 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 21:22:23.555638 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 9 21:22:23.555679 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 21:22:23.555723 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 9 21:22:23.555766 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Feb 9 21:22:23.555806 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 9 21:22:23.555849 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 9 21:22:23.555891 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Feb 9 21:22:23.555932 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 9 21:22:23.555978 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 9 21:22:23.556022 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Feb 9 21:22:23.556062 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 9 21:22:23.556105 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 9 21:22:23.556147 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Feb 9 21:22:23.556187 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Feb 9 21:22:23.556228 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Feb 9 21:22:23.556268 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Feb 9 21:22:23.556316 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Feb 9 21:22:23.556358 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Feb 9 21:22:23.556399 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 9 21:22:23.556443 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 9 21:22:23.556487 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 9 21:22:23.556534 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 9 21:22:23.556576 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 9 21:22:23.556624 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 9 21:22:23.556666 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 9 21:22:23.556711 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 9 21:22:23.556753 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 9 21:22:23.556800 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Feb 9 21:22:23.556844 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Feb 9 21:22:23.556888 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 9 21:22:23.556931 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 21:22:23.556977 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 9 21:22:23.557023 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 9 21:22:23.557064 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Feb 9 21:22:23.557106 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 9 21:22:23.557149 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 9 21:22:23.557190 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 9 21:22:23.557238 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Feb 9 21:22:23.557281 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 9 21:22:23.557327 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Feb 9 21:22:23.557369 kernel: pci 0000:01:00.0: PME# supported from D3cold Feb 9 21:22:23.557412 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 21:22:23.557458 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 21:22:23.557508 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Feb 9 21:22:23.557565 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 9 21:22:23.557610 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Feb 9 21:22:23.557652 kernel: pci 0000:01:00.1: PME# supported from D3cold Feb 9 21:22:23.557694 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 21:22:23.557735 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 21:22:23.557776 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 21:22:23.557818 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 9 21:22:23.557858 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 21:22:23.557898 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 9 21:22:23.557946 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Feb 9 21:22:23.557989 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Feb 9 21:22:23.558031 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Feb 9 21:22:23.558074 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Feb 9 21:22:23.558115 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 9 21:22:23.558156 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 9 21:22:23.558196 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 21:22:23.558236 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 9 21:22:23.558284 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 9 21:22:23.558327 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Feb 9 21:22:23.558370 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Feb 9 21:22:23.558411 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Feb 9 21:22:23.558456 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 9 21:22:23.558539 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 9 21:22:23.558581 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 21:22:23.558624 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 9 21:22:23.558667 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 9 21:22:23.558716 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Feb 9 21:22:23.558759 kernel: pci 0000:06:00.0: enabling Extended Tags Feb 9 21:22:23.558802 kernel: pci 0000:06:00.0: supports D1 D2 Feb 9 21:22:23.558844 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 21:22:23.558887 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 9 21:22:23.558928 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 9 21:22:23.558970 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 9 21:22:23.559015 kernel: pci_bus 0000:07: extended config space not accessible Feb 9 21:22:23.559063 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Feb 9 21:22:23.559107 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Feb 9 21:22:23.559152 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Feb 9 21:22:23.559250 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Feb 9 21:22:23.559295 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 21:22:23.559340 kernel: pci 0000:07:00.0: supports D1 D2 Feb 9 21:22:23.559385 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 21:22:23.559427 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 9 21:22:23.559496 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 9 21:22:23.559558 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 9 21:22:23.559565 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 9 21:22:23.559571 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 9 21:22:23.559576 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 9 21:22:23.559583 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 9 21:22:23.559588 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 9 21:22:23.559593 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 9 21:22:23.559598 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 9 21:22:23.559603 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 9 21:22:23.559609 kernel: iommu: Default domain type: Translated Feb 9 21:22:23.559614 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 21:22:23.559658 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Feb 9 21:22:23.559704 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 21:22:23.559748 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Feb 9 21:22:23.559756 kernel: vgaarb: loaded Feb 9 21:22:23.559761 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 21:22:23.559767 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 21:22:23.559772 kernel: PTP clock support registered Feb 9 21:22:23.559777 kernel: PCI: Using ACPI for IRQ routing Feb 9 21:22:23.559782 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 21:22:23.559787 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 9 21:22:23.559794 kernel: e820: reserve RAM buffer [mem 0x8258a000-0x83ffffff] Feb 9 21:22:23.559799 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Feb 9 21:22:23.559804 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Feb 9 21:22:23.559809 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Feb 9 21:22:23.559814 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Feb 9 21:22:23.559819 kernel: clocksource: Switched to clocksource tsc-early Feb 9 21:22:23.559825 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 21:22:23.559830 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 21:22:23.559835 kernel: pnp: PnP ACPI init Feb 9 21:22:23.559881 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 9 21:22:23.559923 kernel: pnp 00:02: [dma 0 disabled] Feb 9 21:22:23.559963 kernel: pnp 00:03: [dma 0 disabled] Feb 9 21:22:23.560002 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 9 21:22:23.560039 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 9 21:22:23.560078 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 9 21:22:23.560120 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 9 21:22:23.560157 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 9 21:22:23.560193 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 9 21:22:23.560230 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 9 21:22:23.560266 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 9 21:22:23.560302 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 9 21:22:23.560338 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 9 21:22:23.560377 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 9 21:22:23.560419 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 9 21:22:23.560480 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 9 21:22:23.560538 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 9 21:22:23.560574 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 9 21:22:23.560612 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 9 21:22:23.560648 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 9 21:22:23.560687 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 9 21:22:23.560727 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 9 21:22:23.560735 kernel: pnp: PnP ACPI: found 10 devices Feb 9 21:22:23.560741 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 21:22:23.560746 kernel: NET: Registered PF_INET protocol family Feb 9 21:22:23.560751 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 21:22:23.560757 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 21:22:23.560762 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 21:22:23.560769 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 21:22:23.560774 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 21:22:23.560779 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 9 21:22:23.560784 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 21:22:23.560790 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 21:22:23.560795 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 21:22:23.560800 kernel: NET: Registered PF_XDP protocol family Feb 9 21:22:23.560844 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Feb 9 21:22:23.560887 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Feb 9 21:22:23.560928 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Feb 9 21:22:23.560971 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 21:22:23.561013 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 21:22:23.561057 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 21:22:23.561098 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 21:22:23.561140 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 21:22:23.561181 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 9 21:22:23.561224 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 21:22:23.561265 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 9 21:22:23.561306 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 9 21:22:23.561346 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 21:22:23.561387 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 9 21:22:23.561430 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 9 21:22:23.561495 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 21:22:23.561556 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 9 21:22:23.561596 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 9 21:22:23.561639 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 9 21:22:23.561681 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 9 21:22:23.561724 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 9 21:22:23.561764 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 9 21:22:23.561805 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 9 21:22:23.561848 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 9 21:22:23.561885 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 9 21:22:23.561922 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 21:22:23.561957 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 21:22:23.561993 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 21:22:23.562028 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Feb 9 21:22:23.562063 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 9 21:22:23.562105 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Feb 9 21:22:23.562145 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 21:22:23.562189 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Feb 9 21:22:23.562228 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Feb 9 21:22:23.562270 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Feb 9 21:22:23.562308 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Feb 9 21:22:23.562350 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Feb 9 21:22:23.562391 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Feb 9 21:22:23.562430 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 9 21:22:23.562496 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Feb 9 21:22:23.562503 kernel: PCI: CLS 64 bytes, default 64 Feb 9 21:22:23.562509 kernel: DMAR: No ATSR found Feb 9 21:22:23.562516 kernel: DMAR: No SATC found Feb 9 21:22:23.562521 kernel: DMAR: dmar0: Using Queued invalidation Feb 9 21:22:23.562563 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 9 21:22:23.562607 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 9 21:22:23.562649 kernel: pci 0000:00:08.0: Adding to iommu group 2 Feb 9 21:22:23.562690 kernel: pci 0000:00:12.0: Adding to iommu group 3 Feb 9 21:22:23.562732 kernel: pci 0000:00:14.0: Adding to iommu group 4 Feb 9 21:22:23.562772 kernel: pci 0000:00:14.2: Adding to iommu group 4 Feb 9 21:22:23.562815 kernel: pci 0000:00:15.0: Adding to iommu group 5 Feb 9 21:22:23.562855 kernel: pci 0000:00:15.1: Adding to iommu group 5 Feb 9 21:22:23.562898 kernel: pci 0000:00:16.0: Adding to iommu group 6 Feb 9 21:22:23.562941 kernel: pci 0000:00:16.1: Adding to iommu group 6 Feb 9 21:22:23.562983 kernel: pci 0000:00:16.4: Adding to iommu group 6 Feb 9 21:22:23.563024 kernel: pci 0000:00:17.0: Adding to iommu group 7 Feb 9 21:22:23.563066 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Feb 9 21:22:23.563107 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Feb 9 21:22:23.563149 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Feb 9 21:22:23.563191 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Feb 9 21:22:23.563232 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Feb 9 21:22:23.563275 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Feb 9 21:22:23.563316 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Feb 9 21:22:23.563359 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Feb 9 21:22:23.563399 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Feb 9 21:22:23.563442 kernel: pci 0000:01:00.0: Adding to iommu group 1 Feb 9 21:22:23.563490 kernel: pci 0000:01:00.1: Adding to iommu group 1 Feb 9 21:22:23.563533 kernel: pci 0000:03:00.0: Adding to iommu group 15 Feb 9 21:22:23.563577 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 9 21:22:23.563623 kernel: pci 0000:06:00.0: Adding to iommu group 17 Feb 9 21:22:23.563669 kernel: pci 0000:07:00.0: Adding to iommu group 17 Feb 9 21:22:23.563676 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 9 21:22:23.563682 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 21:22:23.563708 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Feb 9 21:22:23.563713 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Feb 9 21:22:23.563719 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 9 21:22:23.563724 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 9 21:22:23.563730 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 9 21:22:23.563774 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 9 21:22:23.563782 kernel: Initialise system trusted keyrings Feb 9 21:22:23.563787 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 9 21:22:23.563792 kernel: Key type asymmetric registered Feb 9 21:22:23.563797 kernel: Asymmetric key parser 'x509' registered Feb 9 21:22:23.563802 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 21:22:23.563808 kernel: io scheduler mq-deadline registered Feb 9 21:22:23.563814 kernel: io scheduler kyber registered Feb 9 21:22:23.563820 kernel: io scheduler bfq registered Feb 9 21:22:23.563861 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Feb 9 21:22:23.563902 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Feb 9 21:22:23.563945 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Feb 9 21:22:23.563986 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Feb 9 21:22:23.564026 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Feb 9 21:22:23.564067 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Feb 9 21:22:23.564114 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 9 21:22:23.564122 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 9 21:22:23.564128 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 9 21:22:23.564133 kernel: pstore: Registered erst as persistent store backend Feb 9 21:22:23.564138 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 21:22:23.564144 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 21:22:23.564149 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 21:22:23.564154 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 21:22:23.564161 kernel: hpet_acpi_add: no address or irqs in _CRS Feb 9 21:22:23.564203 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 9 21:22:23.564211 kernel: i8042: PNP: No PS/2 controller found. Feb 9 21:22:23.564246 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 9 21:22:23.564285 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 9 21:22:23.564321 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-09T21:22:22 UTC (1707513742) Feb 9 21:22:23.564358 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 9 21:22:23.564365 kernel: fail to initialize ptp_kvm Feb 9 21:22:23.564372 kernel: intel_pstate: Intel P-state driver initializing Feb 9 21:22:23.564377 kernel: intel_pstate: Disabling energy efficiency optimization Feb 9 21:22:23.564383 kernel: intel_pstate: HWP enabled Feb 9 21:22:23.564388 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 9 21:22:23.564393 kernel: vesafb: scrolling: redraw Feb 9 21:22:23.564398 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 9 21:22:23.564404 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x0000000077665040, using 768k, total 768k Feb 9 21:22:23.564409 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 21:22:23.564415 kernel: fb0: VESA VGA frame buffer device Feb 9 21:22:23.564421 kernel: NET: Registered PF_INET6 protocol family Feb 9 21:22:23.564426 kernel: Segment Routing with IPv6 Feb 9 21:22:23.564431 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 21:22:23.564436 kernel: NET: Registered PF_PACKET protocol family Feb 9 21:22:23.564441 kernel: Key type dns_resolver registered Feb 9 21:22:23.564446 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 9 21:22:23.564452 kernel: microcode: Microcode Update Driver: v2.2. Feb 9 21:22:23.564480 kernel: IPI shorthand broadcast: enabled Feb 9 21:22:23.564485 kernel: sched_clock: Marking stable (1676662347, 1339690671)->(4435993806, -1419640788) Feb 9 21:22:23.564491 kernel: registered taskstats version 1 Feb 9 21:22:23.564497 kernel: Loading compiled-in X.509 certificates Feb 9 21:22:23.564502 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 21:22:23.564527 kernel: Key type .fscrypt registered Feb 9 21:22:23.564532 kernel: Key type fscrypt-provisioning registered Feb 9 21:22:23.564537 kernel: pstore: Using crash dump compression: deflate Feb 9 21:22:23.564543 kernel: ima: Allocated hash algorithm: sha1 Feb 9 21:22:23.564548 kernel: ima: No architecture policies found Feb 9 21:22:23.564553 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 21:22:23.564559 kernel: Write protecting the kernel read-only data: 28672k Feb 9 21:22:23.564564 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 21:22:23.564570 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 21:22:23.564575 kernel: Run /init as init process Feb 9 21:22:23.564580 kernel: with arguments: Feb 9 21:22:23.564585 kernel: /init Feb 9 21:22:23.564591 kernel: with environment: Feb 9 21:22:23.564596 kernel: HOME=/ Feb 9 21:22:23.564601 kernel: TERM=linux Feb 9 21:22:23.564606 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 21:22:23.564613 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 21:22:23.564619 systemd[1]: Detected architecture x86-64. Feb 9 21:22:23.564625 systemd[1]: Running in initrd. Feb 9 21:22:23.564630 systemd[1]: No hostname configured, using default hostname. Feb 9 21:22:23.564636 systemd[1]: Hostname set to . Feb 9 21:22:23.564641 systemd[1]: Initializing machine ID from random generator. Feb 9 21:22:23.564647 systemd[1]: Queued start job for default target initrd.target. Feb 9 21:22:23.564653 systemd[1]: Started systemd-ask-password-console.path. Feb 9 21:22:23.564658 systemd[1]: Reached target cryptsetup.target. Feb 9 21:22:23.564663 systemd[1]: Reached target paths.target. Feb 9 21:22:23.564669 systemd[1]: Reached target slices.target. Feb 9 21:22:23.564674 systemd[1]: Reached target swap.target. Feb 9 21:22:23.564679 systemd[1]: Reached target timers.target. Feb 9 21:22:23.564684 systemd[1]: Listening on iscsid.socket. Feb 9 21:22:23.564691 systemd[1]: Listening on iscsiuio.socket. Feb 9 21:22:23.564696 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 21:22:23.564702 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 21:22:23.564707 systemd[1]: Listening on systemd-journald.socket. Feb 9 21:22:23.564713 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Feb 9 21:22:23.564718 systemd[1]: Listening on systemd-networkd.socket. Feb 9 21:22:23.564723 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Feb 9 21:22:23.564729 kernel: clocksource: Switched to clocksource tsc Feb 9 21:22:23.564735 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 21:22:23.564740 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 21:22:23.564746 systemd[1]: Reached target sockets.target. Feb 9 21:22:23.564751 systemd[1]: Starting kmod-static-nodes.service... Feb 9 21:22:23.564756 systemd[1]: Finished network-cleanup.service. Feb 9 21:22:23.564762 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 21:22:23.564767 systemd[1]: Starting systemd-journald.service... Feb 9 21:22:23.564773 systemd[1]: Starting systemd-modules-load.service... Feb 9 21:22:23.564780 systemd-journald[266]: Journal started Feb 9 21:22:23.564806 systemd-journald[266]: Runtime Journal (/run/log/journal/5f7303b284a842ae9a0fbb1199e3e868) is 8.0M, max 640.1M, 632.1M free. Feb 9 21:22:23.568157 systemd-modules-load[267]: Inserted module 'overlay' Feb 9 21:22:23.598145 kernel: audit: type=1334 audit(1707513743.574:2): prog-id=6 op=LOAD Feb 9 21:22:23.598156 systemd[1]: Starting systemd-resolved.service... Feb 9 21:22:23.574000 audit: BPF prog-id=6 op=LOAD Feb 9 21:22:23.642497 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 21:22:23.642540 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 21:22:23.674496 kernel: Bridge firewalling registered Feb 9 21:22:23.674515 systemd[1]: Started systemd-journald.service. Feb 9 21:22:23.689341 systemd-modules-load[267]: Inserted module 'br_netfilter' Feb 9 21:22:23.737692 kernel: audit: type=1130 audit(1707513743.697:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:23.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:23.695202 systemd-resolved[269]: Positive Trust Anchors: Feb 9 21:22:23.794582 kernel: SCSI subsystem initialized Feb 9 21:22:23.794603 kernel: audit: type=1130 audit(1707513743.749:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:23.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:23.695209 systemd-resolved[269]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 21:22:23.916546 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 21:22:23.916560 kernel: audit: type=1130 audit(1707513743.820:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:23.916568 kernel: device-mapper: uevent: version 1.0.3 Feb 9 21:22:23.916575 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 21:22:23.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:23.695230 systemd-resolved[269]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 21:22:24.013663 kernel: audit: type=1130 audit(1707513743.924:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:23.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:23.696775 systemd-resolved[269]: Defaulting to hostname 'linux'. Feb 9 21:22:24.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:23.697664 systemd[1]: Started systemd-resolved.service. Feb 9 21:22:24.123984 kernel: audit: type=1130 audit(1707513744.022:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:24.123998 kernel: audit: type=1130 audit(1707513744.077:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:24.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:23.749640 systemd[1]: Finished kmod-static-nodes.service. Feb 9 21:22:23.820615 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 21:22:23.918219 systemd-modules-load[267]: Inserted module 'dm_multipath' Feb 9 21:22:23.924885 systemd[1]: Finished systemd-modules-load.service. Feb 9 21:22:24.022922 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 21:22:24.077726 systemd[1]: Reached target nss-lookup.target. Feb 9 21:22:24.133073 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 21:22:24.153044 systemd[1]: Starting systemd-sysctl.service... Feb 9 21:22:24.153359 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 21:22:24.156230 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 21:22:24.205976 kernel: audit: type=1130 audit(1707513744.155:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:24.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:24.157007 systemd[1]: Finished systemd-sysctl.service. Feb 9 21:22:24.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:24.220935 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 21:22:24.285575 kernel: audit: type=1130 audit(1707513744.220:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:24.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:24.278065 systemd[1]: Starting dracut-cmdline.service... Feb 9 21:22:24.299566 dracut-cmdline[293]: dracut-dracut-053 Feb 9 21:22:24.299566 dracut-cmdline[293]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 9 21:22:24.299566 dracut-cmdline[293]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 21:22:24.368494 kernel: Loading iSCSI transport class v2.0-870. Feb 9 21:22:24.368507 kernel: iscsi: registered transport (tcp) Feb 9 21:22:24.418860 kernel: iscsi: registered transport (qla4xxx) Feb 9 21:22:24.418879 kernel: QLogic iSCSI HBA Driver Feb 9 21:22:24.435023 systemd[1]: Finished dracut-cmdline.service. Feb 9 21:22:24.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:24.435583 systemd[1]: Starting dracut-pre-udev.service... Feb 9 21:22:24.490460 kernel: raid6: avx2x4 gen() 46127 MB/s Feb 9 21:22:24.525459 kernel: raid6: avx2x4 xor() 21959 MB/s Feb 9 21:22:24.560459 kernel: raid6: avx2x2 gen() 53897 MB/s Feb 9 21:22:24.595489 kernel: raid6: avx2x2 xor() 32172 MB/s Feb 9 21:22:24.630492 kernel: raid6: avx2x1 gen() 45287 MB/s Feb 9 21:22:24.665489 kernel: raid6: avx2x1 xor() 27927 MB/s Feb 9 21:22:24.699460 kernel: raid6: sse2x4 gen() 21348 MB/s Feb 9 21:22:24.733485 kernel: raid6: sse2x4 xor() 11985 MB/s Feb 9 21:22:24.767536 kernel: raid6: sse2x2 gen() 21659 MB/s Feb 9 21:22:24.801488 kernel: raid6: sse2x2 xor() 13455 MB/s Feb 9 21:22:24.835531 kernel: raid6: sse2x1 gen() 18295 MB/s Feb 9 21:22:24.887408 kernel: raid6: sse2x1 xor() 8929 MB/s Feb 9 21:22:24.887423 kernel: raid6: using algorithm avx2x2 gen() 53897 MB/s Feb 9 21:22:24.887431 kernel: raid6: .... xor() 32172 MB/s, rmw enabled Feb 9 21:22:24.905622 kernel: raid6: using avx2x2 recovery algorithm Feb 9 21:22:24.951462 kernel: xor: automatically using best checksumming function avx Feb 9 21:22:25.030492 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 21:22:25.035639 systemd[1]: Finished dracut-pre-udev.service. Feb 9 21:22:25.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:25.044000 audit: BPF prog-id=7 op=LOAD Feb 9 21:22:25.044000 audit: BPF prog-id=8 op=LOAD Feb 9 21:22:25.045302 systemd[1]: Starting systemd-udevd.service... Feb 9 21:22:25.053132 systemd-udevd[474]: Using default interface naming scheme 'v252'. Feb 9 21:22:25.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:25.060748 systemd[1]: Started systemd-udevd.service. Feb 9 21:22:25.099589 dracut-pre-trigger[487]: rd.md=0: removing MD RAID activation Feb 9 21:22:25.075200 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 21:22:25.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:25.104564 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 21:22:25.118940 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 21:22:25.170020 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 21:22:25.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:25.199473 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 21:22:25.201466 kernel: libata version 3.00 loaded. Feb 9 21:22:25.201494 kernel: ACPI: bus type USB registered Feb 9 21:22:25.236082 kernel: usbcore: registered new interface driver usbfs Feb 9 21:22:25.236128 kernel: usbcore: registered new interface driver hub Feb 9 21:22:25.254361 kernel: usbcore: registered new device driver usb Feb 9 21:22:25.272466 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 21:22:25.305276 kernel: AES CTR mode by8 optimization enabled Feb 9 21:22:25.339520 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 9 21:22:25.339538 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 9 21:22:25.342461 kernel: ahci 0000:00:17.0: version 3.0 Feb 9 21:22:25.353511 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 21:22:25.353586 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Feb 9 21:22:25.353643 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Feb 9 21:22:25.353696 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 9 21:22:25.360501 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 9 21:22:25.378529 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 9 21:22:25.378598 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 21:22:25.378651 kernel: pps pps0: new PPS source ptp0 Feb 9 21:22:25.378706 kernel: igb 0000:03:00.0: added PHC on eth0 Feb 9 21:22:25.378760 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 21:22:25.378811 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) ac:1f:6b:7b:e7:b6 Feb 9 21:22:25.378861 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Feb 9 21:22:25.378909 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 21:22:25.388458 kernel: scsi host0: ahci Feb 9 21:22:25.388528 kernel: scsi host1: ahci Feb 9 21:22:25.388595 kernel: scsi host2: ahci Feb 9 21:22:25.388649 kernel: scsi host3: ahci Feb 9 21:22:25.388705 kernel: scsi host4: ahci Feb 9 21:22:25.388756 kernel: scsi host5: ahci Feb 9 21:22:25.388812 kernel: scsi host6: ahci Feb 9 21:22:25.388870 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 132 Feb 9 21:22:25.388881 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 132 Feb 9 21:22:25.388888 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 132 Feb 9 21:22:25.388894 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 132 Feb 9 21:22:25.388902 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 132 Feb 9 21:22:25.388909 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 132 Feb 9 21:22:25.388915 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 132 Feb 9 21:22:25.396510 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 21:22:25.453374 kernel: pps pps1: new PPS source ptp1 Feb 9 21:22:25.453476 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 9 21:22:25.453557 kernel: igb 0000:04:00.0: added PHC on eth1 Feb 9 21:22:25.472661 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 9 21:22:25.501226 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 21:22:25.517721 kernel: hub 1-0:1.0: USB hub found Feb 9 21:22:25.517803 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) ac:1f:6b:7b:e7:b7 Feb 9 21:22:25.517859 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Feb 9 21:22:25.548331 kernel: hub 1-0:1.0: 16 ports detected Feb 9 21:22:25.548404 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 21:22:25.575875 kernel: hub 2-0:1.0: USB hub found Feb 9 21:22:25.678530 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 21:22:25.678605 kernel: hub 2-0:1.0: 10 ports detected Feb 9 21:22:25.691522 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 9 21:22:25.692517 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 9 21:22:25.706460 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 21:22:25.706532 kernel: usb: port power management may be unreliable Feb 9 21:22:25.720501 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 9 21:22:25.905495 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 9 21:22:25.905524 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 21:22:25.915503 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 21:22:25.931502 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Feb 9 21:22:25.931578 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 9 21:22:25.961218 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 21:22:25.961291 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 21:22:26.065527 kernel: hub 1-14:1.0: USB hub found Feb 9 21:22:26.065681 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 9 21:22:26.125498 kernel: hub 1-14:1.0: 4 ports detected Feb 9 21:22:26.125573 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 21:22:26.168056 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 9 21:22:26.197206 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 21:22:26.197221 kernel: ata2.00: Features: NCQ-prio Feb 9 21:22:26.227586 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 21:22:26.227601 kernel: ata1.00: Features: NCQ-prio Feb 9 21:22:26.243501 kernel: ata2.00: configured for UDMA/133 Feb 9 21:22:26.259524 kernel: ata1.00: configured for UDMA/133 Feb 9 21:22:26.259539 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 21:22:26.259603 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 21:22:26.295459 kernel: port_module: 9 callbacks suppressed Feb 9 21:22:26.295476 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Feb 9 21:22:26.295549 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 9 21:22:26.326469 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 21:22:26.380461 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Feb 9 21:22:26.401134 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 21:22:26.401154 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 21:22:26.416699 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Feb 9 21:22:26.416818 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 21:22:26.430457 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 21:22:26.430577 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 9 21:22:26.430642 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 9 21:22:26.430707 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 9 21:22:26.430772 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 21:22:26.430834 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 21:22:26.430843 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 21:22:26.430850 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 9 21:22:26.451390 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 9 21:22:26.451414 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 21:22:26.550459 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 21:22:26.550540 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 21:22:26.633460 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 21:22:26.633476 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 9 21:22:26.633596 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 21:22:26.683824 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 21:22:26.717808 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 21:22:26.717824 kernel: GPT:9289727 != 937703087 Feb 9 21:22:26.717831 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 21:22:26.734336 kernel: GPT:9289727 != 937703087 Feb 9 21:22:26.748329 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 21:22:26.763871 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 21:22:26.794146 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 21:22:26.794161 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 21:22:26.827460 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Feb 9 21:22:26.836004 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 21:22:26.908587 kernel: usbcore: registered new interface driver usbhid Feb 9 21:22:26.908600 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (527) Feb 9 21:22:26.908607 kernel: usbhid: USB HID core driver Feb 9 21:22:26.908613 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 9 21:22:26.876532 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 21:22:26.931485 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Feb 9 21:22:26.931267 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 21:22:26.953528 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 21:22:26.962273 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 21:22:27.080571 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 9 21:22:27.080657 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 9 21:22:27.080666 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 9 21:22:27.080733 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 21:22:27.068524 systemd[1]: Starting disk-uuid.service... Feb 9 21:22:27.105542 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 21:22:27.105586 disk-uuid[687]: Primary Header is updated. Feb 9 21:22:27.105586 disk-uuid[687]: Secondary Entries is updated. Feb 9 21:22:27.105586 disk-uuid[687]: Secondary Header is updated. Feb 9 21:22:27.160553 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 21:22:27.160564 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 21:22:27.160570 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 21:22:27.187480 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 21:22:28.167762 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 21:22:28.186517 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 21:22:28.186849 disk-uuid[689]: The operation has completed successfully. Feb 9 21:22:28.222351 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 21:22:28.319521 kernel: audit: type=1130 audit(1707513748.229:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.319539 kernel: audit: type=1131 audit(1707513748.229:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.222419 systemd[1]: Finished disk-uuid.service. Feb 9 21:22:28.350498 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 21:22:28.233611 systemd[1]: Starting verity-setup.service... Feb 9 21:22:28.382565 systemd[1]: Found device dev-mapper-usr.device. Feb 9 21:22:28.391482 systemd[1]: Mounting sysusr-usr.mount... Feb 9 21:22:28.406712 systemd[1]: Finished verity-setup.service. Feb 9 21:22:28.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.468460 kernel: audit: type=1130 audit(1707513748.421:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.498052 systemd[1]: Mounted sysusr-usr.mount. Feb 9 21:22:28.511652 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 21:22:28.504741 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 21:22:28.505135 systemd[1]: Starting ignition-setup.service... Feb 9 21:22:28.595998 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 21:22:28.596012 kernel: BTRFS info (device sda6): using free space tree Feb 9 21:22:28.596019 kernel: BTRFS info (device sda6): has skinny extents Feb 9 21:22:28.596029 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 21:22:28.536899 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 21:22:28.603903 systemd[1]: Finished ignition-setup.service. Feb 9 21:22:28.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.612860 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 21:22:28.720135 kernel: audit: type=1130 audit(1707513748.612:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.720227 kernel: audit: type=1130 audit(1707513748.670:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.671148 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 21:22:28.751335 kernel: audit: type=1334 audit(1707513748.728:24): prog-id=9 op=LOAD Feb 9 21:22:28.728000 audit: BPF prog-id=9 op=LOAD Feb 9 21:22:28.729375 systemd[1]: Starting systemd-networkd.service... Feb 9 21:22:28.765311 systemd-networkd[879]: lo: Link UP Feb 9 21:22:28.832709 kernel: audit: type=1130 audit(1707513748.776:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.765314 systemd-networkd[879]: lo: Gained carrier Feb 9 21:22:28.794063 ignition[867]: Ignition 2.14.0 Feb 9 21:22:28.765599 systemd-networkd[879]: Enumeration completed Feb 9 21:22:28.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.794069 ignition[867]: Stage: fetch-offline Feb 9 21:22:28.996238 kernel: audit: type=1130 audit(1707513748.862:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.996262 kernel: audit: type=1130 audit(1707513748.922:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.996281 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 21:22:28.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.765644 systemd[1]: Started systemd-networkd.service. Feb 9 21:22:29.021504 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Feb 9 21:22:28.794095 ignition[867]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 21:22:28.766328 systemd-networkd[879]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 21:22:28.794108 ignition[867]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 21:22:28.776539 systemd[1]: Reached target network.target. Feb 9 21:22:29.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.801837 ignition[867]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 21:22:29.083671 iscsid[899]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 21:22:29.083671 iscsid[899]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 21:22:29.083671 iscsid[899]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 21:22:29.083671 iscsid[899]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 21:22:29.083671 iscsid[899]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 21:22:29.083671 iscsid[899]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 21:22:29.083671 iscsid[899]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 21:22:29.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:29.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:28.806017 unknown[867]: fetched base config from "system" Feb 9 21:22:29.241662 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 9 21:22:28.801901 ignition[867]: parsed url from cmdline: "" Feb 9 21:22:28.806021 unknown[867]: fetched user config from "system" Feb 9 21:22:28.801903 ignition[867]: no config URL provided Feb 9 21:22:28.841113 systemd[1]: Starting iscsiuio.service... Feb 9 21:22:28.801907 ignition[867]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 21:22:28.855726 systemd[1]: Started iscsiuio.service. Feb 9 21:22:28.801919 ignition[867]: parsing config with SHA512: 4c09b40c6e87baea88e5d9a48174309c07562668ba9899758a5cba3e00ace50ed5f113f8711ae1b03d72ca85c8f0014ec51e0bbf28ec14e212b42871914e8b77 Feb 9 21:22:28.862794 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 21:22:28.806173 ignition[867]: fetch-offline: fetch-offline passed Feb 9 21:22:28.922707 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 21:22:28.806176 ignition[867]: POST message to Packet Timeline Feb 9 21:22:28.923143 systemd[1]: Starting ignition-kargs.service... Feb 9 21:22:28.806180 ignition[867]: POST Status error: resource requires networking Feb 9 21:22:28.997633 systemd-networkd[879]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 21:22:28.806212 ignition[867]: Ignition finished successfully Feb 9 21:22:29.010029 systemd[1]: Starting iscsid.service... Feb 9 21:22:29.000548 ignition[890]: Ignition 2.14.0 Feb 9 21:22:29.032756 systemd[1]: Started iscsid.service. Feb 9 21:22:29.000551 ignition[890]: Stage: kargs Feb 9 21:22:29.060080 systemd[1]: Starting dracut-initqueue.service... Feb 9 21:22:29.000606 ignition[890]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 21:22:29.073710 systemd[1]: Finished dracut-initqueue.service. Feb 9 21:22:29.000615 ignition[890]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 21:22:29.091668 systemd[1]: Reached target remote-fs-pre.target. Feb 9 21:22:29.001911 ignition[890]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 21:22:29.102743 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 21:22:29.003234 ignition[890]: kargs: kargs passed Feb 9 21:22:29.135868 systemd[1]: Reached target remote-fs.target. Feb 9 21:22:29.003237 ignition[890]: POST message to Packet Timeline Feb 9 21:22:29.162856 systemd[1]: Starting dracut-pre-mount.service... Feb 9 21:22:29.003247 ignition[890]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 21:22:29.192753 systemd[1]: Finished dracut-pre-mount.service. Feb 9 21:22:29.005690 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:38929->[::1]:53: read: connection refused Feb 9 21:22:29.236843 systemd-networkd[879]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 21:22:29.206194 ignition[890]: GET https://metadata.packet.net/metadata: attempt #2 Feb 9 21:22:29.266237 systemd-networkd[879]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 21:22:29.206785 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:51107->[::1]:53: read: connection refused Feb 9 21:22:29.296666 systemd-networkd[879]: enp1s0f1np1: Link UP Feb 9 21:22:29.297084 systemd-networkd[879]: enp1s0f1np1: Gained carrier Feb 9 21:22:29.311933 systemd-networkd[879]: enp1s0f0np0: Link UP Feb 9 21:22:29.312288 systemd-networkd[879]: eno2: Link UP Feb 9 21:22:29.312635 systemd-networkd[879]: eno1: Link UP Feb 9 21:22:29.607482 ignition[890]: GET https://metadata.packet.net/metadata: attempt #3 Feb 9 21:22:29.608633 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:41540->[::1]:53: read: connection refused Feb 9 21:22:30.061222 systemd-networkd[879]: enp1s0f0np0: Gained carrier Feb 9 21:22:30.070721 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Feb 9 21:22:30.096685 systemd-networkd[879]: enp1s0f0np0: DHCPv4 address 147.75.49.127/31, gateway 147.75.49.126 acquired from 145.40.83.140 Feb 9 21:22:30.409114 ignition[890]: GET https://metadata.packet.net/metadata: attempt #4 Feb 9 21:22:30.410375 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:36169->[::1]:53: read: connection refused Feb 9 21:22:30.550042 systemd-networkd[879]: enp1s0f1np1: Gained IPv6LL Feb 9 21:22:31.702032 systemd-networkd[879]: enp1s0f0np0: Gained IPv6LL Feb 9 21:22:32.011808 ignition[890]: GET https://metadata.packet.net/metadata: attempt #5 Feb 9 21:22:32.013129 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:34471->[::1]:53: read: connection refused Feb 9 21:22:35.216498 ignition[890]: GET https://metadata.packet.net/metadata: attempt #6 Feb 9 21:22:35.254436 ignition[890]: GET result: OK Feb 9 21:22:35.442803 ignition[890]: Ignition finished successfully Feb 9 21:22:35.447578 systemd[1]: Finished ignition-kargs.service. Feb 9 21:22:35.536032 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 21:22:35.536053 kernel: audit: type=1130 audit(1707513755.458:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:35.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:35.468012 ignition[919]: Ignition 2.14.0 Feb 9 21:22:35.460727 systemd[1]: Starting ignition-disks.service... Feb 9 21:22:35.468015 ignition[919]: Stage: disks Feb 9 21:22:35.468071 ignition[919]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 21:22:35.468081 ignition[919]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 21:22:35.469392 ignition[919]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 21:22:35.470868 ignition[919]: disks: disks passed Feb 9 21:22:35.470871 ignition[919]: POST message to Packet Timeline Feb 9 21:22:35.470882 ignition[919]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 21:22:35.493805 ignition[919]: GET result: OK Feb 9 21:22:35.675148 ignition[919]: Ignition finished successfully Feb 9 21:22:35.678109 systemd[1]: Finished ignition-disks.service. Feb 9 21:22:35.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:35.691067 systemd[1]: Reached target initrd-root-device.target. Feb 9 21:22:35.767718 kernel: audit: type=1130 audit(1707513755.690:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:35.753668 systemd[1]: Reached target local-fs-pre.target. Feb 9 21:22:35.753703 systemd[1]: Reached target local-fs.target. Feb 9 21:22:35.776698 systemd[1]: Reached target sysinit.target. Feb 9 21:22:35.790678 systemd[1]: Reached target basic.target. Feb 9 21:22:35.804358 systemd[1]: Starting systemd-fsck-root.service... Feb 9 21:22:35.822782 systemd-fsck[936]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 21:22:35.839945 systemd[1]: Finished systemd-fsck-root.service. Feb 9 21:22:35.930546 kernel: audit: type=1130 audit(1707513755.848:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:35.930560 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 21:22:35.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:35.850569 systemd[1]: Mounting sysroot.mount... Feb 9 21:22:35.938155 systemd[1]: Mounted sysroot.mount. Feb 9 21:22:35.951734 systemd[1]: Reached target initrd-root-fs.target. Feb 9 21:22:35.959394 systemd[1]: Mounting sysroot-usr.mount... Feb 9 21:22:35.984299 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 21:22:35.994479 systemd[1]: Starting flatcar-static-network.service... Feb 9 21:22:36.009692 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 21:22:36.009811 systemd[1]: Reached target ignition-diskful.target. Feb 9 21:22:36.030409 systemd[1]: Mounted sysroot-usr.mount. Feb 9 21:22:36.051664 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 21:22:36.157502 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (947) Feb 9 21:22:36.157516 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 21:22:36.157526 kernel: BTRFS info (device sda6): using free space tree Feb 9 21:22:36.157537 kernel: BTRFS info (device sda6): has skinny extents Feb 9 21:22:36.075018 systemd[1]: Starting initrd-setup-root.service... Feb 9 21:22:36.190701 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 21:22:36.190713 coreos-metadata[943]: Feb 09 21:22:36.109 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 21:22:36.190713 coreos-metadata[943]: Feb 09 21:22:36.153 INFO Fetch successful Feb 9 21:22:36.190713 coreos-metadata[943]: Feb 09 21:22:36.173 INFO wrote hostname ci-3510.3.2-a-9caeba0f1f to /sysroot/etc/hostname Feb 9 21:22:36.394717 kernel: audit: type=1130 audit(1707513756.199:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:36.394737 kernel: audit: type=1130 audit(1707513756.262:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:36.394747 kernel: audit: type=1131 audit(1707513756.262:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:36.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:36.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:36.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:36.394818 coreos-metadata[944]: Feb 09 21:22:36.110 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 21:22:36.394818 coreos-metadata[944]: Feb 09 21:22:36.153 INFO Fetch successful Feb 9 21:22:36.475642 kernel: audit: type=1130 audit(1707513756.403:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:36.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:36.475681 initrd-setup-root[954]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 21:22:36.177745 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 21:22:36.