Feb 13 00:34:21.549678 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 13 00:34:21.549691 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 00:34:21.549698 kernel: BIOS-provided physical RAM map: Feb 13 00:34:21.549702 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 13 00:34:21.549705 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 13 00:34:21.549709 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 13 00:34:21.549714 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 13 00:34:21.549717 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 13 00:34:21.549721 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000819cffff] usable Feb 13 00:34:21.549725 kernel: BIOS-e820: [mem 0x00000000819d0000-0x00000000819d0fff] ACPI NVS Feb 13 00:34:21.549730 kernel: BIOS-e820: [mem 0x00000000819d1000-0x00000000819d1fff] reserved Feb 13 00:34:21.549733 kernel: BIOS-e820: [mem 0x00000000819d2000-0x000000008afccfff] usable Feb 13 00:34:21.549737 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Feb 13 00:34:21.549741 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Feb 13 00:34:21.549746 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Feb 13 00:34:21.549751 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Feb 13 00:34:21.549756 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Feb 13 00:34:21.549760 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Feb 13 00:34:21.549764 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 13 00:34:21.549768 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 13 00:34:21.549772 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 13 00:34:21.549776 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 13 00:34:21.549780 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 13 00:34:21.549784 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Feb 13 00:34:21.549789 kernel: NX (Execute Disable) protection: active Feb 13 00:34:21.549793 kernel: SMBIOS 3.2.1 present. Feb 13 00:34:21.549798 kernel: DMI: Supermicro Super Server/X11SCM-F, BIOS 1.9 09/16/2022 Feb 13 00:34:21.549802 kernel: tsc: Detected 3400.000 MHz processor Feb 13 00:34:21.549806 kernel: tsc: Detected 3399.906 MHz TSC Feb 13 00:34:21.549810 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 13 00:34:21.549815 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 13 00:34:21.549820 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Feb 13 00:34:21.549824 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 13 00:34:21.549828 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Feb 13 00:34:21.549832 kernel: Using GB pages for direct mapping Feb 13 00:34:21.549837 kernel: ACPI: Early table checksum verification disabled Feb 13 00:34:21.549842 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 13 00:34:21.549846 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 13 00:34:21.549850 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Feb 13 00:34:21.549855 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 13 00:34:21.549861 kernel: ACPI: FACS 0x000000008C66CF80 000040 Feb 13 00:34:21.549866 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Feb 13 00:34:21.549871 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Feb 13 00:34:21.549876 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 13 00:34:21.549880 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 13 00:34:21.549885 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 13 00:34:21.549890 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 13 00:34:21.549895 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 13 00:34:21.549899 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 13 00:34:21.549904 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 00:34:21.549909 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 13 00:34:21.549914 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 13 00:34:21.549919 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 00:34:21.549923 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 00:34:21.549928 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 13 00:34:21.549933 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 13 00:34:21.549937 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 00:34:21.549942 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 13 00:34:21.549947 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 13 00:34:21.549952 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Feb 13 00:34:21.549956 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 13 00:34:21.549961 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 13 00:34:21.549966 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 13 00:34:21.549970 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Feb 13 00:34:21.549975 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 13 00:34:21.549980 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 13 00:34:21.549984 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 13 00:34:21.549990 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 13 00:34:21.549994 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 13 00:34:21.549999 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Feb 13 00:34:21.550004 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Feb 13 00:34:21.550008 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Feb 13 00:34:21.550013 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Feb 13 00:34:21.550017 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Feb 13 00:34:21.550022 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Feb 13 00:34:21.550027 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Feb 13 00:34:21.550032 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Feb 13 00:34:21.550036 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Feb 13 00:34:21.550041 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Feb 13 00:34:21.550046 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Feb 13 00:34:21.550050 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Feb 13 00:34:21.550055 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Feb 13 00:34:21.550059 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Feb 13 00:34:21.550064 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Feb 13 00:34:21.550070 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Feb 13 00:34:21.550074 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Feb 13 00:34:21.550079 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Feb 13 00:34:21.550083 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Feb 13 