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:36.527662 initrd-setup-root[962]: cut: /sysroot/etc/group: No such file or directory Feb 9 21:22:36.567492 kernel: audit: type=1130 audit(1707513756.499:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:36.200745 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 9 21:22:36.578733 initrd-setup-root[970]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 21:22:36.200785 systemd[1]: Finished flatcar-static-network.service. Feb 9 21:22:36.596693 initrd-setup-root[978]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 21:22:36.262736 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 21:22:36.614679 ignition[1016]: INFO : Ignition 2.14.0 Feb 9 21:22:36.614679 ignition[1016]: INFO : Stage: mount Feb 9 21:22:36.614679 ignition[1016]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 21:22:36.614679 ignition[1016]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 21:22:36.614679 ignition[1016]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 21:22:36.614679 ignition[1016]: INFO : mount: mount passed Feb 9 21:22:36.614679 ignition[1016]: INFO : POST message to Packet Timeline Feb 9 21:22:36.614679 ignition[1016]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 21:22:36.614679 ignition[1016]: INFO : GET result: OK Feb 9 21:22:36.381732 systemd[1]: Finished initrd-setup-root.service. Feb 9 21:22:36.404189 systemd[1]: Starting ignition-mount.service... Feb 9 21:22:36.468040 systemd[1]: Starting sysroot-boot.service... Feb 9 21:22:36.476134 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 21:22:36.476179 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 21:22:36.486419 systemd[1]: Finished sysroot-boot.service. Feb 9 21:22:36.772031 ignition[1016]: INFO : Ignition finished successfully Feb 9 21:22:36.775020 systemd[1]: Finished ignition-mount.service. Feb 9 21:22:36.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:36.792647 systemd[1]: Starting ignition-files.service... Feb 9 21:22:36.863533 kernel: audit: type=1130 audit(1707513756.790:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:36.858361 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 21:22:36.921161 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1034) Feb 9 21:22:36.921176 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 21:22:36.921184 kernel: BTRFS info (device sda6): using free space tree Feb 9 21:22:36.944371 kernel: BTRFS info (device sda6): has skinny extents Feb 9 21:22:36.993467 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 21:22:36.994705 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 21:22:37.010608 ignition[1053]: INFO : Ignition 2.14.0 Feb 9 21:22:37.010608 ignition[1053]: INFO : Stage: files Feb 9 21:22:37.010608 ignition[1053]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 21:22:37.010608 ignition[1053]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 21:22:37.010608 ignition[1053]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 21:22:37.010608 ignition[1053]: DEBUG : files: compiled without relabeling support, skipping Feb 9 21:22:37.010608 ignition[1053]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 21:22:37.010608 ignition[1053]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 21:22:37.127708 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1057) Feb 9 21:22:37.014384 unknown[1053]: wrote ssh authorized keys file for user: core Feb 9 21:22:37.136775 ignition[1053]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 21:22:37.136775 ignition[1053]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 21:22:37.136775 ignition[1053]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 21:22:37.136775 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 21:22:37.136775 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 21:22:37.136775 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 21:22:37.136775 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 21:22:37.136775 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2760511226" Feb 9 21:22:37.136775 ignition[1053]: CRITICAL : files: createFilesystemsFiles: createFiles: op(4): op(5): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2760511226": device or resource busy Feb 9 21:22:37.136775 ignition[1053]: ERROR : files: createFilesystemsFiles: createFiles: op(4): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2760511226", trying btrfs: device or resource busy Feb 9 21:22:37.136775 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2760511226" Feb 9 21:22:37.136775 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2760511226" Feb 9 21:22:37.136775 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [started] unmounting "/mnt/oem2760511226" Feb 9 21:22:37.136775 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [finished] unmounting "/mnt/oem2760511226" Feb 9 21:22:37.136775 ignition[1053]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 21:22:37.136775 ignition[1053]: INFO : files: op(8): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 21:22:37.136775 ignition[1053]: INFO : files: op(8): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 21:22:37.497696 kernel: audit: type=1130 audit(1707513757.308:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.293470 systemd[1]: Finished ignition-files.service. Feb 9 21:22:37.512732 ignition[1053]: INFO : files: op(9): [started] processing unit "packet-phone-home.service" Feb 9 21:22:37.512732 ignition[1053]: INFO : files: op(9): [finished] processing unit "packet-phone-home.service" Feb 9 21:22:37.512732 ignition[1053]: INFO : files: op(a): [started] processing unit "etcd-member.service" Feb 9 21:22:37.512732 ignition[1053]: INFO : files: op(a): op(b): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 9 21:22:37.512732 ignition[1053]: INFO : files: op(a): op(b): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 9 21:22:37.512732 ignition[1053]: INFO : files: op(a): [finished] processing unit "etcd-member.service" Feb 9 21:22:37.512732 ignition[1053]: INFO : files: op(c): [started] setting preset to enabled for "etcd-member.service" Feb 9 21:22:37.512732 ignition[1053]: INFO : files: op(c): [finished] setting preset to enabled for "etcd-member.service" Feb 9 21:22:37.512732 ignition[1053]: INFO : files: op(d): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 21:22:37.512732 ignition[1053]: INFO : files: op(d): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 21:22:37.512732 ignition[1053]: INFO : files: op(e): [started] setting preset to enabled for "packet-phone-home.service" Feb 9 21:22:37.512732 ignition[1053]: INFO : files: op(e): [finished] setting preset to enabled for "packet-phone-home.service" Feb 9 21:22:37.512732 ignition[1053]: INFO : files: createResultFile: createFiles: op(f): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 21:22:37.512732 ignition[1053]: INFO : files: createResultFile: createFiles: op(f): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 21:22:37.512732 ignition[1053]: INFO : files: files passed Feb 9 21:22:37.512732 ignition[1053]: INFO : POST message to Packet Timeline Feb 9 21:22:37.512732 ignition[1053]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 21:22:37.512732 ignition[1053]: INFO : GET result: OK Feb 9 21:22:37.512732 ignition[1053]: INFO : Ignition finished successfully Feb 9 21:22:37.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.315307 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 21:22:37.875922 initrd-setup-root-after-ignition[1085]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 21:22:37.374696 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 21:22:37.375093 systemd[1]: Starting ignition-quench.service... Feb 9 21:22:37.412926 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 21:22:37.437003 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 21:22:37.437096 systemd[1]: Finished ignition-quench.service. Feb 9 21:22:37.463033 systemd[1]: Reached target ignition-complete.target. Feb 9 21:22:37.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.487469 systemd[1]: Starting initrd-parse-etc.service... Feb 9 21:22:37.525645 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 21:22:38.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.525685 systemd[1]: Finished initrd-parse-etc.service. Feb 9 21:22:38.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.551709 systemd[1]: Reached target initrd-fs.target. Feb 9 21:22:37.571755 systemd[1]: Reached target initrd.target. Feb 9 21:22:37.606999 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 21:22:37.609048 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 21:22:37.642697 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 21:22:38.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.659588 systemd[1]: Starting initrd-cleanup.service... Feb 9 21:22:38.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.694493 systemd[1]: Stopped target nss-lookup.target. Feb 9 21:22:38.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.714052 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 21:22:38.180523 ignition[1100]: INFO : Ignition 2.14.0 Feb 9 21:22:38.180523 ignition[1100]: INFO : Stage: umount Feb 9 21:22:38.180523 ignition[1100]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 21:22:38.180523 ignition[1100]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 21:22:38.180523 ignition[1100]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 21:22:38.180523 ignition[1100]: INFO : umount: umount passed Feb 9 21:22:38.180523 ignition[1100]: INFO : POST message to Packet Timeline Feb 9 21:22:38.180523 ignition[1100]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 21:22:38.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:38.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:38.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:38.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.736116 systemd[1]: Stopped target timers.target. Feb 9 21:22:38.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:38.316841 iscsid[899]: iscsid shutting down. Feb 9 21:22:38.331765 ignition[1100]: INFO : GET result: OK Feb 9 21:22:37.759035 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 21:22:38.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.759399 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 21:22:38.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:38.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.783338 systemd[1]: Stopped target initrd.target. Feb 9 21:22:37.797049 systemd[1]: Stopped target basic.target. Feb 9 21:22:37.813051 systemd[1]: Stopped target ignition-complete.target. Feb 9 21:22:38.423774 ignition[1100]: INFO : Ignition finished successfully Feb 9 21:22:37.832032 systemd[1]: Stopped target ignition-diskful.target. Feb 9 21:22:38.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.849036 systemd[1]: Stopped target initrd-root-device.target. Feb 9 21:22:38.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.866048 systemd[1]: Stopped target remote-fs.target. Feb 9 21:22:38.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:38.479000 audit: BPF prog-id=6 op=UNLOAD Feb 9 21:22:37.884143 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 21:22:37.906065 systemd[1]: Stopped target sysinit.target. Feb 9 21:22:38.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.931070 systemd[1]: Stopped target local-fs.target. Feb 9 21:22:38.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.947042 systemd[1]: Stopped target local-fs-pre.target. Feb 9 21:22:38.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.965145 systemd[1]: Stopped target swap.target. Feb 9 21:22:38.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.981961 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 21:22:37.982324 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 21:22:38.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:37.998304 systemd[1]: Stopped target cryptsetup.target. Feb 9 21:22:38.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:38.013994 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 21:22:38.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:38.014355 systemd[1]: Stopped dracut-initqueue.service. Feb 9 21:22:38.030250 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 21:22:38.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:38.030634 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 21:22:38.046280 systemd[1]: Stopped target paths.target. Feb 9 21:22:38.059947 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 21:22:38.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:38.063808 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 21:22:38.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:38.075048 systemd[1]: Stopped target slices.target. Feb 9 21:22:38.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:38.089080 systemd[1]: Stopped target sockets.target. Feb 9 21:22:38.109077 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 21:22:38.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:38.109479 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 21:22:38.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:38.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:38.127173 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 21:22:38.127543 systemd[1]: Stopped ignition-files.service. Feb 9 21:22:38.142173 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 21:22:38.142556 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 21:22:38.160172 systemd[1]: Stopping ignition-mount.service... Feb 9 21:22:38.171782 systemd[1]: Stopping iscsid.service... Feb 9 21:22:38.187632 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 21:22:38.187767 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 21:22:38.207472 systemd[1]: Stopping sysroot-boot.service... Feb 9 21:22:38.224651 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 21:22:38.224951 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 21:22:38.252258 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 21:22:38.252641 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 21:22:38.279272 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 21:22:38.281412 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 21:22:38.281748 systemd[1]: Stopped iscsid.service. Feb 9 21:22:38.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:38.288134 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 21:22:38.288346 systemd[1]: Stopped sysroot-boot.service. Feb 9 21:22:38.310089 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 21:22:38.310263 systemd[1]: Closed iscsid.socket. Feb 9 21:22:38.324964 systemd[1]: Stopping iscsiuio.service... Feb 9 21:22:38.339111 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 21:22:38.339344 systemd[1]: Stopped iscsiuio.service. Feb 9 21:22:38.353274 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 21:22:38.353501 systemd[1]: Finished initrd-cleanup.service. Feb 9 21:22:38.370962 systemd[1]: Stopped target network.target. Feb 9 21:22:38.384732 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 21:22:38.384829 systemd[1]: Closed iscsiuio.socket. Feb 9 21:22:38.400064 systemd[1]: Stopping systemd-networkd.service... Feb 9 21:22:38.411651 systemd-networkd[879]: enp1s0f1np1: DHCPv6 lease lost Feb 9 21:22:38.414895 systemd[1]: Stopping systemd-resolved.service... Feb 9 21:22:38.424664 systemd-networkd[879]: enp1s0f0np0: DHCPv6 lease lost Feb 9 21:22:38.431244 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 21:22:39.027000 audit: BPF prog-id=9 op=UNLOAD Feb 9 21:22:38.431512 systemd[1]: Stopped systemd-resolved.service. Feb 9 21:22:38.449138 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 21:22:38.449476 systemd[1]: Stopped systemd-networkd.service. Feb 9 21:22:38.465094 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 21:22:38.465361 systemd[1]: Stopped ignition-mount.service. Feb 9 21:22:38.480164 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 21:22:38.480256 systemd[1]: Closed systemd-networkd.socket. Feb 9 21:22:38.494903 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 21:22:38.495041 systemd[1]: Stopped ignition-disks.service. Feb 9 21:22:38.510794 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 21:22:38.510932 systemd[1]: Stopped ignition-kargs.service. Feb 9 21:22:38.525812 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 21:22:38.525940 systemd[1]: Stopped ignition-setup.service. Feb 9 21:22:38.540868 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 21:22:38.541009 systemd[1]: Stopped initrd-setup-root.service. Feb 9 21:22:38.557556 systemd[1]: Stopping network-cleanup.service... Feb 9 21:22:38.569659 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 21:22:38.569803 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 21:22:39.028477 systemd-journald[266]: Received SIGTERM from PID 1 (n/a). Feb 9 21:22:38.585920 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 21:22:38.586073 systemd[1]: Stopped systemd-sysctl.service. Feb 9 21:22:38.602298 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 21:22:38.602438 systemd[1]: Stopped systemd-modules-load.service. Feb 9 21:22:38.618092 systemd[1]: Stopping systemd-udevd.service... Feb 9 21:22:38.637377 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 21:22:38.638748 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 21:22:38.638822 systemd[1]: Stopped systemd-udevd.service. Feb 9 21:22:38.642822 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 21:22:38.642845 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 21:22:38.666565 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 21:22:38.666590 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 21:22:38.683664 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 21:22:38.683729 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 21:22:38.700769 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 21:22:38.700877 systemd[1]: Stopped dracut-cmdline.service. Feb 9 21:22:38.718852 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 21:22:38.719012 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 21:22:38.736632 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 21:22:38.749651 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 21:22:38.749795 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 21:22:38.765616 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 21:22:38.765837 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 21:22:38.909797 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 21:22:38.910044 systemd[1]: Stopped network-cleanup.service. Feb 9 21:22:38.923089 systemd[1]: Reached target initrd-switch-root.target. Feb 9 21:22:38.939482 systemd[1]: Starting initrd-switch-root.service... Feb 9 21:22:38.977990 systemd[1]: Switching root. Feb 9 21:22:39.029122 systemd-journald[266]: Journal stopped Feb 9 21:22:42.906791 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 21:22:42.906805 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 21:22:42.906814 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 21:22:42.906820 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 21:22:42.906825 kernel: SELinux: policy capability open_perms=1 Feb 9 21:22:42.906831 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 21:22:42.906837 kernel: SELinux: policy capability always_check_network=0 Feb 9 21:22:42.906843 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 21:22:42.906848 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 21:22:42.906854 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 21:22:42.906860 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 21:22:42.906866 systemd[1]: Successfully loaded SELinux policy in 297.203ms. Feb 9 21:22:42.906874 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.966ms. Feb 9 21:22:42.906880 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 21:22:42.906888 systemd[1]: Detected architecture x86-64. Feb 9 21:22:42.906895 systemd[1]: Detected first boot. Feb 9 21:22:42.906900 systemd[1]: Hostname set to . Feb 9 21:22:42.906907 systemd[1]: Initializing machine ID from random generator. Feb 9 21:22:42.906913 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 21:22:42.906919 systemd[1]: Populated /etc with preset unit settings. Feb 9 21:22:42.906925 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 21:22:42.906933 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 21:22:42.906940 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 21:22:42.906946 kernel: kauditd_printk_skb: 58 callbacks suppressed Feb 9 21:22:42.906952 kernel: audit: type=1334 audit(1707513761.259:92): prog-id=12 op=LOAD Feb 9 21:22:42.906958 kernel: audit: type=1334 audit(1707513761.259:93): prog-id=3 op=UNLOAD Feb 9 21:22:42.906964 kernel: audit: type=1334 audit(1707513761.301:94): prog-id=13 op=LOAD Feb 9 21:22:42.906969 kernel: audit: type=1334 audit(1707513761.343:95): prog-id=14 op=LOAD Feb 9 21:22:42.906976 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 21:22:42.906982 kernel: audit: type=1334 audit(1707513761.343:96): prog-id=4 op=UNLOAD Feb 9 21:22:42.906988 kernel: audit: type=1334 audit(1707513761.343:97): prog-id=5 op=UNLOAD Feb 9 21:22:42.906994 systemd[1]: Stopped initrd-switch-root.service. Feb 9 21:22:42.907000 kernel: audit: type=1131 audit(1707513761.344:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:42.907006 kernel: audit: type=1334 audit(1707513761.492:99): prog-id=12 op=UNLOAD Feb 9 21:22:42.907012 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 21:22:42.907019 kernel: audit: type=1130 audit(1707513761.505:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:42.907025 kernel: audit: type=1131 audit(1707513761.505:101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:42.907031 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 21:22:42.907038 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 21:22:42.907044 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 21:22:42.907052 systemd[1]: Created slice system-getty.slice. Feb 9 21:22:42.907059 systemd[1]: Created slice system-modprobe.slice. Feb 9 21:22:42.907066 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 21:22:42.907073 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 21:22:42.907080 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 21:22:42.907086 systemd[1]: Created slice user.slice. Feb 9 21:22:42.907092 systemd[1]: Started systemd-ask-password-console.path. Feb 9 21:22:42.907099 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 21:22:42.907105 systemd[1]: Set up automount boot.automount. Feb 9 21:22:42.907112 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 21:22:42.907118 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 21:22:42.907124 systemd[1]: Stopped target initrd-fs.target. Feb 9 21:22:42.907131 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 21:22:42.907138 systemd[1]: Reached target integritysetup.target. Feb 9 21:22:42.907145 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 21:22:42.907151 systemd[1]: Reached target remote-fs.target. Feb 9 21:22:42.907157 systemd[1]: Reached target slices.target. Feb 9 21:22:42.907164 systemd[1]: Reached target swap.target. Feb 9 21:22:42.907170 systemd[1]: Reached target torcx.target. Feb 9 21:22:42.907176 systemd[1]: Reached target veritysetup.target. Feb 9 21:22:42.907184 systemd[1]: Listening on systemd-coredump.socket. Feb 9 21:22:42.907190 systemd[1]: Listening on systemd-initctl.socket. Feb 9 21:22:42.907197 systemd[1]: Listening on systemd-networkd.socket. Feb 9 21:22:42.907204 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 21:22:42.907211 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 21:22:42.907218 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 21:22:42.907224 systemd[1]: Mounting dev-hugepages.mount... Feb 9 21:22:42.907231 systemd[1]: Mounting dev-mqueue.mount... Feb 9 21:22:42.907238 systemd[1]: Mounting media.mount... Feb 9 21:22:42.907244 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 21:22:42.907251 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 21:22:42.907257 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 21:22:42.907264 systemd[1]: Mounting tmp.mount... Feb 9 21:22:42.907271 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 21:22:42.907278 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 21:22:42.907285 systemd[1]: Starting kmod-static-nodes.service... Feb 9 21:22:42.907291 systemd[1]: Starting modprobe@configfs.service... Feb 9 21:22:42.907298 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 21:22:42.907304 systemd[1]: Starting modprobe@drm.service... Feb 9 21:22:42.907311 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 21:22:42.907318 systemd[1]: Starting modprobe@fuse.service... Feb 9 21:22:42.907325 kernel: fuse: init (API version 7.34) Feb 9 21:22:42.907332 systemd[1]: Starting modprobe@loop.service... Feb 9 21:22:42.907338 kernel: loop: module loaded Feb 9 21:22:42.907345 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 21:22:42.907351 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 21:22:42.907358 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 21:22:42.907364 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 21:22:42.907371 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 21:22:42.907378 systemd[1]: Stopped systemd-journald.service. Feb 9 21:22:42.907384 systemd[1]: Starting systemd-journald.service... Feb 9 21:22:42.907392 systemd[1]: Starting systemd-modules-load.service... Feb 9 21:22:42.907400 systemd-journald[1250]: Journal started Feb 9 21:22:42.907426 systemd-journald[1250]: Runtime Journal (/run/log/journal/efc329d0287345afb0f5385c337f6ede) is 8.0M, max 640.1M, 632.1M free. Feb 9 21:22:39.415000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 21:22:39.671000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 21:22:39.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 21:22:39.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 21:22:39.673000 audit: BPF prog-id=10 op=LOAD Feb 9 21:22:39.673000 audit: BPF prog-id=10 op=UNLOAD Feb 9 21:22:39.673000 audit: BPF prog-id=11 op=LOAD Feb 9 21:22:39.673000 audit: BPF prog-id=11 op=UNLOAD Feb 9 21:22:39.741000 audit[1140]: AVC avc: denied { associate } for pid=1140 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 21:22:39.741000 audit[1140]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a58e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1123 pid=1140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:22:39.741000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 21:22:39.765000 audit[1140]: AVC avc: denied { associate } for pid=1140 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 21:22:39.765000 audit[1140]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a59b9 a2=1ed a3=0 items=2 ppid=1123 pid=1140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:22:39.765000 audit: CWD cwd="/" Feb 9 21:22:39.765000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:39.765000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:39.765000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 21:22:41.259000 audit: BPF prog-id=12 op=LOAD Feb 9 21:22:41.259000 audit: BPF prog-id=3 op=UNLOAD Feb 9 21:22:41.301000 audit: BPF prog-id=13 op=LOAD Feb 9 21:22:41.343000 audit: BPF prog-id=14 op=LOAD Feb 9 21:22:41.343000 audit: BPF prog-id=4 op=UNLOAD Feb 9 21:22:41.343000 audit: BPF prog-id=5 op=UNLOAD Feb 9 21:22:41.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:41.492000 audit: BPF prog-id=12 op=UNLOAD Feb 9 21:22:41.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:41.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:42.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:42.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:42.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:42.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:42.879000 audit: BPF prog-id=15 op=LOAD Feb 9 21:22:42.880000 audit: BPF prog-id=16 op=LOAD Feb 9 21:22:42.880000 audit: BPF prog-id=17 op=LOAD Feb 9 21:22:42.880000 audit: BPF prog-id=13 op=UNLOAD Feb 9 21:22:42.880000 audit: BPF prog-id=14 op=UNLOAD Feb 9 21:22:42.904000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 21:22:42.904000 audit[1250]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffdc7a0d570 a2=4000 a3=7ffdc7a0d60c items=0 ppid=1 pid=1250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:22:42.904000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 21:22:41.258538 systemd[1]: Queued start job for default target multi-user.target. Feb 9 21:22:39.739811 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 21:22:41.344526 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 21:22:39.740302 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 21:22:39.740313 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 21:22:39.740333 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:39Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 21:22:39.740339 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:39Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 21:22:39.740356 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:39Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 21:22:39.740364 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:39Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 21:22:39.740483 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:39Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 21:22:39.740507 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 21:22:39.740514 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 21:22:39.740971 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 21:22:39.740993 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 21:22:39.741005 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 21:22:39.741013 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 21:22:39.741022 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 21:22:39.741030 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 21:22:40.928722 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:40Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 21:22:40.928865 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:40Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 21:22:40.928921 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:40Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 21:22:40.929010 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:40Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 21:22:40.929039 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:40Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 21:22:40.929072 /usr/lib/systemd/system-generators/torcx-generator[1140]: time="2024-02-09T21:22:40Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 21:22:42.938646 systemd[1]: Starting systemd-network-generator.service... Feb 9 21:22:42.960519 systemd[1]: Starting systemd-remount-fs.service... Feb 9 21:22:42.982511 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 21:22:43.015035 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 21:22:43.015054 systemd[1]: Stopped verity-setup.service. Feb 9 21:22:43.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.049501 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 21:22:43.064646 systemd[1]: Started systemd-journald.service. Feb 9 21:22:43.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.072088 systemd[1]: Mounted dev-hugepages.mount. Feb 9 21:22:43.079732 systemd[1]: Mounted dev-mqueue.mount. Feb 9 21:22:43.086729 systemd[1]: Mounted media.mount. Feb 9 21:22:43.093733 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 21:22:43.102711 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 21:22:43.111707 systemd[1]: Mounted tmp.mount. Feb 9 21:22:43.118787 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 21:22:43.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.127806 systemd[1]: Finished kmod-static-nodes.service. Feb 9 21:22:43.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.136897 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 21:22:43.137022 systemd[1]: Finished modprobe@configfs.service. Feb 9 21:22:43.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.145900 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 21:22:43.146039 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 21:22:43.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.155027 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 21:22:43.155222 systemd[1]: Finished modprobe@drm.service. Feb 9 21:22:43.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.164290 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 21:22:43.164687 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 21:22:43.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.173419 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 21:22:43.173759 systemd[1]: Finished modprobe@fuse.service. Feb 9 21:22:43.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.183263 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 21:22:43.183575 systemd[1]: Finished modprobe@loop.service. Feb 9 21:22:43.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.192289 systemd[1]: Finished systemd-modules-load.service. Feb 9 21:22:43.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.201286 systemd[1]: Finished systemd-network-generator.service. Feb 9 21:22:43.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.210260 systemd[1]: Finished systemd-remount-fs.service. Feb 9 21:22:43.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.219254 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 21:22:43.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.228779 systemd[1]: Reached target network-pre.target. Feb 9 21:22:43.239319 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 21:22:43.250068 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 21:22:43.256710 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 21:22:43.259866 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 21:22:43.268968 systemd[1]: Starting systemd-journal-flush.service... Feb 9 21:22:43.277761 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 21:22:43.278213 systemd[1]: Starting systemd-random-seed.service... Feb 9 21:22:43.278417 systemd-journald[1250]: Time spent on flushing to /var/log/journal/efc329d0287345afb0f5385c337f6ede is 15.359ms for 1552 entries. Feb 9 21:22:43.278417 systemd-journald[1250]: System Journal (/var/log/journal/efc329d0287345afb0f5385c337f6ede) is 8.0M, max 195.6M, 187.6M free. Feb 9 21:22:43.321403 systemd-journald[1250]: Received client request to flush runtime journal. Feb 9 21:22:43.293608 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 21:22:43.294075 systemd[1]: Starting systemd-sysctl.service... Feb 9 21:22:43.303197 systemd[1]: Starting systemd-sysusers.service... Feb 9 21:22:43.311080 systemd[1]: Starting systemd-udev-settle.service... Feb 9 21:22:43.319746 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 21:22:43.328653 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 21:22:43.336689 systemd[1]: Finished systemd-journal-flush.service. Feb 9 21:22:43.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.344672 systemd[1]: Finished systemd-random-seed.service. Feb 9 21:22:43.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.352655 systemd[1]: Finished systemd-sysctl.service. Feb 9 21:22:43.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.360651 systemd[1]: Finished systemd-sysusers.service. Feb 9 21:22:43.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.369661 systemd[1]: Reached target first-boot-complete.target. Feb 9 21:22:43.377811 udevadm[1265]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 21:22:43.586669 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 21:22:43.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.596000 audit: BPF prog-id=18 op=LOAD Feb 9 21:22:43.596000 audit: BPF prog-id=19 op=LOAD Feb 9 21:22:43.596000 audit: BPF prog-id=7 op=UNLOAD Feb 9 21:22:43.596000 audit: BPF prog-id=8 op=UNLOAD Feb 9 21:22:43.597799 systemd[1]: Starting systemd-udevd.service... Feb 9 21:22:43.609311 systemd-udevd[1267]: Using default interface naming scheme 'v252'. Feb 9 21:22:43.626255 systemd[1]: Started systemd-udevd.service. Feb 9 21:22:43.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.636564 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 9 21:22:43.636000 audit: BPF prog-id=20 op=LOAD Feb 9 21:22:43.637766 systemd[1]: Starting systemd-networkd.service... Feb 9 21:22:43.657000 audit: BPF prog-id=21 op=LOAD Feb 9 21:22:43.670641 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 9 21:22:43.670707 kernel: ACPI: button: Sleep Button [SLPB] Feb 9 21:22:43.670733 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1277) Feb 9 21:22:43.670755 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 21:22:43.707000 audit: BPF prog-id=22 op=LOAD Feb 9 21:22:43.707000 audit: BPF prog-id=23 op=LOAD Feb 9 21:22:43.708100 systemd[1]: Starting systemd-userdbd.service... Feb 9 21:22:43.708464 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 21:22:43.723462 kernel: ACPI: button: Power Button [PWRF] Feb 9 21:22:43.673000 audit[1340]: AVC avc: denied { confidentiality } for pid=1340 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 21:22:43.673000 audit[1340]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55fca0c2aa10 a1=4d8bc a2=7f13d820dbc5 a3=5 items=42 ppid=1267 pid=1340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:22:43.673000 audit: CWD cwd="/" Feb 9 21:22:43.673000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=1 name=(null) inode=14454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=2 name=(null) inode=14454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=3 name=(null) inode=14455 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=4 name=(null) inode=14454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=5 name=(null) inode=14456 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=6 name=(null) inode=14454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=7 name=(null) inode=14457 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=8 name=(null) inode=14457 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=9 name=(null) inode=14458 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=10 name=(null) inode=14457 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=11 name=(null) inode=14459 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=12 name=(null) inode=14457 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=13 name=(null) inode=14460 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=14 name=(null) inode=14457 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=15 name=(null) inode=14461 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=16 name=(null) inode=14457 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=17 name=(null) inode=14462 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=18 name=(null) inode=14454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=19 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=20 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=21 name=(null) inode=14464 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=22 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=23 name=(null) inode=14465 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=24 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=25 name=(null) inode=14466 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=26 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=27 name=(null) inode=14467 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=28 name=(null) inode=14463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=29 name=(null) inode=14468 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=30 name=(null) inode=14454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=31 name=(null) inode=14469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=32 name=(null) inode=14469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=33 name=(null) inode=14470 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=34 name=(null) inode=14469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=35 name=(null) inode=14471 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=36 name=(null) inode=14469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=37 name=(null) inode=14472 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=38 name=(null) inode=14469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=39 name=(null) inode=14473 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=40 name=(null) inode=14469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PATH item=41 name=(null) inode=14474 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:22:43.673000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 21:22:43.757322 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 9 21:22:43.757509 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 9 21:22:43.757626 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 9 21:22:43.759488 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 21:22:43.809461 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 9 21:22:43.826464 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 9 21:22:43.843462 kernel: IPMI message handler: version 39.2 Feb 9 21:22:43.847857 systemd[1]: Started systemd-userdbd.service. Feb 9 21:22:43.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:43.875498 kernel: iTCO_vendor_support: vendor-support=0 Feb 9 21:22:43.875568 kernel: ipmi device interface Feb 9 21:22:43.929358 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Feb 9 21:22:43.929550 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Feb 9 21:22:43.929669 kernel: ipmi_si: IPMI System Interface driver Feb 9 21:22:43.961745 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 9 21:22:43.961827 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 9 21:22:43.979631 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 9 21:22:43.995984 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 9 21:22:44.030740 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 9 21:22:44.070383 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 9 21:22:44.070548 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 9 21:22:44.070563 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 9 21:22:44.070592 kernel: intel_rapl_common: Found RAPL domain package Feb 9 21:22:44.071275 systemd-networkd[1300]: bond0: netdev ready Feb 9 21:22:44.074020 systemd-networkd[1300]: lo: Link UP Feb 9 21:22:44.074023 systemd-networkd[1300]: lo: Gained carrier Feb 9 21:22:44.074560 systemd-networkd[1300]: Enumeration completed Feb 9 21:22:44.074618 systemd[1]: Started systemd-networkd.service. Feb 9 21:22:44.074963 systemd-networkd[1300]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 9 21:22:44.087204 systemd-networkd[1300]: enp1s0f1np1: Configuring with /etc/systemd/network/10-1c:34:da:5c:29:79.network. Feb 9 21:22:44.108458 kernel: intel_rapl_common: Found RAPL domain core Feb 9 21:22:44.108488 kernel: intel_rapl_common: Found RAPL domain dram Feb 9 21:22:44.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:44.139994 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 21:22:44.173471 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 9 21:22:44.222462 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Feb 9 21:22:44.337460 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 9 21:22:44.355458 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 9 21:22:44.358715 systemd[1]: Finished systemd-udev-settle.service. Feb 9 21:22:44.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:44.367234 systemd[1]: Starting lvm2-activation-early.service... Feb 9 21:22:44.383471 lvm[1372]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 21:22:44.411855 systemd[1]: Finished lvm2-activation-early.service. Feb 9 21:22:44.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:44.420578 systemd[1]: Reached target cryptsetup.target. Feb 9 21:22:44.429121 systemd[1]: Starting lvm2-activation.service... Feb 9 21:22:44.431323 lvm[1373]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 21:22:44.464903 systemd[1]: Finished lvm2-activation.service. Feb 9 21:22:44.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:44.473616 systemd[1]: Reached target local-fs-pre.target. Feb 9 21:22:44.482491 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 21:22:44.482505 systemd[1]: Reached target local-fs.target. Feb 9 21:22:44.490538 systemd[1]: Reached target machines.target. Feb 9 21:22:44.499130 systemd[1]: Starting ldconfig.service... Feb 9 21:22:44.506902 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 21:22:44.506934 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 21:22:44.507562 systemd[1]: Starting systemd-boot-update.service... Feb 9 21:22:44.516002 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 21:22:44.527078 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 21:22:44.527202 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 21:22:44.527224 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 21:22:44.527795 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 21:22:44.527978 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1375 (bootctl) Feb 9 21:22:44.528553 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 21:22:44.542593 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 21:22:44.542964 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 21:22:44.544883 systemd-tmpfiles[1379]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 21:22:44.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:44.547873 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 21:22:44.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:44.549132 systemd-tmpfiles[1379]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 21:22:44.555896 systemd-tmpfiles[1379]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 21:22:44.603456 systemd-fsck[1383]: fsck.fat 4.2 (2021-01-31) Feb 9 21:22:44.603456 systemd-fsck[1383]: /dev/sda1: 789 files, 115339/258078 clusters Feb 9 21:22:44.606242 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 21:22:44.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:44.616303 systemd[1]: Mounting boot.mount... Feb 9 21:22:44.627602 systemd[1]: Mounted boot.mount. Feb 9 21:22:44.646463 systemd[1]: Finished systemd-boot-update.service. Feb 9 21:22:44.661510 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 21:22:44.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:44.684501 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Feb 9 21:22:44.685899 systemd-networkd[1300]: enp1s0f0np0: Configuring with /etc/systemd/network/10-1c:34:da:5c:29:78.network. Feb 9 21:22:44.701674 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 21:22:44.