00:34:21.550088 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Feb 13 00:34:21.550093 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Feb 13 00:34:21.550097 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Feb 13 00:34:21.550102 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Feb 13 00:34:21.550107 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Feb 13 00:34:21.550112 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Feb 13 00:34:21.550117 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Feb 13 00:34:21.550121 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Feb 13 00:34:21.550126 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Feb 13 00:34:21.550131 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Feb 13 00:34:21.550135 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Feb 13 00:34:21.550140 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Feb 13 00:34:21.550144 kernel: No NUMA configuration found Feb 13 00:34:21.550149 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Feb 13 00:34:21.550154 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Feb 13 00:34:21.550159 kernel: Zone ranges: Feb 13 00:34:21.550164 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 13 00:34:21.550169 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 13 00:34:21.550173 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Feb 13 00:34:21.550178 kernel: Movable zone start for each node Feb 13 00:34:21.550182 kernel: Early memory node ranges Feb 13 00:34:21.550187 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 13 00:34:21.550192 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 13 00:34:21.550196 kernel: node 0: [mem 0x0000000040400000-0x00000000819cffff] Feb 13 00:34:21.550202 kernel: node 0: [mem 0x00000000819d2000-0x000000008afccfff] Feb 13 00:34:21.550206 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Feb 13 00:34:21.550211 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Feb 13 00:34:21.550215 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Feb 13 00:34:21.550220 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Feb 13 00:34:21.550225 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 13 00:34:21.550233 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 13 00:34:21.550238 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 13 00:34:21.550243 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 13 00:34:21.550248 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Feb 13 00:34:21.550254 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Feb 13 00:34:21.550259 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Feb 13 00:34:21.550264 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Feb 13 00:34:21.550269 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 13 00:34:21.550274 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 13 00:34:21.550279 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 13 00:34:21.550284 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 13 00:34:21.550290 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 13 00:34:21.550295 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 13 00:34:21.550300 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 13 00:34:21.550304 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 13 00:34:21.550309 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 13 00:34:21.550314 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 13 00:34:21.550319 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 13 00:34:21.550324 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 13 00:34:21.550329 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 13 00:34:21.550335 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 13 00:34:21.550339 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 13 00:34:21.550344 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 13 00:34:21.550349 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 13 00:34:21.550354 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 13 00:34:21.550359 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 13 00:34:21.550364 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 13 00:34:21.550369 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 13 00:34:21.550374 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 13 00:34:21.550380 kernel: TSC deadline timer available Feb 13 00:34:21.550385 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 13 00:34:21.550390 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Feb 13 00:34:21.550395 kernel: Booting paravirtualized kernel on bare hardware Feb 13 00:34:21.550404 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 13 00:34:21.550410 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 13 00:34:21.550415 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 13 00:34:21.550420 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 13 00:34:21.550424 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 13 00:34:21.550430 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Feb 13 00:34:21.550435 kernel: Policy zone: Normal Feb 13 00:34:21.550441 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 00:34:21.550446 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 13 00:34:21.550451 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 13 00:34:21.550456 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 13 00:34:21.550461 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 13 00:34:21.550466 kernel: Memory: 32724720K/33452980K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 13 00:34:21.550472 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 13 00:34:21.550477 kernel: ftrace: allocating 34475 entries in 135 pages Feb 13 00:34:21.550482 kernel: ftrace: allocated 135 pages with 4 groups Feb 13 00:34:21.550487 kernel: rcu: Hierarchical RCU implementation. Feb 13 00:34:21.550492 kernel: rcu: RCU event tracing is enabled. Feb 13 00:34:21.550497 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 13 00:34:21.550502 kernel: Rude variant of Tasks RCU enabled. Feb 13 00:34:21.550507 kernel: Tracing variant of Tasks RCU enabled. Feb 13 00:34:21.550512 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 13 00:34:21.550518 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 13 00:34:21.550523 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 13 00:34:21.550528 kernel: random: crng init done Feb 13 00:34:21.550532 kernel: Console: colour dummy device 80x25 Feb 13 00:34:21.550537 kernel: printk: console [tty0] enabled Feb 13 00:34:21.550542 kernel: printk: console [ttyS1] enabled Feb 13 00:34:21.550547 kernel: ACPI: Core revision 20210730 Feb 13 00:34:21.550552 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Feb 13 00:34:21.550557 kernel: APIC: Switch to symmetric I/O mode setup Feb 13 00:34:21.550563 kernel: DMAR: Host address width 39 Feb 13 00:34:21.550568 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 13 00:34:21.550573 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 13 00:34:21.550578 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Feb 13 00:34:21.550583 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Feb 13 00:34:21.550588 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 13 00:34:21.550592 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 13 00:34:21.550597 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 13 00:34:21.550602 kernel: x2apic enabled Feb 13 00:34:21.550608 kernel: Switched APIC routing to cluster x2apic. Feb 13 00:34:21.550613 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 13 00:34:21.550618 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 13 00:34:21.550623 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 13 00:34:21.550628 kernel: process: using mwait in idle threads Feb 13 00:34:21.550633 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 13 00:34:21.550638 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 13 00:34:21.550642 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 13 00:34:21.550647 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 13 00:34:21.550653 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 13 00:34:21.550658 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 13 00:34:21.550663 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 13 00:34:21.550668 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 13 00:34:21.550673 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 13 00:34:21.550678 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 13 00:34:21.550682 kernel: TAA: Mitigation: TSX disabled Feb 13 00:34:21.550687 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 13 00:34:21.550692 kernel: SRBDS: Mitigation: Microcode Feb 13 00:34:21.550697 kernel: GDS: Vulnerable: No microcode Feb 13 00:34:21.550702 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 13 00:34:21.550708 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 13 00:34:21.550713 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 13 00:34:21.550718 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 13 00:34:21.550722 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 13 00:34:21.550727 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 13 00:34:21.550732 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 13 00:34:21.550737 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 13 00:34:21.550742 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 13 00:34:21.550747 kernel: Freeing SMP alternatives memory: 32K Feb 13 00:34:21.550752 kernel: pid_max: default: 32768 minimum: 301 Feb 13 00:34:21.550756 kernel: LSM: Security Framework initializing Feb 13 00:34:21.550761 kernel: SELinux: Initializing. Feb 13 00:34:21.550767 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 00:34:21.550772 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 00:34:21.550777 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 13 00:34:21.550782 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 13 00:34:21.550787 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 13 00:34:21.550792 kernel: ... version: 4 Feb 13 00:34:21.550797 kernel: ... bit width: 48 Feb 13 00:34:21.550802 kernel: ... generic registers: 4 Feb 13 00:34:21.550807 kernel: ... value mask: 0000ffffffffffff Feb 13 00:34:21.550812 kernel: ... max period: 00007fffffffffff Feb 13 00:34:21.550817 kernel: ... fixed-purpose events: 3 Feb 13 00:34:21.550822 kernel: ... event mask: 000000070000000f Feb 13 00:34:21.550827 kernel: signal: max sigframe size: 2032 Feb 13 00:34:21.550832 kernel: rcu: Hierarchical SRCU implementation. Feb 13 00:34:21.550837 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 13 00:34:21.550842 kernel: smp: Bringing up secondary CPUs ... Feb 13 00:34:21.550847 kernel: x86: Booting SMP configuration: Feb 13 00:34:21.550852 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 13 00:34:21.550857 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 13 00:34:21.550864 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 13 00:34:21.550870 kernel: smp: Brought up 1 node, 16 CPUs Feb 13 00:34:21.550876 kernel: smpboot: Max logical packages: 1 Feb 13 00:34:21.550882 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 13 00:34:21.550888 kernel: devtmpfs: initialized Feb 13 00:34:21.550893 kernel: x86/mm: Memory block size: 128MB Feb 13 00:34:21.550899 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x819d0000-0x819d0fff] (4096 bytes) Feb 13 00:34:21.550905 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Feb 13 00:34:21.550912 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 13 00:34:21.550917 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 13 00:34:21.550922 kernel: pinctrl core: initialized pinctrl subsystem Feb 13 00:34:21.550927 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 13 00:34:21.550932 kernel: audit: initializing netlink subsys (disabled) Feb 13 00:34:21.550937 kernel: audit: type=2000 audit(1707784456.040:1): state=initialized audit_enabled=0 res=1 Feb 13 00:34:21.550941 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 13 00:34:21.550946 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 13 00:34:21.550951 kernel: cpuidle: using governor menu Feb 13 00:34:21.550957 kernel: ACPI: bus type PCI registered Feb 13 00:34:21.550962 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 13 00:34:21.550967 kernel: dca service started, version 1.12.1 Feb 13 00:34:21.550972 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 13 00:34:21.550977 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 13 00:34:21.550982 kernel: PCI: Using configuration type 1 for base access Feb 13 00:34:21.550987 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 13 00:34:21.550992 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 13 00:34:21.550997 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 13 00:34:21.551002 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 13 00:34:21.551007 kernel: ACPI: Added _OSI(Module Device) Feb 13 00:34:21.551012 kernel: ACPI: Added _OSI(Processor Device) Feb 13 00:34:21.551017 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 13 00:34:21.551022 