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:44.719373 systemd[1]: Starting audit-rules.service... Feb 9 21:22:44.724461 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 21:22:44.732089 systemd[1]: Starting clean-ca-certificates.service... Feb 9 21:22:44.737000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 21:22:44.737000 audit[1403]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc2eaa8b90 a2=420 a3=0 items=0 ppid=1387 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:22:44.737000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 21:22:44.738552 augenrules[1403]: No rules Feb 9 21:22:44.741138 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 21:22:44.750501 systemd[1]: Starting systemd-resolved.service... Feb 9 21:22:44.758553 systemd[1]: Starting systemd-timesyncd.service... Feb 9 21:22:44.766222 systemd[1]: Starting systemd-update-utmp.service... Feb 9 21:22:44.773796 systemd[1]: Finished audit-rules.service. Feb 9 21:22:44.780668 systemd[1]: Finished clean-ca-certificates.service. Feb 9 21:22:44.788703 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 21:22:44.800939 systemd[1]: Finished systemd-update-utmp.service. Feb 9 21:22:44.808076 ldconfig[1374]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 21:22:44.809637 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 21:22:44.810946 systemd[1]: Finished ldconfig.service. Feb 9 21:22:44.824163 systemd[1]: Starting systemd-update-done.service... Feb 9 21:22:44.830458 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 9 21:22:44.830569 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 21:22:44.866697 systemd[1]: Finished systemd-update-done.service. Feb 9 21:22:44.873496 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Feb 9 21:22:44.873520 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 9 21:22:44.873771 systemd-networkd[1300]: bond0: Link UP Feb 9 21:22:44.873958 systemd-networkd[1300]: enp1s0f1np1: Link UP Feb 9 21:22:44.874092 systemd-networkd[1300]: enp1s0f1np1: Gained carrier Feb 9 21:22:44.875031 systemd-networkd[1300]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-1c:34:da:5c:29:78.network. Feb 9 21:22:44.899506 systemd[1]: Started systemd-timesyncd.service. Feb 9 21:22:44.901175 systemd-resolved[1409]: Positive Trust Anchors: Feb 9 21:22:44.901181 systemd-resolved[1409]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 21:22:44.901201 systemd-resolved[1409]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 21:22:44.904822 systemd-resolved[1409]: Using system hostname 'ci-3510.3.2-a-9caeba0f1f'. Feb 9 21:22:44.908541 systemd[1]: Reached target time-set.target. Feb 9 21:22:44.929502 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:44.949487 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:44.970485 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:44.990499 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:45.011492 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:45.030490 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:45.050529 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:45.070515 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:45.090504 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:45.109520 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:45.128497 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:45.147490 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:45.165490 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:45.183499 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:45.201489 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:45.219494 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:45.236509 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:45.237632 systemd-networkd[1300]: enp1s0f0np0: Link UP Feb 9 21:22:45.237852 systemd-networkd[1300]: bond0: Gained carrier Feb 9 21:22:45.237951 systemd-networkd[1300]: enp1s0f0np0: Gained carrier Feb 9 21:22:45.238005 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 9 21:22:45.238755 systemd[1]: Started systemd-resolved.service. Feb 9 21:22:45.269437 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 21:22:45.269463 kernel: bond0: (slave enp1s0f1np1): link status definitely down, disabling slave Feb 9 21:22:45.269481 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 21:22:45.279188 systemd[1]: Reached target network.target. Feb 9 21:22:45.289699 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 9 21:22:45.303559 systemd[1]: Reached target nss-lookup.target. Feb 9 21:22:45.306083 systemd-networkd[1300]: enp1s0f1np1: Link DOWN Feb 9 21:22:45.306086 systemd-networkd[1300]: enp1s0f1np1: Lost carrier Feb 9 21:22:45.306516 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 9 21:22:45.306558 kernel: bond0: active interface up! Feb 9 21:22:45.323637 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 9 21:22:45.323843 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 9 21:22:45.326562 systemd[1]: Reached target sysinit.target. Feb 9 21:22:45.335605 systemd[1]: Started motdgen.path. Feb 9 21:22:45.342531 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 21:22:45.352587 systemd[1]: Started logrotate.timer. Feb 9 21:22:45.359562 systemd[1]: Started mdadm.timer. Feb 9 21:22:45.366533 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 21:22:45.374489 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 21:22:45.374506 systemd[1]: Reached target paths.target. Feb 9 21:22:45.381496 systemd[1]: Reached target timers.target. Feb 9 21:22:45.388640 systemd[1]: Listening on dbus.socket. Feb 9 21:22:45.396115 systemd[1]: Starting docker.socket... Feb 9 21:22:45.403901 systemd[1]: Listening on sshd.socket. Feb 9 21:22:45.410597 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 21:22:45.410844 systemd[1]: Listening on docker.socket. Feb 9 21:22:45.417590 systemd[1]: Reached target sockets.target. Feb 9 21:22:45.427003 systemd[1]: Reached target basic.target. Feb 9 21:22:45.433569 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 21:22:45.433584 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 21:22:45.434044 systemd[1]: Starting containerd.service... Feb 9 21:22:45.441904 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 21:22:45.456022 systemd[1]: Starting coreos-metadata.service... Feb 9 21:22:45.461522 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 21:22:45.466623 systemd-networkd[1300]: enp1s0f1np1: Link UP Feb 9 21:22:45.466786 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 9 21:22:45.466798 systemd-networkd[1300]: enp1s0f1np1: Gained carrier Feb 9 21:22:45.466826 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 9 21:22:45.468037 systemd[1]: Starting dbus.service... Feb 9 21:22:45.469867 coreos-metadata[1418]: Feb 09 21:22:45.469 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 21:22:45.474010 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 21:22:45.477671 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 9 21:22:45.477771 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 9 21:22:45.478024 jq[1426]: false Feb 9 21:22:45.481054 systemd[1]: Starting extend-filesystems.service... Feb 9 21:22:45.483969 dbus-daemon[1424]: [system] SELinux support is enabled Feb 9 21:22:45.484201 coreos-metadata[1421]: Feb 09 21:22:45.484 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 21:22:45.487579 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 21:22:45.488236 systemd[1]: Starting motdgen.service... Feb 9 21:22:45.488323 extend-filesystems[1427]: Found sda Feb 9 21:22:45.506487 coreos-metadata[1418]: Feb 09 21:22:45.489 INFO Fetch successful Feb 9 21:22:45.506515 extend-filesystems[1427]: Found sda1 Feb 9 21:22:45.506515 extend-filesystems[1427]: Found sda2 Feb 9 21:22:45.506515 extend-filesystems[1427]: Found sda3 Feb 9 21:22:45.506515 extend-filesystems[1427]: Found usr Feb 9 21:22:45.506515 extend-filesystems[1427]: Found sda4 Feb 9 21:22:45.506515 extend-filesystems[1427]: Found sda6 Feb 9 21:22:45.506515 extend-filesystems[1427]: Found sda7 Feb 9 21:22:45.506515 extend-filesystems[1427]: Found sda9 Feb 9 21:22:45.506515 extend-filesystems[1427]: Checking size of /dev/sda9 Feb 9 21:22:45.506515 extend-filesystems[1427]: Resized partition /dev/sda9 Feb 9 21:22:45.631557 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Feb 9 21:22:45.631586 kernel: bond0: (slave enp1s0f1np1): link status up, enabling it in 200 ms Feb 9 21:22:45.631674 kernel: bond0: (slave enp1s0f1np1): invalid new link 3 on slave Feb 9 21:22:45.631686 coreos-metadata[1421]: Feb 09 21:22:45.503 INFO Fetch successful Feb 9 21:22:45.495255 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 21:22:45.631779 extend-filesystems[1442]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 21:22:45.513395 unknown[1418]: wrote ssh authorized keys file for user: core Feb 9 21:22:45.534254 systemd[1]: Starting sshd-keygen.service... Feb 9 21:22:45.569089 systemd[1]: Starting systemd-logind.service... Feb 9 21:22:45.585541 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 21:22:45.647920 update_engine[1454]: I0209 21:22:45.646003 1454 main.cc:92] Flatcar Update Engine starting Feb 9 21:22:45.586106 systemd[1]: Starting tcsd.service... Feb 9 21:22:45.648062 jq[1455]: true Feb 9 21:22:45.590507 systemd-logind[1452]: Watching system buttons on /dev/input/event3 (Power Button) Feb 9 21:22:45.590517 systemd-logind[1452]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 21:22:45.590526 systemd-logind[1452]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 9 21:22:45.590625 systemd-logind[1452]: New seat seat0. Feb 9 21:22:45.597852 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 21:22:45.598210 systemd[1]: Starting update-engine.service... Feb 9 21:22:45.616133 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 21:22:45.639870 systemd[1]: Started dbus.service. Feb 9 21:22:45.649365 update_engine[1454]: I0209 21:22:45.649327 1454 update_check_scheduler.cc:74] Next update check in 10m6s Feb 9 21:22:45.656838 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 21:22:45.656928 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 21:22:45.657090 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 21:22:45.657171 systemd[1]: Finished motdgen.service. Feb 9 21:22:45.663685 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 21:22:45.663758 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 21:22:45.673374 systemd[1]: Finished coreos-metadata.service. Feb 9 21:22:45.674584 jq[1459]: true Feb 9 21:22:45.683882 dbus-daemon[1424]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 21:22:45.684655 env[1460]: time="2024-02-09T21:22:45.684631624Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 21:22:45.684784 update-ssh-keys[1457]: Updated "/home/core/.ssh/authorized_keys" Feb 9 21:22:45.685644 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 21:22:45.693739 env[1460]: time="2024-02-09T21:22:45.693706130Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 21:22:45.693982 env[1460]: time="2024-02-09T21:22:45.693942001Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 21:22:45.694522 env[1460]: time="2024-02-09T21:22:45.694481767Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 21:22:45.694522 env[1460]: time="2024-02-09T21:22:45.694498713Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 21:22:45.695714 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 9 21:22:45.695796 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 9 21:22:45.696156 env[1460]: time="2024-02-09T21:22:45.696114144Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 21:22:45.696156 env[1460]: time="2024-02-09T21:22:45.696126812Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 21:22:45.696156 env[1460]: time="2024-02-09T21:22:45.696135094Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 21:22:45.696156 env[1460]: time="2024-02-09T21:22:45.696143121Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 21:22:45.696236 env[1460]: time="2024-02-09T21:22:45.696184608Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 21:22:45.696339 env[1460]: time="2024-02-09T21:22:45.696306089Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 21:22:45.696378 env[1460]: time="2024-02-09T21:22:45.696368362Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 21:22:45.696398 env[1460]: time="2024-02-09T21:22:45.696378475Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 21:22:45.698226 env[1460]: time="2024-02-09T21:22:45.698185219Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 21:22:45.698226 env[1460]: time="2024-02-09T21:22:45.698197657Z" level=info msg="metadata content store policy set" policy=shared Feb 9 21:22:45.701319 systemd[1]: Started update-engine.service. Feb 9 21:22:45.704694 env[1460]: time="2024-02-09T21:22:45.704652843Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 21:22:45.704694 env[1460]: time="2024-02-09T21:22:45.704667844Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 21:22:45.704694 env[1460]: time="2024-02-09T21:22:45.704675531Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 21:22:45.704694 env[1460]: time="2024-02-09T21:22:45.704690890Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 21:22:45.704775 env[1460]: time="2024-02-09T21:22:45.704698722Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 21:22:45.704775 env[1460]: time="2024-02-09T21:22:45.704707952Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 21:22:45.704775 env[1460]: time="2024-02-09T21:22:45.704714545Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 21:22:45.704775 env[1460]: time="2024-02-09T21:22:45.704722069Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 21:22:45.704775 env[1460]: time="2024-02-09T21:22:45.704729431Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 21:22:45.704775 env[1460]: time="2024-02-09T21:22:45.704736655Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 21:22:45.704775 env[1460]: time="2024-02-09T21:22:45.704743380Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 21:22:45.704775 env[1460]: time="2024-02-09T21:22:45.704749949Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 21:22:45.704908 env[1460]: time="2024-02-09T21:22:45.704795841Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 21:22:45.704908 env[1460]: time="2024-02-09T21:22:45.704837574Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 21:22:45.705379 env[1460]: time="2024-02-09T21:22:45.705290498Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 21:22:45.705379 env[1460]: time="2024-02-09T21:22:45.705366871Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 21:22:45.705379 env[1460]: time="2024-02-09T21:22:45.705376488Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 21:22:45.705441 env[1460]: time="2024-02-09T21:22:45.705405419Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 21:22:45.705441 env[1460]: time="2024-02-09T21:22:45.705415722Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 21:22:45.705441 env[1460]: time="2024-02-09T21:22:45.705423035Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 21:22:45.705441 env[1460]: time="2024-02-09T21:22:45.705429249Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 21:22:45.705441 env[1460]: time="2024-02-09T21:22:45.705435652Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 21:22:45.705523 env[1460]: time="2024-02-09T21:22:45.705442437Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 21:22:45.705523 env[1460]: time="2024-02-09T21:22:45.705448760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 21:22:45.705523 env[1460]: time="2024-02-09T21:22:45.705460871Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 21:22:45.705523 env[1460]: time="2024-02-09T21:22:45.705469565Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 21:22:45.705585 env[1460]: time="2024-02-09T21:22:45.705545087Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 21:22:45.705585 env[1460]: time="2024-02-09T21:22:45.705554384Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 21:22:45.705585 env[1460]: time="2024-02-09T21:22:45.705560847Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 21:22:45.705585 env[1460]: time="2024-02-09T21:22:45.705567047Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 21:22:45.705585 env[1460]: time="2024-02-09T21:22:45.705574607Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 21:22:45.705585 env[1460]: time="2024-02-09T21:22:45.705581522Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 21:22:45.705676 env[1460]: time="2024-02-09T21:22:45.705591043Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 21:22:45.705676 env[1460]: time="2024-02-09T21:22:45.705611172Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 21:22:45.705786 env[1460]: time="2024-02-09T21:22:45.705718522Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 21:22:45.705786 env[1460]: time="2024-02-09T21:22:45.705752293Z" level=info msg="Connect containerd service" Feb 9 21:22:45.705786 env[1460]: time="2024-02-09T21:22:45.705772052Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 21:22:45.709747 env[1460]: time="2024-02-09T21:22:45.706046374Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 21:22:45.709747 env[1460]: time="2024-02-09T21:22:45.706132796Z" level=info msg="Start subscribing containerd event" Feb 9 21:22:45.709747 env[1460]: time="2024-02-09T21:22:45.706165379Z" level=info msg="Start recovering state" Feb 9 21:22:45.709747 env[1460]: time="2024-02-09T21:22:45.706189954Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 21:22:45.709747 env[1460]: time="2024-02-09T21:22:45.706205635Z" level=info msg="Start event monitor" Feb 9 21:22:45.709747 env[1460]: time="2024-02-09T21:22:45.706215786Z" level=info msg="Start snapshots syncer" Feb 9 21:22:45.709747 env[1460]: time="2024-02-09T21:22:45.706219840Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 21:22:45.709747 env[1460]: time="2024-02-09T21:22:45.706225335Z" level=info msg="Start cni network conf syncer for default" Feb 9 21:22:45.709747 env[1460]: time="2024-02-09T21:22:45.706256360Z" level=info msg="containerd successfully booted in 0.022000s" Feb 9 21:22:45.709747 env[1460]: time="2024-02-09T21:22:45.706264120Z" level=info msg="Start streaming server" Feb 9 21:22:45.709573 systemd[1]: Started containerd.service. Feb 9 21:22:45.710269 bash[1491]: Updated "/home/core/.ssh/authorized_keys" Feb 9 21:22:45.716694 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 21:22:45.729081 systemd[1]: Started systemd-logind.service. Feb 9 21:22:45.739077 systemd[1]: Started locksmithd.service. Feb 9 21:22:45.755261 systemd[1]: Started packet-phone-home.service. Feb 9 21:22:45.759461 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 21:22:45.760349 curl[1501]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 9 21:22:45.760501 curl[1501]: Dload Upload Total Spent Left Speed Feb 9 21:22:45.767601 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 21:22:45.767685 systemd[1]: Reached target system-config.target. Feb 9 21:22:45.775589 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 21:22:45.775659 systemd[1]: Reached target user-config.target. Feb 9 21:22:45.795068 locksmithd[1500]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 21:22:45.995501 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Feb 9 21:22:46.023337 extend-filesystems[1442]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 9 21:22:46.023337 extend-filesystems[1442]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 9 21:22:46.023337 extend-filesystems[1442]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Feb 9 21:22:46.060575 extend-filesystems[1427]: Resized filesystem in /dev/sda9 Feb 9 21:22:46.060575 extend-filesystems[1427]: Found sdb Feb 9 21:22:46.023924 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 21:22:46.024025 systemd[1]: Finished extend-filesystems.service. Feb 9 21:22:46.293546 systemd-networkd[1300]: bond0: Gained IPv6LL Feb 9 21:22:46.293815 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 9 21:22:46.576873 sshd_keygen[1451]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 21:22:46.588950 systemd[1]: Finished sshd-keygen.service. Feb 9 21:22:46.596546 systemd[1]: Starting issuegen.service... Feb 9 21:22:46.603722 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 21:22:46.603794 systemd[1]: Finished issuegen.service. Feb 9 21:22:46.611252 systemd[1]: Starting systemd-user-sessions.service... Feb 9 21:22:46.619729 systemd[1]: Finished systemd-user-sessions.service. Feb 9 21:22:46.628153 systemd[1]: Started getty@tty1.service. Feb 9 21:22:46.635117 systemd[1]: Started serial-getty@ttyS1.service. Feb 9 21:22:46.643636 systemd[1]: Reached target getty.target. Feb 9 21:22:47.061862 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 9 21:22:47.061958 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 9 21:22:47.062923 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 21:22:47.072855 systemd[1]: Reached target network-online.target. Feb 9 21:22:47.081350 systemd[1]: Starting etcd-member.service... Feb 9 21:22:47.097501 systemd[1]: Starting docker.service... Feb 9 21:22:47.115096 env[1537]: time="2024-02-09T21:22:47.115040942Z" level=info msg="Starting up" Feb 9 21:22:47.115713 env[1537]: time="2024-02-09T21:22:47.115701946Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 21:22:47.115713 env[1537]: time="2024-02-09T21:22:47.115710924Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 21:22:47.115787 env[1537]: time="2024-02-09T21:22:47.115726343Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 21:22:47.115787 env[1537]: time="2024-02-09T21:22:47.115735518Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 21:22:47.116637 env[1537]: time="2024-02-09T21:22:47.116592969Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 21:22:47.116637 env[1537]: time="2024-02-09T21:22:47.116600534Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 21:22:47.116637 env[1537]: time="2024-02-09T21:22:47.116607743Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 21:22:47.116637 env[1537]: time="2024-02-09T21:22:47.116615962Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 21:22:47.133537 env[1537]: time="2024-02-09T21:22:47.133479451Z" level=info msg="Loading containers: start." Feb 9 21:22:47.228510 kernel: Initializing XFRM netlink socket Feb 9 21:22:47.249591 env[1537]: time="2024-02-09T21:22:47.249573650Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 21:22:47.250100 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 9 21:22:47.250144 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 9 21:22:47.253148 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 9 21:22:47.253276 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 9 21:22:47.297785 systemd-networkd[1300]: docker0: Link UP Feb 9 21:22:47.297909 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 9 21:22:47.313207 env[1537]: time="2024-02-09T21:22:47.313151685Z" level=info msg="Loading containers: done." Feb 9 21:22:47.318279 env[1537]: time="2024-02-09T21:22:47.318261557Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 21:22:47.318351 env[1537]: time="2024-02-09T21:22:47.318341815Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 21:22:47.318391 env[1537]: time="2024-02-09T21:22:47.318385159Z" level=info msg="Daemon has completed initialization" Feb 9 21:22:47.324137 systemd[1]: Started docker.service. Feb 9 21:22:47.326227 env[1537]: time="2024-02-09T21:22:47.326184206Z" level=info msg="API listen on /run/docker.sock" Feb 9 21:22:47.327334 etcd-wrapper[1527]: Error response from daemon: No such container: etcd-member Feb 9 21:22:47.338359 etcd-wrapper[1657]: Error: No such container: etcd-member Feb 9 21:22:47.366975 etcd-wrapper[1679]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Feb 9 21:22:47.660602 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 9 21:22:51.655902 login[1522]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 21:22:51.664010 login[1521]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 21:22:51.664169 systemd-logind[1452]: New session 1 of user core. Feb 9 21:22:51.664717 systemd[1]: Created slice user-500.slice. Feb 9 21:22:51.665291 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 21:22:51.666409 systemd-logind[1452]: New session 2 of user core. Feb 9 21:22:51.670434 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 21:22:51.671145 systemd[1]: Starting user@500.service... Feb 9 21:22:51.684290 (systemd)[1695]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:22:51.752860 systemd[1695]: Queued start job for default target default.target. Feb 9 21:22:51.753113 systemd[1695]: Reached target paths.target. Feb 9 21:22:51.753125 systemd[1695]: Reached target sockets.target. Feb 9 21:22:51.753133 systemd[1695]: Reached target timers.target. Feb 9 21:22:51.753140 systemd[1695]: Reached target basic.target. Feb 9 21:22:51.753160 systemd[1695]: Reached target default.target. Feb 9 21:22:51.753174 systemd[1695]: Startup finished in 65ms. Feb 9 21:22:51.753228 systemd[1]: Started user@500.service. Feb 9 21:22:51.753821 systemd[1]: Started session-1.scope. Feb 9 21:22:51.754275 systemd[1]: Started session-2.scope. Feb 9 21:22:52.644591 env[1537]: time="2024-02-09T21:22:52.644472930Z" level=warning msg="Error getting v2 registry: Get \"https://quay.io/v2/\": dial tcp: lookup quay.io: Temporary failure in name resolution" Feb 9 21:22:52.644591 env[1537]: time="2024-02-09T21:22:52.644540936Z" level=info msg="Attempting next endpoint for pull after error: Get \"https://quay.io/v2/\": dial tcp: lookup quay.io: Temporary failure in name resolution" Feb 9 21:22:52.648134 env[1537]: time="2024-02-09T21:22:52.648038377Z" level=error msg="Handler for POST /v1.41/images/create returned error: Get \"https://quay.io/v2/\": dial tcp: lookup quay.io: Temporary failure in name resolution" Feb 9 21:22:52.648529 etcd-wrapper[1679]: docker: Error response from daemon: Get "https://quay.io/v2/": dial tcp: lookup quay.io: Temporary failure in name resolution. Feb 9 21:22:52.648529 etcd-wrapper[1679]: See 'docker run --help'. Feb 9 21:22:52.654281 systemd[1]: etcd-member.service: Main process exited, code=exited, status=125/n/a Feb 9 21:22:52.670873 docker[1715]: Error: No such container: etcd-member Feb 9 21:22:52.671625 systemd[1]: etcd-member.service: Control process exited, code=exited, status=1/FAILURE Feb 9 21:22:52.671667 systemd[1]: etcd-member.service: Failed with result 'exit-code'. Feb 9 21:22:52.671786 systemd[1]: Failed to start etcd-member.service. Feb 9 21:22:52.672005 systemd[1]: Reached target multi-user.target. Feb 9 21:22:52.672742 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 21:22:52.676800 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 21:22:52.676870 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 21:22:52.676992 systemd[1]: Startup finished in 1.848s (kernel) + 16.270s (initrd) + 13.572s (userspace) = 31.691s. Feb 9 21:22:53.044463 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Feb 9 21:22:53.052631 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 9 21:22:53.741015 systemd[1]: Created slice system-sshd.slice. Feb 9 21:22:53.741662 systemd[1]: Started sshd@0-147.75.49.127:22-139.178.89.65:50310.service. Feb 9 21:22:53.791863 sshd[1727]: Accepted publickey for core from 139.178.89.65 port 50310 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:22:53.792914 sshd[1727]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:22:53.796130 systemd-logind[1452]: New session 3 of user core. Feb 9 21:22:53.796913 systemd[1]: Started session-3.scope. Feb 9 21:22:53.855266 systemd[1]: Started sshd@1-147.75.49.127:22-139.178.89.65:50312.service. Feb 9 21:22:53.883027 sshd[1732]: Accepted publickey for core from 139.178.89.65 port 50312 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:22:53.883680 sshd[1732]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:22:53.885774 systemd-logind[1452]: New session 4 of user core. Feb 9 21:22:53.886167 systemd[1]: Started session-4.scope. Feb 9 21:22:53.935684 sshd[1732]: pam_unix(sshd:session): session closed for user core Feb 9 21:22:53.937899 systemd[1]: sshd@1-147.75.49.127:22-139.178.89.65:50312.service: Deactivated successfully. Feb 9 21:22:53.938415 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 21:22:53.939017 systemd-logind[1452]: Session 4 logged out. Waiting for processes to exit. Feb 9 21:22:53.939875 systemd[1]: Started sshd@2-147.75.49.127:22-139.178.89.65:50322.service. Feb 9 21:22:53.940517 systemd-logind[1452]: Removed session 4. Feb 9 21:22:53.970324 sshd[1738]: Accepted publickey for core from 139.178.89.65 port 50322 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:22:53.971070 sshd[1738]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:22:53.973650 systemd-logind[1452]: New session 5 of user core. Feb 9 21:22:53.974165 systemd[1]: Started session-5.scope. Feb 9 21:22:54.024706 sshd[1738]: pam_unix(sshd:session): session closed for user core Feb 9 21:22:54.029781 systemd[1]: sshd@2-147.75.49.127:22-139.178.89.65:50322.service: Deactivated successfully. Feb 9 21:22:54.031175 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 21:22:54.032684 systemd-logind[1452]: Session 5 logged out. Waiting for processes to exit. Feb 9 21:22:54.035149 systemd[1]: Started sshd@3-147.75.49.127:22-139.178.89.65:50334.service. Feb 9 21:22:54.037347 systemd-logind[1452]: Removed session 5. Feb 9 21:22:54.088062 sshd[1745]: Accepted publickey for core from 139.178.89.65 port 50334 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:22:54.088703 sshd[1745]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:22:54.091017 systemd-logind[1452]: New session 6 of user core. Feb 9 21:22:54.091401 systemd[1]: Started session-6.scope. Feb 9 21:22:54.143516 sshd[1745]: pam_unix(sshd:session): session closed for user core Feb 9 21:22:54.146430 systemd[1]: sshd@3-147.75.49.127:22-139.178.89.65:50334.service: Deactivated successfully. Feb 9 21:22:54.147086 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 21:22:54.147847 systemd-logind[1452]: Session 6 logged out. Waiting for processes to exit. Feb 9 21:22:54.148913 systemd[1]: Started sshd@4-147.75.49.127:22-139.178.89.65:50348.service. Feb 9 21:22:54.150051 systemd-logind[1452]: Removed session 6. Feb 9 21:22:54.190842 sshd[1751]: Accepted publickey for core from 139.178.89.65 port 50348 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:22:54.191517 sshd[1751]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:22:54.193844 systemd-logind[1452]: New session 7 of user core. Feb 9 21:22:54.194257 systemd[1]: Started session-7.scope. Feb 9 21:22:54.264262 sudo[1754]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 21:22:54.264879 sudo[1754]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 21:22:54.284911 dbus-daemon[1424]: \xd0m,\u0019\x89U: received setenforce notice (enforcing=1813318448) Feb 9 21:22:54.289938 sudo[1754]: pam_unix(sudo:session): session closed for user root Feb 9 21:22:54.295099 sshd[1751]: pam_unix(sshd:session): session closed for user core Feb 9 21:22:54.302140 systemd[1]: sshd@4-147.75.49.127:22-139.178.89.65:50348.service: Deactivated successfully. Feb 9 21:22:54.303850 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 21:22:54.305613 systemd-logind[1452]: Session 7 logged out. Waiting for processes to exit. Feb 9 21:22:54.308287 systemd[1]: Started sshd@5-147.75.49.127:22-139.178.89.65:50358.service. Feb 9 21:22:54.310809 systemd-logind[1452]: Removed session 7. Feb 9 21:22:54.398062 sshd[1758]: Accepted publickey for core from 139.178.89.65 port 50358 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:22:54.399169 sshd[1758]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:22:54.402405 systemd-logind[1452]: New session 8 of user core. Feb 9 21:22:54.403068 systemd[1]: Started session-8.scope. Feb 9 21:22:54.458524 sudo[1762]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 21:22:54.458634 sudo[1762]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 21:22:54.460362 sudo[1762]: pam_unix(sudo:session): session closed for user root Feb 9 21:22:54.462625 sudo[1761]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 21:22:54.462732 sudo[1761]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 21:22:54.467903 systemd[1]: Stopping audit-rules.service... Feb 9 21:22:54.468000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 21:22:54.468836 auditctl[1765]: No rules Feb 9 21:22:54.468989 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 21:22:54.469075 systemd[1]: Stopped audit-rules.service. Feb 9 21:22:54.469857 systemd[1]: Starting audit-rules.service... Feb 9 21:22:54.474242 kernel: kauditd_printk_skb: 105 callbacks suppressed Feb 9 21:22:54.474273 kernel: audit: type=1305 audit(1707513774.468:158): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 21:22:54.480397 augenrules[1782]: No rules Feb 9 21:22:54.480745 systemd[1]: Finished audit-rules.service. Feb 9 21:22:54.481228 sudo[1761]: pam_unix(sudo:session): session closed for user root Feb 9 21:22:54.482264 sshd[1758]: pam_unix(sshd:session): session closed for user core Feb 9 21:22:54.484025 systemd[1]: sshd@5-147.75.49.127:22-139.178.89.65:50358.service: Deactivated successfully. Feb 9 21:22:54.484377 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 21:22:54.484715 systemd-logind[1452]: Session 8 logged out. Waiting for processes to exit. Feb 9 21:22:54.485331 systemd[1]: Started sshd@6-147.75.49.127:22-139.178.89.65:50372.service. Feb 9 21:22:54.485891 systemd-logind[1452]: Removed session 8. Feb 9 21:22:54.468000 audit[1765]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcc32dccb0 a2=420 a3=0 items=0 ppid=1 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:22:54.520825 kernel: audit: type=1300 audit(1707513774.468:158): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcc32dccb0 a2=420 a3=0 items=0 ppid=1 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:22:54.520897 kernel: audit: type=1327 audit(1707513774.468:158): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 21:22:54.468000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 21:22:54.530382 kernel: audit: type=1131 audit(1707513774.468:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:54.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:54.552809 kernel: audit: type=1130 audit(1707513774.480:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:54.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:54.574874 sshd[1788]: Accepted publickey for core from 139.178.89.65 port 50372 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:22:54.575258 kernel: audit: type=1106 audit(1707513774.480:161): pid=1761 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 21:22:54.480000 audit[1761]: USER_END pid=1761 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 21:22:54.575526 sshd[1788]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:22:54.577436 systemd-logind[1452]: New session 9 of user core. Feb 9 21:22:54.577918 systemd[1]: Started session-9.scope. Feb 9 21:22:54.601239 kernel: audit: type=1104 audit(1707513774.480:162): pid=1761 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 21:22:54.480000 audit[1761]: CRED_DISP pid=1761 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 21:22:54.624357 sshd[1788]: pam_unix(sshd:session): session closed for user core Feb 9 21:22:54.624774 kernel: audit: type=1106 audit(1707513774.482:163): pid=1758 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:22:54.482000 audit[1758]: USER_END pid=1758 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:22:54.625720 systemd[1]: sshd@6-147.75.49.127:22-139.178.89.65:50372.service: Deactivated successfully. Feb 9 21:22:54.626003 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 21:22:54.626305 systemd-logind[1452]: Session 9 logged out. Waiting for processes to exit. Feb 9 21:22:54.626791 systemd[1]: Started sshd@7-147.75.49.127:22-139.178.89.65:50388.service. Feb 9 21:22:54.627210 systemd-logind[1452]: Removed session 9. Feb 9 21:22:54.656805 kernel: audit: type=1104 audit(1707513774.482:164): pid=1758 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:22:54.482000 audit[1758]: CRED_DISP pid=1758 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:22:54.682590 kernel: audit: type=1131 audit(1707513774.483:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-147.75.49.127:22-139.178.89.65:50358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:54.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-147.75.49.127:22-139.178.89.65:50358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:54.704569 sshd[1796]: Accepted publickey for core from 139.178.89.65 port 50388 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:22:54.706736 sshd[1796]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:22:54.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.49.127:22-139.178.89.65:50372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:54.574000 audit[1788]: USER_ACCT pid=1788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:22:54.574000 audit[1788]: CRED_ACQ pid=1788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:22:54.574000 audit[1788]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe25f7bfe0 a2=3 a3=0 items=0 ppid=1 pid=1788 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:22:54.574000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 21:22:54.579000 audit[1788]: USER_START pid=1788 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:22:54.579000 audit[1790]: CRED_ACQ pid=1790 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:22:54.624000 audit[1788]: USER_END pid=1788 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:22:54.624000 audit[1788]: CRED_DISP pid=1788 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:22:54.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.49.127:22-139.178.89.65:50372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:54.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.49.127:22-139.178.89.65:50388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:22:54.704000 audit[1796]: USER_ACCT pid=1796 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:22:54.706000 audit[1796]: CRED_ACQ pid=1796 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:22:54.706000 audit[1796]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef54309c0 a2=3 a3=0 items=0 ppid=1 pid=1796 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:22:54.706000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 21:22:54.708940 systemd-logind[1452]: New session 10 of user core. Feb 9 21:22:54.709331 systemd[1]: Started session-10.scope. Feb 9 21:22:54.711000 audit[1796]: USER_START pid=1796 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:22:54.711000 audit[1798]: CRED_ACQ pid=1798 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:22:55.977662 curl[1501]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:02 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:03 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:04 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:05 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:06 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:07 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:08 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:09 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:10 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:10 --:--:-- 0 Feb 9 21:22:55.980187 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 9 21:22:55.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=packet-phone-home comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:00.037626 sshd[1796]: pam_unix(sshd:session): session closed for user core Feb 9 21:23:00.039000 audit[1796]: USER_END pid=1796 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:23:00.043520 systemd[1]: sshd@7-147.75.49.127:22-139.178.89.65:50388.service: Deactivated successfully. Feb 9 21:23:00.045202 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 21:23:00.046126 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 9 21:23:00.046194 kernel: audit: type=1106 audit(1707513780.039:182): pid=1796 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:23:00.046344 systemd-logind[1452]: Session 10 logged out. Waiting for processes to exit. Feb 9 21:23:00.047073 systemd-logind[1452]: Removed session 10. Feb 9 21:23:00.040000 audit[1796]: CRED_DISP pid=1796 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:23:00.155465 kernel: audit: type=1104 audit(1707513780.040:183): pid=1796 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:23:00.155542 kernel: audit: type=1131 audit(1707513780.043:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.49.127:22-139.178.89.65:50388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:00.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.49.127:22-139.178.89.65:50388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:02.923378 systemd[1]: etcd-member.service: Scheduled restart job, restart counter is at 1. Feb 9 21:23:02.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:02.923946 systemd[1]: Stopped etcd-member.service. Feb 9 21:23:02.927410 systemd[1]: Starting etcd-member.service... Feb 9 21:23:02.941868 etcd-wrapper[1816]: Error response from daemon: No such container: etcd-member Feb 9 21:23:02.952639 etcd-wrapper[1829]: Error: No such container: etcd-member Feb 9 21:23:02.966762 etcd-wrapper[1851]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Feb 9 21:23:02.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:03.044536 kernel: audit: type=1130 audit(1707513782.923:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:03.044585 kernel: audit: type=1131 audit(1707513782.923:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:04.321073 etcd-wrapper[1851]: v3.5.0: Pulling from coreos/etcd Feb 9 21:23:04.619275 etcd-wrapper[1851]: 1813d21adc01: Pulling fs layer Feb 9 21:23:04.619275 etcd-wrapper[1851]: 6e96907ab677: Pulling fs layer Feb 9 21:23:04.619275 etcd-wrapper[1851]: 444ed0ea8673: Pulling fs layer Feb 9 21:23:04.619275 etcd-wrapper[1851]: 0fd2df5633f0: Pulling fs layer Feb 9 21:23:04.619275 etcd-wrapper[1851]: 8cc22b9456bb: Pulling fs layer Feb 9 21:23:04.619275 etcd-wrapper[1851]: 7ac70aecd290: Pulling fs layer Feb 9 21:23:04.619275 etcd-wrapper[1851]: 4b376c64dfe4: Pulling fs layer Feb 9 21:23:04.619275 etcd-wrapper[1851]: 0fd2df5633f0: Waiting Feb 9 21:23:04.619275 etcd-wrapper[1851]: 8cc22b9456bb: Waiting Feb 9 21:23:04.619275 etcd-wrapper[1851]: 7ac70aecd290: Waiting Feb 9 21:23:04.620330 etcd-wrapper[1851]: 4b376c64dfe4: Waiting Feb 9 21:23:04.982014 etcd-wrapper[1851]: 444ed0ea8673: Verifying Checksum Feb 9 21:23:04.982014 etcd-wrapper[1851]: 444ed0ea8673: Download complete Feb 9 21:23:05.003146 etcd-wrapper[1851]: 6e96907ab677: Verifying Checksum Feb 9 21:23:05.003146 etcd-wrapper[1851]: 6e96907ab677: Download complete Feb 9 21:23:05.024552 etcd-wrapper[1851]: 1813d21adc01: Verifying Checksum Feb 9 21:23:05.024552 etcd-wrapper[1851]: 1813d21adc01: Download complete Feb 9 21:23:05.277983 systemd[1]: Started sshd@8-147.75.49.127:22-157.230.15.197:36534.service. Feb 9 21:23:05.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.49.127:22-157.230.15.197:36534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:05.298749 etcd-wrapper[1851]: 8cc22b9456bb: Verifying Checksum Feb 9 21:23:05.298749 etcd-wrapper[1851]: 8cc22b9456bb: Download complete Feb 9 21:23:05.321534 etcd-wrapper[1851]: 0fd2df5633f0: Verifying Checksum Feb 9 21:23:05.321534 etcd-wrapper[1851]: 0fd2df5633f0: Download complete Feb 9 21:23:05.327460 etcd-wrapper[1851]: 7ac70aecd290: Verifying Checksum Feb 9 21:23:05.327460 etcd-wrapper[1851]: 7ac70aecd290: Download complete Feb 9 21:23:05.366496 kernel: audit: type=1130 audit(1707513785.277:187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.49.127:22-157.230.15.197:36534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:05.535615 etcd-wrapper[1851]: 1813d21adc01: Pull complete Feb 9 21:23:05.591830 etcd-wrapper[1851]: 4b376c64dfe4: Verifying Checksum Feb 9 21:23:05.591830 etcd-wrapper[1851]: 4b376c64dfe4: Download complete Feb 9 21:23:05.672344 sshd[1883]: Invalid user javib from 157.230.15.197 port 36534 Feb 9 21:23:05.673575 sshd[1883]: pam_faillock(sshd:auth): User unknown Feb 9 21:23:05.673841 sshd[1883]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:23:05.673872 sshd[1883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.15.197 Feb 9 21:23:05.674148 sshd[1883]: pam_faillock(sshd:auth): User unknown Feb 9 21:23:05.673000 audit[1883]: USER_AUTH pid=1883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="javib" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:23:05.764497 kernel: audit: type=1100 audit(1707513785.673:188): pid=1883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="javib" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:23:05.764486 systemd[1]: var-lib-docker-overlay2-ad8b1f0a1687006e8f0d8ce7e53cb3c7dbab640bb3c42311a4d1b11b2578c4e2-merged.mount: Deactivated successfully. Feb 9 21:23:05.998807 etcd-wrapper[1851]: 6e96907ab677: Pull complete Feb 9 21:23:06.154819 systemd[1]: var-lib-docker-overlay2-bed5311b3f9c6c8b46a4bbafb5c1821f5caa7998366d9ce31cec2233bb9b25d1-merged.mount: Deactivated successfully. Feb 9 21:23:06.198102 etcd-wrapper[1851]: 444ed0ea8673: Pull complete Feb 9 21:23:06.414083 etcd-wrapper[1851]: 0fd2df5633f0: Pull complete Feb 9 21:23:06.438014 etcd-wrapper[1851]: 8cc22b9456bb: Pull complete Feb 9 21:23:06.499332 etcd-wrapper[1851]: 7ac70aecd290: Pull complete Feb 9 21:23:06.535481 etcd-wrapper[1851]: 4b376c64dfe4: Pull complete Feb 9 21:23:06.538529 systemd[1]: var-lib-docker-overlay2-99ff062f23f7286a4c9332e5be5ed4a60fffaa2e1d2b54b1b4f3de103c313d38-merged.mount: Deactivated successfully. Feb 9 21:23:06.539225 etcd-wrapper[1851]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Feb 9 21:23:06.540462 etcd-wrapper[1851]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Feb 9 21:23:06.546483 systemd[1]: var-lib-docker-overlay2-80552bdfd6f49b72e40f6f825c1fc7874ba196e578dd27f859bc82605045a39d\x2dinit-merged.mount: Deactivated successfully. Feb 9 21:23:06.600575 env[1460]: time="2024-02-09T21:23:06.600531046Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 21:23:06.600575 env[1460]: time="2024-02-09T21:23:06.600561291Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 21:23:06.600575 env[1460]: time="2024-02-09T21:23:06.600572513Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 21:23:06.600948 env[1460]: time="2024-02-09T21:23:06.600703886Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/eacf857a09f6af2afc33f4a52363793892389725de662c52f830a879335662dd pid=2033 runtime=io.containerd.runc.v2 Feb 9 21:23:06.621120 systemd[1]: Started docker-eacf857a09f6af2afc33f4a52363793892389725de662c52f830a879335662dd.scope. Feb 9 21:23:06.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.757528 kernel: audit: type=1400 audit(1707513786.630:189): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.757598 kernel: audit: type=1400 audit(1707513786.630:190): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.757634 kernel: audit: type=1400 audit(1707513786.630:191): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.885278 kernel: audit: type=1400 audit(1707513786.630:192): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.885314 kernel: audit: type=1400 audit(1707513786.630:193): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.950785 kernel: audit: type=1400 audit(1707513786.630:194): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.015156 kernel: audit: type=1400 audit(1707513786.630:195): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.079530 kernel: audit: type=1400 audit(1707513786.630:196): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.820000 audit: BPF prog-id=31 op=LOAD Feb 9 21:23:06.820000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.820000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2033 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:23:06.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F65616366383537613039663661663261666333336634613532 Feb 9 21:23:06.820000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.820000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2033 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:23:06.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F65616366383537613039663661663261666333336634613532 Feb 9 21:23:06.820000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.820000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.820000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.820000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.820000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.820000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.820000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.820000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.820000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.820000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:06.820000 audit: BPF prog-id=32 op=LOAD Feb 9 21:23:06.820000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000988e0 items=0 ppid=2033 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:23:06.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F65616366383537613039663661663261666333336634613532 Feb 9 21:23:07.014000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.014000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.014000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.014000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.014000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.014000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.014000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.014000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.014000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.014000 audit: BPF prog-id=33 op=LOAD Feb 9 21:23:07.014000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000098928 items=0 ppid=2033 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:23:07.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F65616366383537613039663661663261666333336634613532 Feb 9 21:23:07.143000 audit: BPF prog-id=33 op=UNLOAD Feb 9 21:23:07.143000 audit: BPF prog-id=32 op=UNLOAD Feb 9 21:23:07.143000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.143000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.143000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.143000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.143000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.143000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.143000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.143000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.143000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.143000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:23:07.143000 audit: BPF prog-id=34 op=LOAD Feb 9 21:23:07.143000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000098d88 items=0 ppid=2033 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:23:07.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F65616366383537613039663661663261666333336634613532 Feb 9 21:23:07.180365 etcd-wrapper[1851]: {"level":"info","ts":1707513787.1802688,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Feb 9 21:23:07.180365 etcd-wrapper[1851]: {"level":"info","ts":1707513787.1803076,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"efc329d0287345afb0f5385c337f6ede"} Feb 9 21:23:07.180365 etcd-wrapper[1851]: {"level":"warn","ts":1707513787.1803238,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Feb 9 21:23:07.180365 etcd-wrapper[1851]: {"level":"warn","ts":1707513787.1803284,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Feb 9 21:23:07.180365 etcd-wrapper[1851]: {"level":"warn","ts":1707513787.1803317,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Feb 9 21:23:07.180365 etcd-wrapper[1851]: {"level":"warn","ts":1707513787.1803348,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Feb 9 21:23:07.180548 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.180Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-client-urls=http://0.0.0.0:2379","--advertise-client-urls=http://10.67.80.13:2379"]} Feb 9 21:23:07.180548 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.180Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://localhost:2380"]} Feb 9 21:23:07.180772 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.180Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Feb 9 21:23:07.180822 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.180Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"efc329d0287345afb0f5385c337f6ede","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.13:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"efc329d0287345afb0f5385c337f6ede=http://localhost:2380","initial-cluster-state":"new","initial-cluster-token":"etcd-cluster","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} Feb 9 21:23:07.181461 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.181Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"457.886µs"} Feb 9 21:23:07.182410 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.182Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"8e9e05c52164694d","cluster-id":"cdf818194e3a8c32"} Feb 9 21:23:07.182410 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.182Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=()"} Feb 9 21:23:07.182410 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.182Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 0"} Feb 9 21:23:07.182410 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.182Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8e9e05c52164694d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Feb 9 21:23:07.182509 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.182Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 1"} Feb 9 21:23:07.182509 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.182Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 9 21:23:07.183027 etcd-wrapper[1851]: {"level":"warn","ts":"2024-02-09T21:23:07.182Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Feb 9 21:23:07.183342 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.183Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Feb 9 21:23:07.183609 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.183Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Feb 9 21:23:07.183748 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.183Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"8e9e05c52164694d","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Feb 9 21:23:07.183814 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.183Z","caller":"etcdserver/server.go:728","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"8e9e05c52164694d","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Feb 9 21:23:07.184317 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.184Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 9 21:23:07.184347 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.184Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","added-peer-id":"8e9e05c52164694d","added-peer-peer-urls":["http://localhost:2380"]} Feb 9 21:23:07.185129 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.185Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"8e9e05c52164694d","initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.13:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Feb 9 21:23:07.185129 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.185Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"127.0.0.1:2380"} Feb 9 21:23:07.185129 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.185Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"127.0.0.1:2380"} Feb 9 21:23:07.481342 sshd[1883]: Failed password for invalid user javib from 157.230.15.197 port 36534 ssh2 Feb 9 21:23:07.484097 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.483Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d is starting a new election at term 1"} Feb 9 21:23:07.484097 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.483Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became pre-candidate at term 1"} Feb 9 21:23:07.484097 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.483Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgPreVoteResp from 8e9e05c52164694d at term 1"} Feb 9 21:23:07.484097 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.483Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became candidate at term 2"} Feb 9 21:23:07.484097 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.483Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgVoteResp from 8e9e05c52164694d at term 2"} Feb 9 21:23:07.484097 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.483Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became leader at term 2"} Feb 9 21:23:07.484097 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.483Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8e9e05c52164694d elected leader 8e9e05c52164694d at term 2"} Feb 9 21:23:07.485531 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.484Z","caller":"etcdserver/server.go:2476","msg":"setting up initial cluster version using v2 API","cluster-version":"3.5"} Feb 9 21:23:07.485531 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.484Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","cluster-version":"3.5"} Feb 9 21:23:07.485531 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.484Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Feb 9 21:23:07.485531 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.484Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"8e9e05c52164694d","local-member-attributes":"{Name:efc329d0287345afb0f5385c337f6ede ClientURLs:[http://10.67.80.13:2379]}","request-path":"/0/members/8e9e05c52164694d/attributes","cluster-id":"cdf818194e3a8c32","publish-timeout":"7s"} Feb 9 21:23:07.485531 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.485Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Feb 9 21:23:07.485531 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.485Z","caller":"etcdserver/server.go:2500","msg":"cluster version is updated","cluster-version":"3.5"} Feb 9 21:23:07.486208 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.485Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Feb 9 21:23:07.486208 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.485Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Feb 9 21:23:07.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:07.485919 systemd[1]: Started etcd-member.service. Feb 9 21:23:07.487027 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T21:23:07.486Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Feb 9 21:23:07.789383 sshd[1883]: Received disconnect from 157.230.15.197 port 36534:11: Bye Bye [preauth] Feb 9 21:23:07.789383 sshd[1883]: Disconnected from invalid user javib 157.230.15.197 port 36534 [preauth] Feb 9 21:23:07.791873 systemd[1]: sshd@8-147.75.49.127:22-157.230.15.197:36534.service: Deactivated successfully. Feb 9 21:23:07.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.49.127:22-157.230.15.197:36534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:10.046270 systemd[1]: Started sshd@9-147.75.49.127:22-139.178.89.65:42142.service. Feb 9 21:23:10.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.49.127:22-139.178.89.65:42142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:10.074000 audit[2081]: USER_ACCT pid=2081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:23:10.074889 sshd[2081]: Accepted publickey for core from 139.178.89.65 port 42142 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:23:10.074000 audit[2081]: CRED_ACQ pid=2081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:23:10.075000 audit[2081]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6bba3020 a2=3 a3=0 items=0 ppid=1 pid=2081 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:23:10.075000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 21:23:10.075699 sshd[2081]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:23:10.078667 systemd-logind[1452]: New session 11 of user core. Feb 9 21:23:10.079298 systemd[1]: Started session-11.scope. Feb 9 21:23:10.082000 audit[2081]: USER_START pid=2081 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:23:10.083000 audit[2083]: CRED_ACQ pid=2083 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:23:10.152667 sshd[2081]: pam_unix(sshd:session): session closed for user core Feb 9 21:23:10.152000 audit[2081]: USER_END pid=2081 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:23:10.152000 audit[2081]: CRED_DISP pid=2081 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:23:10.154086 systemd[1]: sshd@9-147.75.49.127:22-139.178.89.65:42142.service: Deactivated successfully. Feb 9 21:23:10.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.49.127:22-139.178.89.65:42142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:10.154479 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 21:23:10.154852 systemd-logind[1452]: Session 11 logged out. Waiting for processes to exit. Feb 9 21:23:10.155332 systemd-logind[1452]: Removed session 11. Feb 9 21:23:11.815930 systemd[1]: Started sshd@10-147.75.49.127:22-43.153.62.138:49768.service. Feb 9 21:23:11.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.49.127:22-43.153.62.138:49768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:11.843585 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 9 21:23:11.843692 kernel: audit: type=1130 audit(1707513791.815:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.49.127:22-43.153.62.138:49768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:11.999395 sshd[2102]: Invalid user hoss from 43.153.62.138 port 49768 Feb 9 21:23:12.000897 sshd[2102]: pam_faillock(sshd:auth): User unknown Feb 9 21:23:12.001163 sshd[2102]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:23:12.001187 sshd[2102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.62.138 Feb 9 21:23:12.001414 sshd[2102]: pam_faillock(sshd:auth): User unknown Feb 9 21:23:12.001000 audit[2102]: USER_AUTH pid=2102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hoss" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:23:12.092528 kernel: audit: type=1100 audit(1707513792.001:219): pid=2102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hoss" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:23:13.447180 systemd[1]: Started sshd@11-147.75.49.127:22-49.233.38.108:32936.service. Feb 9 21:23:13.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.49.127:22-49.233.38.108:32936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:13.539656 kernel: audit: type=1130 audit(1707513793.446:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.49.127:22-49.233.38.108:32936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:14.104402 sshd[2102]: Failed password for invalid user hoss from 43.153.62.138 port 49768 ssh2 Feb 9 21:23:14.308726 sshd[2105]: Invalid user cpwdtl from 49.233.38.108 port 32936 Feb 9 21:23:14.314989 sshd[2105]: pam_faillock(sshd:auth): User unknown Feb 9 21:23:14.315973 sshd[2105]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:23:14.316062 sshd[2105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.38.108 Feb 9 21:23:14.317153 sshd[2105]: pam_faillock(sshd:auth): User unknown Feb 9 21:23:14.316000 audit[2105]: USER_AUTH pid=2105 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="cpwdtl" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:23:14.409657 kernel: audit: type=1100 audit(1707513794.316:221): pid=2105 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="cpwdtl" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:23:15.848218 sshd[2102]: Received disconnect from 43.153.62.138 port 49768:11: Bye Bye [preauth] Feb 9 21:23:15.848218 sshd[2102]: Disconnected from invalid user hoss 43.153.62.138 port 49768 [preauth] Feb 9 21:23:15.850714 systemd[1]: sshd@10-147.75.49.127:22-43.153.62.138:49768.service: Deactivated successfully. Feb 9 21:23:15.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.49.127:22-43.153.62.138:49768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:15.943516 kernel: audit: type=1131 audit(1707513795.850:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.49.127:22-43.153.62.138:49768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:16.360532 sshd[2105]: Failed password for invalid user cpwdtl from 49.233.38.108 port 32936 ssh2 Feb 9 21:23:16.763054 sshd[2105]: Received disconnect from 49.233.38.108 port 32936:11: Bye Bye [preauth] Feb 9 21:23:16.763054 sshd[2105]: Disconnected from invalid user cpwdtl 49.233.38.108 port 32936 [preauth] Feb 9 21:23:16.765498 systemd[1]: sshd@11-147.75.49.127:22-49.233.38.108:32936.service: Deactivated successfully. Feb 9 21:23:16.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.49.127:22-49.233.38.108:32936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:16.858520 kernel: audit: type=1131 audit(1707513796.765:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.49.127:22-49.233.38.108:32936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:17.937263 systemd-timesyncd[1410]: Contacted time server [2605:6400:84e1::123]:123 (2.flatcar.pool.ntp.org). Feb 9 21:23:17.937402 systemd-timesyncd[1410]: Initial clock synchronization to Fri 2024-02-09 21:23:18.070399 UTC. Feb 9 21:23:31.014193 update_engine[1454]: I0209 21:23:31.014079 1454 update_attempter.cc:509] Updating boot flags... Feb 9 21:23:36.466213 systemd[1]: Started sshd@12-147.75.49.127:22-43.155.132.249:57350.service. Feb 9 21:23:36.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.49.127:22-43.155.132.249:57350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:36.558487 kernel: audit: type=1130 audit(1707513816.465:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.49.127:22-43.155.132.249:57350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:37.314905 sshd[2128]: Invalid user junsoo from 43.155.132.249 port 57350 Feb 9 21:23:37.321022 sshd[2128]: pam_faillock(sshd:auth): User unknown Feb 9 21:23:37.322121 sshd[2128]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:23:37.322209 sshd[2128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:23:37.323258 sshd[2128]: pam_faillock(sshd:auth): User unknown Feb 9 21:23:37.321000 audit[2128]: USER_AUTH pid=2128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="junsoo" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:23:37.415487 kernel: audit: type=1100 audit(1707513817.321:225): pid=2128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="junsoo" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:23:39.858190 sshd[2128]: Failed password for invalid user junsoo from 43.155.132.249 port 57350 ssh2 Feb 9 21:23:40.566182 sshd[2128]: Received disconnect from 43.155.132.249 port 57350:11: Bye Bye [preauth] Feb 9 21:23:40.566182 sshd[2128]: Disconnected from invalid user junsoo 43.155.132.249 port 57350 [preauth] Feb 9 21:23:40.568766 systemd[1]: sshd@12-147.75.49.127:22-43.155.132.249:57350.service: Deactivated successfully. Feb 9 21:23:40.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.49.127:22-43.155.132.249:57350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:23:40.661631 kernel: audit: type=1131 audit(1707513820.568:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.49.127:22-43.155.132.249:57350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:00.737533 systemd[1]: Started sshd@13-147.75.49.127:22-157.230.15.197:48688.service. Feb 9 21:24:00.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.49.127:22-157.230.15.197:48688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:00.829505 kernel: audit: type=1130 audit(1707513840.736:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.49.127:22-157.230.15.197:48688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:01.137506 sshd[2133]: Invalid user anitav from 157.230.15.197 port 48688 Feb 9 21:24:01.143552 sshd[2133]: pam_faillock(sshd:auth): User unknown Feb 9 21:24:01.144524 sshd[2133]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:24:01.144609 sshd[2133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.15.197 Feb 9 21:24:01.145503 sshd[2133]: pam_faillock(sshd:auth): User unknown Feb 9 21:24:01.144000 audit[2133]: USER_AUTH pid=2133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="anitav" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:24:01.244525 kernel: audit: type=1100 audit(1707513841.144:228): pid=2133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="anitav" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:24:02.801756 systemd[1]: Started sshd@14-147.75.49.127:22-49.233.38.108:46886.service. Feb 9 21:24:02.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.49.127:22-49.233.38.108:46886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:02.894656 kernel: audit: type=1130 audit(1707513842.800:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.49.127:22-49.233.38.108:46886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:03.640576 sshd[2133]: Failed password for invalid user anitav from 157.230.15.197 port 48688 ssh2 Feb 9 21:24:03.781847 sshd[2136]: Invalid user hassani from 49.233.38.108 port 46886 Feb 9 21:24:03.787856 sshd[2136]: pam_faillock(sshd:auth): User unknown Feb 9 21:24:03.788837 sshd[2136]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:24:03.788924 sshd[2136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.38.108 Feb 9 21:24:03.789814 sshd[2136]: pam_faillock(sshd:auth): User unknown Feb 9 21:24:03.788000 audit[2136]: USER_AUTH pid=2136 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hassani" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:24:03.882517 kernel: audit: type=1100 audit(1707513843.788:230): pid=2136 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hassani" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:24:05.225801 sshd[2136]: Failed password for invalid user hassani from 49.233.38.108 port 46886 ssh2 Feb 9 21:24:05.841348 sshd[2133]: Received disconnect from 157.230.15.197 port 48688:11: Bye Bye [preauth] Feb 9 21:24:05.841348 sshd[2133]: Disconnected from invalid user anitav 157.230.15.197 port 48688 [preauth] Feb 9 21:24:05.843809 systemd[1]: sshd@13-147.75.49.127:22-157.230.15.197:48688.service: Deactivated successfully. Feb 9 21:24:05.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.49.127:22-157.230.15.197:48688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:05.936654 kernel: audit: type=1131 audit(1707513845.843:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.49.127:22-157.230.15.197:48688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:06.010508 sshd[2136]: Received disconnect from 49.233.38.108 port 46886:11: Bye Bye [preauth] Feb 9 21:24:06.010508 sshd[2136]: Disconnected from invalid user hassani 49.233.38.108 port 46886 [preauth] Feb 9 21:24:06.011467 systemd[1]: sshd@14-147.75.49.127:22-49.233.38.108:46886.service: Deactivated successfully. Feb 9 21:24:06.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.49.127:22-49.233.38.108:46886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:06.103459 kernel: audit: type=1131 audit(1707513846.011:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.49.127:22-49.233.38.108:46886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:07.667337 systemd[1]: Started sshd@15-147.75.49.127:22-43.153.62.138:40300.service. Feb 9 21:24:07.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.49.127:22-43.153.62.138:40300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:07.760629 kernel: audit: type=1130 audit(1707513847.666:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.49.127:22-43.153.62.138:40300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:07.820384 sshd[2141]: Invalid user single from 43.153.62.138 port 40300 Feb 9 21:24:07.821771 sshd[2141]: pam_faillock(sshd:auth): User unknown Feb 9 21:24:07.822022 sshd[2141]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:24:07.822042 sshd[2141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.62.138 Feb 9 21:24:07.822272 sshd[2141]: pam_faillock(sshd:auth): User unknown Feb 9 21:24:07.821000 audit[2141]: USER_AUTH pid=2141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="single" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:24:07.914649 kernel: audit: type=1100 audit(1707513847.821:234): pid=2141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="single" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:24:10.141532 sshd[2141]: Failed password for invalid user single from 43.153.62.138 port 40300 ssh2 Feb 9 21:24:10.905254 sshd[2141]: Received disconnect from 43.153.62.138 port 40300:11: Bye Bye [preauth] Feb 9 21:24:10.905254 sshd[2141]: Disconnected from invalid user single 43.153.62.138 port 40300 [preauth] Feb 9 21:24:10.907771 systemd[1]: sshd@15-147.75.49.127:22-43.153.62.138:40300.service: Deactivated successfully. Feb 9 21:24:10.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.49.127:22-43.153.62.138:40300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:11.001557 kernel: audit: type=1131 audit(1707513850.907:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.49.127:22-43.153.62.138:40300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:52.465944 systemd[1]: Started sshd@16-147.75.49.127:22-49.233.38.108:60828.service. Feb 9 21:24:52.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.49.127:22-49.233.38.108:60828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:52.558482 kernel: audit: type=1130 audit(1707513892.464:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.49.127:22-49.233.38.108:60828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:53.323356 sshd[2145]: Invalid user mypc from 49.233.38.108 port 60828 Feb 9 21:24:53.329324 sshd[2145]: pam_faillock(sshd:auth): User unknown Feb 9 21:24:53.330291 sshd[2145]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:24:53.330380 sshd[2145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.38.108 Feb 9 21:24:53.331445 sshd[2145]: pam_faillock(sshd:auth): User unknown Feb 9 21:24:53.330000 audit[2145]: USER_AUTH pid=2145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mypc" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:24:53.424661 kernel: audit: type=1100 audit(1707513893.330:237): pid=2145 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mypc" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:24:55.299496 sshd[2145]: Failed password for invalid user mypc from 49.233.38.108 port 60828 ssh2 Feb 9 21:24:57.190117 sshd[2145]: Received disconnect from 49.233.38.108 port 60828:11: Bye Bye [preauth] Feb 9 21:24:57.190117 sshd[2145]: Disconnected from invalid user mypc 49.233.38.108 port 60828 [preauth] Feb 9 21:24:57.192617 systemd[1]: sshd@16-147.75.49.127:22-49.233.38.108:60828.service: Deactivated successfully. Feb 9 21:24:57.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.49.127:22-49.233.38.108:60828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:57.286630 kernel: audit: type=1131 audit(1707513897.191:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.49.127:22-49.233.38.108:60828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:58.637579 systemd[1]: Started sshd@17-147.75.49.127:22-157.230.15.197:48886.service. Feb 9 21:24:58.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.49.127:22-157.230.15.197:48886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:58.730459 kernel: audit: type=1130 audit(1707513898.636:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.49.127:22-157.230.15.197:48886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:24:59.049074 sshd[2149]: Invalid user chony from 157.230.15.197 port 48886 Feb 9 21:24:59.055017 sshd[2149]: pam_faillock(sshd:auth): User unknown Feb 9 21:24:59.056180 sshd[2149]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:24:59.056271 sshd[2149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.15.197 Feb 9 21:24:59.057163 sshd[2149]: pam_faillock(sshd:auth): User unknown Feb 9 21:24:59.055000 audit[2149]: USER_AUTH pid=2149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="chony" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:24:59.155653 kernel: audit: type=1100 audit(1707513899.055:240): pid=2149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="chony" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:25:01.180922 sshd[2149]: Failed password for invalid user chony from 157.230.15.197 port 48886 ssh2 Feb 9 21:25:01.921916 sshd[2149]: Received disconnect from 157.230.15.197 port 48886:11: Bye Bye [preauth] Feb 9 21:25:01.921916 sshd[2149]: Disconnected from invalid user chony 157.230.15.197 port 48886 [preauth] Feb 9 21:25:01.924396 systemd[1]: sshd@17-147.75.49.127:22-157.230.15.197:48886.service: Deactivated successfully. Feb 9 21:25:01.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.49.127:22-157.230.15.197:48886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:02.017496 kernel: audit: type=1131 audit(1707513901.923:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.49.127:22-157.230.15.197:48886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:03.604541 systemd[1]: Started sshd@18-147.75.49.127:22-43.153.62.138:59068.service. Feb 9 21:25:03.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.49.127:22-43.153.62.138:59068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:03.697630 kernel: audit: type=1130 audit(1707513903.603:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.49.127:22-43.153.62.138:59068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:03.756898 sshd[2153]: Invalid user mhucke from 43.153.62.138 port 59068 Feb 9 21:25:03.758273 sshd[2153]: pam_faillock(sshd:auth): User unknown Feb 9 21:25:03.758552 sshd[2153]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:25:03.758572 sshd[2153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.62.138 Feb 9 21:25:03.758771 sshd[2153]: pam_faillock(sshd:auth): User unknown Feb 9 21:25:03.757000 audit[2153]: USER_AUTH pid=2153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mhucke" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:25:03.851653 kernel: audit: type=1100 audit(1707513903.757:243): pid=2153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mhucke" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:25:05.766649 sshd[2153]: Failed password for invalid user mhucke from 43.153.62.138 port 59068 ssh2 Feb 9 21:25:05.951709 sshd[2153]: Received disconnect from 43.153.62.138 port 59068:11: Bye Bye [preauth] Feb 9 21:25:05.951709 sshd[2153]: Disconnected from invalid user mhucke 43.153.62.138 port 59068 [preauth] Feb 9 21:25:05.954213 systemd[1]: sshd@18-147.75.49.127:22-43.153.62.138:59068.service: Deactivated successfully. Feb 9 21:25:05.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.49.127:22-43.153.62.138:59068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:06.047665 kernel: audit: type=1131 audit(1707513905.954:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.49.127:22-43.153.62.138:59068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:19.915092 systemd[1]: Started sshd@19-147.75.49.127:22-43.155.132.249:51856.service. Feb 9 21:25:19.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.49.127:22-43.155.132.249:51856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:20.008664 kernel: audit: type=1130 audit(1707513919.914:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.49.127:22-43.155.132.249:51856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:20.693919 sshd[2161]: Invalid user shedy from 43.155.132.249 port 51856 Feb 9 21:25:20.699928 sshd[2161]: pam_faillock(sshd:auth): User unknown Feb 9 21:25:20.700899 sshd[2161]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:25:20.700986 sshd[2161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:25:20.701969 sshd[2161]: pam_faillock(sshd:auth): User unknown Feb 9 21:25:20.701000 audit[2161]: USER_AUTH pid=2161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="shedy" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:25:20.795647 kernel: audit: type=1100 audit(1707513920.701:246): pid=2161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="shedy" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:25:23.041349 sshd[2161]: Failed password for invalid user shedy from 43.155.132.249 port 51856 ssh2 Feb 9 21:25:25.186485 sshd[2161]: Received disconnect from 43.155.132.249 port 51856:11: Bye Bye [preauth] Feb 9 21:25:25.186485 sshd[2161]: Disconnected from invalid user shedy 43.155.132.249 port 51856 [preauth] Feb 9 21:25:25.188984 systemd[1]: sshd@19-147.75.49.127:22-43.155.132.249:51856.service: Deactivated successfully. Feb 9 21:25:25.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.49.127:22-43.155.132.249:51856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:25.282521 kernel: audit: type=1131 audit(1707513925.189:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.49.127:22-43.155.132.249:51856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:40.102949 systemd[1]: Started sshd@20-147.75.49.127:22-49.233.38.108:46538.service. Feb 9 21:25:40.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.49.127:22-49.233.38.108:46538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:40.196663 kernel: audit: type=1130 audit(1707513940.101:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.49.127:22-49.233.38.108:46538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:41.041042 sshd[2165]: Invalid user lutj from 49.233.38.108 port 46538 Feb 9 21:25:41.046992 sshd[2165]: pam_faillock(sshd:auth): User unknown Feb 9 21:25:41.047989 sshd[2165]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:25:41.048076 sshd[2165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.38.108 Feb 9 21:25:41.048969 sshd[2165]: pam_faillock(sshd:auth): User unknown Feb 9 21:25:41.047000 audit[2165]: USER_AUTH pid=2165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lutj" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:25:41.142662 kernel: audit: type=1100 audit(1707513941.047:249): pid=2165 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lutj" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:25:43.272954 sshd[2165]: Failed password for invalid user lutj from 49.233.38.108 port 46538 ssh2 Feb 9 21:25:44.625388 sshd[2165]: Received disconnect from 49.233.38.108 port 46538:11: Bye Bye [preauth] Feb 9 21:25:44.625388 sshd[2165]: Disconnected from invalid user lutj 49.233.38.108 port 46538 [preauth] Feb 9 21:25:44.627917 systemd[1]: sshd@20-147.75.49.127:22-49.233.38.108:46538.service: Deactivated successfully. Feb 9 21:25:44.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.49.127:22-49.233.38.108:46538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:44.721536 kernel: audit: type=1131 audit(1707513944.626:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.49.127:22-49.233.38.108:46538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:54.813720 systemd[1]: Started sshd@21-147.75.49.127:22-157.230.15.197:40602.service. Feb 9 21:25:54.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.49.127:22-157.230.15.197:40602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:54.906537 kernel: audit: type=1130 audit(1707513954.812:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.49.127:22-157.230.15.197:40602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:55.240050 sshd[2169]: Invalid user amaniz from 157.230.15.197 port 40602 Feb 9 21:25:55.246042 sshd[2169]: pam_faillock(sshd:auth): User unknown Feb 9 21:25:55.247129 sshd[2169]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:25:55.247215 sshd[2169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.15.197 Feb 9 21:25:55.248224 sshd[2169]: pam_faillock(sshd:auth): User unknown Feb 9 21:25:55.246000 audit[2169]: USER_AUTH pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="amaniz" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:25:55.346528 kernel: audit: type=1100 audit(1707513955.246:252): pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="amaniz" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:25:57.060704 sshd[2169]: Failed password for invalid user amaniz from 157.230.15.197 port 40602 ssh2 Feb 9 21:25:58.235522 sshd[2169]: Received disconnect from 157.230.15.197 port 40602:11: Bye Bye [preauth] Feb 9 21:25:58.235522 sshd[2169]: Disconnected from invalid user amaniz 157.230.15.197 port 40602 [preauth] Feb 9 21:25:58.238022 systemd[1]: sshd@21-147.75.49.127:22-157.230.15.197:40602.service: Deactivated successfully. Feb 9 21:25:58.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.49.127:22-157.230.15.197:40602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:58.330673 kernel: audit: type=1131 audit(1707513958.237:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.49.127:22-157.230.15.197:40602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:58.334358 systemd[1]: Started sshd@22-147.75.49.127:22-43.153.62.138:49594.service. Feb 9 21:25:58.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.49.127:22-43.153.62.138:49594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:58.427458 kernel: audit: type=1130 audit(1707513958.332:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.49.127:22-43.153.62.138:49594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:25:58.485282 sshd[2173]: Invalid user neginr from 43.153.62.138 port 49594 Feb 9 21:25:58.486822 sshd[2173]: pam_faillock(sshd:auth): User unknown Feb 9 21:25:58.487079 sshd[2173]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:25:58.487102 sshd[2173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.62.138 Feb 9 21:25:58.487325 sshd[2173]: pam_faillock(sshd:auth): User unknown Feb 9 21:25:58.485000 audit[2173]: USER_AUTH pid=2173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="neginr" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:25:58.579647 kernel: audit: type=1100 audit(1707513958.485:255): pid=2173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="neginr" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:26:00.043893 sshd[2173]: Failed password for invalid user neginr from 43.153.62.138 port 49594 ssh2 Feb 9 21:26:00.762968 sshd[2173]: Received disconnect from 43.153.62.138 port 49594:11: Bye Bye [preauth] Feb 9 21:26:00.762968 sshd[2173]: Disconnected from invalid user neginr 43.153.62.138 port 49594 [preauth] Feb 9 21:26:00.765446 systemd[1]: sshd@22-147.75.49.127:22-43.153.62.138:49594.service: Deactivated successfully. Feb 9 21:26:00.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.49.127:22-43.153.62.138:49594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:00.858515 kernel: audit: type=1131 audit(1707513960.764:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.49.127:22-43.153.62.138:49594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:28.823954 systemd[1]: Started sshd@23-147.75.49.127:22-49.233.38.108:60484.service. Feb 9 21:26:28.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.49.127:22-49.233.38.108:60484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:28.916487 kernel: audit: type=1130 audit(1707513988.823:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.49.127:22-49.233.38.108:60484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:29.688430 sshd[2177]: Invalid user niloofar from 49.233.38.108 port 60484 Feb 9 21:26:29.694423 sshd[2177]: pam_faillock(sshd:auth): User unknown Feb 9 21:26:29.695378 sshd[2177]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:26:29.695485 sshd[2177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.38.108 Feb 9 21:26:29.696367 sshd[2177]: pam_faillock(sshd:auth): User unknown Feb 9 21:26:29.696000 audit[2177]: USER_AUTH pid=2177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="niloofar" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:26:29.790662 kernel: audit: type=1100 audit(1707513989.696:258): pid=2177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="niloofar" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:26:31.176801 sshd[2177]: Failed password for invalid user niloofar from 49.233.38.108 port 60484 ssh2 Feb 9 21:26:32.729354 sshd[2177]: Received disconnect from 49.233.38.108 port 60484:11: Bye Bye [preauth] Feb 9 21:26:32.729354 sshd[2177]: Disconnected from invalid user niloofar 49.233.38.108 port 60484 [preauth] Feb 9 21:26:32.731852 systemd[1]: sshd@23-147.75.49.127:22-49.233.38.108:60484.service: Deactivated successfully. Feb 9 21:26:32.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.49.127:22-49.233.38.108:60484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:32.825653 kernel: audit: type=1131 audit(1707513992.731:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.49.127:22-49.233.38.108:60484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:44.363074 systemd[1]: Started sshd@24-147.75.49.127:22-180.101.88.197:56941.service. Feb 9 21:26:44.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.49.127:22-180.101.88.197:56941 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:44.455513 kernel: audit: type=1130 audit(1707514004.362:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.49.127:22-180.101.88.197:56941 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:46.208565 sshd[2181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 21:26:46.208000 audit[2181]: USER_AUTH pid=2181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:26:46.301642 kernel: audit: type=1100 audit(1707514006.208:261): pid=2181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:26:48.020840 sshd[2181]: Failed password for root from 180.101.88.197 port 56941 ssh2 Feb 9 21:26:49.003000 audit[2181]: USER_AUTH pid=2181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:26:49.096644 kernel: audit: type=1100 audit(1707514009.003:262): pid=2181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:26:49.124210 systemd[1]: Started sshd@25-147.75.49.127:22-157.230.15.197:45306.service. Feb 9 21:26:49.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.49.127:22-157.230.15.197:45306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:49.217654 kernel: audit: type=1130 audit(1707514009.123:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.49.127:22-157.230.15.197:45306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:49.564261 sshd[2184]: Invalid user tcs from 157.230.15.197 port 45306 Feb 9 21:26:49.570340 sshd[2184]: pam_faillock(sshd:auth): User unknown Feb 9 21:26:49.571450 sshd[2184]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:26:49.571572 sshd[2184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.15.197 Feb 9 21:26:49.572422 sshd[2184]: pam_faillock(sshd:auth): User unknown Feb 9 21:26:49.572000 audit[2184]: USER_AUTH pid=2184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tcs" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:26:49.671673 kernel: audit: type=1100 audit(1707514009.572:264): pid=2184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tcs" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:26:51.227745 sshd[2181]: Failed password for root from 180.101.88.197 port 56941 ssh2 Feb 9 21:26:51.796319 sshd[2184]: Failed password for invalid user tcs from 157.230.15.197 port 45306 ssh2 Feb 9 21:26:51.796000 audit[2181]: USER_AUTH pid=2181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:26:51.889644 kernel: audit: type=1100 audit(1707514011.796:265): pid=2181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:26:53.896854 sshd[2184]: Received disconnect from 157.230.15.197 port 45306:11: Bye Bye [preauth] Feb 9 21:26:53.896854 sshd[2184]: Disconnected from invalid user tcs 157.230.15.197 port 45306 [preauth] Feb 9 21:26:53.899317 systemd[1]: sshd@25-147.75.49.127:22-157.230.15.197:45306.service: Deactivated successfully. Feb 9 21:26:53.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.49.127:22-157.230.15.197:45306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:53.964832 sshd[2181]: Failed password for root from 180.101.88.197 port 56941 ssh2 Feb 9 21:26:53.992656 kernel: audit: type=1131 audit(1707514013.899:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.49.127:22-157.230.15.197:45306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:55.095695 sshd[2181]: Received disconnect from 180.101.88.197 port 56941:11: [preauth] Feb 9 21:26:55.095695 sshd[2181]: Disconnected from authenticating user root 180.101.88.197 port 56941 [preauth] Feb 9 21:26:55.096187 sshd[2181]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 21:26:55.098228 systemd[1]: sshd@24-147.75.49.127:22-180.101.88.197:56941.service: Deactivated successfully. Feb 9 21:26:55.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.49.127:22-180.101.88.197:56941 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:55.191510 kernel: audit: type=1131 audit(1707514015.098:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.49.127:22-180.101.88.197:56941 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:55.762473 systemd[1]: Started sshd@26-147.75.49.127:22-180.101.88.197:13049.service. Feb 9 21:26:55.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.49.127:22-180.101.88.197:13049 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:55.855658 kernel: audit: type=1130 audit(1707514015.762:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.49.127:22-180.101.88.197:13049 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:56.177171 systemd[1]: Started sshd@27-147.75.49.127:22-43.153.62.138:40132.service. Feb 9 21:26:56.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.49.127:22-43.153.62.138:40132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:56.269510 kernel: audit: type=1130 audit(1707514016.176:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.49.127:22-43.153.62.138:40132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:56.336032 sshd[2194]: Invalid user nethe from 43.153.62.138 port 40132 Feb 9 21:26:56.337634 sshd[2194]: pam_faillock(sshd:auth): User unknown Feb 9 21:26:56.337927 sshd[2194]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:26:56.337951 sshd[2194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.62.138 Feb 9 21:26:56.338215 sshd[2194]: pam_faillock(sshd:auth): User unknown Feb 9 21:26:56.337000 audit[2194]: USER_AUTH pid=2194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nethe" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:26:56.430666 kernel: audit: type=1100 audit(1707514016.337:270): pid=2194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nethe" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:26:56.847139 sshd[2191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 21:26:56.846000 audit[2191]: USER_AUTH pid=2191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:26:56.939646 kernel: audit: type=1100 audit(1707514016.846:271): pid=2191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:26:58.190870 sshd[2194]: Failed password for invalid user nethe from 43.153.62.138 port 40132 ssh2 Feb 9 21:26:58.700086 sshd[2191]: Failed password for root from 180.101.88.197 port 13049 ssh2 Feb 9 21:26:59.604835 sshd[2194]: Received disconnect from 43.153.62.138 port 40132:11: Bye Bye [preauth] Feb 9 21:26:59.604835 sshd[2194]: Disconnected from invalid user nethe 43.153.62.138 port 40132 [preauth] Feb 9 21:26:59.607262 systemd[1]: sshd@27-147.75.49.127:22-43.153.62.138:40132.service: Deactivated successfully. Feb 9 21:26:59.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.49.127:22-43.153.62.138:40132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:59.641925 sshd[2191]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 21:26:59.641000 audit[2191]: ANOM_LOGIN_FAILURES pid=2191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:59.765572 kernel: audit: type=1131 audit(1707514019.607:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.75.49.127:22-43.153.62.138:40132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:59.765603 kernel: audit: type=2100 audit(1707514019.641:273): pid=2191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 21:26:59.765617 kernel: audit: type=1100 audit(1707514019.641:274): pid=2191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:26:59.641000 audit[2191]: USER_AUTH pid=2191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:27:01.238767 sshd[2191]: Failed password for root from 180.101.88.197 port 13049 ssh2 Feb 9 21:27:02.438000 audit[2191]: USER_AUTH pid=2191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:27:02.531643 kernel: audit: type=1100 audit(1707514022.438:275): pid=2191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:27:02.576516 systemd[1]: Started sshd@28-147.75.49.127:22-43.155.132.249:46374.service. Feb 9 21:27:02.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.49.127:22-43.155.132.249:46374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:02.669459 kernel: audit: type=1130 audit(1707514022.576:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.49.127:22-43.155.132.249:46374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:03.347357 sshd[2198]: Invalid user shokooh from 43.155.132.249 port 46374 Feb 9 21:27:03.353565 sshd[2198]: pam_faillock(sshd:auth): User unknown Feb 9 21:27:03.354553 sshd[2198]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:27:03.354642 sshd[2198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:27:03.355738 sshd[2198]: pam_faillock(sshd:auth): User unknown Feb 9 21:27:03.355000 audit[2198]: USER_AUTH pid=2198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="shokooh" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:27:03.449634 kernel: audit: type=1100 audit(1707514023.355:277): pid=2198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="shokooh" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:27:04.782532 sshd[2191]: Failed password for root from 180.101.88.197 port 13049 ssh2 Feb 9 21:27:05.234268 sshd[2191]: Received disconnect from 180.101.88.197 port 13049:11: [preauth] Feb 9 21:27:05.234268 sshd[2191]: Disconnected from authenticating user root 180.101.88.197 port 13049 [preauth] Feb 9 21:27:05.234889 sshd[2191]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 21:27:05.236880 systemd[1]: sshd@26-147.75.49.127:22-180.101.88.197:13049.service: Deactivated successfully. Feb 9 21:27:05.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.49.127:22-180.101.88.197:13049 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:05.329656 kernel: audit: type=1131 audit(1707514025.236:278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.49.127:22-180.101.88.197:13049 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:05.377319 systemd[1]: Started sshd@29-147.75.49.127:22-180.101.88.197:19504.service. Feb 9 21:27:05.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.49.127:22-180.101.88.197:19504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:05.470533 kernel: audit: type=1130 audit(1707514025.376:279): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.49.127:22-180.101.88.197:19504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:05.504126 sshd[2198]: Failed password for invalid user shokooh from 43.155.132.249 port 46374 ssh2 Feb 9 21:27:06.098488 sshd[2198]: Received disconnect from 43.155.132.249 port 46374:11: Bye Bye [preauth] Feb 9 21:27:06.098488 sshd[2198]: Disconnected from invalid user shokooh 43.155.132.249 port 46374 [preauth] Feb 9 21:27:06.100958 systemd[1]: sshd@28-147.75.49.127:22-43.155.132.249:46374.service: Deactivated successfully. Feb 9 21:27:06.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.49.127:22-43.155.132.249:46374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:06.194655 kernel: audit: type=1131 audit(1707514026.100:280): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-147.75.49.127:22-43.155.132.249:46374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:08.201375 sshd[2202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 21:27:08.201000 audit[2202]: USER_AUTH pid=2202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:27:08.294498 kernel: audit: type=1100 audit(1707514028.201:281): pid=2202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:27:10.034245 sshd[2202]: Failed password for root from 180.101.88.197 port 19504 ssh2 Feb 9 21:27:10.983000 audit[2202]: USER_AUTH pid=2202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:27:11.077656 kernel: audit: type=1100 audit(1707514030.983:282): pid=2202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:27:12.425228 sshd[2202]: Failed password for root from 180.101.88.197 port 19504 ssh2 Feb 9 21:27:13.765000 audit[2202]: USER_AUTH pid=2202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:27:13.859637 kernel: audit: type=1100 audit(1707514033.765:283): pid=2202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 9 21:27:15.954491 sshd[2202]: Failed password for root from 180.101.88.197 port 19504 ssh2 Feb 9 21:27:16.547806 sshd[2202]: Received disconnect from 180.101.88.197 port 19504:11: [preauth] Feb 9 21:27:16.547806 sshd[2202]: Disconnected from authenticating user root 180.101.88.197 port 19504 [preauth] Feb 9 21:27:16.548367 sshd[2202]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 9 21:27:16.550392 systemd[1]: sshd@29-147.75.49.127:22-180.101.88.197:19504.service: Deactivated successfully. Feb 9 21:27:16.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.49.127:22-180.101.88.197:19504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:16.644551 kernel: audit: type=1131 audit(1707514036.550:284): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-147.75.49.127:22-180.101.88.197:19504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:16.719772 systemd[1]: Started sshd@30-147.75.49.127:22-49.233.38.108:46194.service. Feb 9 21:27:16.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.49.127:22-49.233.38.108:46194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:16.811460 kernel: audit: type=1130 audit(1707514036.719:285): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.49.127:22-49.233.38.108:46194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:17.713993 sshd[2211]: Invalid user serrano from 49.233.38.108 port 46194 Feb 9 21:27:17.720003 sshd[2211]: pam_faillock(sshd:auth): User unknown Feb 9 21:27:17.720965 sshd[2211]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:27:17.721052 sshd[2211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.38.108 Feb 9 21:27:17.721970 sshd[2211]: pam_faillock(sshd:auth): User unknown Feb 9 21:27:17.721000 audit[2211]: USER_AUTH pid=2211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="serrano" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:27:17.815534 kernel: audit: type=1100 audit(1707514037.721:286): pid=2211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="serrano" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:27:19.459079 sshd[2211]: Failed password for invalid user serrano from 49.233.38.108 port 46194 ssh2 Feb 9 21:27:20.225413 sshd[2211]: Received disconnect from 49.233.38.108 port 46194:11: Bye Bye [preauth] Feb 9 21:27:20.225413 sshd[2211]: Disconnected from invalid user serrano 49.233.38.108 port 46194 [preauth] Feb 9 21:27:20.228026 systemd[1]: sshd@30-147.75.49.127:22-49.233.38.108:46194.service: Deactivated successfully. Feb 9 21:27:20.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.49.127:22-49.233.38.108:46194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:20.321670 kernel: audit: type=1131 audit(1707514040.227:287): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-147.75.49.127:22-49.233.38.108:46194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:45.275467 systemd[1]: Started sshd@31-147.75.49.127:22-157.230.15.197:55560.service. Feb 9 21:27:45.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.49.127:22-157.230.15.197:55560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:45.368472 kernel: audit: type=1130 audit(1707514065.274:288): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.49.127:22-157.230.15.197:55560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:45.703371 sshd[2216]: Invalid user yyx from 157.230.15.197 port 55560 Feb 9 21:27:45.709782 sshd[2216]: pam_faillock(sshd:auth): User unknown Feb 9 21:27:45.710844 sshd[2216]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:27:45.710878 sshd[2216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.15.197 Feb 9 21:27:45.712328 sshd[2216]: pam_faillock(sshd:auth): User unknown Feb 9 21:27:45.710000 audit[2216]: USER_AUTH pid=2216 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="yyx" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:27:45.805538 kernel: audit: type=1100 audit(1707514065.710:289): pid=2216 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="yyx" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:27:47.960912 sshd[2216]: Failed password for invalid user yyx from 157.230.15.197 port 55560 ssh2 Feb 9 21:27:48.744471 sshd[2216]: Received disconnect from 157.230.15.197 port 55560:11: Bye Bye [preauth] Feb 9 21:27:48.744471 sshd[2216]: Disconnected from invalid user yyx 157.230.15.197 port 55560 [preauth] Feb 9 21:27:48.746977 systemd[1]: sshd@31-147.75.49.127:22-157.230.15.197:55560.service: Deactivated successfully. Feb 9 21:27:48.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.49.127:22-157.230.15.197:55560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:48.840511 kernel: audit: type=1131 audit(1707514068.745:290): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-147.75.49.127:22-157.230.15.197:55560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:49.957646 systemd[1]: Started sshd@32-147.75.49.127:22-43.153.62.138:58892.service. Feb 9 21:27:49.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.49.127:22-43.153.62.138:58892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:50.051674 kernel: audit: type=1130 audit(1707514069.956:291): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.49.127:22-43.153.62.138:58892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:50.111478 sshd[2223]: Invalid user sa from 43.153.62.138 port 58892 Feb 9 21:27:50.112953 sshd[2223]: pam_faillock(sshd:auth): User unknown Feb 9 21:27:50.113231 sshd[2223]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:27:50.113251 sshd[2223]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.62.138 Feb 9 21:27:50.113449 sshd[2223]: pam_faillock(sshd:auth): User unknown Feb 9 21:27:50.112000 audit[2223]: USER_AUTH pid=2223 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sa" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:27:50.204654 kernel: audit: type=1100 audit(1707514070.112:292): pid=2223 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sa" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:27:52.046026 sshd[2223]: Failed password for invalid user sa from 43.153.62.138 port 58892 ssh2 Feb 9 21:27:53.789018 sshd[2223]: Received disconnect from 43.153.62.138 port 58892:11: Bye Bye [preauth] Feb 9 21:27:53.789018 sshd[2223]: Disconnected from invalid user sa 43.153.62.138 port 58892 [preauth] Feb 9 21:27:53.791505 systemd[1]: sshd@32-147.75.49.127:22-43.153.62.138:58892.service: Deactivated successfully. Feb 9 21:27:53.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.49.127:22-43.153.62.138:58892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:27:53.885668 kernel: audit: type=1131 audit(1707514073.791:293): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-147.75.49.127:22-43.153.62.138:58892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:09.061421 systemd[1]: Started sshd@33-147.75.49.127:22-49.233.38.108:60150.service. Feb 9 21:28:09.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.49.127:22-49.233.38.108:60150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:09.154658 kernel: audit: type=1130 audit(1707514089.061:294): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.49.127:22-49.233.38.108:60150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:10.024099 sshd[2228]: Invalid user betelehem from 49.233.38.108 port 60150 Feb 9 21:28:10.030227 sshd[2228]: pam_faillock(sshd:auth): User unknown Feb 9 21:28:10.031349 sshd[2228]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:28:10.031436 sshd[2228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.38.108 Feb 9 21:28:10.032367 sshd[2228]: pam_faillock(sshd:auth): User unknown Feb 9 21:28:10.032000 audit[2228]: USER_AUTH pid=2228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="betelehem" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:28:10.126654 kernel: audit: type=1100 audit(1707514090.032:295): pid=2228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="betelehem" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:28:12.045520 sshd[2228]: Failed password for invalid user betelehem from 49.233.38.108 port 60150 ssh2 Feb 9 21:28:12.222056 sshd[2228]: Received disconnect from 49.233.38.108 port 60150:11: Bye Bye [preauth] Feb 9 21:28:12.222056 sshd[2228]: Disconnected from invalid user betelehem 49.233.38.108 port 60150 [preauth] Feb 9 21:28:12.224625 systemd[1]: sshd@33-147.75.49.127:22-49.233.38.108:60150.service: Deactivated successfully. Feb 9 21:28:12.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.49.127:22-49.233.38.108:60150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:12.318661 kernel: audit: type=1131 audit(1707514092.224:296): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-147.75.49.127:22-49.233.38.108:60150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:43.528190 systemd[1]: Started sshd@34-147.75.49.127:22-43.153.62.138:49436.service. Feb 9 21:28:43.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.49.127:22-43.153.62.138:49436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:43.621659 kernel: audit: type=1130 audit(1707514123.527:297): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.49.127:22-43.153.62.138:49436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:43.680523 sshd[2233]: Invalid user nimajam from 43.153.62.138 port 49436 Feb 9 21:28:43.681990 sshd[2233]: pam_faillock(sshd:auth): User unknown Feb 9 21:28:43.682239 sshd[2233]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:28:43.682261 sshd[2233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.62.138 Feb 9 21:28:43.682500 sshd[2233]: pam_faillock(sshd:auth): User unknown Feb 9 21:28:43.682000 audit[2233]: USER_AUTH pid=2233 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nimajam" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:28:43.773653 kernel: audit: type=1100 audit(1707514123.682:298): pid=2233 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nimajam" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:28:45.891342 sshd[2233]: Failed password for invalid user nimajam from 43.153.62.138 port 49436 ssh2 Feb 9 21:28:46.061254 systemd[1]: Started sshd@35-147.75.49.127:22-43.155.132.249:40882.service. Feb 9 21:28:46.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.49.127:22-43.155.132.249:40882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:46.154671 kernel: audit: type=1130 audit(1707514126.060:299): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.49.127:22-43.155.132.249:40882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:46.871517 sshd[2236]: Invalid user hias from 43.155.132.249 port 40882 Feb 9 21:28:46.877439 sshd[2236]: pam_faillock(sshd:auth): User unknown Feb 9 21:28:46.878623 sshd[2236]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:28:46.878707 sshd[2236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:28:46.879772 sshd[2236]: pam_faillock(sshd:auth): User unknown Feb 9 21:28:46.879000 audit[2236]: USER_AUTH pid=2236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hias" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:28:46.972650 kernel: audit: type=1100 audit(1707514126.879:300): pid=2236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hias" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:28:47.889190 systemd[1]: Started sshd@36-147.75.49.127:22-157.230.15.197:32798.service. Feb 9 21:28:47.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.49.127:22-157.230.15.197:32798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:47.982526 kernel: audit: type=1130 audit(1707514127.888:301): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.49.127:22-157.230.15.197:32798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:48.089727 sshd[2233]: Received disconnect from 43.153.62.138 port 49436:11: Bye Bye [preauth] Feb 9 21:28:48.089727 sshd[2233]: Disconnected from invalid user nimajam 43.153.62.138 port 49436 [preauth] Feb 9 21:28:48.090957 systemd[1]: sshd@34-147.75.49.127:22-43.153.62.138:49436.service: Deactivated successfully. Feb 9 21:28:48.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.49.127:22-43.153.62.138:49436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:48.189659 kernel: audit: type=1131 audit(1707514128.090:302): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-147.75.49.127:22-43.153.62.138:49436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:48.334493 sshd[2239]: Invalid user mmdy from 157.230.15.197 port 32798 Feb 9 21:28:48.340484 sshd[2239]: pam_faillock(sshd:auth): User unknown Feb 9 21:28:48.341486 sshd[2239]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:28:48.341572 sshd[2239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.15.197 Feb 9 21:28:48.342429 sshd[2239]: pam_faillock(sshd:auth): User unknown Feb 9 21:28:48.342000 audit[2239]: USER_AUTH pid=2239 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mmdy" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:28:48.441667 kernel: audit: type=1100 audit(1707514128.342:303): pid=2239 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mmdy" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:28:48.501296 sshd[2236]: Failed password for invalid user hias from 43.155.132.249 port 40882 ssh2 Feb 9 21:28:49.023431 sshd[2236]: Received disconnect from 43.155.132.249 port 40882:11: Bye Bye [preauth] Feb 9 21:28:49.023431 sshd[2236]: Disconnected from invalid user hias 43.155.132.249 port 40882 [preauth] Feb 9 21:28:49.025918 systemd[1]: sshd@35-147.75.49.127:22-43.155.132.249:40882.service: Deactivated successfully. Feb 9 21:28:49.