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 13 00:34:21.551027 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 13 00:34:21.551032 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 13 00:34:21.551037 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 13 00:34:21.551042 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 13 00:34:21.551047 kernel: ACPI: Dynamic OEM Table Load: Feb 13 00:34:21.551052 kernel: ACPI: SSDT 0xFFFF9F8601408400 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 13 00:34:21.551057 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 13 00:34:21.551062 kernel: ACPI: Dynamic OEM Table Load: Feb 13 00:34:21.551067 kernel: ACPI: SSDT 0xFFFF9F86013F5C00 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 13 00:34:21.551072 kernel: ACPI: Dynamic OEM Table Load: Feb 13 00:34:21.551077 kernel: ACPI: SSDT 0xFFFF9F86013EA800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 13 00:34:21.551082 kernel: ACPI: Dynamic OEM Table Load: Feb 13 00:34:21.551087 kernel: ACPI: SSDT 0xFFFF9F86013ED000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 13 00:34:21.551092 kernel: ACPI: Dynamic OEM Table Load: Feb 13 00:34:21.551097 kernel: ACPI: SSDT 0xFFFF9F86013FD000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 13 00:34:21.551102 kernel: ACPI: Dynamic OEM Table Load: Feb 13 00:34:21.551107 kernel: ACPI: SSDT 0xFFFF9F86013F3C00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 13 00:34:21.551112 kernel: ACPI: Interpreter enabled Feb 13 00:34:21.551117 kernel: ACPI: PM: (supports S0 S5) Feb 13 00:34:21.551122 kernel: ACPI: Using IOAPIC for interrupt routing Feb 13 00:34:21.551127 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 13 00:34:21.551132 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 13 00:34:21.551137 kernel: HEST: Table parsing has been initialized. Feb 13 00:34:21.551142 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 13 00:34:21.551147 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 13 00:34:21.551152 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 13 00:34:21.551157 kernel: ACPI: PM: Power Resource [USBC] Feb 13 00:34:21.551162 kernel: ACPI: PM: Power Resource [V0PR] Feb 13 00:34:21.551167 kernel: ACPI: PM: Power Resource [V1PR] Feb 13 00:34:21.551172 kernel: ACPI: PM: Power Resource [V2PR] Feb 13 00:34:21.551177 kernel: ACPI: PM: Power Resource [WRST] Feb 13 00:34:21.551182 kernel: ACPI: PM: Power Resource [FN00] Feb 13 00:34:21.551188 kernel: ACPI: PM: Power Resource [FN01] Feb 13 00:34:21.551193 kernel: ACPI: PM: Power Resource [FN02] Feb 13 00:34:21.551198 kernel: ACPI: PM: Power Resource [FN03] Feb 13 00:34:21.551202 kernel: ACPI: PM: Power Resource [FN04] Feb 13 00:34:21.551207 kernel: ACPI: PM: Power Resource [PIN] Feb 13 00:34:21.551212 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 13 00:34:21.551277 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 13 00:34:21.551322 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 13 00:34:21.551365 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 13 00:34:21.551372 kernel: PCI host bridge to bus 0000:00 Feb 13 00:34:21.551423 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 13 00:34:21.551461 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 13 00:34:21.551498 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 13 00:34:21.551535 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Feb 13 00:34:21.551571 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 13 00:34:21.551608 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 13 00:34:21.551660 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 13 00:34:21.551707 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 13 00:34:21.551750 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 13 00:34:21.551794 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 13 00:34:21.551836 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Feb 13 00:34:21.551882 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 13 00:34:21.551925 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Feb 13 00:34:21.551970 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 13 00:34:21.552012 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Feb 13 00:34:21.552055 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 13 00:34:21.552104 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 13 00:34:21.552148 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Feb 13 00:34:21.552190 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Feb 13 00:34:21.552235 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 13 00:34:21.552277 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 00:34:21.552321 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 13 00:34:21.552361 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 00:34:21.552410 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 13 00:34:21.552455 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Feb 13 00:34:21.552498 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 13 00:34:21.552542 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 13 00:34:21.552584 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Feb 13 00:34:21.552625 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 13 00:34:21.552669 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 13 00:34:21.552713 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Feb 13 00:34:21.552754 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 13 00:34:21.552800 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 13 00:34:21.552841 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Feb 13 00:34:21.552882 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Feb 13 00:34:21.552923 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Feb 13 00:34:21.552963 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Feb 13 00:34:21.553011 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Feb 13 00:34:21.553054 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Feb 13 00:34:21.553097 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 13 00:34:21.553144 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 13 00:34:21.553187 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 13 00:34:21.553232 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 13 00:34:21.553275 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 13 00:34:21.553321 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 13 00:34:21.553364 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 13 00:34:21.553413 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 13 00:34:21.553455 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 13 00:34:21.553502 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Feb 13 00:34:21.553546 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Feb 13 00:34:21.553593 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 13 00:34:21.553634 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 00:34:21.553682 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 13 00:34:21.553730 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 13 00:34:21.553785 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Feb 13 00:34:21.553826 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 13 00:34:21.553869 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 13 00:34:21.553911 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 13 00:34:21.553957 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Feb 13 00:34:21.554000 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 13 00:34:21.554044 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Feb 13 00:34:21.554087 kernel: pci 0000:01:00.0: PME# supported from D3cold Feb 13 00:34:21.554128 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 00:34:21.554170 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 00:34:21.554217 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Feb 13 00:34:21.554259 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 13 00:34:21.554304 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Feb 13 00:34:21.554345 kernel: pci 0000:01:00.1: PME# supported from D3cold Feb 13 00:34:21.554388 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 00:34:21.554475 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 00:34:21.554520 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 00:34:21.554561 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 13 00:34:21.554603 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 00:34:21.554644 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 13 00:34:21.554693 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Feb 13 00:34:21.554736 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Feb 13 00:34:21.554778 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Feb 13 00:34:21.554821 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Feb 13 00:34:21.554863 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 13 00:34:21.554905 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 13 00:34:21.554946 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 00:34:21.554988 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 13 00:34:21.555039 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 13 00:34:21.555115 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Feb 13 00:34:21.555198 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Feb 13 00:34:21.555241 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Feb 13 00:34:21.555283 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 13 00:34:21.555324 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 13 00:34:21.555368 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 00:34:21.555429 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 13 00:34:21.555493 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 13 00:34:21.555539 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Feb 13 00:34:21.555583 kernel: pci 0000:06:00.0: enabling Extended Tags Feb 13 00:34:21.555626 kernel: pci 0000:06:00.0: supports D1 D2 Feb 13 00:34:21.555670 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 00:34:21.555711 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 13 00:34:21.555752 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 13 00:34:21.555796 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 13 00:34:21.555841 kernel: pci_bus 0000:07: extended config space not accessible Feb 13 00:34:21.555891 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Feb 13 00:34:21.555935 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Feb 13 00:34:21.555981 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Feb 13 00:34:21.556025 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Feb 13 00:34:21.556070 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 13 00:34:21.556116 kernel: pci 0000:07:00.0: supports D1 D2 Feb 13 00:34:21.556162 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 00:34:21.556204 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 13 00:34:21.556248 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 13 00:34:21.556290 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 13 00:34:21.556298 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 13 00:34:21.556303 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 13 00:34:21.556310 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 13 00:34:21.556315 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 13 00:34:21.556320 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 13 00:34:21.556325 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 13 00:34:21.556330 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 13 00:34:21.556336 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 13 00:34:21.556341 kernel: iommu: Default domain type: Translated Feb 13 00:34:21.556346 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 13 00:34:21.556390 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Feb 13 00:34:21.556460 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 13 00:34:21.556506 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Feb 13 00:34:21.556514 kernel: vgaarb: loaded Feb 13 00:34:21.556519 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 13 00:34:21.556525 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 13 00:34:21.556530 kernel: PTP clock support registered Feb 13 00:34:21.556536 kernel: PCI: Using ACPI for IRQ routing Feb 13 00:34:21.556541 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 13 00:34:21.556546 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 13 00:34:21.556553 kernel: e820: reserve RAM buffer [mem 0x819d0000-0x83ffffff] Feb 13 00:34:21.556558 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Feb 13 00:34:21.556563 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Feb 13 00:34:21.556568 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Feb 13 00:34:21.556573 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Feb 13 00:34:21.556578 kernel: clocksource: Switched to clocksource tsc-early Feb 13 00:34:21.556584 kernel: VFS: Disk quotas dquot_6.6.0 Feb 13 00:34:21.556589 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 