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.49.127:22-43.155.132.249:40882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:49.119656 kernel: audit: type=1131 audit(1707514129.025:304): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-147.75.49.127:22-43.155.132.249:40882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:49.904156 sshd[2239]: Failed password for invalid user mmdy from 157.230.15.197 port 32798 ssh2 Feb 9 21:28:51.393910 sshd[2239]: Received disconnect from 157.230.15.197 port 32798:11: Bye Bye [preauth] Feb 9 21:28:51.393910 sshd[2239]: Disconnected from invalid user mmdy 157.230.15.197 port 32798 [preauth] Feb 9 21:28:51.396486 systemd[1]: sshd@36-147.75.49.127:22-157.230.15.197:32798.service: Deactivated successfully. Feb 9 21:28:51.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.49.127:22-157.230.15.197:32798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:51.489521 kernel: audit: type=1131 audit(1707514131.396:305): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-147.75.49.127:22-157.230.15.197:32798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:57.803232 systemd[1]: Started sshd@37-147.75.49.127:22-49.233.38.108:45878.service. Feb 9 21:28:57.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.49.127:22-49.233.38.108:45878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:57.896655 kernel: audit: type=1130 audit(1707514137.802:306): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.49.127:22-49.233.38.108:45878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:28:58.807152 sshd[2245]: Invalid user zz from 49.233.38.108 port 45878 Feb 9 21:28:58.813289 sshd[2245]: pam_faillock(sshd:auth): User unknown Feb 9 21:28:58.814323 sshd[2245]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:28:58.814410 sshd[2245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.38.108 Feb 9 21:28:58.815496 sshd[2245]: pam_faillock(sshd:auth): User unknown Feb 9 21:28:58.815000 audit[2245]: USER_AUTH pid=2245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zz" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:28:58.908654 kernel: audit: type=1100 audit(1707514138.815:307): pid=2245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zz" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:29:00.416939 sshd[2245]: Failed password for invalid user zz from 49.233.38.108 port 45878 ssh2 Feb 9 21:29:01.908360 sshd[2245]: Received disconnect from 49.233.38.108 port 45878:11: Bye Bye [preauth] Feb 9 21:29:01.908360 sshd[2245]: Disconnected from invalid user zz 49.233.38.108 port 45878 [preauth] Feb 9 21:29:01.910885 systemd[1]: sshd@37-147.75.49.127:22-49.233.38.108:45878.service: Deactivated successfully. Feb 9 21:29:01.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.49.127:22-49.233.38.108:45878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:29:02.004667 kernel: audit: type=1131 audit(1707514141.910:308): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-147.75.49.127:22-49.233.38.108:45878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:29:35.466244 systemd[1]: Started sshd@38-147.75.49.127:22-103.147.242.96:46353.service. Feb 9 21:29:35.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.49.127:22-103.147.242.96:46353 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:29:35.559665 kernel: audit: type=1130 audit(1707514175.465:309): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.49.127:22-103.147.242.96:46353 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:29:37.100111 sshd[2249]: Invalid user anet from 103.147.242.96 port 46353 Feb 9 21:29:37.106067 sshd[2249]: pam_faillock(sshd:auth): User unknown Feb 9 21:29:37.107182 sshd[2249]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:29:37.107269 sshd[2249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:29:37.108143 sshd[2249]: pam_faillock(sshd:auth): User unknown Feb 9 21:29:37.107000 audit[2249]: USER_AUTH pid=2249 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="anet" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:29:37.201669 kernel: audit: type=1100 audit(1707514177.107:310): pid=2249 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="anet" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:29:39.396855 sshd[2249]: Failed password for invalid user anet from 103.147.242.96 port 46353 ssh2 Feb 9 21:29:40.552054 systemd[1]: Started sshd@39-147.75.49.127:22-43.153.62.138:39964.service. Feb 9 21:29:40.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.49.127:22-43.153.62.138:39964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:29:40.645661 kernel: audit: type=1130 audit(1707514180.551:311): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.49.127:22-43.153.62.138:39964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:29:40.705145 sshd[2252]: Invalid user kabir from 43.153.62.138 port 39964 Feb 9 21:29:40.706574 sshd[2252]: pam_faillock(sshd:auth): User unknown Feb 9 21:29:40.706827 sshd[2252]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:29:40.706849 sshd[2252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.62.138 Feb 9 21:29:40.707082 sshd[2252]: pam_faillock(sshd:auth): User unknown Feb 9 21:29:40.706000 audit[2252]: USER_AUTH pid=2252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="kabir" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:29:40.799657 kernel: audit: type=1100 audit(1707514180.706:312): pid=2252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="kabir" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:29:41.994016 sshd[2249]: Received disconnect from 103.147.242.96 port 46353:11: Bye Bye [preauth] Feb 9 21:29:41.994016 sshd[2249]: Disconnected from invalid user anet 103.147.242.96 port 46353 [preauth] Feb 9 21:29:41.996481 systemd[1]: sshd@38-147.75.49.127:22-103.147.242.96:46353.service: Deactivated successfully. Feb 9 21:29:41.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.49.127:22-103.147.242.96:46353 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:29:42.090760 kernel: audit: type=1131 audit(1707514181.996:313): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-147.75.49.127:22-103.147.242.96:46353 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:29:42.199934 systemd[1]: Started sshd@40-147.75.49.127:22-157.230.15.197:40626.service. Feb 9 21:29:42.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.49.127:22-157.230.15.197:40626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:29:42.293660 kernel: audit: type=1130 audit(1707514182.199:314): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.49.127:22-157.230.15.197:40626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:29:42.407845 sshd[2252]: Failed password for invalid user kabir from 43.153.62.138 port 39964 ssh2 Feb 9 21:29:42.600048 sshd[2257]: Invalid user alidana from 157.230.15.197 port 40626 Feb 9 21:29:42.606165 sshd[2257]: pam_faillock(sshd:auth): User unknown Feb 9 21:29:42.607286 sshd[2257]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:29:42.607374 sshd[2257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.15.197 Feb 9 21:29:42.608287 sshd[2257]: pam_faillock(sshd:auth): User unknown Feb 9 21:29:42.608000 audit[2257]: USER_AUTH pid=2257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="alidana" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:29:42.709657 kernel: audit: type=1100 audit(1707514182.608:315): pid=2257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="alidana" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:29:42.712609 sshd[2252]: Received disconnect from 43.153.62.138 port 39964:11: Bye Bye [preauth] Feb 9 21:29:42.712609 sshd[2252]: Disconnected from invalid user kabir 43.153.62.138 port 39964 [preauth] Feb 9 21:29:42.713098 systemd[1]: sshd@39-147.75.49.127:22-43.153.62.138:39964.service: Deactivated successfully. Feb 9 21:29:42.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.49.127:22-43.153.62.138:39964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:29:42.806665 kernel: audit: type=1131 audit(1707514182.712:316): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-147.75.49.127:22-43.153.62.138:39964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:29:44.917645 sshd[2257]: Failed password for invalid user alidana from 157.230.15.197 port 40626 ssh2 Feb 9 21:29:45.685686 sshd[2257]: Received disconnect from 157.230.15.197 port 40626:11: Bye Bye [preauth] Feb 9 21:29:45.685686 sshd[2257]: Disconnected from invalid user alidana 157.230.15.197 port 40626 [preauth] Feb 9 21:29:45.688251 systemd[1]: sshd@40-147.75.49.127:22-157.230.15.197:40626.service: Deactivated successfully. Feb 9 21:29:45.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.49.127:22-157.230.15.197:40626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:29:45.782526 kernel: audit: type=1131 audit(1707514185.688:317): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-147.75.49.127:22-157.230.15.197:40626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:29:52.704299 systemd[1]: Started sshd@41-147.75.49.127:22-49.233.38.108:59840.service. Feb 9 21:29:52.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.49.127:22-49.233.38.108:59840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:29:52.797526 kernel: audit: type=1130 audit(1707514192.703:318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.49.127:22-49.233.38.108:59840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:29:53.566812 sshd[2262]: Invalid user gizmodo from 49.233.38.108 port 59840 Feb 9 21:29:53.572948 sshd[2262]: pam_faillock(sshd:auth): User unknown Feb 9 21:29:53.573907 sshd[2262]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:29:53.573995 sshd[2262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.38.108 Feb 9 21:29:53.574883 sshd[2262]: pam_faillock(sshd:auth): User unknown Feb 9 21:29:53.574000 audit[2262]: USER_AUTH pid=2262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="gizmodo" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:29:53.668649 kernel: audit: type=1100 audit(1707514193.574:319): pid=2262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="gizmodo" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:29:55.392505 sshd[2262]: Failed password for invalid user gizmodo from 49.233.38.108 port 59840 ssh2 Feb 9 21:29:55.596608 sshd[2262]: Received disconnect from 49.233.38.108 port 59840:11: Bye Bye [preauth] Feb 9 21:29:55.596608 sshd[2262]: Disconnected from invalid user gizmodo 49.233.38.108 port 59840 [preauth] Feb 9 21:29:55.599118 systemd[1]: sshd@41-147.75.49.127:22-49.233.38.108:59840.service: Deactivated successfully. Feb 9 21:29:55.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.49.127:22-49.233.38.108:59840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:29:55.693666 kernel: audit: type=1131 audit(1707514195.599:320): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-147.75.49.127:22-49.233.38.108:59840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:11.728580 systemd[1]: Started sshd@42-147.75.49.127:22-61.177.172.136:48856.service. Feb 9 21:30:11.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.49.127:22-61.177.172.136:48856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:11.821465 kernel: audit: type=1130 audit(1707514211.727:321): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.49.127:22-61.177.172.136:48856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:12.740679 sshd[2268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:30:12.739000 audit[2268]: USER_AUTH pid=2268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:12.833648 kernel: audit: type=1100 audit(1707514212.739:322): pid=2268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:14.834374 sshd[2268]: Failed password for root from 61.177.172.136 port 48856 ssh2 Feb 9 21:30:15.522000 audit[2268]: USER_AUTH pid=2268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:15.616645 kernel: audit: type=1100 audit(1707514215.522:323): pid=2268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:18.028737 sshd[2268]: Failed password for root from 61.177.172.136 port 48856 ssh2 Feb 9 21:30:18.305000 audit[2268]: USER_AUTH pid=2268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:18.399654 kernel: audit: type=1100 audit(1707514218.305:324): pid=2268 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:20.224666 sshd[2268]: Failed password for root from 61.177.172.136 port 48856 ssh2 Feb 9 21:30:21.089221 sshd[2268]: Received disconnect from 61.177.172.136 port 48856:11: [preauth] Feb 9 21:30:21.089221 sshd[2268]: Disconnected from authenticating user root 61.177.172.136 port 48856 [preauth] Feb 9 21:30:21.089762 sshd[2268]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:30:21.091800 systemd[1]: sshd@42-147.75.49.127:22-61.177.172.136:48856.service: Deactivated successfully. Feb 9 21:30:21.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.49.127:22-61.177.172.136:48856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:21.185601 kernel: audit: type=1131 audit(1707514221.091:325): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-147.75.49.127:22-61.177.172.136:48856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:21.222012 systemd[1]: Started sshd@43-147.75.49.127:22-61.177.172.136:46675.service. Feb 9 21:30:21.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.49.127:22-61.177.172.136:46675 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:21.314659 kernel: audit: type=1130 audit(1707514221.220:326): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.49.127:22-61.177.172.136:46675 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:22.170065 sshd[2273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:30:22.168000 audit[2273]: USER_AUTH pid=2273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:22.263644 kernel: audit: type=1100 audit(1707514222.168:327): pid=2273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:24.303565 sshd[2273]: Failed password for root from 61.177.172.136 port 46675 ssh2 Feb 9 21:30:24.941000 audit[2273]: ANOM_LOGIN_FAILURES pid=2273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:24.942754 sshd[2273]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 21:30:24.941000 audit[2273]: USER_AUTH pid=2273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:25.099613 kernel: audit: type=2100 audit(1707514224.941:328): pid=2273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:25.099649 kernel: audit: type=1100 audit(1707514224.941:329): pid=2273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:27.352215 sshd[2273]: Failed password for root from 61.177.172.136 port 46675 ssh2 Feb 9 21:30:27.713000 audit[2273]: USER_AUTH pid=2273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:27.807644 kernel: audit: type=1100 audit(1707514227.713:330): pid=2273 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:29.517647 systemd[1]: Started sshd@44-147.75.49.127:22-43.155.132.249:35384.service. Feb 9 21:30:29.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.49.127:22-43.155.132.249:35384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:29.610460 kernel: audit: type=1130 audit(1707514229.516:331): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.49.127:22-43.155.132.249:35384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:29.867656 sshd[2273]: Failed password for root from 61.177.172.136 port 46675 ssh2 Feb 9 21:30:30.347508 sshd[2276]: Invalid user pcanibe from 43.155.132.249 port 35384 Feb 9 21:30:30.353542 sshd[2276]: pam_faillock(sshd:auth): User unknown Feb 9 21:30:30.354539 sshd[2276]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:30:30.354627 sshd[2276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:30:30.355711 sshd[2276]: pam_faillock(sshd:auth): User unknown Feb 9 21:30:30.354000 audit[2276]: USER_AUTH pid=2276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pcanibe" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:30:30.449636 kernel: audit: type=1100 audit(1707514230.354:332): pid=2276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pcanibe" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:30:30.485412 sshd[2273]: Received disconnect from 61.177.172.136 port 46675:11: [preauth] Feb 9 21:30:30.485412 sshd[2273]: Disconnected from authenticating user root 61.177.172.136 port 46675 [preauth] Feb 9 21:30:30.485590 sshd[2273]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:30:30.486113 systemd[1]: sshd@43-147.75.49.127:22-61.177.172.136:46675.service: Deactivated successfully. Feb 9 21:30:30.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.49.127:22-61.177.172.136:46675 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:30.579657 kernel: audit: type=1131 audit(1707514230.484:333): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-147.75.49.127:22-61.177.172.136:46675 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:30.629375 systemd[1]: Started sshd@45-147.75.49.127:22-61.177.172.136:38474.service. Feb 9 21:30:30.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.49.127:22-61.177.172.136:38474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:30.721658 kernel: audit: type=1130 audit(1707514230.628:334): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.49.127:22-61.177.172.136:38474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:31.577986 sshd[2280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:30:31.576000 audit[2280]: USER_AUTH pid=2280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:31.670513 kernel: audit: type=1100 audit(1707514231.576:335): pid=2280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:32.589396 sshd[2276]: Failed password for invalid user pcanibe from 43.155.132.249 port 35384 ssh2 Feb 9 21:30:33.235431 sshd[2276]: Received disconnect from 43.155.132.249 port 35384:11: Bye Bye [preauth] Feb 9 21:30:33.235431 sshd[2276]: Disconnected from invalid user pcanibe 43.155.132.249 port 35384 [preauth] Feb 9 21:30:33.237954 systemd[1]: sshd@44-147.75.49.127:22-43.155.132.249:35384.service: Deactivated successfully. Feb 9 21:30:33.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.49.127:22-43.155.132.249:35384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:33.331637 kernel: audit: type=1131 audit(1707514233.237:336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-147.75.49.127:22-43.155.132.249:35384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:33.947587 sshd[2280]: Failed password for root from 61.177.172.136 port 38474 ssh2 Feb 9 21:30:34.348000 audit[2280]: USER_AUTH pid=2280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:34.443651 kernel: audit: type=1100 audit(1707514234.348:337): pid=2280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:36.463954 sshd[2280]: Failed password for root from 61.177.172.136 port 38474 ssh2 Feb 9 21:30:37.121000 audit[2280]: USER_AUTH pid=2280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:37.215642 kernel: audit: type=1100 audit(1707514237.121:338): pid=2280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:30:37.595662 systemd[1]: Started sshd@46-147.75.49.127:22-43.153.62.138:58728.service. Feb 9 21:30:37.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.49.127:22-43.153.62.138:58728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:37.689643 kernel: audit: type=1130 audit(1707514237.594:339): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.49.127:22-43.153.62.138:58728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:37.748952 sshd[2284]: Invalid user najme from 43.153.62.138 port 58728 Feb 9 21:30:37.750612 sshd[2284]: pam_faillock(sshd:auth): User unknown Feb 9 21:30:37.750902 sshd[2284]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:30:37.750927 sshd[2284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.62.138 Feb 9 21:30:37.751192 sshd[2284]: pam_faillock(sshd:auth): User unknown Feb 9 21:30:37.749000 audit[2284]: USER_AUTH pid=2284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="najme" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:30:37.843649 kernel: audit: type=1100 audit(1707514237.749:340): pid=2284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="najme" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:30:39.248661 systemd[1]: Started sshd@47-147.75.49.127:22-157.230.15.197:51906.service. Feb 9 21:30:39.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.49.127:22-157.230.15.197:51906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:39.315604 sshd[2280]: Failed password for root from 61.177.172.136 port 38474 ssh2 Feb 9 21:30:39.341662 kernel: audit: type=1130 audit(1707514239.247:341): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.49.127:22-157.230.15.197:51906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:39.649589 sshd[2287]: Invalid user taiirah from 157.230.15.197 port 51906 Feb 9 21:30:39.655849 sshd[2287]: pam_faillock(sshd:auth): User unknown Feb 9 21:30:39.656833 sshd[2287]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:30:39.656924 sshd[2287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.15.197 Feb 9 21:30:39.657827 sshd[2287]: pam_faillock(sshd:auth): User unknown Feb 9 21:30:39.656000 audit[2287]: USER_AUTH pid=2287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="taiirah" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:30:39.758666 kernel: audit: type=1100 audit(1707514239.656:342): pid=2287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="taiirah" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:30:39.893778 sshd[2280]: Received disconnect from 61.177.172.136 port 38474:11: [preauth] Feb 9 21:30:39.893778 sshd[2280]: Disconnected from authenticating user root 61.177.172.136 port 38474 [preauth] Feb 9 21:30:39.894201 sshd[2280]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:30:39.896080 systemd[1]: sshd@45-147.75.49.127:22-61.177.172.136:38474.service: Deactivated successfully. Feb 9 21:30:39.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.49.127:22-61.177.172.136:38474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:39.943637 sshd[2284]: Failed password for invalid user najme from 43.153.62.138 port 58728 ssh2 Feb 9 21:30:39.990654 kernel: audit: type=1131 audit(1707514239.895:343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-147.75.49.127:22-61.177.172.136:38474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:41.358413 sshd[2284]: Received disconnect from 43.153.62.138 port 58728:11: Bye Bye [preauth] Feb 9 21:30:41.358413 sshd[2284]: Disconnected from invalid user najme 43.153.62.138 port 58728 [preauth] Feb 9 21:30:41.360948 systemd[1]: sshd@46-147.75.49.127:22-43.153.62.138:58728.service: Deactivated successfully. Feb 9 21:30:41.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.49.127:22-43.153.62.138:58728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:41.454651 kernel: audit: type=1131 audit(1707514241.359:344): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-147.75.49.127:22-43.153.62.138:58728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:41.791324 sshd[2287]: Failed password for invalid user taiirah from 157.230.15.197 port 51906 ssh2 Feb 9 21:30:43.193137 sshd[2287]: Received disconnect from 157.230.15.197 port 51906:11: Bye Bye [preauth] Feb 9 21:30:43.193137 sshd[2287]: Disconnected from invalid user taiirah 157.230.15.197 port 51906 [preauth] Feb 9 21:30:43.195691 systemd[1]: sshd@47-147.75.49.127:22-157.230.15.197:51906.service: Deactivated successfully. Feb 9 21:30:43.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.49.127:22-157.230.15.197:51906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:43.289653 kernel: audit: type=1131 audit(1707514243.194:345): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-147.75.49.127:22-157.230.15.197:51906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:47.558897 systemd[1]: Started sshd@48-147.75.49.127:22-49.233.38.108:45556.service. Feb 9 21:30:47.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.49.127:22-49.233.38.108:45556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:47.651519 kernel: audit: type=1130 audit(1707514247.557:346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.49.127:22-49.233.38.108:45556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:48.468547 sshd[2294]: Invalid user dwgan from 49.233.38.108 port 45556 Feb 9 21:30:48.474808 sshd[2294]: pam_faillock(sshd:auth): User unknown Feb 9 21:30:48.475471 sshd[2294]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:30:48.475509 sshd[2294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.38.108 Feb 9 21:30:48.475717 sshd[2294]: pam_faillock(sshd:auth): User unknown Feb 9 21:30:48.474000 audit[2294]: USER_AUTH pid=2294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dwgan" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:30:48.568530 kernel: audit: type=1100 audit(1707514248.474:347): pid=2294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dwgan" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:30:50.845001 sshd[2294]: Failed password for invalid user dwgan from 49.233.38.108 port 45556 ssh2 Feb 9 21:30:52.889365 sshd[2294]: Received disconnect from 49.233.38.108 port 45556:11: Bye Bye [preauth] Feb 9 21:30:52.889365 sshd[2294]: Disconnected from invalid user dwgan 49.233.38.108 port 45556 [preauth] Feb 9 21:30:52.891911 systemd[1]: sshd@48-147.75.49.127:22-49.233.38.108:45556.service: Deactivated successfully. Feb 9 21:30:52.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.49.127:22-49.233.38.108:45556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:30:52.984511 kernel: audit: type=1131 audit(1707514252.890:348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-147.75.49.127:22-49.233.38.108:45556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:31:36.081918 systemd[1]: Started sshd@49-147.75.49.127:22-43.153.62.138:49264.service. Feb 9 21:31:36.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.49.127:22-43.153.62.138:49264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:31:36.174659 kernel: audit: type=1130 audit(1707514296.080:349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.49.127:22-43.153.62.138:49264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:31:36.230640 sshd[2299]: Invalid user shirq from 43.153.62.138 port 49264 Feb 9 21:31:36.232069 sshd[2299]: pam_faillock(sshd:auth): User unknown Feb 9 21:31:36.232308 sshd[2299]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:31:36.232328 sshd[2299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.62.138 Feb 9 21:31:36.232552 sshd[2299]: pam_faillock(sshd:auth): User unknown Feb 9 21:31:36.231000 audit[2299]: USER_AUTH pid=2299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="shirq" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:31:36.323497 kernel: audit: type=1100 audit(1707514296.231:350): pid=2299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="shirq" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:31:36.666608 systemd[1]: Started sshd@50-147.75.49.127:22-49.233.38.108:59508.service. Feb 9 21:31:36.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.49.127:22-49.233.38.108:59508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:31:36.759660 kernel: audit: type=1130 audit(1707514296.665:351): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.49.127:22-49.233.38.108:59508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:31:37.345882 systemd[1]: Started sshd@51-147.75.49.127:22-157.230.15.197:58344.service. Feb 9 21:31:37.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.49.127:22-157.230.15.197:58344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:31:37.438509 kernel: audit: type=1130 audit(1707514297.344:352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.49.127:22-157.230.15.197:58344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:31:37.508823 sshd[2302]: Invalid user farshid from 49.233.38.108 port 59508 Feb 9 21:31:37.510464 sshd[2302]: pam_faillock(sshd:auth): User unknown Feb 9 21:31:37.510758 sshd[2302]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:31:37.510783 sshd[2302]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.38.108 Feb 9 21:31:37.511010 sshd[2302]: pam_faillock(sshd:auth): User unknown Feb 9 21:31:37.509000 audit[2302]: USER_AUTH pid=2302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="farshid" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:31:37.602650 kernel: audit: type=1100 audit(1707514297.509:353): pid=2302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="farshid" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:31:37.775212 sshd[2305]: Invalid user fuyh from 157.230.15.197 port 58344 Feb 9 21:31:37.781316 sshd[2305]: pam_faillock(sshd:auth): User unknown Feb 9 21:31:37.782405 sshd[2305]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:31:37.782534 sshd[2305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.15.197 Feb 9 21:31:37.783415 sshd[2305]: pam_faillock(sshd:auth): User unknown Feb 9 21:31:37.782000 audit[2305]: USER_AUTH pid=2305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fuyh" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:31:37.877652 kernel: audit: type=1100 audit(1707514297.782:354): pid=2305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fuyh" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:31:38.190588 sshd[2299]: Failed password for invalid user shirq from 43.153.62.138 port 49264 ssh2 Feb 9 21:31:38.620704 sshd[2299]: Received disconnect from 43.153.62.138 port 49264:11: Bye Bye [preauth] Feb 9 21:31:38.620704 sshd[2299]: Disconnected from invalid user shirq 43.153.62.138 port 49264 [preauth] Feb 9 21:31:38.623203 systemd[1]: sshd@49-147.75.49.127:22-43.153.62.138:49264.service: Deactivated successfully. Feb 9 21:31:38.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.49.127:22-43.153.62.138:49264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:31:38.716573 kernel: audit: type=1131 audit(1707514298.623:355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-147.75.49.127:22-43.153.62.138:49264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:31:39.608849 sshd[2302]: Failed password for invalid user farshid from 49.233.38.108 port 59508 ssh2 Feb 9 21:31:39.881711 sshd[2305]: Failed password for invalid user fuyh from 157.230.15.197 port 58344 ssh2 Feb 9 21:31:40.932593 sshd[2305]: Received disconnect from 157.230.15.197 port 58344:11: Bye Bye [preauth] Feb 9 21:31:40.932593 sshd[2305]: Disconnected from invalid user fuyh 157.230.15.197 port 58344 [preauth] Feb 9 21:31:40.935174 systemd[1]: sshd@51-147.75.49.127:22-157.230.15.197:58344.service: Deactivated successfully. Feb 9 21:31:40.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.49.127:22-157.230.15.197:58344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:31:41.028654 kernel: audit: type=1131 audit(1707514300.935:356): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-147.75.49.127:22-157.230.15.197:58344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:31:41.782595 sshd[2302]: Received disconnect from 49.233.38.108 port 59508:11: Bye Bye [preauth] Feb 9 21:31:41.782595 sshd[2302]: Disconnected from invalid user farshid 49.233.38.108 port 59508 [preauth] Feb 9 21:31:41.785184 systemd[1]: sshd@50-147.75.49.127:22-49.233.38.108:59508.service: Deactivated successfully. Feb 9 21:31:41.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.49.127:22-49.233.38.108:59508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:31:41.878637 kernel: audit: type=1131 audit(1707514301.785:357): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-147.75.49.127:22-49.233.38.108:59508 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:32:12.812932 systemd[1]: Started sshd@52-147.75.49.127:22-43.155.132.249:58118.service. Feb 9 21:32:12.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.49.127:22-43.155.132.249:58118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:32:12.906795 kernel: audit: type=1130 audit(1707514332.811:358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.49.127:22-43.155.132.249:58118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:32:13.630642 sshd[2312]: Invalid user hliu from 43.155.132.249 port 58118 Feb 9 21:32:13.636622 sshd[2312]: pam_faillock(sshd:auth): User unknown Feb 9 21:32:13.637594 sshd[2312]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:32:13.637682 sshd[2312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:32:13.638571 sshd[2312]: pam_faillock(sshd:auth): User unknown Feb 9 21:32:13.637000 audit[2312]: USER_AUTH pid=2312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hliu" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:32:13.731527 kernel: audit: type=1100 audit(1707514333.637:359): pid=2312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hliu" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:32:15.676671 sshd[2312]: Failed password for invalid user hliu from 43.155.132.249 port 58118 ssh2 Feb 9 21:32:17.750850 sshd[2312]: Received disconnect from 43.155.132.249 port 58118:11: Bye Bye [preauth] Feb 9 21:32:17.750850 sshd[2312]: Disconnected from invalid user hliu 43.155.132.249 port 58118 [preauth] Feb 9 21:32:17.753360 systemd[1]: sshd@52-147.75.49.127:22-43.155.132.249:58118.service: Deactivated successfully. Feb 9 21:32:17.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.49.127:22-43.155.132.249:58118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:32:17.846656 kernel: audit: type=1131 audit(1707514337.752:360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-147.75.49.127:22-43.155.132.249:58118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:32:25.411440 systemd[1]: Started sshd@53-147.75.49.127:22-49.233.38.108:45218.service. Feb 9 21:32:25.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.49.127:22-49.233.38.108:45218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:32:25.504527 kernel: audit: type=1130 audit(1707514345.410:361): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.49.127:22-49.233.38.108:45218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:32:26.272100 sshd[2318]: Invalid user risheng from 49.233.38.108 port 45218 Feb 9 21:32:26.278296 sshd[2318]: pam_faillock(sshd:auth): User unknown Feb 9 21:32:26.279449 sshd[2318]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:32:26.279575 sshd[2318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.38.108 Feb 9 21:32:26.280398 sshd[2318]: pam_faillock(sshd:auth): User unknown Feb 9 21:32:26.279000 audit[2318]: USER_AUTH pid=2318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="risheng" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:32:26.373656 kernel: audit: type=1100 audit(1707514346.279:362): pid=2318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="risheng" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:32:28.103027 sshd[2318]: Failed password for invalid user risheng from 49.233.38.108 port 45218 ssh2 Feb 9 21:32:28.713807 sshd[2318]: Received disconnect from 49.233.38.108 port 45218:11: Bye Bye [preauth] Feb 9 21:32:28.713807 sshd[2318]: Disconnected from invalid user risheng 49.233.38.108 port 45218 [preauth] Feb 9 21:32:28.716349 systemd[1]: sshd@53-147.75.49.127:22-49.233.38.108:45218.service: Deactivated successfully. Feb 9 21:32:28.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.49.127:22-49.233.38.108:45218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:32:28.809517 kernel: audit: type=1131 audit(1707514348.715:363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-147.75.49.127:22-49.233.38.108:45218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:32:34.682045 systemd[1]: Started sshd@54-147.75.49.127:22-43.153.62.138:39802.service. Feb 9 21:32:34.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.49.127:22-43.153.62.138:39802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:32:34.775660 kernel: audit: type=1130 audit(1707514354.680:364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.49.127:22-43.153.62.138:39802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:32:34.842805 sshd[2322]: Invalid user pcanibe from 43.153.62.138 port 39802 Feb 9 21:32:34.844343 sshd[2322]: pam_faillock(sshd:auth): User unknown Feb 9 21:32:34.844659 sshd[2322]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:32:34.844685 sshd[2322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.62.138 Feb 9 21:32:34.844943 sshd[2322]: pam_faillock(sshd:auth): User unknown Feb 9 21:32:34.843000 audit[2322]: USER_AUTH pid=2322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pcanibe" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:32:34.936626 kernel: audit: type=1100 audit(1707514354.843:365): pid=2322 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pcanibe" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:32:36.100200 sshd[2322]: Failed password for invalid user pcanibe from 43.153.62.138 port 39802 ssh2 Feb 9 21:32:36.221220 sshd[2322]: Received disconnect from 43.153.62.138 port 39802:11: Bye Bye [preauth] Feb 9 21:32:36.221220 sshd[2322]: Disconnected from invalid user pcanibe 43.153.62.138 port 39802 [preauth] Feb 9 21:32:36.223788 systemd[1]: sshd@54-147.75.49.127:22-43.153.62.138:39802.service: Deactivated successfully. Feb 9 21:32:36.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.49.127:22-43.153.62.138:39802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:32:36.317653 kernel: audit: type=1131 audit(1707514356.222:366): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-147.75.49.127:22-43.153.62.138:39802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:32:38.424268 systemd[1]: Started sshd@55-147.75.49.127:22-157.230.15.197:36856.service. Feb 9 21:32:38.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.49.127:22-157.230.15.197:36856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:32:38.517653 kernel: audit: type=1130 audit(1707514358.422:367): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.49.127:22-157.230.15.197:36856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:32:38.854024 sshd[2326]: Invalid user userftp from 157.230.15.197 port 36856 Feb 9 21:32:38.859987 sshd[2326]: pam_faillock(sshd:auth): User unknown Feb 9 21:32:38.861063 sshd[2326]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:32:38.861152 sshd[2326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.15.197 Feb 9 21:32:38.862146 sshd[2326]: pam_faillock(sshd:auth): User unknown Feb 9 21:32:38.860000 audit[2326]: USER_AUTH pid=2326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="userftp" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:32:38.956648 kernel: audit: type=1100 audit(1707514358.860:368): pid=2326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="userftp" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:32:40.664666 sshd[2326]: Failed password for invalid user userftp from 157.230.15.197 port 36856 ssh2 Feb 9 21:32:42.182273 sshd[2326]: Received disconnect from 157.230.15.197 port 36856:11: Bye Bye [preauth] Feb 9 21:32:42.182273 sshd[2326]: Disconnected from invalid user userftp 157.230.15.197 port 36856 [preauth] Feb 9 21:32:42.184791 systemd[1]: sshd@55-147.75.49.127:22-157.230.15.197:36856.service: Deactivated successfully. Feb 9 21:32:42.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.49.127:22-157.230.15.197:36856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:32:42.278661 kernel: audit: type=1131 audit(1707514362.183:369): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-147.75.49.127:22-157.230.15.197:36856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:32:52.085877 update_engine[1454]: I0209 21:32:52.085786 1454 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 21:32:52.085877 update_engine[1454]: I0209 21:32:52.085881 1454 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 21:32:52.088281 update_engine[1454]: I0209 21:32:52.087684 1454 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 21:32:52.088823 update_engine[1454]: I0209 21:32:52.088775 1454 omaha_request_params.cc:62] Current group set to lts Feb 9 21:32:52.089188 update_engine[1454]: I0209 21:32:52.089143 1454 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 21:32:52.089188 update_engine[1454]: I0209 21:32:52.089167 1454 update_attempter.cc:643] Scheduling an action processor start. Feb 9 21:32:52.089594 update_engine[1454]: I0209 21:32:52.089212 1454 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 21:32:52.089594 update_engine[1454]: I0209 21:32:52.089303 1454 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 21:32:52.089594 update_engine[1454]: I0209 21:32:52.089529 1454 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 21:32:52.089594 update_engine[1454]: I0209 21:32:52.089557 1454 omaha_request_action.cc:271] Request: Feb 9 21:32:52.089594 update_engine[1454]: Feb 9 21:32:52.089594 update_engine[1454]: Feb 9 21:32:52.089594 update_engine[1454]: Feb 9 21:32:52.089594 update_engine[1454]: Feb 9 21:32:52.089594 update_engine[1454]: Feb 9 21:32:52.089594 update_engine[1454]: Feb 9 21:32:52.089594 update_engine[1454]: Feb 9 21:32:52.089594 update_engine[1454]: Feb 9 21:32:52.089594 update_engine[1454]: I0209 21:32:52.089573 1454 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:32:52.091619 locksmithd[1500]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 21:32:52.093520 update_engine[1454]: I0209 21:32:52.093444 1454 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:32:52.093690 update_engine[1454]: E0209 21:32:52.093681 1454 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:32:52.093730 update_engine[1454]: I0209 21:32:52.093722 1454 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 21:33:01.996086 update_engine[1454]: I0209 21:33:01.995995 1454 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:33:01.997338 update_engine[1454]: I0209 21:33:01.996590 1454 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:33:01.997338 update_engine[1454]: E0209 21:33:01.996855 1454 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:33:01.997338 update_engine[1454]: I0209 21:33:01.997107 1454 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 21:33:11.996624 update_engine[1454]: I0209 21:33:11.996529 1454 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:33:11.997899 update_engine[1454]: I0209 21:33:11.997092 1454 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:33:11.997899 update_engine[1454]: E0209 21:33:11.997359 1454 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:33:11.997899 update_engine[1454]: I0209 21:33:11.997632 1454 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 21:33:14.022447 systemd[1]: Started sshd@56-147.75.49.127:22-49.233.38.108:59162.service. Feb 9 21:33:14.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.49.127:22-49.233.38.108:59162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:14.115661 kernel: audit: type=1130 audit(1707514394.022:370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.49.127:22-49.233.38.108:59162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:14.864670 sshd[2335]: Invalid user bchau from 49.233.38.108 port 59162 Feb 9 21:33:14.870757 sshd[2335]: pam_faillock(sshd:auth): User unknown Feb 9 21:33:14.871884 sshd[2335]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:33:14.871975 sshd[2335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.38.108 Feb 9 21:33:14.872862 sshd[2335]: pam_faillock(sshd:auth): User unknown Feb 9 21:33:14.872000 audit[2335]: USER_AUTH pid=2335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bchau" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:33:14.966664 kernel: audit: type=1100 audit(1707514394.872:371): pid=2335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="bchau" exe="/usr/sbin/sshd" hostname=49.233.38.108 addr=49.233.38.108 terminal=ssh res=failed' Feb 9 21:33:17.618824 sshd[2335]: Failed password for invalid user bchau from 49.233.38.108 port 59162 ssh2 Feb 9 21:33:18.582389 sshd[2335]: Received disconnect from 49.233.38.108 port 59162:11: Bye Bye [preauth] Feb 9 21:33:18.582389 sshd[2335]: Disconnected from invalid user bchau 49.233.38.108 port 59162 [preauth] Feb 9 21:33:18.585004 systemd[1]: sshd@56-147.75.49.127:22-49.233.38.108:59162.service: Deactivated successfully. Feb 9 21:33:18.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.49.127:22-49.233.38.108:59162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:18.678654 kernel: audit: type=1131 audit(1707514398.584:372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-147.75.49.127:22-49.233.38.108:59162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:21.996149 update_engine[1454]: I0209 21:33:21.996062 1454 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:33:21.997318 update_engine[1454]: I0209 21:33:21.996662 1454 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:33:21.997318 update_engine[1454]: E0209 21:33:21.996944 1454 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:33:21.997318 update_engine[1454]: I0209 21:33:21.997159 1454 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 21:33:21.997318 update_engine[1454]: I0209 21:33:21.997185 1454 omaha_request_action.cc:621] Omaha request response: Feb 9 21:33:21.998032 update_engine[1454]: E0209 21:33:21.997370 1454 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 9 21:33:21.998032 update_engine[1454]: I0209 21:33:21.997411 1454 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 9 21:33:21.998032 update_engine[1454]: I0209 21:33:21.997429 1454 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 21:33:21.998032 update_engine[1454]: I0209 21:33:21.997443 1454 update_attempter.cc:306] Processing Done. Feb 9 21:33:21.998032 update_engine[1454]: E0209 21:33:21.997500 1454 update_attempter.cc:619] Update failed. Feb 9 21:33:21.998032 update_engine[1454]: I0209 21:33:21.997516 1454 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 9 21:33:21.998032 update_engine[1454]: I0209 21:33:21.997530 1454 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 9 21:33:21.998032 update_engine[1454]: I0209 21:33:21.997545 1454 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 9 21:33:21.998032 update_engine[1454]: I0209 21:33:21.997771 1454 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 21:33:21.998032 update_engine[1454]: I0209 21:33:21.997846 1454 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 21:33:21.998032 update_engine[1454]: I0209 21:33:21.997864 1454 omaha_request_action.cc:271] Request: Feb 9 21:33:21.998032 update_engine[1454]: Feb 9 21:33:21.998032 update_engine[1454]: Feb 9 21:33:21.998032 update_engine[1454]: Feb 9 21:33:21.998032 update_engine[1454]: Feb 9 21:33:21.998032 update_engine[1454]: Feb 9 21:33:21.998032 update_engine[1454]: Feb 9 21:33:21.998032 update_engine[1454]: I0209 21:33:21.997879 1454 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:33:22.000104 update_engine[1454]: I0209 21:33:21.998293 1454 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:33:22.000104 update_engine[1454]: E0209 21:33:21.998553 1454 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:33:22.000104 update_engine[1454]: I0209 21:33:21.998754 1454 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 21:33:22.000104 update_engine[1454]: I0209 21:33:21.998780 1454 omaha_request_action.cc:621] Omaha request response: Feb 9 21:33:22.000104 update_engine[1454]: I0209 21:33:21.998795 1454 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 21:33:22.000104 update_engine[1454]: I0209 21:33:21.998808 1454 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 21:33:22.000104 update_engine[1454]: I0209 21:33:21.998821 1454 update_attempter.cc:306] Processing Done. Feb 9 21:33:22.000104 update_engine[1454]: I0209 21:33:21.998834 1454 update_attempter.cc:310] Error event sent. Feb 9 21:33:22.000104 update_engine[1454]: I0209 21:33:21.998870 1454 update_check_scheduler.cc:74] Next update check in 49m10s Feb 9 21:33:22.000238 locksmithd[1500]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 9 21:33:22.000238 locksmithd[1500]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 9 21:33:30.393386 systemd[1]: Started sshd@57-147.75.49.127:22-43.153.62.138:58568.service. Feb 9 21:33:30.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.49.127:22-43.153.62.138:58568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:30.486654 kernel: audit: type=1130 audit(1707514410.393:373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.49.127:22-43.153.62.138:58568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:30.553382 sshd[2340]: Invalid user hym from 43.153.62.138 port 58568 Feb 9 21:33:30.554976 sshd[2340]: pam_faillock(sshd:auth): User unknown Feb 9 21:33:30.555261 sshd[2340]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:33:30.555285 sshd[2340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.62.138 Feb 9 21:33:30.555517 sshd[2340]: pam_faillock(sshd:auth): User unknown Feb 9 21:33:30.555000 audit[2340]: USER_AUTH pid=2340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hym" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:33:30.647661 kernel: audit: type=1100 audit(1707514410.555:374): pid=2340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hym" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:33:32.497837 sshd[2340]: Failed password for invalid user hym from 43.153.62.138 port 58568 ssh2 Feb 9 21:33:32.693634 sshd[2340]: Received disconnect from 43.153.62.138 port 58568:11: Bye Bye [preauth] Feb 9 21:33:32.693634 sshd[2340]: Disconnected from invalid user hym 43.153.62.138 port 58568 [preauth] Feb 9 21:33:32.696138 systemd[1]: sshd@57-147.75.49.127:22-43.153.62.138:58568.service: Deactivated successfully. Feb 9 21:33:32.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.49.127:22-43.153.62.138:58568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:32.789670 kernel: audit: type=1131 audit(1707514412.696:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-147.75.49.127:22-43.153.62.138:58568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:33.066120 systemd[1]: Started sshd@58-147.75.49.127:22-157.230.15.197:50612.service. Feb 9 21:33:33.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.49.127:22-157.230.15.197:50612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:33.159460 kernel: audit: type=1130 audit(1707514413.066:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.49.127:22-157.230.15.197:50612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:33.493499 sshd[2345]: Invalid user zuoye from 157.230.15.197 port 50612 Feb 9 21:33:33.499593 sshd[2345]: pam_faillock(sshd:auth): User unknown Feb 9 21:33:33.500549 sshd[2345]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:33:33.500637 sshd[2345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.15.197 Feb 9 21:33:33.501526 sshd[2345]: pam_faillock(sshd:auth): User unknown Feb 9 21:33:33.501000 audit[2345]: USER_AUTH pid=2345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zuoye" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:33:33.595659 kernel: audit: type=1100 audit(1707514413.501:377): pid=2345 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zuoye" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:33:35.856034 sshd[2345]: Failed password for invalid user zuoye from 157.230.15.197 port 50612 ssh2 Feb 9 21:33:37.012701 sshd[2345]: Received disconnect from 157.230.15.197 port 50612:11: Bye Bye [preauth] Feb 9 21:33:37.012701 sshd[2345]: Disconnected from invalid user zuoye 157.230.15.197 port 50612 [preauth] Feb 9 21:33:37.015181 systemd[1]: sshd@58-147.75.49.127:22-157.230.15.197:50612.service: Deactivated successfully. Feb 9 21:33:37.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.49.127:22-157.230.15.197:50612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:37.108652 kernel: audit: type=1131 audit(1707514417.015:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-147.75.49.127:22-157.230.15.197:50612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:46.256133 systemd[1]: Started sshd@59-147.75.49.127:22-103.147.242.96:37916.service. Feb 9 21:33:46.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.49.127:22-103.147.242.96:37916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:46.349512 kernel: audit: type=1130 audit(1707514426.255:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.49.127:22-103.147.242.96:37916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:47.465530 sshd[2350]: Invalid user limingxia from 103.147.242.96 port 37916 Feb 9 21:33:47.471935 sshd[2350]: pam_faillock(sshd:auth): User unknown Feb 9 21:33:47.473091 sshd[2350]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:33:47.473182 sshd[2350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:33:47.474091 sshd[2350]: pam_faillock(sshd:auth): User unknown Feb 9 21:33:47.473000 audit[2350]: USER_AUTH pid=2350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="limingxia" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:33:47.567521 kernel: audit: type=1100 audit(1707514427.473:380): pid=2350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="limingxia" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:33:48.749706 sshd[2350]: Failed password for invalid user limingxia from 103.147.242.96 port 37916 ssh2 Feb 9 21:33:49.239603 sshd[2350]: Received disconnect from 103.147.242.96 port 37916:11: Bye Bye [preauth] Feb 9 21:33:49.239603 sshd[2350]: Disconnected from invalid user limingxia 103.147.242.96 port 37916 [preauth] Feb 9 21:33:49.242166 systemd[1]: sshd@59-147.75.49.127:22-103.147.242.96:37916.service: Deactivated successfully. Feb 9 21:33:49.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.49.127:22-103.147.242.96:37916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:49.335648 kernel: audit: type=1131 audit(1707514429.242:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-147.75.49.127:22-103.147.242.96:37916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:54.066669 systemd[1]: Started sshd@60-147.75.49.127:22-43.155.132.249:52620.service. Feb 9 21:33:54.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.49.127:22-43.155.132.249:52620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:54.159461 kernel: audit: type=1130 audit(1707514434.066:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.49.127:22-43.155.132.249:52620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:54.860818 sshd[2355]: Invalid user dm from 43.155.132.249 port 52620 Feb 9 21:33:54.866788 sshd[2355]: pam_faillock(sshd:auth): User unknown Feb 9 21:33:54.867850 sshd[2355]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:33:54.867938 sshd[2355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:33:54.868866 sshd[2355]: pam_faillock(sshd:auth): User unknown Feb 9 21:33:54.868000 audit[2355]: USER_AUTH pid=2355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dm" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:33:54.962484 kernel: audit: type=1100 audit(1707514434.868:383): pid=2355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dm" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:33:56.771850 sshd[2355]: Failed password for invalid user dm from 43.155.132.249 port 52620 ssh2 Feb 9 21:33:57.718202 sshd[2355]: Received disconnect from 43.155.132.249 port 52620:11: Bye Bye [preauth] Feb 9 21:33:57.718202 sshd[2355]: Disconnected from invalid user dm 43.155.132.249 port 52620 [preauth] Feb 9 21:33:57.720738 systemd[1]: sshd@60-147.75.49.127:22-43.155.132.249:52620.service: Deactivated successfully. Feb 9 21:33:57.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.49.127:22-43.155.132.249:52620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:33:57.814656 kernel: audit: type=1131 audit(1707514437.720:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-147.75.49.127:22-43.155.132.249:52620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:34:24.260372 systemd[1]: Started sshd@61-147.75.49.127:22-43.153.62.138:49102.service. Feb 9 21:34:24.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.49.127:22-43.153.62.138:49102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:34:24.353643 kernel: audit: type=1130 audit(1707514464.260:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.49.127:22-43.153.62.138:49102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:34:24.420977 sshd[2359]: Invalid user roy from 43.153.62.138 port 49102 Feb 9 21:34:24.422377 sshd[2359]: pam_faillock(sshd:auth): User unknown Feb 9 21:34:24.422653 sshd[2359]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:34:24.422675 sshd[2359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.62.138 Feb 9 21:34:24.422916 sshd[2359]: pam_faillock(sshd:auth): User unknown Feb 9 21:34:24.422000 audit[2359]: USER_AUTH pid=2359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="roy" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:34:24.515657 kernel: audit: type=1100 audit(1707514464.422:386): pid=2359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="roy" exe="/usr/sbin/sshd" hostname=43.153.62.138 addr=43.153.62.138 terminal=ssh res=failed' Feb 9 21:34:26.444834 sshd[2359]: Failed password for invalid user roy from 43.153.62.138 port 49102 ssh2 Feb 9 21:34:26.721375 systemd[1]: Started sshd@62-147.75.49.127:22-157.230.15.197:48816.service. Feb 9 21:34:26.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.49.127:22-157.230.15.197:48816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:34:26.783585 sshd[2359]: Received disconnect from 43.153.62.138 port 49102:11: Bye Bye [preauth] Feb 9 21:34:26.783585 sshd[2359]: Disconnected from invalid user roy 43.153.62.138 port 49102 [preauth] Feb 9 21:34:26.784080 systemd[1]: sshd@61-147.75.49.127:22-43.153.62.138:49102.service: Deactivated successfully. Feb 9 21:34:26.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.49.127:22-43.153.62.138:49102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:34:26.906663 kernel: audit: type=1130 audit(1707514466.720:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.49.127:22-157.230.15.197:48816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:34:26.906691 kernel: audit: type=1131 audit(1707514466.783:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-147.75.49.127:22-43.153.62.138:49102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:34:27.146291 sshd[2362]: Invalid user simaabdi from 157.230.15.197 port 48816 Feb 9 21:34:27.152399 sshd[2362]: pam_faillock(sshd:auth): User unknown Feb 9 21:34:27.153348 sshd[2362]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:34:27.153433 sshd[2362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.15.197 Feb 9 21:34:27.154512 sshd[2362]: pam_faillock(sshd:auth): User unknown Feb 9 21:34:27.154000 audit[2362]: USER_AUTH pid=2362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="simaabdi" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:34:27.254655 kernel: audit: type=1100 audit(1707514467.154:389): pid=2362 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="simaabdi" exe="/usr/sbin/sshd" hostname=157.230.15.197 addr=157.230.15.197 terminal=ssh res=failed' Feb 9 21:34:29.589216 sshd[2362]: Failed password for invalid user simaabdi from 157.230.15.197 port 48816 ssh2 Feb 9 21:34:29.929303 sshd[2362]: Received disconnect from 157.230.15.197 port 48816:11: Bye Bye [preauth] Feb 9 21:34:29.929303 sshd[2362]: Disconnected from invalid user simaabdi 157.230.15.197 port 48816 [preauth] Feb 9 21:34:29.931888 systemd[1]: sshd@62-147.75.49.127:22-157.230.15.197:48816.service: Deactivated successfully. Feb 9 21:34:29.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.49.127:22-157.230.15.197:48816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:34:30.025648 kernel: audit: type=1131 audit(1707514469.931:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-147.75.49.127:22-157.230.15.197:48816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:34:55.096523 systemd[1]: Started sshd@63-147.75.49.127:22-103.147.242.96:47546.service. Feb 9 21:34:55.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.49.127:22-103.147.242.96:47546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:34:55.189473 kernel: audit: type=1130 audit(1707514495.096:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.49.127:22-103.147.242.96:47546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:34:56.301519 sshd[2367]: Invalid user dongbang from 103.147.242.96 port 47546 Feb 9 21:34:56.307497 sshd[2367]: pam_faillock(sshd:auth): User unknown Feb 9 21:34:56.308432 sshd[2367]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:34:56.308542 sshd[2367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:34:56.309394 sshd[2367]: pam_faillock(sshd:auth): User unknown Feb 9 21:34:56.309000 audit[2367]: USER_AUTH pid=2367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dongbang" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:34:56.403487 kernel: audit: type=1100 audit(1707514496.309:392): pid=2367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dongbang" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:34:58.391843 sshd[2367]: Failed password for invalid user dongbang from 103.147.242.96 port 47546 ssh2 Feb 9 21:34:59.608558 sshd[2367]: Received disconnect from 103.147.242.96 port 47546:11: Bye Bye [preauth] Feb 9 21:34:59.608558 sshd[2367]: Disconnected from invalid user dongbang 103.147.242.96 port 47546 [preauth] Feb 9 21:34:59.611078 systemd[1]: sshd@63-147.75.49.127:22-103.147.242.96:47546.service: Deactivated successfully. Feb 9 21:34:59.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.49.127:22-103.147.242.96:47546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:34:59.705679 kernel: audit: type=1131 audit(1707514499.611:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-147.75.49.127:22-103.147.242.96:47546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:35:36.143340 systemd[1]: Started sshd@64-147.75.49.127:22-218.92.0.33:27892.service. Feb 9 21:35:36.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.49.127:22-218.92.0.33:27892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:35:36.236535 kernel: audit: type=1130 audit(1707514536.142:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.49.127:22-218.92.0.33:27892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:35:36.292575 sshd[2371]: Unable to negotiate with 218.92.0.33 port 27892: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 9 21:35:36.293031 systemd[1]: sshd@64-147.75.49.127:22-218.92.0.33:27892.service: Deactivated successfully. Feb 9 21:35:36.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.49.127:22-218.92.0.33:27892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:35:36.385652 kernel: audit: type=1131 audit(1707514536.292:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-147.75.49.127:22-218.92.0.33:27892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:35:36.683679 systemd[1]: Started sshd@65-147.75.49.127:22-154.68.39.6:43738.service. Feb 9 21:35:36.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.49.127:22-154.68.39.6:43738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:35:36.770658 systemd[1]: Started sshd@66-147.75.49.127:22-43.155.132.249:47120.service. Feb 9 21:35:36.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.49.127:22-43.155.132.249:47120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:35:36.869206 kernel: audit: type=1130 audit(1707514536.683:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.49.127:22-154.68.39.6:43738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:35:36.869253 kernel: audit: type=1130 audit(1707514536.770:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.49.127:22-43.155.132.249:47120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:35:37.573949 sshd[2378]: Invalid user apite from 43.155.132.249 port 47120 Feb 9 21:35:37.580043 sshd[2378]: pam_faillock(sshd:auth): User unknown Feb 9 21:35:37.580853 sshd[2378]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:35:37.580894 sshd[2378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:35:37.581151 sshd[2378]: pam_faillock(sshd:auth): User unknown Feb 9 21:35:37.580000 audit[2378]: USER_AUTH pid=2378 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="apite" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:35:37.674664 kernel: audit: type=1100 audit(1707514537.580:398): pid=2378 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="apite" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:35:37.988952 sshd[2375]: Invalid user ylbrick from 154.68.39.6 port 43738 Feb 9 21:35:37.994929 sshd[2375]: pam_faillock(sshd:auth): User unknown Feb 9 21:35:37.995957 sshd[2375]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:35:37.996046 sshd[2375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 21:35:37.996918 sshd[2375]: pam_faillock(sshd:auth): User unknown Feb 9 21:35:37.996000 audit[2375]: USER_AUTH pid=2375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ylbrick" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:35:38.097660 kernel: audit: type=1100 audit(1707514537.996:399): pid=2375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ylbrick" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:35:39.623841 sshd[2378]: Failed password for invalid user apite from 43.155.132.249 port 47120 ssh2 Feb 9 21:35:39.968203 sshd[2378]: Received disconnect from 43.155.132.249 port 47120:11: Bye Bye [preauth] Feb 9 21:35:39.968203 sshd[2378]: Disconnected from invalid user apite 43.155.132.249 port 47120 [preauth] Feb 9 21:35:39.970570 systemd[1]: sshd@66-147.75.49.127:22-43.155.132.249:47120.service: Deactivated successfully. Feb 9 21:35:39.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.49.127:22-43.155.132.249:47120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:35:40.039940 sshd[2375]: Failed password for invalid user ylbrick from 154.68.39.6 port 43738 ssh2 Feb 9 21:35:40.064524 kernel: audit: type=1131 audit(1707514539.970:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-147.75.49.127:22-43.155.132.249:47120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:35:41.025795 sshd[2375]: Received disconnect from 154.68.39.6 port 43738:11: Bye Bye [preauth] Feb 9 21:35:41.025795 sshd[2375]: Disconnected from invalid user ylbrick 154.68.39.6 port 43738 [preauth] Feb 9 21:35:41.028328 systemd[1]: sshd@65-147.75.49.127:22-154.68.39.6:43738.service: Deactivated successfully. Feb 9 21:35:41.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.49.127:22-154.68.39.6:43738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:35:41.121651 kernel: audit: type=1131 audit(1707514541.028:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-147.75.49.127:22-154.68.39.6:43738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:35:56.601612 systemd[1]: Started sshd@67-147.75.49.127:22-218.92.0.29:50317.service. Feb 9 21:35:56.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.49.127:22-218.92.0.29:50317 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:35:56.694675 kernel: audit: type=1130 audit(1707514556.601:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.49.127:22-218.92.0.29:50317 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:35:57.617158 sshd[2384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 21:35:57.616000 audit[2384]: USER_AUTH pid=2384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:35:57.709654 kernel: audit: type=1100 audit(1707514557.616:403): pid=2384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:35:59.740841 sshd[2384]: Failed password for root from 218.92.0.29 port 50317 ssh2 Feb 9 21:36:00.400000 audit[2384]: USER_AUTH pid=2384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:36:00.492659 kernel: audit: type=1100 audit(1707514560.400:404): pid=2384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:36:02.268389 sshd[2384]: Failed password for root from 218.92.0.29 port 50317 ssh2 Feb 9 21:36:03.183000 audit[2384]: USER_AUTH pid=2384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:36:03.275485 kernel: audit: type=1100 audit(1707514563.183:405): pid=2384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:36:05.799164 sshd[2384]: Failed password for root from 218.92.0.29 port 50317 ssh2 Feb 9 21:36:05.966992 sshd[2384]: Received disconnect from 218.92.0.29 port 50317:11: [preauth] Feb 9 21:36:05.966992 sshd[2384]: Disconnected from authenticating user root 218.92.0.29 port 50317 [preauth] Feb 9 21:36:05.967544 sshd[2384]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 21:36:05.969579 systemd[1]: sshd@67-147.75.49.127:22-218.92.0.29:50317.service: Deactivated successfully. Feb 9 21:36:05.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.49.127:22-218.92.0.29:50317 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:36:06.062522 kernel: audit: type=1131 audit(1707514565.969:406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-147.75.49.127:22-218.92.0.29:50317 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:36:06.102930 systemd[1]: Started sshd@68-147.75.49.127:22-218.92.0.29:64522.service. Feb 9 21:36:06.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.49.127:22-218.92.0.29:64522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:36:06.195657 kernel: audit: type=1130 audit(1707514566.102:407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.49.127:22-218.92.0.29:64522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:36:07.058728 sshd[2390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 21:36:07.058000 audit[2390]: USER_AUTH pid=2390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:36:07.150658 kernel: audit: type=1100 audit(1707514567.058:408): pid=2390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:36:08.492269 systemd[1]: Started sshd@69-147.75.49.127:22-103.147.242.96:57186.service. Feb 9 21:36:08.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.49.127:22-103.147.242.96:57186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:36:08.585642 kernel: audit: type=1130 audit(1707514568.491:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.49.127:22-103.147.242.96:57186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:36:08.885845 sshd[2390]: Failed password for root from 218.92.0.29 port 64522 ssh2 Feb 9 21:36:09.695953 sshd[2393]: Invalid user brandsuser from 103.147.242.96 port 57186 Feb 9 21:36:09.702016 sshd[2393]: pam_faillock(sshd:auth): User unknown Feb 9 21:36:09.702982 sshd[2393]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:36:09.703067 sshd[2393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:36:09.703991 sshd[2393]: pam_faillock(sshd:auth): User unknown Feb 9 21:36:09.703000 audit[2393]: USER_AUTH pid=2393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="brandsuser" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:36:09.797526 kernel: audit: type=1100 audit(1707514569.703:410): pid=2393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="brandsuser" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:36:09.831000 audit[2390]: ANOM_LOGIN_FAILURES pid=2390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 21:36:09.831755 sshd[2390]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 21:36:09.831000 audit[2390]: USER_AUTH pid=2390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:36:09.985772 kernel: audit: type=2100 audit(1707514569.831:411): pid=2390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 21:36:09.985806 kernel: audit: type=1100 audit(1707514569.831:412): pid=2390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:36:11.807300 sshd[2393]: Failed password for invalid user brandsuser from 103.147.242.96 port 57186 ssh2 Feb 9 21:36:11.934142 sshd[2390]: Failed password for root from 218.92.0.29 port 64522 ssh2 Feb 9 21:36:12.030317 sshd[2393]: Received disconnect from 103.147.242.96 port 57186:11: Bye Bye [preauth] Feb 9 21:36:12.030317 sshd[2393]: Disconnected from invalid user brandsuser 103.147.242.96 port 57186 [preauth] Feb 9 21:36:12.032871 systemd[1]: sshd@69-147.75.49.127:22-103.147.242.96:57186.service: Deactivated successfully. Feb 9 21:36:12.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.49.127:22-103.147.242.96:57186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:36:12.126673 kernel: audit: type=1131 audit(1707514572.032:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-147.75.49.127:22-103.147.242.96:57186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:36:12.605000 audit[2390]: USER_AUTH pid=2390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:36:12.698641 kernel: audit: type=1100 audit(1707514572.605:414): pid=2390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:36:14.789340 sshd[2390]: Failed password for root from 218.92.0.29 port 64522 ssh2 Feb 9 21:36:15.378369 sshd[2390]: Received disconnect from 218.92.0.29 port 64522:11: [preauth] Feb 9 21:36:15.378369 sshd[2390]: Disconnected from authenticating user root 218.92.0.29 port 64522 [preauth] Feb 9 21:36:15.378912 sshd[2390]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 21:36:15.380948 systemd[1]: sshd@68-147.75.49.127:22-218.92.0.29:64522.service: Deactivated successfully. Feb 9 21:36:15.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.49.127:22-218.92.0.29:64522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:36:15.474661 kernel: audit: type=1131 audit(1707514575.380:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-147.75.49.127:22-218.92.0.29:64522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:36:20.556811 systemd[1]: Started sshd@70-147.75.49.127:22-218.92.0.29:49698.service. Feb 9 21:36:20.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.49.127:22-218.92.0.29:49698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:36:20.649652 kernel: audit: type=1130 audit(1707514580.556:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.49.127:22-218.92.0.29:49698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:36:21.582223 sshd[2398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 21:36:21.582000 audit[2398]: USER_AUTH pid=2398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:36:21.674650 kernel: audit: type=1100 audit(1707514581.582:417): pid=2398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:36:23.665963 sshd[2398]: Failed password for root from 218.92.0.29 port 49698 ssh2 Feb 9 21:36:24.366000 audit[2398]: USER_AUTH pid=2398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:36:24.458459 kernel: audit: type=1100 audit(1707514584.366:418): pid=2398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:36:26.530638 sshd[2398]: Failed password for root from 218.92.0.29 port 49698 ssh2 Feb 9 21:36:27.151000 audit[2398]: USER_AUTH pid=2398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:36:27.242658 kernel: audit: type=1100 audit(1707514587.151:419): pid=2398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.29 addr=218.92.0.29 terminal=ssh res=failed' Feb 9 21:36:29.727013 sshd[2398]: Failed password for root from 218.92.0.29 port 49698 ssh2 Feb 9 21:36:29.936281 sshd[2398]: Received disconnect from 218.92.0.29 port 49698:11: [preauth] Feb 9 21:36:29.936281 sshd[2398]: Disconnected from authenticating user root 218.92.0.29 port 49698 [preauth] Feb 9 21:36:29.936833 sshd[2398]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.29 user=root Feb 9 21:36:29.938878 systemd[1]: sshd@70-147.75.49.127:22-218.92.0.29:49698.service: Deactivated successfully. Feb 9 21:36:29.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.49.127:22-218.92.0.29:49698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:36:30.031511 kernel: audit: type=1131 audit(1707514589.938:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-147.75.49.127:22-218.92.0.29:49698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:17.181337 systemd[1]: Started sshd@71-147.75.49.127:22-103.147.242.96:38599.service. Feb 9 21:37:17.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.49.127:22-103.147.242.96:38599 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:17.273461 kernel: audit: type=1130 audit(1707514637.180:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.49.127:22-103.147.242.96:38599 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:18.760046 sshd[2402]: Invalid user wcs from 103.147.242.96 port 38599 Feb 9 21:37:18.761167 sshd[2402]: pam_faillock(sshd:auth): User unknown Feb 9 21:37:18.761402 sshd[2402]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:37:18.761417 sshd[2402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:37:18.761652 sshd[2402]: pam_faillock(sshd:auth): User unknown Feb 9 21:37:18.761000 audit[2402]: USER_AUTH pid=2402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="wcs" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:37:18.854666 kernel: audit: type=1100 audit(1707514638.761:422): pid=2402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="wcs" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:37:20.337931 sshd[2402]: Failed password for invalid user wcs from 103.147.242.96 port 38599 ssh2 Feb 9 21:37:21.218446 sshd[2402]: Received disconnect from 103.147.242.96 port 38599:11: Bye Bye [preauth] Feb 9 21:37:21.218446 sshd[2402]: Disconnected from invalid user wcs 103.147.242.96 port 38599 [preauth] Feb 9 21:37:21.220998 systemd[1]: sshd@71-147.75.49.127:22-103.147.242.96:38599.service: Deactivated successfully. Feb 9 21:37:21.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.49.127:22-103.147.242.96:38599 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:21.225849 systemd[1]: Starting systemd-tmpfiles-clean.service... Feb 9 21:37:21.275414 systemd[1]: Started sshd@72-147.75.49.127:22-43.155.132.249:41624.service. Feb 9 21:37:21.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.49.127:22-43.155.132.249:41624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:21.318813 systemd-tmpfiles[2405]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 21:37:21.319031 systemd-tmpfiles[2405]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 21:37:21.319726 systemd-tmpfiles[2405]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 21:37:21.330186 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 9 21:37:21.330272 systemd[1]: Finished systemd-tmpfiles-clean.service. Feb 9 21:37:21.406124 kernel: audit: type=1131 audit(1707514641.221:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-147.75.49.127:22-103.147.242.96:38599 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:21.406158 kernel: audit: type=1130 audit(1707514641.275:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.49.127:22-43.155.132.249:41624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:21.406175 kernel: audit: type=1130 audit(1707514641.329:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:21.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:21.406914 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 9 21:37:21.494536 kernel: audit: type=1131 audit(1707514641.329:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:21.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:22.105383 sshd[2408]: Invalid user rastegar from 43.155.132.249 port 41624 Feb 9 21:37:22.106694 sshd[2408]: pam_faillock(sshd:auth): User unknown Feb 9 21:37:22.106924 sshd[2408]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:37:22.106955 sshd[2408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:37:22.107126 sshd[2408]: pam_faillock(sshd:auth): User unknown Feb 9 21:37:22.106000 audit[2408]: USER_AUTH pid=2408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="rastegar" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:37:22.200530 kernel: audit: type=1100 audit(1707514642.106:427): pid=2408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="rastegar" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:37:23.899325 sshd[2408]: Failed password for invalid user rastegar from 43.155.132.249 port 41624 ssh2 Feb 9 21:37:24.095402 sshd[2408]: Received disconnect from 43.155.132.249 port 41624:11: Bye Bye [preauth] Feb 9 21:37:24.095402 sshd[2408]: Disconnected from invalid user rastegar 43.155.132.249 port 41624 [preauth] Feb 9 21:37:24.097986 systemd[1]: sshd@72-147.75.49.127:22-43.155.132.249:41624.service: Deactivated successfully. Feb 9 21:37:24.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.49.127:22-43.155.132.249:41624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:24.191663 kernel: audit: type=1131 audit(1707514644.097:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-147.75.49.127:22-43.155.132.249:41624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:38:23.688102 systemd[1]: Started sshd@73-147.75.49.127:22-103.147.242.96:48219.service. Feb 9 21:38:23.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.49.127:22-103.147.242.96:48219 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:38:23.781675 kernel: audit: type=1130 audit(1707514703.687:429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.49.127:22-103.147.242.96:48219 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:38:24.882122 sshd[2418]: Invalid user smtech from 103.147.242.96 port 48219 Feb 9 21:38:24.888369 sshd[2418]: pam_faillock(sshd:auth): User unknown Feb 9 21:38:24.889503 sshd[2418]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:38:24.889593 sshd[2418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:38:24.890474 sshd[2418]: pam_faillock(sshd:auth): User unknown Feb 9 21:38:24.889000 audit[2418]: USER_AUTH pid=2418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="smtech" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:38:24.983507 kernel: audit: type=1100 audit(1707514704.889:430): pid=2418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="smtech" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:38:26.527361 sshd[2418]: Failed password for invalid user smtech from 103.147.242.96 port 48219 ssh2 Feb 9 21:38:27.309143 sshd[2418]: Received disconnect from 103.147.242.96 port 48219:11: Bye Bye [preauth] Feb 9 21:38:27.309143 sshd[2418]: Disconnected from invalid user smtech 103.147.242.96 port 48219 [preauth] Feb 9 21:38:27.311645 systemd[1]: sshd@73-147.75.49.127:22-103.147.242.96:48219.service: Deactivated successfully. Feb 9 21:38:27.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.49.127:22-103.147.242.96:48219 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:38:27.405593 kernel: audit: type=1131 audit(1707514707.310:431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-147.75.49.127:22-103.147.242.96:48219 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:04.923828 systemd[1]: Started sshd@74-147.75.49.127:22-43.155.132.249:36130.service. Feb 9 21:39:04.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.49.127:22-43.155.132.249:36130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:05.017660 kernel: audit: type=1130 audit(1707514744.922:432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.49.127:22-43.155.132.249:36130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:05.714716 sshd[2423]: Invalid user zaheid from 43.155.132.249 port 36130 Feb 9 21:39:05.720673 sshd[2423]: pam_faillock(sshd:auth): User unknown Feb 9 21:39:05.721478 sshd[2423]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:39:05.721495 sshd[2423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:39:05.721758 sshd[2423]: pam_faillock(sshd:auth): User unknown Feb 9 21:39:05.720000 audit[2423]: USER_AUTH pid=2423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zaheid" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:39:05.814676 kernel: audit: type=1100 audit(1707514745.720:433): pid=2423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zaheid" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:39:07.985862 sshd[2423]: Failed password for invalid user zaheid from 43.155.132.249 port 36130 ssh2 Feb 9 21:39:09.546329 sshd[2423]: Received disconnect from 43.155.132.249 port 36130:11: Bye Bye [preauth] Feb 9 21:39:09.546329 sshd[2423]: Disconnected from invalid user zaheid 43.155.132.249 port 36130 [preauth] Feb 9 21:39:09.548913 systemd[1]: sshd@74-147.75.49.127:22-43.155.132.249:36130.service: Deactivated successfully. Feb 9 21:39:09.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.49.127:22-43.155.132.249:36130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:09.642651 kernel: audit: type=1131 audit(1707514749.547:434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-147.75.49.127:22-43.155.132.249:36130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:29.050875 systemd[1]: Started sshd@75-147.75.49.127:22-103.147.242.96:57844.service. Feb 9 21:39:29.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-147.75.49.127:22-103.147.242.96:57844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:29.143502 kernel: audit: type=1130 audit(1707514769.049:435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-147.75.49.127:22-103.147.242.96:57844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:30.574987 sshd[2427]: Invalid user jihoon from 103.147.242.96 port 57844 Feb 9 21:39:30.581201 sshd[2427]: pam_faillock(sshd:auth): User unknown Feb 9 21:39:30.582210 sshd[2427]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:39:30.582299 sshd[2427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:39:30.583285 sshd[2427]: pam_faillock(sshd:auth): User unknown Feb 9 21:39:30.582000 audit[2427]: USER_AUTH pid=2427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jihoon" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:39:30.676638 kernel: audit: type=1100 audit(1707514770.582:436): pid=2427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jihoon" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:39:32.611663 sshd[2427]: Failed password for invalid user jihoon from 103.147.242.96 port 57844 ssh2 Feb 9 21:39:34.207617 sshd[2427]: Received disconnect from 103.147.242.96 port 57844:11: Bye Bye [preauth] Feb 9 21:39:34.207617 sshd[2427]: Disconnected from invalid user jihoon 103.147.242.96 port 57844 [preauth] Feb 9 21:39:34.210141 systemd[1]: sshd@75-147.75.49.127:22-103.147.242.96:57844.service: Deactivated successfully. Feb 9 21:39:34.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-147.75.49.127:22-103.147.242.96:57844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:34.304654 kernel: audit: type=1131 audit(1707514774.209:437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-147.75.49.127:22-103.147.242.96:57844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:16.978513 systemd[1]: Started sshd@76-147.75.49.127:22-218.92.0.27:35613.service. Feb 9 21:40:16.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-147.75.49.127:22-218.92.0.27:35613 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:17.071460 kernel: audit: type=1130 audit(1707514816.978:438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-147.75.49.127:22-218.92.0.27:35613 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:17.982224 sshd[2433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 21:40:17.982000 audit[2433]: USER_AUTH pid=2433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:18.075669 kernel: audit: type=1100 audit(1707514817.982:439): pid=2433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:19.799429 sshd[2433]: Failed password for root from 218.92.0.27 port 35613 ssh2 Feb 9 21:40:20.763000 audit[2433]: USER_AUTH pid=2433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:20.856646 kernel: audit: type=1100 audit(1707514820.763:440): pid=2433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:22.992704 sshd[2433]: Failed password for root from 218.92.0.27 port 35613 ssh2 Feb 9 21:40:23.544000 audit[2433]: USER_AUTH pid=2433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:23.637644 kernel: audit: type=1100 audit(1707514823.544:441): pid=2433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:24.850997 sshd[2433]: Failed password for root from 218.92.0.27 port 35613 ssh2 Feb 9 21:40:25.011531 sshd[2433]: Received disconnect from 218.92.0.27 port 35613:11: [preauth] Feb 9 21:40:25.011531 sshd[2433]: Disconnected from authenticating user root 218.92.0.27 port 35613 [preauth] Feb 9 21:40:25.012092 sshd[2433]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 21:40:25.014128 systemd[1]: sshd@76-147.75.49.127:22-218.92.0.27:35613.service: Deactivated successfully. Feb 9 21:40:25.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-147.75.49.127:22-218.92.0.27:35613 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:25.107670 kernel: audit: type=1131 audit(1707514825.014:442): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-147.75.49.127:22-218.92.0.27:35613 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:25.187427 systemd[1]: Started sshd@77-147.75.49.127:22-218.92.0.27:29020.service. Feb 9 21:40:25.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-147.75.49.127:22-218.92.0.27:29020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:25.280518 kernel: audit: type=1130 audit(1707514825.187:443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-147.75.49.127:22-218.92.0.27:29020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:26.262663 sshd[2439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 21:40:26.262000 audit[2439]: USER_AUTH pid=2439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:26.355648 kernel: audit: type=1100 audit(1707514826.262:444): pid=2439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:28.315846 sshd[2439]: Failed password for root from 218.92.0.27 port 29020 ssh2 Feb 9 21:40:29.054000 audit[2439]: ANOM_LOGIN_FAILURES pid=2439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:29.056002 sshd[2439]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 21:40:29.054000 audit[2439]: USER_AUTH pid=2439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:29.212135 kernel: audit: type=2100 audit(1707514829.054:445): pid=2439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:29.212170 kernel: audit: type=1100 audit(1707514829.054:446): pid=2439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:30.853315 sshd[2439]: Failed password for root from 218.92.0.27 port 29020 ssh2 Feb 9 21:40:31.847000 audit[2439]: USER_AUTH pid=2439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:31.941644 kernel: audit: type=1100 audit(1707514831.847:447): pid=2439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:33.585840 sshd[2439]: Failed password for root from 218.92.0.27 port 29020 ssh2 Feb 9 21:40:33.810298 systemd[1]: Started sshd@78-147.75.49.127:22-103.147.242.96:39220.service. Feb 9 21:40:33.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-147.75.49.127:22-103.147.242.96:39220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:33.903461 kernel: audit: type=1130 audit(1707514833.808:448): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-147.75.49.127:22-103.147.242.96:39220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:34.640979 sshd[2439]: Received disconnect from 218.92.0.27 port 29020:11: [preauth] Feb 9 21:40:34.640979 sshd[2439]: Disconnected from authenticating user root 218.92.0.27 port 29020 [preauth] Feb 9 21:40:34.641548 sshd[2439]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 21:40:34.643533 systemd[1]: sshd@77-147.75.49.127:22-218.92.0.27:29020.service: Deactivated successfully. Feb 9 21:40:34.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-147.75.49.127:22-218.92.0.27:29020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:34.737563 kernel: audit: type=1131 audit(1707514834.642:449): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-147.75.49.127:22-218.92.0.27:29020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:34.784068 systemd[1]: Started sshd@79-147.75.49.127:22-218.92.0.27:28439.service. Feb 9 21:40:34.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-147.75.49.127:22-218.92.0.27:28439 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:34.876462 kernel: audit: type=1130 audit(1707514834.782:450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-147.75.49.127:22-218.92.0.27:28439 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:35.003021 sshd[2442]: Invalid user audadmin from 103.147.242.96 port 39220 Feb 9 21:40:35.007582 sshd[2442]: pam_faillock(sshd:auth): User unknown Feb 9 21:40:35.008524 sshd[2442]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:40:35.008614 sshd[2442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:40:35.009451 sshd[2442]: pam_faillock(sshd:auth): User unknown Feb 9 21:40:35.008000 audit[2442]: USER_AUTH pid=2442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="audadmin" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:40:35.108650 kernel: audit: type=1100 audit(1707514835.008:451): pid=2442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="audadmin" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:40:35.786781 sshd[2446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 21:40:35.785000 audit[2446]: USER_AUTH pid=2446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:35.879645 kernel: audit: type=1100 audit(1707514835.785:452): pid=2446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:36.295271 sshd[2442]: Failed password for invalid user audadmin from 103.147.242.96 port 39220 ssh2 Feb 9 21:40:37.072745 sshd[2446]: Failed password for root from 218.92.0.27 port 28439 ssh2 Feb 9 21:40:37.252000 audit[2446]: USER_AUTH pid=2446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:37.345518 kernel: audit: type=1100 audit(1707514837.252:453): pid=2446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:37.348729 sshd[2442]: Received disconnect from 103.147.242.96 port 39220:11: Bye Bye [preauth] Feb 9 21:40:37.348729 sshd[2442]: Disconnected from invalid user audadmin 103.147.242.96 port 39220 [preauth] Feb 9 21:40:37.349303 systemd[1]: sshd@78-147.75.49.127:22-103.147.242.96:39220.service: Deactivated successfully. Feb 9 21:40:37.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-147.75.49.127:22-103.147.242.96:39220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:37.442658 kernel: audit: type=1131 audit(1707514837.347:454): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-147.75.49.127:22-103.147.242.96:39220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:39.482424 sshd[2446]: Failed password for root from 218.92.0.27 port 28439 ssh2 Feb 9 21:40:40.033000 audit[2446]: USER_AUTH pid=2446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:40.127660 kernel: audit: type=1100 audit(1707514840.033:455): pid=2446 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:40:42.008393 sshd[2446]: Failed password for root from 218.92.0.27 port 28439 ssh2 Feb 9 21:40:42.816429 sshd[2446]: Received disconnect from 218.92.0.27 port 28439:11: [preauth] Feb 9 21:40:42.816429 sshd[2446]: Disconnected from authenticating user root 218.92.0.27 port 28439 [preauth] Feb 9 21:40:42.816965 sshd[2446]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 21:40:42.819006 systemd[1]: sshd@79-147.75.49.127:22-218.92.0.27:28439.service: Deactivated successfully. Feb 9 21:40:42.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-147.75.49.127:22-218.92.0.27:28439 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:42.912652 kernel: audit: type=1131 audit(1707514842.817:456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-147.75.49.127:22-218.92.0.27:28439 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:46.989892 systemd[1]: Started sshd@80-147.75.49.127:22-43.155.132.249:58862.service. Feb 9 21:40:46.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-147.75.49.127:22-43.155.132.249:58862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:47.083722 kernel: audit: type=1130 audit(1707514846.988:457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-147.75.49.127:22-43.155.132.249:58862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:47.820499 sshd[2451]: Invalid user shirq from 43.155.132.249 port 58862 Feb 9 21:40:47.826579 sshd[2451]: pam_faillock(sshd:auth): User unknown Feb 9 21:40:47.827564 sshd[2451]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:40:47.827652 sshd[2451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:40:47.828767 sshd[2451]: pam_faillock(sshd:auth): User unknown Feb 9 21:40:47.827000 audit[2451]: USER_AUTH pid=2451 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="shirq" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:40:47.921639 kernel: audit: type=1100 audit(1707514847.827:458): pid=2451 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="shirq" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:40:47.934650 systemd[1]: Started sshd@81-147.75.49.127:22-61.177.172.140:37480.service. Feb 9 21:40:47.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-147.75.49.127:22-61.177.172.140:37480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:48.025497 kernel: audit: type=1130 audit(1707514847.933:459): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-147.75.49.127:22-61.177.172.140:37480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:49.094585 sshd[2451]: Failed password for invalid user shirq from 43.155.132.249 port 58862 ssh2 Feb 9 21:40:50.340720 sshd[2451]: Received disconnect from 43.155.132.249 port 58862:11: Bye Bye [preauth] Feb 9 21:40:50.340720 sshd[2451]: Disconnected from invalid user shirq 43.155.132.249 port 58862 [preauth] Feb 9 21:40:50.343202 systemd[1]: sshd@80-147.75.49.127:22-43.155.132.249:58862.service: Deactivated successfully. Feb 9 21:40:50.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-147.75.49.127:22-43.155.132.249:58862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:50.436662 kernel: audit: type=1131 audit(1707514850.342:460): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-147.75.49.127:22-43.155.132.249:58862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:57.823086 systemd[1]: Started sshd@82-147.75.49.127:22-154.68.39.6:42308.service. Feb 9 21:40:57.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-147.75.49.127:22-154.68.39.6:42308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:57.916655 kernel: audit: type=1130 audit(1707514857.821:461): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-147.75.49.127:22-154.68.39.6:42308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:40:59.285563 sshd[2457]: Invalid user ftpuser01 from 154.68.39.6 port 42308 Feb 9 21:40:59.291974 sshd[2457]: pam_faillock(sshd:auth): User unknown Feb 9 21:40:59.293115 sshd[2457]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:40:59.293204 sshd[2457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 21:40:59.294214 sshd[2457]: pam_faillock(sshd:auth): User unknown Feb 9 21:40:59.293000 audit[2457]: USER_AUTH pid=2457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ftpuser01" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:40:59.387644 kernel: audit: type=1100 audit(1707514859.293:462): pid=2457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ftpuser01" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:41:00.875856 sshd[2457]: Failed password for invalid user ftpuser01 from 154.68.39.6 port 42308 ssh2 Feb 9 21:41:01.739846 sshd[2457]: Received disconnect from 154.68.39.6 port 42308:11: Bye Bye [preauth] Feb 9 21:41:01.739846 sshd[2457]: Disconnected from invalid user ftpuser01 154.68.39.6 port 42308 [preauth] Feb 9 21:41:01.742358 systemd[1]: sshd@82-147.75.49.127:22-154.68.39.6:42308.service: Deactivated successfully. Feb 9 21:41:01.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-147.75.49.127:22-154.68.39.6:42308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:41:01.835656 kernel: audit: type=1131 audit(1707514861.742:463): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-147.75.49.127:22-154.68.39.6:42308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:41:43.109663 systemd[1]: Started sshd@83-147.75.49.127:22-103.147.242.96:48858.service. Feb 9 21:41:43.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-147.75.49.127:22-103.147.242.96:48858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:41:43.202503 kernel: audit: type=1130 audit(1707514903.108:464): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-147.75.49.127:22-103.147.242.96:48858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:41:44.313955 sshd[2461]: Invalid user majidmohajeri from 103.147.242.96 port 48858 Feb 9 21:41:44.319936 sshd[2461]: pam_faillock(sshd:auth): User unknown Feb 9 21:41:44.320909 sshd[2461]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:41:44.320997 sshd[2461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:41:44.322087 sshd[2461]: pam_faillock(sshd:auth): User unknown Feb 9 21:41:44.320000 audit[2461]: USER_AUTH pid=2461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="majidmohajeri" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:41:44.416644 kernel: audit: type=1100 audit(1707514904.320:465): pid=2461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="majidmohajeri" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:41:46.415539 sshd[2461]: Failed password for invalid user majidmohajeri from 103.147.242.96 port 48858 ssh2 Feb 9 21:41:47.574089 sshd[2461]: Received disconnect from 103.147.242.96 port 48858:11: Bye Bye [preauth] Feb 9 21:41:47.574089 sshd[2461]: Disconnected from invalid user majidmohajeri 103.147.242.96 port 48858 [preauth] Feb 9 21:41:47.576559 systemd[1]: sshd@83-147.75.49.127:22-103.147.242.96:48858.service: Deactivated successfully. Feb 9 21:41:47.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-147.75.49.127:22-103.147.242.96:48858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:41:47.670662 kernel: audit: type=1131 audit(1707514907.575:466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-147.75.49.127:22-103.147.242.96:48858 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:42:33.200260 systemd[1]: Started sshd@84-147.75.49.127:22-43.155.132.249:53382.service. Feb 9 21:42:33.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-147.75.49.127:22-43.155.132.249:53382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:42:33.293654 kernel: audit: type=1130 audit(1707514953.199:467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-147.75.49.127:22-43.155.132.249:53382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:42:34.014792 sshd[2465]: Invalid user kabir from 43.155.132.249 port 53382 Feb 9 21:42:34.020893 sshd[2465]: pam_faillock(sshd:auth): User unknown Feb 9 21:42:34.022065 sshd[2465]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:42:34.022155 sshd[2465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:42:34.023232 sshd[2465]: pam_faillock(sshd:auth): User unknown Feb 9 21:42:34.022000 audit[2465]: USER_AUTH pid=2465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="kabir" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:42:34.116530 kernel: audit: type=1100 audit(1707514954.022:468): pid=2465 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="kabir" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:42:36.312646 sshd[2465]: Failed password for invalid user kabir from 43.155.132.249 port 53382 ssh2 Feb 9 21:42:38.162095 sshd[2465]: Received disconnect from 43.155.132.249 port 53382:11: Bye Bye [preauth] Feb 9 21:42:38.162095 sshd[2465]: Disconnected from invalid user kabir 43.155.132.249 port 53382 [preauth] Feb 9 21:42:38.164550 systemd[1]: sshd@84-147.75.49.127:22-43.155.132.249:53382.service: Deactivated successfully. Feb 9 21:42:38.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-147.75.49.127:22-43.155.132.249:53382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:42:38.258653 kernel: audit: type=1131 audit(1707514958.164:469): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-147.75.49.127:22-43.155.132.249:53382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:42:47.939799 sshd[2454]: Timeout before authentication for 61.177.172.140 port 37480 Feb 9 21:42:47.941259 systemd[1]: sshd@81-147.75.49.127:22-61.177.172.140:37480.service: Deactivated successfully. Feb 9 21:42:47.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-147.75.49.127:22-61.177.172.140:37480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:42:48.033666 kernel: audit: type=1131 audit(1707514967.940:470): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-147.75.49.127:22-61.177.172.140:37480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:42:49.841289 systemd[1]: Started sshd@85-147.75.49.127:22-103.147.242.96:58480.service. Feb 9 21:42:49.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-147.75.49.127:22-103.147.242.96:58480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:42:49.934659 kernel: audit: type=1130 audit(1707514969.839:471): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-147.75.49.127:22-103.147.242.96:58480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:42:51.043363 sshd[2471]: Invalid user yanpeimin from 103.147.242.96 port 58480 Feb 9 21:42:51.049589 sshd[2471]: pam_faillock(sshd:auth): User unknown Feb 9 21:42:51.050585 sshd[2471]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:42:51.050673 sshd[2471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:42:51.051595 sshd[2471]: pam_faillock(sshd:auth): User unknown Feb 9 21:42:51.050000 audit[2471]: USER_AUTH pid=2471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="yanpeimin" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:42:51.145659 kernel: audit: type=1100 audit(1707514971.050:472): pid=2471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="yanpeimin" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:42:53.676904 sshd[2471]: Failed password for invalid user yanpeimin from 103.147.242.96 port 58480 ssh2 Feb 9 21:42:54.453400 sshd[2471]: Received disconnect from 103.147.242.96 port 58480:11: Bye Bye [preauth] Feb 9 21:42:54.453400 sshd[2471]: Disconnected from invalid user yanpeimin 103.147.242.96 port 58480 [preauth] Feb 9 21:42:54.455982 systemd[1]: sshd@85-147.75.49.127:22-103.147.242.96:58480.service: Deactivated successfully. Feb 9 21:42:54.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-147.75.49.127:22-103.147.242.96:58480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:42:54.549514 kernel: audit: type=1131 audit(1707514974.455:473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-147.75.49.127:22-103.147.242.96:58480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:43:13.551973 systemd[1]: Started sshd@86-147.75.49.127:22-154.68.39.6:57217.service. Feb 9 21:43:13.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-147.75.49.127:22-154.68.39.6:57217 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:43:13.645662 kernel: audit: type=1130 audit(1707514993.550:474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-147.75.49.127:22-154.68.39.6:57217 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:43:14.874220 sshd[2475]: Invalid user firetrack from 154.68.39.6 port 57217 Feb 9 21:43:14.880261 sshd[2475]: pam_faillock(sshd:auth): User unknown Feb 9 21:43:14.881416 sshd[2475]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:43:14.881503 sshd[2475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 21:43:14.882990 sshd[2475]: pam_faillock(sshd:auth): User unknown Feb 9 21:43:14.881000 audit[2475]: USER_AUTH pid=2475 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="firetrack" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:43:14.976526 kernel: audit: type=1100 audit(1707514994.881:475): pid=2475 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="firetrack" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:43:17.332301 sshd[2475]: Failed password for invalid user firetrack from 154.68.39.6 port 57217 ssh2 Feb 9 21:43:19.562305 sshd[2475]: Received disconnect from 154.68.39.6 port 57217:11: Bye Bye [preauth] Feb 9 21:43:19.562305 sshd[2475]: Disconnected from invalid user firetrack 154.68.39.6 port 57217 [preauth] Feb 9 21:43:19.564852 systemd[1]: sshd@86-147.75.49.127:22-154.68.39.6:57217.service: Deactivated successfully. Feb 9 21:43:19.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-147.75.49.127:22-154.68.39.6:57217 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:43:19.658657 kernel: audit: type=1131 audit(1707514999.563:476): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-147.75.49.127:22-154.68.39.6:57217 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:44:02.250532 systemd[1]: Started sshd@87-147.75.49.127:22-103.147.242.96:39888.service. Feb 9 21:44:02.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-147.75.49.127:22-103.147.242.96:39888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:44:02.343533 kernel: audit: type=1130 audit(1707515042.250:477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-147.75.49.127:22-103.147.242.96:39888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:44:03.468936 sshd[2484]: Invalid user saeideh from 103.147.242.96 port 39888 Feb 9 21:44:03.475143 sshd[2484]: pam_faillock(sshd:auth): User unknown Feb 9 21:44:03.476319 sshd[2484]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:44:03.476408 sshd[2484]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:44:03.477325 sshd[2484]: pam_faillock(sshd:auth): User unknown Feb 9 21:44:03.477000 audit[2484]: USER_AUTH pid=2484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="saeideh" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:44:03.571655 kernel: audit: type=1100 audit(1707515043.477:478): pid=2484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="saeideh" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:44:05.650718 sshd[2484]: Failed password for invalid user saeideh from 103.147.242.96 port 39888 ssh2 Feb 9 21:44:07.638984 sshd[2484]: Received disconnect from 103.147.242.96 port 39888:11: Bye Bye [preauth] Feb 9 21:44:07.638984 sshd[2484]: Disconnected from invalid user saeideh 103.147.242.96 port 39888 [preauth] Feb 9 21:44:07.641519 systemd[1]: sshd@87-147.75.49.127:22-103.147.242.96:39888.service: Deactivated successfully. Feb 9 21:44:07.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-147.75.49.127:22-103.147.242.96:39888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:44:07.734508 kernel: audit: type=1131 audit(1707515047.641:479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-147.75.49.127:22-103.147.242.96:39888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:44:16.544379 systemd[1]: Started sshd@88-147.75.49.127:22-43.155.132.249:47876.service. Feb 9 21:44:16.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-147.75.49.127:22-43.155.132.249:47876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:44:16.637519 kernel: audit: type=1130 audit(1707515056.543:480): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-147.75.49.127:22-43.155.132.249:47876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:44:17.351281 sshd[2489]: Invalid user mauri from 43.155.132.249 port 47876 Feb 9 21:44:17.357251 sshd[2489]: pam_faillock(sshd:auth): User unknown Feb 9 21:44:17.358218 sshd[2489]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:44:17.358304 sshd[2489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:44:17.359193 sshd[2489]: pam_faillock(sshd:auth): User unknown Feb 9 21:44:17.358000 audit[2489]: USER_AUTH pid=2489 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mauri" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:44:17.453663 kernel: audit: type=1100 audit(1707515057.358:481): pid=2489 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mauri" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:44:18.790264 sshd[2489]: Failed password for invalid user mauri from 43.155.132.249 port 47876 ssh2 Feb 9 21:44:19.325620 sshd[2489]: Received disconnect from 43.155.132.249 port 47876:11: Bye Bye [preauth] Feb 9 21:44:19.325620 sshd[2489]: Disconnected from invalid user mauri 43.155.132.249 port 47876 [preauth] Feb 9 21:44:19.328182 systemd[1]: sshd@88-147.75.49.127:22-43.155.132.249:47876.service: Deactivated successfully. Feb 9 21:44:19.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-147.75.49.127:22-43.155.132.249:47876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:44:19.421490 kernel: audit: type=1131 audit(1707515059.328:482): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-147.75.49.127:22-43.155.132.249:47876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:45:11.008116 systemd[1]: Started sshd@89-147.75.49.127:22-103.147.242.96:49521.service. Feb 9 21:45:11.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-147.75.49.127:22-103.147.242.96:49521 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:45:11.101661 kernel: audit: type=1130 audit(1707515111.006:483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-147.75.49.127:22-103.147.242.96:49521 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:45:12.207895 sshd[2496]: Invalid user yany from 103.147.242.96 port 49521 Feb 9 21:45:12.213906 sshd[2496]: pam_faillock(sshd:auth): User unknown Feb 9 21:45:12.214960 sshd[2496]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:45:12.215046 sshd[2496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:45:12.215927 sshd[2496]: pam_faillock(sshd:auth): User unknown Feb 9 21:45:12.214000 audit[2496]: USER_AUTH pid=2496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="yany" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:45:12.309515 kernel: audit: type=1100 audit(1707515112.214:484): pid=2496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="yany" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:45:14.198824 sshd[2496]: Failed password for invalid user yany from 103.147.242.96 port 49521 ssh2 Feb 9 21:45:16.289722 sshd[2496]: Received disconnect from 103.147.242.96 port 49521:11: Bye Bye [preauth] Feb 9 21:45:16.289722 sshd[2496]: Disconnected from invalid user yany 103.147.242.96 port 49521 [preauth] Feb 9 21:45:16.292326 systemd[1]: sshd@89-147.75.49.127:22-103.147.242.96:49521.service: Deactivated successfully. Feb 9 21:45:16.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-147.75.49.127:22-103.147.242.96:49521 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:45:16.386660 kernel: audit: type=1131 audit(1707515116.291:485): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-147.75.49.127:22-103.147.242.96:49521 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:45:17.908400 systemd[1]: Started sshd@90-147.75.49.127:22-154.68.39.6:46143.service. Feb 9 21:45:17.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-147.75.49.127:22-154.68.39.6:46143 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:45:18.001656 kernel: audit: type=1130 audit(1707515117.907:486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-147.75.49.127:22-154.68.39.6:46143 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:45:19.202554 sshd[2500]: Invalid user hamidvip from 154.68.39.6 port 46143 Feb 9 21:45:19.208594 sshd[2500]: pam_faillock(sshd:auth): User unknown Feb 9 21:45:19.209585 sshd[2500]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:45:19.209673 sshd[2500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 21:45:19.210587 sshd[2500]: pam_faillock(sshd:auth): User unknown Feb 9 21:45:19.209000 audit[2500]: USER_AUTH pid=2500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hamidvip" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:45:19.304654 kernel: audit: type=1100 audit(1707515119.209:487): pid=2500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hamidvip" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:45:20.817635 sshd[2500]: Failed password for invalid user hamidvip from 154.68.39.6 port 46143 ssh2 Feb 9 21:45:22.508600 sshd[2500]: Received disconnect from 154.68.39.6 port 46143:11: Bye Bye [preauth] Feb 9 21:45:22.508600 sshd[2500]: Disconnected from invalid user hamidvip 154.68.39.6 port 46143 [preauth] Feb 9 21:45:22.509404 systemd[1]: sshd@90-147.75.49.127:22-154.68.39.6:46143.service: Deactivated successfully. Feb 9 21:45:22.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-147.75.49.127:22-154.68.39.6:46143 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:45:22.602663 kernel: audit: type=1131 audit(1707515122.508:488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-147.75.49.127:22-154.68.39.6:46143 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:45:56.689925 systemd[1]: Started sshd@91-147.75.49.127:22-43.155.132.249:42370.service. Feb 9 21:45:56.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-147.75.49.127:22-43.155.132.249:42370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:45:56.783657 kernel: audit: type=1130 audit(1707515156.688:489): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-147.75.49.127:22-43.155.132.249:42370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:45:57.520872 sshd[2505]: Invalid user raz from 43.155.132.249 port 42370 Feb 9 21:45:57.526938 sshd[2505]: pam_faillock(sshd:auth): User unknown Feb 9 21:45:57.527922 sshd[2505]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:45:57.528011 sshd[2505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:45:57.528913 sshd[2505]: pam_faillock(sshd:auth): User unknown Feb 9 21:45:57.527000 audit[2505]: USER_AUTH pid=2505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="raz" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:45:57.622645 kernel: audit: type=1100 audit(1707515157.527:490): pid=2505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="raz" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:45:59.687671 sshd[2505]: Failed password for invalid user raz from 43.155.132.249 port 42370 ssh2 Feb 9 21:46:00.449355 sshd[2505]: Received disconnect from 43.155.132.249 port 42370:11: Bye Bye [preauth] Feb 9 21:46:00.449355 sshd[2505]: Disconnected from invalid user raz 43.155.132.249 port 42370 [preauth] Feb 9 21:46:00.451941 systemd[1]: sshd@91-147.75.49.127:22-43.155.132.249:42370.service: Deactivated successfully. Feb 9 21:46:00.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-147.75.49.127:22-43.155.132.249:42370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:46:00.545519 kernel: audit: type=1131 audit(1707515160.450:491): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-147.75.49.127:22-43.155.132.249:42370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:46:20.068838 systemd[1]: Started sshd@92-147.75.49.127:22-103.147.242.96:59152.service. Feb 9 21:46:20.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-147.75.49.127:22-103.147.242.96:59152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:46:20.162656 kernel: audit: type=1130 audit(1707515180.068:492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-147.75.49.127:22-103.147.242.96:59152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:46:21.568344 sshd[2510]: Invalid user mmad from 103.147.242.96 port 59152 Feb 9 21:46:21.574298 sshd[2510]: pam_faillock(sshd:auth): User unknown Feb 9 21:46:21.575406 sshd[2510]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:46:21.575523 sshd[2510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:46:21.576404 sshd[2510]: pam_faillock(sshd:auth): User unknown Feb 9 21:46:21.575000 audit[2510]: USER_AUTH pid=2510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mmad" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:46:21.669529 kernel: audit: type=1100 audit(1707515181.575:493): pid=2510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mmad" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:46:23.363697 sshd[2510]: Failed password for invalid user mmad from 103.147.242.96 port 59152 ssh2 Feb 9 21:46:23.833207 sshd[2510]: Received disconnect from 103.147.242.96 port 59152:11: Bye Bye [preauth] Feb 9 21:46:23.833207 sshd[2510]: Disconnected from invalid user mmad 103.147.242.96 port 59152 [preauth] Feb 9 21:46:23.835719 systemd[1]: sshd@92-147.75.49.127:22-103.147.242.96:59152.service: Deactivated successfully. Feb 9 21:46:23.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-147.75.49.127:22-103.147.242.96:59152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:46:23.929658 kernel: audit: type=1131 audit(1707515183.835:494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-147.75.49.127:22-103.147.242.96:59152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:47:21.343803 systemd[1]: Started sshd@93-147.75.49.127:22-154.68.39.6:35866.service. Feb 9 21:47:21.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-147.75.49.127:22-154.68.39.6:35866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:47:21.436671 kernel: audit: type=1130 audit(1707515241.343:495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-147.75.49.127:22-154.68.39.6:35866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:47:22.848406 sshd[2516]: Invalid user formom from 154.68.39.6 port 35866 Feb 9 21:47:22.854539 sshd[2516]: pam_faillock(sshd:auth): User unknown Feb 9 21:47:22.855513 sshd[2516]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:47:22.855602 sshd[2516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 21:47:22.856537 sshd[2516]: pam_faillock(sshd:auth): User unknown Feb 9 21:47:22.856000 audit[2516]: USER_AUTH pid=2516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="formom" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:47:22.949675 kernel: audit: type=1100 audit(1707515242.856:496): pid=2516 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="formom" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:47:24.683734 sshd[2516]: Failed password for invalid user formom from 154.68.39.6 port 35866 ssh2 Feb 9 21:47:25.174290 sshd[2516]: Received disconnect from 154.68.39.6 port 35866:11: Bye Bye [preauth] Feb 9 21:47:25.174290 sshd[2516]: Disconnected from invalid user formom 154.68.39.6 port 35866 [preauth] Feb 9 21:47:25.176863 systemd[1]: sshd@93-147.75.49.127:22-154.68.39.6:35866.service: Deactivated successfully. Feb 9 21:47:25.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-147.75.49.127:22-154.68.39.6:35866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:47:25.269459 kernel: audit: type=1131 audit(1707515245.177:497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-147.75.49.127:22-154.68.39.6:35866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:47:26.513583 systemd[1]: Started sshd@94-147.75.49.127:22-103.147.242.96:40561.service. Feb 9 21:47:26.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-147.75.49.127:22-103.147.242.96:40561 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:47:26.606511 kernel: audit: type=1130 audit(1707515246.513:498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-147.75.49.127:22-103.147.242.96:40561 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:47:27.699330 sshd[2520]: Invalid user seyed from 103.147.242.96 port 40561 Feb 9 21:47:27.705421 sshd[2520]: pam_faillock(sshd:auth): User unknown Feb 9 21:47:27.706401 sshd[2520]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:47:27.706521 sshd[2520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:47:27.707547 sshd[2520]: pam_faillock(sshd:auth): User unknown Feb 9 21:47:27.707000 audit[2520]: USER_AUTH pid=2520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="seyed" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:47:27.801652 kernel: audit: type=1100 audit(1707515247.707:499): pid=2520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="seyed" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:47:30.222424 sshd[2520]: Failed password for invalid user seyed from 103.147.242.96 port 40561 ssh2 Feb 9 21:47:32.435930 sshd[2520]: Received disconnect from 103.147.242.96 port 40561:11: Bye Bye [preauth] Feb 9 21:47:32.435930 sshd[2520]: Disconnected from invalid user seyed 103.147.242.96 port 40561 [preauth] Feb 9 21:47:32.438486 systemd[1]: sshd@94-147.75.49.127:22-103.147.242.96:40561.service: Deactivated successfully. Feb 9 21:47:32.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-147.75.49.127:22-103.147.242.96:40561 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:47:32.532594 kernel: audit: type=1131 audit(1707515252.438:500): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-147.75.49.127:22-103.147.242.96:40561 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:47:37.504794 systemd[1]: Started sshd@95-147.75.49.127:22-43.155.132.249:36870.service. Feb 9 21:47:37.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-147.75.49.127:22-43.155.132.249:36870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:47:37.597459 kernel: audit: type=1130 audit(1707515257.504:501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-147.75.49.127:22-43.155.132.249:36870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:47:38.334141 sshd[2525]: Invalid user mhucke from 43.155.132.249 port 36870 Feb 9 21:47:38.340122 sshd[2525]: pam_faillock(sshd:auth): User unknown Feb 9 21:47:38.341129 sshd[2525]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:47:38.341216 sshd[2525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:47:38.342278 sshd[2525]: pam_faillock(sshd:auth): User unknown Feb 9 21:47:38.342000 audit[2525]: USER_AUTH pid=2525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mhucke" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:47:38.436662 kernel: audit: type=1100 audit(1707515258.342:502): pid=2525 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mhucke" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:47:40.701602 sshd[2525]: Failed password for invalid user mhucke from 43.155.132.249 port 36870 ssh2 Feb 9 21:47:42.853739 sshd[2525]: Received disconnect from 43.155.132.249 port 36870:11: Bye Bye [preauth] Feb 9 21:47:42.853739 sshd[2525]: Disconnected from invalid user mhucke 43.155.132.249 port 36870 [preauth] Feb 9 21:47:42.856269 systemd[1]: sshd@95-147.75.49.127:22-43.155.132.249:36870.service: Deactivated successfully. Feb 9 21:47:42.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-147.75.49.127:22-43.155.132.249:36870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:47:42.949636 kernel: audit: type=1131 audit(1707515262.856:503): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-147.75.49.127:22-43.155.132.249:36870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:48:33.293422 systemd[1]: Started sshd@96-147.75.49.127:22-103.147.242.96:50178.service. Feb 9 21:48:33.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-147.75.49.127:22-103.147.242.96:50178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:48:33.386480 kernel: audit: type=1130 audit(1707515313.293:504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-147.75.49.127:22-103.147.242.96:50178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:48:34.477699 sshd[2532]: Invalid user emami from 103.147.242.96 port 50178 Feb 9 21:48:34.483752 sshd[2532]: pam_faillock(sshd:auth): User unknown Feb 9 21:48:34.484891 sshd[2532]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:48:34.484981 sshd[2532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:48:34.485880 sshd[2532]: pam_faillock(sshd:auth): User unknown Feb 9 21:48:34.485000 audit[2532]: USER_AUTH pid=2532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="emami" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:48:34.579656 kernel: audit: type=1100 audit(1707515314.485:505): pid=2532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="emami" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:48:36.865363 sshd[2532]: Failed password for invalid user emami from 103.147.242.96 port 50178 ssh2 Feb 9 21:48:37.794041 sshd[2532]: Received disconnect from 103.147.242.96 port 50178:11: Bye Bye [preauth] Feb 9 21:48:37.794041 sshd[2532]: Disconnected from invalid user emami 103.147.242.96 port 50178 [preauth] Feb 9 21:48:37.796598 systemd[1]: sshd@96-147.75.49.127:22-103.147.242.96:50178.service: Deactivated successfully. Feb 9 21:48:37.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-147.75.49.127:22-103.147.242.96:50178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:48:37.890659 kernel: audit: type=1131 audit(1707515317.796:506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-147.75.49.127:22-103.147.242.96:50178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:20.948968 systemd[1]: Started sshd@97-147.75.49.127:22-43.155.132.249:59606.service. Feb 9 21:49:20.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-147.75.49.127:22-43.155.132.249:59606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:21.042675 kernel: audit: type=1130 audit(1707515360.948:507): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-147.75.49.127:22-43.155.132.249:59606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:21.755928 sshd[2538]: Invalid user gittest from 43.155.132.249 port 59606 Feb 9 21:49:21.761963 sshd[2538]: pam_faillock(sshd:auth): User unknown Feb 9 21:49:21.762953 sshd[2538]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:49:21.763042 sshd[2538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:49:21.763969 sshd[2538]: pam_faillock(sshd:auth): User unknown Feb 9 21:49:21.763000 audit[2538]: USER_AUTH pid=2538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="gittest" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:49:21.858682 kernel: audit: type=1100 audit(1707515361.763:508): pid=2538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="gittest" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:49:23.848322 systemd[1]: Started sshd@98-147.75.49.127:22-154.68.39.6:52785.service. Feb 9 21:49:23.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-147.75.49.127:22-154.68.39.6:52785 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:23.926593 sshd[2538]: Failed password for invalid user gittest from 43.155.132.249 port 59606 ssh2 Feb 9 21:49:23.940525 kernel: audit: type=1130 audit(1707515363.847:509): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-147.75.49.127:22-154.68.39.6:52785 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:24.104905 sshd[2538]: Received disconnect from 43.155.132.249 port 59606:11: Bye Bye [preauth] Feb 9 21:49:24.104905 sshd[2538]: Disconnected from invalid user gittest 43.155.132.249 port 59606 [preauth] Feb 9 21:49:24.107276 systemd[1]: sshd@97-147.75.49.127:22-43.155.132.249:59606.service: Deactivated successfully. Feb 9 21:49:24.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-147.75.49.127:22-43.155.132.249:59606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:24.206502 kernel: audit: type=1131 audit(1707515364.107:510): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-147.75.49.127:22-43.155.132.249:59606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:25.179532 sshd[2541]: Invalid user amirf from 154.68.39.6 port 52785 Feb 9 21:49:25.185144 sshd[2541]: pam_faillock(sshd:auth): User unknown Feb 9 21:49:25.185362 sshd[2541]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:49:25.185392 sshd[2541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 21:49:25.185692 sshd[2541]: pam_faillock(sshd:auth): User unknown Feb 9 21:49:25.185000 audit[2541]: USER_AUTH pid=2541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="amirf" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:49:25.278659 kernel: audit: type=1100 audit(1707515365.185:511): pid=2541 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="amirf" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:49:26.897789 sshd[2541]: Failed password for invalid user amirf from 154.68.39.6 port 52785 ssh2 Feb 9 21:49:28.263517 sshd[2541]: Received disconnect from 154.68.39.6 port 52785:11: Bye Bye [preauth] Feb 9 21:49:28.263517 sshd[2541]: Disconnected from invalid user amirf 154.68.39.6 port 52785 [preauth] Feb 9 21:49:28.264305 systemd[1]: sshd@98-147.75.49.127:22-154.68.39.6:52785.service: Deactivated successfully. Feb 9 21:49:28.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-147.75.49.127:22-154.68.39.6:52785 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:28.357660 kernel: audit: type=1131 audit(1707515368.262:512): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-147.75.49.127:22-154.68.39.6:52785 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:38.424337 systemd[1]: Started sshd@99-147.75.49.127:22-61.177.172.136:47196.service. Feb 9 21:49:38.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-147.75.49.127:22-61.177.172.136:47196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:38.517648 kernel: audit: type=1130 audit(1707515378.422:513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-147.75.49.127:22-61.177.172.136:47196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:39.381238 sshd[2546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:49:39.380000 audit[2546]: USER_AUTH pid=2546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:49:39.474646 kernel: audit: type=1100 audit(1707515379.380:514): pid=2546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:49:40.561446 systemd[1]: Started sshd@100-147.75.49.127:22-103.147.242.96:59811.service. Feb 9 21:49:40.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-147.75.49.127:22-103.147.242.96:59811 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:40.655679 kernel: audit: type=1130 audit(1707515380.560:515): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-147.75.49.127:22-103.147.242.96:59811 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:41.749346 sshd[2549]: Invalid user avani from 103.147.242.96 port 59811 Feb 9 21:49:41.755348 sshd[2549]: pam_faillock(sshd:auth): User unknown Feb 9 21:49:41.756312 sshd[2549]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:49:41.756399 sshd[2549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:49:41.757295 sshd[2549]: pam_faillock(sshd:auth): User unknown Feb 9 21:49:41.756000 audit[2549]: USER_AUTH pid=2549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="avani" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:49:41.850525 kernel: audit: type=1100 audit(1707515381.756:516): pid=2549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="avani" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:49:42.016884 sshd[2546]: Failed password for root from 61.177.172.136 port 47196 ssh2 Feb 9 21:49:43.334067 sshd[2549]: Failed password for invalid user avani from 103.147.242.96 port 59811 ssh2 Feb 9 21:49:44.049290 sshd[2549]: Received disconnect from 103.147.242.96 port 59811:11: Bye Bye [preauth] Feb 9 21:49:44.049290 sshd[2549]: Disconnected from invalid user avani 103.147.242.96 port 59811 [preauth] Feb 9 21:49:44.051759 systemd[1]: sshd@100-147.75.49.127:22-103.147.242.96:59811.service: Deactivated successfully. Feb 9 21:49:44.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-147.75.49.127:22-103.147.242.96:59811 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:44.145520 kernel: audit: type=1131 audit(1707515384.050:517): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-147.75.49.127:22-103.147.242.96:59811 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:44.783000 audit[2546]: USER_AUTH pid=2546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:49:44.877516 kernel: audit: type=1100 audit(1707515384.783:518): pid=2546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:49:46.772597 sshd[2546]: Failed password for root from 61.177.172.136 port 47196 ssh2 Feb 9 21:49:47.556000 audit[2546]: USER_AUTH pid=2546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:49:47.651755 kernel: audit: type=1100 audit(1707515387.556:519): pid=2546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:49:49.290493 sshd[2546]: Failed password for root from 61.177.172.136 port 47196 ssh2 Feb 9 21:49:50.331323 sshd[2546]: Received disconnect from 61.177.172.136 port 47196:11: [preauth] Feb 9 21:49:50.331323 sshd[2546]: Disconnected from authenticating user root 61.177.172.136 port 47196 [preauth] Feb 9 21:49:50.331874 sshd[2546]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:49:50.333920 systemd[1]: sshd@99-147.75.49.127:22-61.177.172.136:47196.service: Deactivated successfully. Feb 9 21:49:50.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-147.75.49.127:22-61.177.172.136:47196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:50.427660 kernel: audit: type=1131 audit(1707515390.332:520): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-147.75.49.127:22-61.177.172.136:47196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:50.492680 systemd[1]: Started sshd@101-147.75.49.127:22-61.177.172.136:63705.service. Feb 9 21:49:50.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-147.75.49.127:22-61.177.172.136:63705 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:50.585538 kernel: audit: type=1130 audit(1707515390.491:521): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-147.75.49.127:22-61.177.172.136:63705 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:51.497018 sshd[2556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:49:51.495000 audit[2556]: USER_AUTH pid=2556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:49:51.589651 kernel: audit: type=1100 audit(1707515391.495:522): pid=2556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:49:53.781178 sshd[2556]: Failed password for root from 61.177.172.136 port 63705 ssh2 Feb 9 21:49:54.276000 audit[2556]: ANOM_LOGIN_FAILURES pid=2556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:54.278401 sshd[2556]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 21:49:54.277000 audit[2556]: USER_AUTH pid=2556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:49:54.434442 kernel: audit: type=2100 audit(1707515394.276:523): pid=2556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:54.434511 kernel: audit: type=1100 audit(1707515394.277:524): pid=2556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:49:56.306657 sshd[2556]: Failed password for root from 61.177.172.136 port 63705 ssh2 Feb 9 21:49:57.058000 audit[2556]: USER_AUTH pid=2556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:49:57.152515 kernel: audit: type=1100 audit(1707515397.058:525): pid=2556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:49:59.499625 sshd[2556]: Failed password for root from 61.177.172.136 port 63705 ssh2 Feb 9 21:49:59.840854 sshd[2556]: Received disconnect from 61.177.172.136 port 63705:11: [preauth] Feb 9 21:49:59.840854 sshd[2556]: Disconnected from authenticating user root 61.177.172.136 port 63705 [preauth] Feb 9 21:49:59.841219 sshd[2556]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:49:59.843268 systemd[1]: sshd@101-147.75.49.127:22-61.177.172.136:63705.service: Deactivated successfully. Feb 9 21:49:59.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-147.75.49.127:22-61.177.172.136:63705 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:49:59.937657 kernel: audit: type=1131 audit(1707515399.842:526): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-147.75.49.127:22-61.177.172.136:63705 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:50:00.000167 systemd[1]: Started sshd@102-147.75.49.127:22-61.177.172.136:57324.service. Feb 9 21:49:59.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-147.75.49.127:22-61.177.172.136:57324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:50:00.093531 kernel: audit: type=1130 audit(1707515399.998:527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-147.75.49.127:22-61.177.172.136:57324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:50:01.027976 sshd[2560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:50:01.026000 audit[2560]: USER_AUTH pid=2560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:50:01.121658 kernel: audit: type=1100 audit(1707515401.026:528): pid=2560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:50:03.350110 sshd[2560]: Failed password for root from 61.177.172.136 port 57324 ssh2 Feb 9 21:50:03.811000 audit[2560]: USER_AUTH pid=2560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:50:03.906649 kernel: audit: type=1100 audit(1707515403.811:529): pid=2560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:50:06.077174 sshd[2560]: Failed password for root from 61.177.172.136 port 57324 ssh2 Feb 9 21:50:06.597000 audit[2560]: USER_AUTH pid=2560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:50:06.691672 kernel: audit: type=1100 audit(1707515406.597:530): pid=2560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 9 21:50:08.606775 sshd[2560]: Failed password for root from 61.177.172.136 port 57324 ssh2 Feb 9 21:50:09.382870 sshd[2560]: Received disconnect from 61.177.172.136 port 57324:11: [preauth] Feb 9 21:50:09.382870 sshd[2560]: Disconnected from authenticating user root 61.177.172.136 port 57324 [preauth] Feb 9 21:50:09.383397 sshd[2560]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 9 21:50:09.385404 systemd[1]: sshd@102-147.75.49.127:22-61.177.172.136:57324.service: Deactivated successfully. Feb 9 21:50:09.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-147.75.49.127:22-61.177.172.136:57324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:50:09.479661 kernel: audit: type=1131 audit(1707515409.384:531): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-147.75.49.127:22-61.177.172.136:57324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:50:20.777231 systemd[1]: Started sshd@103-147.75.49.127:22-218.92.0.33:58954.service. Feb 9 21:50:20.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-147.75.49.127:22-218.92.0.33:58954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:50:20.870675 kernel: audit: type=1130 audit(1707515420.775:532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-147.75.49.127:22-218.92.0.33:58954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:50:20.940642 sshd[2564]: Unable to negotiate with 218.92.0.33 port 58954: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 9 21:50:20.941164 systemd[1]: sshd@103-147.75.49.127:22-218.92.0.33:58954.service: Deactivated successfully. Feb 9 21:50:20.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-147.75.49.127:22-218.92.0.33:58954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:50:21.033460 kernel: audit: type=1131 audit(1707515420.939:533): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-147.75.49.127:22-218.92.0.33:58954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:50:47.624568 systemd[1]: Started sshd@104-147.75.49.127:22-103.147.242.96:41200.service. Feb 9 21:50:47.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-147.75.49.127:22-103.147.242.96:41200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:50:47.717508 kernel: audit: type=1130 audit(1707515447.623:534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-147.75.49.127:22-103.147.242.96:41200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:50:48.826148 sshd[2569]: Invalid user jicofo from 103.147.242.96 port 41200 Feb 9 21:50:48.832237 sshd[2569]: pam_faillock(sshd:auth): User unknown Feb 9 21:50:48.833389 sshd[2569]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:50:48.833520 sshd[2569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:50:48.834361 sshd[2569]: pam_faillock(sshd:auth): User unknown Feb 9 21:50:48.833000 audit[2569]: USER_AUTH pid=2569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jicofo" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:50:48.927676 kernel: audit: type=1100 audit(1707515448.833:535): pid=2569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jicofo" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:50:50.942798 sshd[2569]: Failed password for invalid user jicofo from 103.147.242.96 port 41200 ssh2 Feb 9 21:50:52.826837 sshd[2569]: Received disconnect from 103.147.242.96 port 41200:11: Bye Bye [preauth] Feb 9 21:50:52.826837 sshd[2569]: Disconnected from invalid user jicofo 103.147.242.96 port 41200 [preauth] Feb 9 21:50:52.829402 systemd[1]: sshd@104-147.75.49.127:22-103.147.242.96:41200.service: Deactivated successfully. Feb 9 21:50:52.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-147.75.49.127:22-103.147.242.96:41200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:50:52.923660 kernel: audit: type=1131 audit(1707515452.828:536): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-147.75.49.127:22-103.147.242.96:41200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:06.100367 systemd[1]: Started sshd@105-147.75.49.127:22-43.155.132.249:54108.service. Feb 9 21:51:06.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-147.75.49.127:22-43.155.132.249:54108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:06.193460 kernel: audit: type=1130 audit(1707515466.098:537): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-147.75.49.127:22-43.155.132.249:54108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:06.928313 sshd[2573]: Invalid user abtin from 43.155.132.249 port 54108 Feb 9 21:51:06.934334 sshd[2573]: pam_faillock(sshd:auth): User unknown Feb 9 21:51:06.935291 sshd[2573]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:51:06.935378 sshd[2573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:51:06.936283 sshd[2573]: pam_faillock(sshd:auth): User unknown Feb 9 21:51:06.935000 audit[2573]: USER_AUTH pid=2573 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="abtin" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:51:07.029527 kernel: audit: type=1100 audit(1707515466.935:538): pid=2573 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="abtin" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:51:08.181778 sshd[2573]: Failed password for invalid user abtin from 43.155.132.249 port 54108 ssh2 Feb 9 21:51:08.890703 sshd[2573]: Received disconnect from 43.155.132.249 port 54108:11: Bye Bye [preauth] Feb 9 21:51:08.890703 sshd[2573]: Disconnected from invalid user abtin 43.155.132.249 port 54108 [preauth] Feb 9 21:51:08.893286 systemd[1]: sshd@105-147.75.49.127:22-43.155.132.249:54108.service: Deactivated successfully. Feb 9 21:51:08.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-147.75.49.127:22-43.155.132.249:54108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:08.987660 kernel: audit: type=1131 audit(1707515468.892:539): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-147.75.49.127:22-43.155.132.249:54108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:11.403272 systemd[1]: Started sshd@106-147.75.49.127:22-218.92.0.56:12010.service. Feb 9 21:51:11.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-147.75.49.127:22-218.92.0.56:12010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:11.496510 kernel: audit: type=1130 audit(1707515471.401:540): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-147.75.49.127:22-218.92.0.56:12010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:12.424251 sshd[2577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 21:51:12.423000 audit[2577]: USER_AUTH pid=2577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:12.517641 kernel: audit: type=1100 audit(1707515472.423:541): pid=2577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:14.828857 sshd[2577]: Failed password for root from 218.92.0.56 port 12010 ssh2 Feb 9 21:51:15.207000 audit[2577]: USER_AUTH pid=2577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:15.301631 kernel: audit: type=1100 audit(1707515475.207:542): pid=2577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:17.357361 sshd[2577]: Failed password for root from 218.92.0.56 port 12010 ssh2 Feb 9 21:51:17.991000 audit[2577]: USER_AUTH pid=2577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:18.085646 kernel: audit: type=1100 audit(1707515477.991:543): pid=2577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:20.085975 sshd[2577]: Failed password for root from 218.92.0.56 port 12010 ssh2 Feb 9 21:51:20.777218 sshd[2577]: Received disconnect from 218.92.0.56 port 12010:11: [preauth] Feb 9 21:51:20.777218 sshd[2577]: Disconnected from authenticating user root 218.92.0.56 port 12010 [preauth] Feb 9 21:51:20.777783 sshd[2577]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 21:51:20.779817 systemd[1]: sshd@106-147.75.49.127:22-218.92.0.56:12010.service: Deactivated successfully. Feb 9 21:51:20.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-147.75.49.127:22-218.92.0.56:12010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:20.873659 kernel: audit: type=1131 audit(1707515480.778:544): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-147.75.49.127:22-218.92.0.56:12010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:20.909686 systemd[1]: Started sshd@107-147.75.49.127:22-218.92.0.56:12555.service. Feb 9 21:51:20.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-147.75.49.127:22-218.92.0.56:12555 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:21.001658 kernel: audit: type=1130 audit(1707515480.908:545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-147.75.49.127:22-218.92.0.56:12555 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:21.866616 sshd[2581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 21:51:21.865000 audit[2581]: USER_AUTH pid=2581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:21.959646 kernel: audit: type=1100 audit(1707515481.865:546): pid=2581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:23.172203 sshd[2581]: Failed password for root from 218.92.0.56 port 12555 ssh2 Feb 9 21:51:23.324000 audit[2581]: USER_AUTH pid=2581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:23.416489 kernel: audit: type=1100 audit(1707515483.324:547): pid=2581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:25.573956 sshd[2581]: Failed password for root from 218.92.0.56 port 12555 ssh2 Feb 9 21:51:26.097000 audit[2581]: USER_AUTH pid=2581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:26.191644 kernel: audit: type=1100 audit(1707515486.097:548): pid=2581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:27.627842 systemd[1]: Started sshd@108-147.75.49.127:22-154.68.39.6:42010.service. Feb 9 21:51:27.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-147.75.49.127:22-154.68.39.6:42010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:27.720527 kernel: audit: type=1130 audit(1707515487.626:549): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-147.75.49.127:22-154.68.39.6:42010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:28.092006 sshd[2581]: Failed password for root from 218.92.0.56 port 12555 ssh2 Feb 9 21:51:28.872756 sshd[2581]: Received disconnect from 218.92.0.56 port 12555:11: [preauth] Feb 9 21:51:28.872756 sshd[2581]: Disconnected from authenticating user root 218.92.0.56 port 12555 [preauth] Feb 9 21:51:28.873276 sshd[2581]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 21:51:28.875244 systemd[1]: sshd@107-147.75.49.127:22-218.92.0.56:12555.service: Deactivated successfully. Feb 9 21:51:28.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-147.75.49.127:22-218.92.0.56:12555 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:28.968504 kernel: audit: type=1131 audit(1707515488.874:550): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-147.75.49.127:22-218.92.0.56:12555 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:28.969261 sshd[2584]: Invalid user lizy from 154.68.39.6 port 42010 Feb 9 21:51:28.970379 sshd[2584]: pam_faillock(sshd:auth): User unknown Feb 9 21:51:28.970624 sshd[2584]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:51:28.970639 sshd[2584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 21:51:28.970823 sshd[2584]: pam_faillock(sshd:auth): User unknown Feb 9 21:51:28.969000 audit[2584]: USER_AUTH pid=2584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lizy" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:51:29.017649 systemd[1]: Started sshd@109-147.75.49.127:22-218.92.0.56:14252.service. Feb 9 21:51:29.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-147.75.49.127:22-218.92.0.56:14252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:29.152957 kernel: audit: type=1100 audit(1707515488.969:551): pid=2584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lizy" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:51:29.152988 kernel: audit: type=1130 audit(1707515489.016:552): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-147.75.49.127:22-218.92.0.56:14252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:29.976379 sshd[2588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 21:51:29.975000 audit[2588]: USER_AUTH pid=2588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:30.068639 kernel: audit: type=1100 audit(1707515489.975:553): pid=2588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:30.571836 sshd[2584]: Failed password for invalid user lizy from 154.68.39.6 port 42010 ssh2 Feb 9 21:51:31.171674 sshd[2584]: Received disconnect from 154.68.39.6 port 42010:11: Bye Bye [preauth] Feb 9 21:51:31.171674 sshd[2584]: Disconnected from invalid user lizy 154.68.39.6 port 42010 [preauth] Feb 9 21:51:31.172534 systemd[1]: sshd@108-147.75.49.127:22-154.68.39.6:42010.service: Deactivated successfully. Feb 9 21:51:31.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-147.75.49.127:22-154.68.39.6:42010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:31.264524 kernel: audit: type=1131 audit(1707515491.171:554): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-147.75.49.127:22-154.68.39.6:42010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:32.049426 sshd[2588]: Failed password for root from 218.92.0.56 port 14252 ssh2 Feb 9 21:51:32.749000 audit[2588]: USER_AUTH pid=2588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:32.841644 kernel: audit: type=1100 audit(1707515492.749:555): pid=2588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:33.900502 sshd[2588]: Failed password for root from 218.92.0.56 port 14252 ssh2 Feb 9 21:51:34.208000 audit[2588]: USER_AUTH pid=2588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:34.302648 kernel: audit: type=1100 audit(1707515494.208:556): pid=2588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.56 addr=218.92.0.56 terminal=ssh res=failed' Feb 9 21:51:36.634338 sshd[2588]: Failed password for root from 218.92.0.56 port 14252 ssh2 Feb 9 21:51:36.983665 sshd[2588]: Received disconnect from 218.92.0.56 port 14252:11: [preauth] Feb 9 21:51:36.983665 sshd[2588]: Disconnected from authenticating user root 218.92.0.56 port 14252 [preauth] Feb 9 21:51:36.984225 sshd[2588]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.56 user=root Feb 9 21:51:36.986218 systemd[1]: sshd@109-147.75.49.127:22-218.92.0.56:14252.service: Deactivated successfully. Feb 9 21:51:36.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-147.75.49.127:22-218.92.0.56:14252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:37.080654 kernel: audit: type=1131 audit(1707515496.985:557): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-147.75.49.127:22-218.92.0.56:14252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:53.154111 systemd[1]: Started sshd@110-147.75.49.127:22-103.147.242.96:50824.service. Feb 9 21:51:53.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-147.75.49.127:22-103.147.242.96:50824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:53.247509 kernel: audit: type=1130 audit(1707515513.152:558): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-147.75.49.127:22-103.147.242.96:50824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:54.346504 sshd[2597]: Invalid user xiexm from 103.147.242.96 port 50824 Feb 9 21:51:54.352556 sshd[2597]: pam_faillock(sshd:auth): User unknown Feb 9 21:51:54.353510 sshd[2597]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:51:54.353599 sshd[2597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:51:54.354500 sshd[2597]: pam_faillock(sshd:auth): User unknown Feb 9 21:51:54.353000 audit[2597]: USER_AUTH pid=2597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xiexm" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:51:54.447655 kernel: audit: type=1100 audit(1707515514.353:559): pid=2597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xiexm" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:51:56.191797 sshd[2597]: Failed password for invalid user xiexm from 103.147.242.96 port 50824 ssh2 Feb 9 21:51:57.515861 sshd[2597]: Received disconnect from 103.147.242.96 port 50824:11: Bye Bye [preauth] Feb 9 21:51:57.515861 sshd[2597]: Disconnected from invalid user xiexm 103.147.242.96 port 50824 [preauth] Feb 9 21:51:57.518413 systemd[1]: sshd@110-147.75.49.127:22-103.147.242.96:50824.service: Deactivated successfully. Feb 9 21:51:57.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-147.75.49.127:22-103.147.242.96:50824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:51:57.612655 kernel: audit: type=1131 audit(1707515517.517:560): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-147.75.49.127:22-103.147.242.96:50824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:52:48.726226 systemd[1]: Started sshd@111-147.75.49.127:22-43.155.132.249:48614.service. Feb 9 21:52:48.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-147.75.49.127:22-43.155.132.249:48614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:52:48.819461 kernel: audit: type=1130 audit(1707515568.724:561): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-147.75.49.127:22-43.155.132.249:48614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:52:49.531535 sshd[2601]: Invalid user nimajam from 43.155.132.249 port 48614 Feb 9 21:52:49.537549 sshd[2601]: pam_faillock(sshd:auth): User unknown Feb 9 21:52:49.538516 sshd[2601]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:52:49.538604 sshd[2601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:52:49.539506 sshd[2601]: pam_faillock(sshd:auth): User unknown Feb 9 21:52:49.538000 audit[2601]: USER_AUTH pid=2601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nimajam" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:52:49.631663 kernel: audit: type=1100 audit(1707515569.538:562): pid=2601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nimajam" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:52:51.928528 sshd[2601]: Failed password for invalid user nimajam from 43.155.132.249 port 48614 ssh2 Feb 9 21:52:54.066057 sshd[2601]: Received disconnect from 43.155.132.249 port 48614:11: Bye Bye [preauth] Feb 9 21:52:54.066057 sshd[2601]: Disconnected from invalid user nimajam 43.155.132.249 port 48614 [preauth] Feb 9 21:52:54.068594 systemd[1]: sshd@111-147.75.49.127:22-43.155.132.249:48614.service: Deactivated successfully. Feb 9 21:52:54.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-147.75.49.127:22-43.155.132.249:48614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:52:54.162516 kernel: audit: type=1131 audit(1707515574.067:563): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-147.75.49.127:22-43.155.132.249:48614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:52:57.705671 systemd[1]: Started sshd@112-147.75.49.127:22-103.147.242.96:60455.service. Feb 9 21:52:57.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-147.75.49.127:22-103.147.242.96:60455 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:52:57.799657 kernel: audit: type=1130 audit(1707515577.704:564): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-147.75.49.127:22-103.147.242.96:60455 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:52:59.208716 sshd[2605]: Invalid user melikaa from 103.147.242.96 port 60455 Feb 9 21:52:59.214676 sshd[2605]: pam_faillock(sshd:auth): User unknown Feb 9 21:52:59.215833 sshd[2605]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:52:59.215921 sshd[2605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:52:59.216814 sshd[2605]: pam_faillock(sshd:auth): User unknown Feb 9 21:52:59.215000 audit[2605]: USER_AUTH pid=2605 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="melikaa" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:52:59.309491 kernel: audit: type=1100 audit(1707515579.215:565): pid=2605 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="melikaa" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:53:01.310136 sshd[2605]: Failed password for invalid user melikaa from 103.147.242.96 port 60455 ssh2 Feb 9 21:53:03.104203 sshd[2605]: Received disconnect from 103.147.242.96 port 60455:11: Bye Bye [preauth] Feb 9 21:53:03.104203 sshd[2605]: Disconnected from invalid user melikaa 103.147.242.96 port 60455 [preauth] Feb 9 21:53:03.106775 systemd[1]: sshd@112-147.75.49.127:22-103.147.242.96:60455.service: Deactivated successfully. Feb 9 21:53:03.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-147.75.49.127:22-103.147.242.96:60455 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:53:03.200528 kernel: audit: type=1131 audit(1707515583.105:566): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-147.75.49.127:22-103.147.242.96:60455 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:53:25.528165 systemd[1]: Started sshd@113-147.75.49.127:22-154.68.39.6:60072.service. Feb 9 21:53:25.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-147.75.49.127:22-154.68.39.6:60072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:53:25.621643 kernel: audit: type=1130 audit(1707515605.526:567): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-147.75.49.127:22-154.68.39.6:60072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:53:26.837743 sshd[2609]: Invalid user lchen from 154.68.39.6 port 60072 Feb 9 21:53:26.843912 sshd[2609]: pam_faillock(sshd:auth): User unknown Feb 9 21:53:26.845075 sshd[2609]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:53:26.845164 sshd[2609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 21:53:26.846068 sshd[2609]: pam_faillock(sshd:auth): User unknown Feb 9 21:53:26.844000 audit[2609]: USER_AUTH pid=2609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lchen" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:53:26.938638 kernel: audit: type=1100 audit(1707515606.844:568): pid=2609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lchen" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:53:28.979498 sshd[2609]: Failed password for invalid user lchen from 154.68.39.6 port 60072 ssh2 Feb 9 21:53:30.452241 sshd[2609]: Received disconnect from 154.68.39.6 port 60072:11: Bye Bye [preauth] Feb 9 21:53:30.452241 sshd[2609]: Disconnected from invalid user lchen 154.68.39.6 port 60072 [preauth] Feb 9 21:53:30.454797 systemd[1]: sshd@113-147.75.49.127:22-154.68.39.6:60072.service: Deactivated successfully. Feb 9 21:53:30.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-147.75.49.127:22-154.68.39.6:60072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:53:30.548660 kernel: audit: type=1131 audit(1707515610.453:569): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-147.75.49.127:22-154.68.39.6:60072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:54:03.756256 systemd[1]: Started sshd@114-147.75.49.127:22-103.147.242.96:41843.service. Feb 9 21:54:03.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-147.75.49.127:22-103.147.242.96:41843 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:54:03.850662 kernel: audit: type=1130 audit(1707515643.754:570): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-147.75.49.127:22-103.147.242.96:41843 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:54:05.270542 sshd[2618]: Invalid user himanshu from 103.147.242.96 port 41843 Feb 9 21:54:05.276550 sshd[2618]: pam_faillock(sshd:auth): User unknown Feb 9 21:54:05.277581 sshd[2618]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:54:05.277668 sshd[2618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:54:05.278755 sshd[2618]: pam_faillock(sshd:auth): User unknown Feb 9 21:54:05.277000 audit[2618]: USER_AUTH pid=2618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="himanshu" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:54:05.373645 kernel: audit: type=1100 audit(1707515645.277:571): pid=2618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="himanshu" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:54:07.100859 sshd[2618]: Failed password for invalid user himanshu from 103.147.242.96 port 41843 ssh2 Feb 9 21:54:07.754047 sshd[2618]: Received disconnect from 103.147.242.96 port 41843:11: Bye Bye [preauth] Feb 9 21:54:07.754047 sshd[2618]: Disconnected from invalid user himanshu 103.147.242.96 port 41843 [preauth] Feb 9 21:54:07.756560 systemd[1]: sshd@114-147.75.49.127:22-103.147.242.96:41843.service: Deactivated successfully. Feb 9 21:54:07.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-147.75.49.127:22-103.147.242.96:41843 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:54:07.849499 kernel: audit: type=1131 audit(1707515647.755:572): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-147.75.49.127:22-103.147.242.96:41843 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:54:33.541579 systemd[1]: Started sshd@115-147.75.49.127:22-43.155.132.249:43120.service. Feb 9 21:54:33.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-147.75.49.127:22-43.155.132.249:43120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:54:33.634653 kernel: audit: type=1130 audit(1707515673.540:573): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-147.75.49.127:22-43.155.132.249:43120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:54:34.363936 sshd[2623]: Invalid user hym from 43.155.132.249 port 43120 Feb 9 21:54:34.369891 sshd[2623]: pam_faillock(sshd:auth): User unknown Feb 9 21:54:34.371087 sshd[2623]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:54:34.371176 sshd[2623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.132.249 Feb 9 21:54:34.372251 sshd[2623]: pam_faillock(sshd:auth): User unknown Feb 9 21:54:34.370000 audit[2623]: USER_AUTH pid=2623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hym" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:54:34.465517 kernel: audit: type=1100 audit(1707515674.370:574): pid=2623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hym" exe="/usr/sbin/sshd" hostname=43.155.132.249 addr=43.155.132.249 terminal=ssh res=failed' Feb 9 21:54:35.838637 sshd[2623]: Failed password for invalid user hym from 43.155.132.249 port 43120 ssh2 Feb 9 21:54:36.643907 sshd[2623]: Received disconnect from 43.155.132.249 port 43120:11: Bye Bye [preauth] Feb 9 21:54:36.643907 sshd[2623]: Disconnected from invalid user hym 43.155.132.249 port 43120 [preauth] Feb 9 21:54:36.646402 systemd[1]: sshd@115-147.75.49.127:22-43.155.132.249:43120.service: Deactivated successfully. Feb 9 21:54:36.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-147.75.49.127:22-43.155.132.249:43120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:54:36.740658 kernel: audit: type=1131 audit(1707515676.645:575): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-147.75.49.127:22-43.155.132.249:43120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:55:10.121385 systemd[1]: Started sshd@116-147.75.49.127:22-103.147.242.96:51472.service. Feb 9 21:55:10.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-147.75.49.127:22-103.147.242.96:51472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:55:10.214459 kernel: audit: type=1130 audit(1707515710.120:576): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-147.75.49.127:22-103.147.242.96:51472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:55:11.313047 sshd[2627]: Invalid user lining from 103.147.242.96 port 51472 Feb 9 21:55:11.319155 sshd[2627]: pam_faillock(sshd:auth): User unknown Feb 9 21:55:11.320156 sshd[2627]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:55:11.320244 sshd[2627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:55:11.321229 sshd[2627]: pam_faillock(sshd:auth): User unknown Feb 9 21:55:11.319000 audit[2627]: USER_AUTH pid=2627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lining" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:55:11.414657 kernel: audit: type=1100 audit(1707515711.319:577): pid=2627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lining" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:55:13.203665 sshd[2627]: Failed password for invalid user lining from 103.147.242.96 port 51472 ssh2 Feb 9 21:55:13.659195 sshd[2627]: Received disconnect from 103.147.242.96 port 51472:11: Bye Bye [preauth] Feb 9 21:55:13.659195 sshd[2627]: Disconnected from invalid user lining 103.147.242.96 port 51472 [preauth] Feb 9 21:55:13.661768 systemd[1]: sshd@116-147.75.49.127:22-103.147.242.96:51472.service: Deactivated successfully. Feb 9 21:55:13.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-147.75.49.127:22-103.147.242.96:51472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:55:13.755511 kernel: audit: type=1131 audit(1707515713.660:578): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-147.75.49.127:22-103.147.242.96:51472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:55:32.775243 systemd[1]: Started sshd@117-147.75.49.127:22-154.68.39.6:54434.service. Feb 9 21:55:32.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.49.127:22-154.68.39.6:54434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:55:32.869662 kernel: audit: type=1130 audit(1707515732.773:579): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.49.127:22-154.68.39.6:54434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:55:34.098217 sshd[2631]: Invalid user hanzaleh from 154.68.39.6 port 54434 Feb 9 21:55:34.104350 sshd[2631]: pam_faillock(sshd:auth): User unknown Feb 9 21:55:34.105384 sshd[2631]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:55:34.105509 sshd[2631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 21:55:34.106390 sshd[2631]: pam_faillock(sshd:auth): User unknown Feb 9 21:55:34.105000 audit[2631]: USER_AUTH pid=2631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hanzaleh" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:55:34.200662 kernel: audit: type=1100 audit(1707515734.105:580): pid=2631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hanzaleh" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:55:35.813097 sshd[2631]: Failed password for invalid user hanzaleh from 154.68.39.6 port 54434 ssh2 Feb 9 21:55:37.380983 sshd[2631]: Received disconnect from 154.68.39.6 port 54434:11: Bye Bye [preauth] Feb 9 21:55:37.380983 sshd[2631]: Disconnected from invalid user hanzaleh 154.68.39.6 port 54434 [preauth] Feb 9 21:55:37.383537 systemd[1]: sshd@117-147.75.49.127:22-154.68.39.6:54434.service: Deactivated successfully. Feb 9 21:55:37.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.49.127:22-154.68.39.6:54434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:55:37.477655 kernel: audit: type=1131 audit(1707515737.382:581): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-147.75.49.127:22-154.68.39.6:54434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:55:52.587264 systemd[1]: Started sshd@118-147.75.49.127:22-218.92.0.112:16488.service. Feb 9 21:55:52.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-147.75.49.127:22-218.92.0.112:16488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:55:52.680460 kernel: audit: type=1130 audit(1707515752.585:582): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-147.75.49.127:22-218.92.0.112:16488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:55:53.666865 sshd[2637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 21:55:53.665000 audit[2637]: USER_AUTH pid=2637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:55:53.759645 kernel: audit: type=1100 audit(1707515753.665:583): pid=2637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:55:55.649571 sshd[2637]: Failed password for root from 218.92.0.112 port 16488 ssh2 Feb 9 21:55:56.459000 audit[2637]: USER_AUTH pid=2637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:55:56.554644 kernel: audit: type=1100 audit(1707515756.459:584): pid=2637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:55:58.854734 sshd[2637]: Failed password for root from 218.92.0.112 port 16488 ssh2 Feb 9 21:55:59.254000 audit[2637]: USER_AUTH pid=2637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:55:59.348510 kernel: audit: type=1100 audit(1707515759.254:585): pid=2637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:56:01.393988 sshd[2637]: Failed password for root from 218.92.0.112 port 16488 ssh2 Feb 9 21:56:02.049354 sshd[2637]: Received disconnect from 218.92.0.112 port 16488:11: [preauth] Feb 9 21:56:02.049354 sshd[2637]: Disconnected from authenticating user root 218.92.0.112 port 16488 [preauth] Feb 9 21:56:02.049917 sshd[2637]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 21:56:02.051934 systemd[1]: sshd@118-147.75.49.127:22-218.92.0.112:16488.service: Deactivated successfully. Feb 9 21:56:02.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-147.75.49.127:22-218.92.0.112:16488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:56:02.146666 kernel: audit: type=1131 audit(1707515762.050:586): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-147.75.49.127:22-218.92.0.112:16488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:56:02.209097 systemd[1]: Started sshd@119-147.75.49.127:22-218.92.0.112:22369.service. Feb 9 21:56:02.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.49.127:22-218.92.0.112:22369 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:56:02.300518 kernel: audit: type=1130 audit(1707515762.207:587): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.49.127:22-218.92.0.112:22369 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:56:03.266302 sshd[2641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 21:56:03.265000 audit[2641]: USER_AUTH pid=2641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:56:03.359647 kernel: audit: type=1100 audit(1707515763.265:588): pid=2641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:56:05.620550 sshd[2641]: Failed password for root from 218.92.0.112 port 22369 ssh2 Feb 9 21:56:06.054000 audit[2641]: ANOM_LOGIN_FAILURES pid=2641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 21:56:06.056449 sshd[2641]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 21:56:06.055000 audit[2641]: USER_AUTH pid=2641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:56:06.212809 kernel: audit: type=2100 audit(1707515766.054:589): pid=2641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 21:56:06.212840 kernel: audit: type=1100 audit(1707515766.055:590): pid=2641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:56:08.154734 sshd[2641]: Failed password for root from 218.92.0.112 port 22369 ssh2 Feb 9 21:56:08.845000 audit[2641]: USER_AUTH pid=2641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:56:08.938663 kernel: audit: type=1100 audit(1707515768.845:591): pid=2641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:56:11.220655 sshd[2641]: Failed password for root from 218.92.0.112 port 22369 ssh2 Feb 9 21:56:11.636478 sshd[2641]: Received disconnect from 218.92.0.112 port 22369:11: [preauth] Feb 9 21:56:11.636478 sshd[2641]: Disconnected from authenticating user root 218.92.0.112 port 22369 [preauth] Feb 9 21:56:11.637025 sshd[2641]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 21:56:11.639073 systemd[1]: sshd@119-147.75.49.127:22-218.92.0.112:22369.service: Deactivated successfully. Feb 9 21:56:11.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.49.127:22-218.92.0.112:22369 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:56:11.732651 kernel: audit: type=1131 audit(1707515771.638:592): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-147.75.49.127:22-218.92.0.112:22369 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:56:11.791659 systemd[1]: Started sshd@120-147.75.49.127:22-218.92.0.112:22464.service. Feb 9 21:56:11.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-147.75.49.127:22-218.92.0.112:22464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:56:11.884658 kernel: audit: type=1130 audit(1707515771.790:593): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-147.75.49.127:22-218.92.0.112:22464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:56:12.827324 sshd[2647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 21:56:12.826000 audit[2647]: USER_AUTH pid=2647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:56:12.920602 kernel: audit: type=1100 audit(1707515772.826:594): pid=2647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:56:14.750110 sshd[2647]: Failed password for root from 218.92.0.112 port 22464 ssh2 Feb 9 21:56:15.612000 audit[2647]: USER_AUTH pid=2647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:56:15.706511 kernel: audit: type=1100 audit(1707515775.612:595): pid=2647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:56:17.616655 sshd[2647]: Failed password for root from 218.92.0.112 port 22464 ssh2 Feb 9 21:56:18.399000 audit[2647]: USER_AUTH pid=2647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:56:18.493645 kernel: audit: type=1100 audit(1707515778.399:596): pid=2647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 9 21:56:18.682883 systemd[1]: Started sshd@121-147.75.49.127:22-103.147.242.96:32866.service. Feb 9 21:56:18.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-147.75.49.127:22-103.147.242.96:32866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:56:18.776660 kernel: audit: type=1130 audit(1707515778.681:597): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-147.75.49.127:22-103.147.242.96:32866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:56:19.893012 sshd[2650]: Invalid user pcorco from 103.147.242.96 port 32866 Feb 9 21:56:19.899291 sshd[2650]: pam_faillock(sshd:auth): User unknown Feb 9 21:56:19.900449 sshd[2650]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:56:19.900568 sshd[2650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:56:19.901427 sshd[2650]: pam_faillock(sshd:auth): User unknown Feb 9 21:56:19.900000 audit[2650]: USER_AUTH pid=2650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pcorco" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:56:19.994526 kernel: audit: type=1100 audit(1707515779.900:598): pid=2650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="pcorco" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:56:20.815004 sshd[2647]: Failed password for root from 218.92.0.112 port 22464 ssh2 Feb 9 21:56:21.187149 sshd[2647]: Received disconnect from 218.92.0.112 port 22464:11: [preauth] Feb 9 21:56:21.187149 sshd[2647]: Disconnected from authenticating user root 218.92.0.112 port 22464 [preauth] Feb 9 21:56:21.187706 sshd[2647]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 9 21:56:21.189677 systemd[1]: sshd@120-147.75.49.127:22-218.92.0.112:22464.service: Deactivated successfully. Feb 9 21:56:21.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-147.75.49.127:22-218.92.0.112:22464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:56:21.283655 kernel: audit: type=1131 audit(1707515781.188:599): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-147.75.49.127:22-218.92.0.112:22464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:56:22.451346 sshd[2650]: Failed password for invalid user pcorco from 103.147.242.96 port 32866 ssh2 Feb 9 21:56:23.319509 sshd[2650]: Received disconnect from 103.147.242.96 port 32866:11: Bye Bye [preauth] Feb 9 21:56:23.319509 sshd[2650]: Disconnected from invalid user pcorco 103.147.242.96 port 32866 [preauth] Feb 9 21:56:23.322062 systemd[1]: sshd@121-147.75.49.127:22-103.147.242.96:32866.service: Deactivated successfully. Feb 9 21:56:23.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-147.75.49.127:22-103.147.242.96:32866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:56:23.415508 kernel: audit: type=1131 audit(1707515783.321:600): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-147.75.49.127:22-103.147.242.96:32866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:57:27.382778 systemd[1]: Started sshd@122-147.75.49.127:22-103.147.242.96:42512.service. Feb 9 21:57:27.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-147.75.49.127:22-103.147.242.96:42512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:57:27.476508 kernel: audit: type=1130 audit(1707515847.382:601): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-147.75.49.127:22-103.147.242.96:42512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:57:28.967902 sshd[2658]: Invalid user samanvpn from 103.147.242.96 port 42512 Feb 9 21:57:28.974032 sshd[2658]: pam_faillock(sshd:auth): User unknown Feb 9 21:57:28.975018 sshd[2658]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:57:28.975105 sshd[2658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:57:28.976016 sshd[2658]: pam_faillock(sshd:auth): User unknown Feb 9 21:57:28.975000 audit[2658]: USER_AUTH pid=2658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="samanvpn" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:57:29.070659 kernel: audit: type=1100 audit(1707515848.975:602): pid=2658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="samanvpn" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:57:30.998948 sshd[2658]: Failed password for invalid user samanvpn from 103.147.242.96 port 42512 ssh2 Feb 9 21:57:33.128076 sshd[2658]: Received disconnect from 103.147.242.96 port 42512:11: Bye Bye [preauth] Feb 9 21:57:33.128076 sshd[2658]: Disconnected from invalid user samanvpn 103.147.242.96 port 42512 [preauth] Feb 9 21:57:33.130621 systemd[1]: sshd@122-147.75.49.127:22-103.147.242.96:42512.service: Deactivated successfully. Feb 9 21:57:33.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-147.75.49.127:22-103.147.242.96:42512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:57:33.224652 kernel: audit: type=1131 audit(1707515853.130:603): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-147.75.49.127:22-103.147.242.96:42512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:57:51.809833 systemd[1]: Started sshd@123-147.75.49.127:22-154.68.39.6:51221.service. Feb 9 21:57:51.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.49.127:22-154.68.39.6:51221 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:57:51.903694 kernel: audit: type=1130 audit(1707515871.809:604): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.49.127:22-154.68.39.6:51221 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:57:53.289332 sshd[2662]: Invalid user zhulx from 154.68.39.6 port 51221 Feb 9 21:57:53.295376 sshd[2662]: pam_faillock(sshd:auth): User unknown Feb 9 21:57:53.296514 sshd[2662]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:57:53.296604 sshd[2662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 21:57:53.297666 sshd[2662]: pam_faillock(sshd:auth): User unknown Feb 9 21:57:53.297000 audit[2662]: USER_AUTH pid=2662 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zhulx" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:57:53.391657 kernel: audit: type=1100 audit(1707515873.297:605): pid=2662 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zhulx" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 21:57:55.420769 sshd[2662]: Failed password for invalid user zhulx from 154.68.39.6 port 51221 ssh2 Feb 9 21:57:57.430097 sshd[2662]: Received disconnect from 154.68.39.6 port 51221:11: Bye Bye [preauth] Feb 9 21:57:57.430097 sshd[2662]: Disconnected from invalid user zhulx 154.68.39.6 port 51221 [preauth] Feb 9 21:57:57.432706 systemd[1]: sshd@123-147.75.49.127:22-154.68.39.6:51221.service: Deactivated successfully. Feb 9 21:57:57.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.49.127:22-154.68.39.6:51221 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:57:57.526655 kernel: audit: type=1131 audit(1707515877.431:606): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-147.75.49.127:22-154.68.39.6:51221 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:58:28.727110 systemd[1]: Started sshd@124-147.75.49.127:22-61.177.172.160:63327.service. Feb 9 21:58:28.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-147.75.49.127:22-61.177.172.160:63327 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:58:28.819650 kernel: audit: type=1130 audit(1707515908.726:607): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-147.75.49.127:22-61.177.172.160:63327 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:58:36.677398 systemd[1]: Started sshd@125-147.75.49.127:22-103.147.242.96:52134.service. Feb 9 21:58:36.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.49.127:22-103.147.242.96:52134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:58:36.771653 kernel: audit: type=1130 audit(1707515916.677:608): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.49.127:22-103.147.242.96:52134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:58:38.305401 sshd[2668]: Invalid user mamazdashti from 103.147.242.96 port 52134 Feb 9 21:58:38.311514 sshd[2668]: pam_faillock(sshd:auth): User unknown Feb 9 21:58:38.312556 sshd[2668]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:58:38.312645 sshd[2668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:58:38.313550 sshd[2668]: pam_faillock(sshd:auth): User unknown Feb 9 21:58:38.313000 audit[2668]: USER_AUTH pid=2668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mamazdashti" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:58:38.408663 kernel: audit: type=1100 audit(1707515918.313:609): pid=2668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mamazdashti" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:58:40.281067 sshd[2668]: Failed password for invalid user mamazdashti from 103.147.242.96 port 52134 ssh2 Feb 9 21:58:40.822065 sshd[2668]: Received disconnect from 103.147.242.96 port 52134:11: Bye Bye [preauth] Feb 9 21:58:40.822065 sshd[2668]: Disconnected from invalid user mamazdashti 103.147.242.96 port 52134 [preauth] Feb 9 21:58:40.824576 systemd[1]: sshd@125-147.75.49.127:22-103.147.242.96:52134.service: Deactivated successfully. Feb 9 21:58:40.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.49.127:22-103.147.242.96:52134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:58:40.917517 kernel: audit: type=1131 audit(1707515920.824:610): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-147.75.49.127:22-103.147.242.96:52134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:59:45.368943 systemd[1]: Started sshd@126-147.75.49.127:22-103.147.242.96:33538.service. Feb 9 21:59:45.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.49.127:22-103.147.242.96:33538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:59:45.462474 kernel: audit: type=1130 audit(1707515985.368:611): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.49.127:22-103.147.242.96:33538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:59:46.935102 sshd[2676]: Invalid user mrzpiran from 103.147.242.96 port 33538 Feb 9 21:59:46.941197 sshd[2676]: pam_faillock(sshd:auth): User unknown Feb 9 21:59:46.942351 sshd[2676]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:59:46.942440 sshd[2676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 21:59:46.943330 sshd[2676]: pam_faillock(sshd:auth): User unknown Feb 9 21:59:46.942000 audit[2676]: USER_AUTH pid=2676 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mrzpiran" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:59:47.035651 kernel: audit: type=1100 audit(1707515986.942:612): pid=2676 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mrzpiran" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 21:59:48.911034 sshd[2676]: Failed password for invalid user mrzpiran from 103.147.242.96 port 33538 ssh2 Feb 9 21:59:50.246179 sshd[2676]: Received disconnect from 103.147.242.96 port 33538:11: Bye Bye [preauth] Feb 9 21:59:50.246179 sshd[2676]: Disconnected from invalid user mrzpiran 103.147.242.96 port 33538 [preauth] Feb 9 21:59:50.248675 systemd[1]: sshd@126-147.75.49.127:22-103.147.242.96:33538.service: Deactivated successfully. Feb 9 21:59:50.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.49.127:22-103.147.242.96:33538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:59:50.343655 kernel: audit: type=1131 audit(1707515990.248:613): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-147.75.49.127:22-103.147.242.96:33538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:00:05.281975 systemd[1]: Started sshd@127-147.75.49.127:22-154.68.39.6:41408.service. Feb 9 22:00:05.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.49.127:22-154.68.39.6:41408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:00:05.375657 kernel: audit: type=1130 audit(1707516005.281:614): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.49.127:22-154.68.39.6:41408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:00:06.580286 sshd[2681]: Invalid user araz from 154.68.39.6 port 41408 Feb 9 22:00:06.586307 sshd[2681]: pam_faillock(sshd:auth): User unknown Feb 9 22:00:06.587335 sshd[2681]: pam_unix(sshd:auth): check pass; user unknown Feb 9 22:00:06.587423 sshd[2681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 22:00:06.588327 sshd[2681]: pam_faillock(sshd:auth): User unknown Feb 9 22:00:06.588000 audit[2681]: USER_AUTH pid=2681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="araz" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 22:00:06.681511 kernel: audit: type=1100 audit(1707516006.588:615): pid=2681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="araz" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 22:00:08.636231 sshd[2681]: Failed password for invalid user araz from 154.68.39.6 port 41408 ssh2 Feb 9 22:00:09.413091 sshd[2681]: Received disconnect from 154.68.39.6 port 41408:11: Bye Bye [preauth] Feb 9 22:00:09.413091 sshd[2681]: Disconnected from invalid user araz 154.68.39.6 port 41408 [preauth] Feb 9 22:00:09.415585 systemd[1]: sshd@127-147.75.49.127:22-154.68.39.6:41408.service: Deactivated successfully. Feb 9 22:00:09.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.49.127:22-154.68.39.6:41408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:00:09.509571 kernel: audit: type=1131 audit(1707516009.415:616): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-147.75.49.127:22-154.68.39.6:41408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:00:28.732292 sshd[2666]: Timeout before authentication for 61.177.172.160 port 63327 Feb 9 22:00:28.733782 systemd[1]: sshd@124-147.75.49.127:22-61.177.172.160:63327.service: Deactivated successfully. Feb 9 22:00:28.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-147.75.49.127:22-61.177.172.160:63327 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:00:28.827650 kernel: audit: type=1131 audit(1707516028.732:617): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-147.75.49.127:22-61.177.172.160:63327 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:00:53.212331 systemd[1]: Started sshd@128-147.75.49.127:22-103.147.242.96:43168.service. Feb 9 22:00:53.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-147.75.49.127:22-103.147.242.96:43168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:00:53.305654 kernel: audit: type=1130 audit(1707516053.210:618): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-147.75.49.127:22-103.147.242.96:43168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:00:54.424773 sshd[2688]: Invalid user luowh from 103.147.242.96 port 43168 Feb 9 22:00:54.430918 sshd[2688]: pam_faillock(sshd:auth): User unknown Feb 9 22:00:54.432077 sshd[2688]: pam_unix(sshd:auth): check pass; user unknown Feb 9 22:00:54.432166 sshd[2688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 22:00:54.433180 sshd[2688]: pam_faillock(sshd:auth): User unknown Feb 9 22:00:54.431000 audit[2688]: USER_AUTH pid=2688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="luowh" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 22:00:54.527568 kernel: audit: type=1100 audit(1707516054.431:619): pid=2688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="luowh" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 22:00:56.736821 sshd[2688]: Failed password for invalid user luowh from 103.147.242.96 port 43168 ssh2 Feb 9 22:00:58.023232 sshd[2688]: Received disconnect from 103.147.242.96 port 43168:11: Bye Bye [preauth] Feb 9 22:00:58.023232 sshd[2688]: Disconnected from invalid user luowh 103.147.242.96 port 43168 [preauth] Feb 9 22:00:58.025774 systemd[1]: sshd@128-147.75.49.127:22-103.147.242.96:43168.service: Deactivated successfully. Feb 9 22:00:58.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-147.75.49.127:22-103.147.242.96:43168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:00:58.119490 kernel: audit: type=1131 audit(1707516058.024:620): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-147.75.49.127:22-103.147.242.96:43168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:02:01.007669 systemd[1]: Started sshd@129-147.75.49.127:22-103.147.242.96:52795.service. Feb 9 22:02:01.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-147.75.49.127:22-103.147.242.96:52795 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:02:01.101504 kernel: audit: type=1130 audit(1707516121.007:621): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-147.75.49.127:22-103.147.242.96:52795 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:02:02.191540 sshd[2692]: Invalid user zc from 103.147.242.96 port 52795 Feb 9 22:02:02.197513 sshd[2692]: pam_faillock(sshd:auth): User unknown Feb 9 22:02:02.198493 sshd[2692]: pam_unix(sshd:auth): check pass; user unknown Feb 9 22:02:02.198583 sshd[2692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 22:02:02.199428 sshd[2692]: pam_faillock(sshd:auth): User unknown Feb 9 22:02:02.199000 audit[2692]: USER_AUTH pid=2692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zc" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 22:02:02.292659 kernel: audit: type=1100 audit(1707516122.199:622): pid=2692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zc" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 22:02:04.502851 sshd[2692]: Failed password for invalid user zc from 103.147.242.96 port 52795 ssh2 Feb 9 22:02:05.599949 sshd[2692]: Received disconnect from 103.147.242.96 port 52795:11: Bye Bye [preauth] Feb 9 22:02:05.599949 sshd[2692]: Disconnected from invalid user zc 103.147.242.96 port 52795 [preauth] Feb 9 22:02:05.602438 systemd[1]: sshd@129-147.75.49.127:22-103.147.242.96:52795.service: Deactivated successfully. Feb 9 22:02:05.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-147.75.49.127:22-103.147.242.96:52795 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:02:05.696514 kernel: audit: type=1131 audit(1707516125.601:623): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-147.75.49.127:22-103.147.242.96:52795 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:02:08.514017 systemd[1]: Started sshd@130-147.75.49.127:22-154.68.39.6:34415.service. Feb 9 22:02:08.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-147.75.49.127:22-154.68.39.6:34415 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:02:08.607652 kernel: audit: type=1130 audit(1707516128.512:624): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-147.75.49.127:22-154.68.39.6:34415 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:02:09.826381 sshd[2698]: Invalid user rod from 154.68.39.6 port 34415 Feb 9 22:02:09.832492 sshd[2698]: pam_faillock(sshd:auth): User unknown Feb 9 22:02:09.833433 sshd[2698]: pam_unix(sshd:auth): check pass; user unknown Feb 9 22:02:09.833555 sshd[2698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 22:02:09.834524 sshd[2698]: pam_faillock(sshd:auth): User unknown Feb 9 22:02:09.833000 audit[2698]: USER_AUTH pid=2698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="rod" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 22:02:09.926653 kernel: audit: type=1100 audit(1707516129.833:625): pid=2698 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="rod" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 22:02:11.767107 sshd[2698]: Failed password for invalid user rod from 154.68.39.6 port 34415 ssh2 Feb 9 22:02:12.324689 sshd[2698]: Received disconnect from 154.68.39.6 port 34415:11: Bye Bye [preauth] Feb 9 22:02:12.324689 sshd[2698]: Disconnected from invalid user rod 154.68.39.6 port 34415 [preauth] Feb 9 22:02:12.327214 systemd[1]: sshd@130-147.75.49.127:22-154.68.39.6:34415.service: Deactivated successfully. Feb 9 22:02:12.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-147.75.49.127:22-154.68.39.6:34415 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:02:12.421657 kernel: audit: type=1131 audit(1707516132.326:626): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-147.75.49.127:22-154.68.39.6:34415 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:03:08.440172 systemd[1]: Started sshd@131-147.75.49.127:22-103.147.242.96:34189.service. Feb 9 22:03:08.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-147.75.49.127:22-103.147.242.96:34189 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:03:08.533655 kernel: audit: type=1130 audit(1707516188.439:627): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-147.75.49.127:22-103.147.242.96:34189 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:03:09.642486 sshd[2703]: Invalid user jiangchun from 103.147.242.96 port 34189 Feb 9 22:03:09.648869 sshd[2703]: pam_faillock(sshd:auth): User unknown Feb 9 22:03:09.649725 sshd[2703]: pam_unix(sshd:auth): check pass; user unknown Feb 9 22:03:09.649760 sshd[2703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 22:03:09.649994 sshd[2703]: pam_faillock(sshd:auth): User unknown Feb 9 22:03:09.649000 audit[2703]: USER_AUTH pid=2703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jiangchun" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 22:03:09.743656 kernel: audit: type=1100 audit(1707516189.649:628): pid=2703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jiangchun" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 22:03:11.818040 sshd[2703]: Failed password for invalid user jiangchun from 103.147.242.96 port 34189 ssh2 Feb 9 22:03:12.147065 sshd[2703]: Received disconnect from 103.147.242.96 port 34189:11: Bye Bye [preauth] Feb 9 22:03:12.147065 sshd[2703]: Disconnected from invalid user jiangchun 103.147.242.96 port 34189 [preauth] Feb 9 22:03:12.149663 systemd[1]: sshd@131-147.75.49.127:22-103.147.242.96:34189.service: Deactivated successfully. Feb 9 22:03:12.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-147.75.49.127:22-103.147.242.96:34189 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:03:12.243481 kernel: audit: type=1131 audit(1707516192.149:629): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-147.75.49.127:22-103.147.242.96:34189 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:04:14.357574 systemd[1]: Started sshd@132-147.75.49.127:22-103.147.242.96:43812.service. Feb 9 22:04:14.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-147.75.49.127:22-103.147.242.96:43812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:04:14.451666 kernel: audit: type=1130 audit(1707516254.356:630): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-147.75.49.127:22-103.147.242.96:43812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:04:15.560098 sshd[2708]: Invalid user cfaoffice from 103.147.242.96 port 43812 Feb 9 22:04:15.566227 sshd[2708]: pam_faillock(sshd:auth): User unknown Feb 9 22:04:15.567207 sshd[2708]: pam_unix(sshd:auth): check pass; user unknown Feb 9 22:04:15.567224 sshd[2708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 22:04:15.568691 sshd[2708]: pam_faillock(sshd:auth): User unknown Feb 9 22:04:15.567000 audit[2708]: USER_AUTH pid=2708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="cfaoffice" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 22:04:15.662605 kernel: audit: type=1100 audit(1707516255.567:631): pid=2708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="cfaoffice" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 22:04:17.797302 sshd[2708]: Failed password for invalid user cfaoffice from 103.147.242.96 port 43812 ssh2 Feb 9 22:04:19.506087 systemd[1]: Started sshd@133-147.75.49.127:22-154.68.39.6:57597.service. Feb 9 22:04:19.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-147.75.49.127:22-154.68.39.6:57597 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:04:19.598650 kernel: audit: type=1130 audit(1707516259.504:632): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-147.75.49.127:22-154.68.39.6:57597 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:04:19.841678 sshd[2708]: Received disconnect from 103.147.242.96 port 43812:11: Bye Bye [preauth] Feb 9 22:04:19.841678 sshd[2708]: Disconnected from invalid user cfaoffice 103.147.242.96 port 43812 [preauth] Feb 9 22:04:19.844086 systemd[1]: sshd@132-147.75.49.127:22-103.147.242.96:43812.service: Deactivated successfully. Feb 9 22:04:19.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-147.75.49.127:22-103.147.242.96:43812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:04:19.944655 kernel: audit: type=1131 audit(1707516259.843:633): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-147.75.49.127:22-103.147.242.96:43812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:04:20.837305 sshd[2714]: Invalid user lohaunaik from 154.68.39.6 port 57597 Feb 9 22:04:20.843422 sshd[2714]: pam_faillock(sshd:auth): User unknown Feb 9 22:04:20.844528 sshd[2714]: pam_unix(sshd:auth): check pass; user unknown Feb 9 22:04:20.844617 sshd[2714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 22:04:20.845512 sshd[2714]: pam_faillock(sshd:auth): User unknown Feb 9 22:04:20.844000 audit[2714]: USER_AUTH pid=2714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lohaunaik" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 22:04:20.939659 kernel: audit: type=1100 audit(1707516260.844:634): pid=2714 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lohaunaik" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 22:04:22.762626 sshd[2714]: Failed password for invalid user lohaunaik from 154.68.39.6 port 57597 ssh2 Feb 9 22:04:23.187551 sshd[2714]: Received disconnect from 154.68.39.6 port 57597:11: Bye Bye [preauth] Feb 9 22:04:23.187551 sshd[2714]: Disconnected from invalid user lohaunaik 154.68.39.6 port 57597 [preauth] Feb 9 22:04:23.190195 systemd[1]: sshd@133-147.75.49.127:22-154.68.39.6:57597.service: Deactivated successfully. Feb 9 22:04:23.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-147.75.49.127:22-154.68.39.6:57597 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:04:23.283525 kernel: audit: type=1131 audit(1707516263.189:635): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-147.75.49.127:22-154.68.39.6:57597 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:04:54.338374 systemd[1]: Started sshd@134-147.75.49.127:22-218.92.0.51:13484.service. Feb 9 22:04:54.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-147.75.49.127:22-218.92.0.51:13484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:04:54.431659 kernel: audit: type=1130 audit(1707516294.336:636): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-147.75.49.127:22-218.92.0.51:13484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:04:54.492825 sshd[2722]: Unable to negotiate with 218.92.0.51 port 13484: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 9 22:04:54.494831 systemd[1]: sshd@134-147.75.49.127:22-218.92.0.51:13484.service: Deactivated successfully. Feb 9 22:04:54.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-147.75.49.127:22-218.92.0.51:13484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:04:54.592651 kernel: audit: type=1131 audit(1707516294.493:637): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-147.75.49.127:22-218.92.0.51:13484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:05:19.473241 systemd[1]: Started sshd@135-147.75.49.127:22-103.147.242.96:53445.service. Feb 9 22:05:19.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-147.75.49.127:22-103.147.242.96:53445 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:05:19.566459 kernel: audit: type=1130 audit(1707516319.472:638): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-147.75.49.127:22-103.147.242.96:53445 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:05:21.042447 sshd[2726]: Invalid user tanglv from 103.147.242.96 port 53445 Feb 9 22:05:21.048487 sshd[2726]: pam_faillock(sshd:auth): User unknown Feb 9 22:05:21.049504 sshd[2726]: pam_unix(sshd:auth): check pass; user unknown Feb 9 22:05:21.049597 sshd[2726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 22:05:21.050644 sshd[2726]: pam_faillock(sshd:auth): User unknown Feb 9 22:05:21.050000 audit[2726]: USER_AUTH pid=2726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tanglv" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 22:05:21.143551 kernel: audit: type=1100 audit(1707516321.050:639): pid=2726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tanglv" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 22:05:22.671819 sshd[2726]: Failed password for invalid user tanglv from 103.147.242.96 port 53445 ssh2 Feb 9 22:05:24.098743 sshd[2726]: Received disconnect from 103.147.242.96 port 53445:11: Bye Bye [preauth] Feb 9 22:05:24.098743 sshd[2726]: Disconnected from invalid user tanglv 103.147.242.96 port 53445 [preauth] Feb 9 22:05:24.101260 systemd[1]: sshd@135-147.75.49.127:22-103.147.242.96:53445.service: Deactivated successfully. Feb 9 22:05:24.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-147.75.49.127:22-103.147.242.96:53445 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:05:24.194658 kernel: audit: type=1131 audit(1707516324.101:640): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-147.75.49.127:22-103.147.242.96:53445 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:06:24.872619 systemd[1]: Started sshd@136-147.75.49.127:22-103.147.242.96:34833.service. Feb 9 22:06:24.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-147.75.49.127:22-103.147.242.96:34833 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:06:24.965495 kernel: audit: type=1130 audit(1707516384.872:641): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-147.75.49.127:22-103.147.242.96:34833 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:06:26.068772 sshd[2731]: Invalid user see from 103.147.242.96 port 34833 Feb 9 22:06:26.074959 sshd[2731]: pam_faillock(sshd:auth): User unknown Feb 9 22:06:26.076118 sshd[2731]: pam_unix(sshd:auth): check pass; user unknown Feb 9 22:06:26.076209 sshd[2731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.147.242.96 Feb 9 22:06:26.077196 sshd[2731]: pam_faillock(sshd:auth): User unknown Feb 9 22:06:26.076000 audit[2731]: USER_AUTH pid=2731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="see" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 22:06:26.170662 kernel: audit: type=1100 audit(1707516386.076:642): pid=2731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="see" exe="/usr/sbin/sshd" hostname=103.147.242.96 addr=103.147.242.96 terminal=ssh res=failed' Feb 9 22:06:27.200054 systemd[1]: Started sshd@137-147.75.49.127:22-154.68.39.6:51574.service. Feb 9 22:06:27.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-147.75.49.127:22-154.68.39.6:51574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:06:27.292641 kernel: audit: type=1130 audit(1707516387.198:643): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-147.75.49.127:22-154.68.39.6:51574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:06:28.290470 sshd[2731]: Failed password for invalid user see from 103.147.242.96 port 34833 ssh2 Feb 9 22:06:28.573850 sshd[2734]: Invalid user jungil from 154.68.39.6 port 51574 Feb 9 22:06:28.580212 sshd[2734]: pam_faillock(sshd:auth): User unknown Feb 9 22:06:28.581208 sshd[2734]: pam_unix(sshd:auth): check pass; user unknown Feb 9 22:06:28.581296 sshd[2734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 22:06:28.582247 sshd[2734]: pam_faillock(sshd:auth): User unknown Feb 9 22:06:28.580000 audit[2734]: USER_AUTH pid=2734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jungil" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 22:06:28.674520 kernel: audit: type=1100 audit(1707516388.580:644): pid=2734 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jungil" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 22:06:29.140849 sshd[2731]: Received disconnect from 103.147.242.96 port 34833:11: Bye Bye [preauth] Feb 9 22:06:29.140849 sshd[2731]: Disconnected from invalid user see 103.147.242.96 port 34833 [preauth] Feb 9 22:06:29.143386 systemd[1]: sshd@136-147.75.49.127:22-103.147.242.96:34833.service: Deactivated successfully. Feb 9 22:06:29.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-147.75.49.127:22-103.147.242.96:34833 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:06:29.236510 kernel: audit: type=1131 audit(1707516389.142:645): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-147.75.49.127:22-103.147.242.96:34833 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:06:30.067797 sshd[2734]: Failed password for invalid user jungil from 154.68.39.6 port 51574 ssh2 Feb 9 22:06:31.402848 sshd[2734]: Received disconnect from 154.68.39.6 port 51574:11: Bye Bye [preauth] Feb 9 22:06:31.402848 sshd[2734]: Disconnected from invalid user jungil 154.68.39.6 port 51574 [preauth] Feb 9 22:06:31.405544 systemd[1]: sshd@137-147.75.49.127:22-154.68.39.6:51574.service: Deactivated successfully. Feb 9 22:06:31.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-147.75.49.127:22-154.68.39.6:51574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:06:31.498650 kernel: audit: type=1131 audit(1707516391.404:646): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-147.75.49.127:22-154.68.39.6:51574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:07:22.298911 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T22:07:22.298Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":1012} Feb 9 22:07:22.317226 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T22:07:22.316Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":1012,"took":"18.163585ms"} Feb 9 22:08:37.964922 systemd[1]: Started sshd@138-147.75.49.127:22-154.68.39.6:45948.service. Feb 9 22:08:37.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-147.75.49.127:22-154.68.39.6:45948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:08:38.058664 kernel: audit: type=1130 audit(1707516517.964:647): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-147.75.49.127:22-154.68.39.6:45948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:08:39.292077 sshd[2742]: Invalid user kaluzh from 154.68.39.6 port 45948 Feb 9 22:08:39.298296 sshd[2742]: pam_faillock(sshd:auth): User unknown Feb 9 22:08:39.299342 sshd[2742]: pam_unix(sshd:auth): check pass; user unknown Feb 9 22:08:39.299431 sshd[2742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 22:08:39.300356 sshd[2742]: pam_faillock(sshd:auth): User unknown Feb 9 22:08:39.300000 audit[2742]: USER_AUTH pid=2742 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="kaluzh" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 22:08:39.392461 kernel: audit: type=1100 audit(1707516519.300:648): pid=2742 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="kaluzh" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 22:08:41.438748 sshd[2742]: Failed password for invalid user kaluzh from 154.68.39.6 port 45948 ssh2 Feb 9 22:08:41.736095 sshd[2742]: Received disconnect from 154.68.39.6 port 45948:11: Bye Bye [preauth] Feb 9 22:08:41.736095 sshd[2742]: Disconnected from invalid user kaluzh 154.68.39.6 port 45948 [preauth] Feb 9 22:08:41.738496 systemd[1]: sshd@138-147.75.49.127:22-154.68.39.6:45948.service: Deactivated successfully. Feb 9 22:08:41.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-147.75.49.127:22-154.68.39.6:45948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:08:41.831512 kernel: audit: type=1131 audit(1707516521.738:649): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-147.75.49.127:22-154.68.39.6:45948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:10:55.237424 systemd[1]: Started sshd@139-147.75.49.127:22-154.68.39.6:41296.service. Feb 9 22:10:55.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-147.75.49.127:22-154.68.39.6:41296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:10:55.330676 kernel: audit: type=1130 audit(1707516655.236:650): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-147.75.49.127:22-154.68.39.6:41296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:10:56.540292 sshd[2751]: Invalid user le from 154.68.39.6 port 41296 Feb 9 22:10:56.546559 sshd[2751]: pam_faillock(sshd:auth): User unknown Feb 9 22:10:56.547812 sshd[2751]: pam_unix(sshd:auth): check pass; user unknown Feb 9 22:10:56.547901 sshd[2751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.68.39.6 Feb 9 22:10:56.548774 sshd[2751]: pam_faillock(sshd:auth): User unknown Feb 9 22:10:56.547000 audit[2751]: USER_AUTH pid=2751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="le" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 22:10:56.639653 kernel: audit: type=1100 audit(1707516656.547:651): pid=2751 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="le" exe="/usr/sbin/sshd" hostname=154.68.39.6 addr=154.68.39.6 terminal=ssh res=failed' Feb 9 22:10:58.496133 sshd[2751]: Failed password for invalid user le from 154.68.39.6 port 41296 ssh2 Feb 9 22:10:59.620262 sshd[2751]: Received disconnect from 154.68.39.6 port 41296:11: Bye Bye [preauth] Feb 9 22:10:59.620262 sshd[2751]: Disconnected from invalid user le 154.68.39.6 port 41296 [preauth] Feb 9 22:10:59.622770 systemd[1]: sshd@139-147.75.49.127:22-154.68.39.6:41296.service: Deactivated successfully. Feb 9 22:10:59.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-147.75.49.127:22-154.68.39.6:41296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:10:59.716583 kernel: audit: type=1131 audit(1707516659.621:652): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-147.75.49.127:22-154.68.39.6:41296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 22:12:22.300950 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T22:12:22.300Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":1549} Feb 9 22:12:22.303580 etcd-wrapper[1851]: {"level":"info","ts":"2024-02-09T22:12:22.303Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":1549,"took":"2.119293ms"}