13 00:34:21.556594 kernel: pnp: PnP ACPI init Feb 13 00:34:21.556637 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 13 00:34:21.556682 kernel: pnp 00:02: [dma 0 disabled] Feb 13 00:34:21.556722 kernel: pnp 00:03: [dma 0 disabled] Feb 13 00:34:21.556764 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 13 00:34:21.556802 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 13 00:34:21.556842 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 13 00:34:21.556885 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 13 00:34:21.556923 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 13 00:34:21.556961 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 13 00:34:21.556998 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 13 00:34:21.557036 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 13 00:34:21.557073 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 13 00:34:21.557111 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 13 00:34:21.557150 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 13 00:34:21.557189 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 13 00:34:21.557228 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 13 00:34:21.557264 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 13 00:34:21.557304 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 13 00:34:21.557341 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 13 00:34:21.557379 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 13 00:34:21.557420 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 13 00:34:21.557460 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 13 00:34:21.557468 kernel: pnp: PnP ACPI: found 10 devices Feb 13 00:34:21.557474 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 13 00:34:21.557479 kernel: NET: Registered PF_INET protocol family Feb 13 00:34:21.557485 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 00:34:21.557490 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 13 00:34:21.557495 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 13 00:34:21.557502 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 00:34:21.557507 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 13 00:34:21.557513 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 13 00:34:21.557518 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 00:34:21.557523 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 00:34:21.557529 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 13 00:34:21.557534 kernel: NET: Registered PF_XDP protocol family Feb 13 00:34:21.557577 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Feb 13 00:34:21.557621 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Feb 13 00:34:21.557663 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Feb 13 00:34:21.557706 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 00:34:21.557750 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 00:34:21.557794 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 00:34:21.557838 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 00:34:21.557880 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 00:34:21.557922 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 13 00:34:21.557965 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 00:34:21.558006 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 13 00:34:21.558048 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 13 00:34:21.558089 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 00:34:21.558132 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 13 00:34:21.558176 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 13 00:34:21.558219 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 00:34:21.558260 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 13 00:34:21.558302 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 13 00:34:21.558346 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 13 00:34:21.558389 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 13 00:34:21.558436 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 13 00:34:21.558479 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 13 00:34:21.558522 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 13 00:34:21.558565 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 13 00:34:21.558604 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 13 00:34:21.558641 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 13 00:34:21.558676 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 13 00:34:21.558714 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 13 00:34:21.558749 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Feb 13 00:34:21.558786 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 13 00:34:21.558831 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Feb 13 00:34:21.558873 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 00:34:21.558914 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Feb 13 00:34:21.558953 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Feb 13 00:34:21.558995 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Feb 13 00:34:21.559034 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Feb 13 00:34:21.559076 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Feb 13 00:34:21.559116 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Feb 13 00:34:21.559158 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 13 00:34:21.559198 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Feb 13 00:34:21.559205 kernel: PCI: CLS 64 bytes, default 64 Feb 13 00:34:21.559212 kernel: DMAR: No ATSR found Feb 13 00:34:21.559217 kernel: DMAR: No SATC found Feb 13 00:34:21.559223 kernel: DMAR: dmar0: Using Queued invalidation Feb 13 00:34:21.559265 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 13 00:34:21.559309 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 13 00:34:21.559351 kernel: pci 0000:00:08.0: Adding to iommu group 2 Feb 13 00:34:21.559394 kernel: pci 0000:00:12.0: Adding to iommu group 3 Feb 13 00:34:21.559439 kernel: pci 0000:00:14.0: Adding to iommu group 4 Feb 13 00:34:21.559482 kernel: pci 0000:00:14.2: Adding to iommu group 4 Feb 13 00:34:21.559523 kernel: pci 0000:00:15.0: Adding to iommu group 5 Feb 13 00:34:21.559565 kernel: pci 0000:00:15.1: Adding to iommu group 5 Feb 13 00:34:21.559607 kernel: pci 0000:00:16.0: Adding to iommu group 6 Feb 13 00:34:21.559669 kernel: pci 0000:00:16.1: Adding to iommu group 6 Feb 13 00:34:21.559712 kernel: pci 0000:00:16.4: Adding to iommu group 6 Feb 13 00:34:21.559752 kernel: pci 0000:00:17.0: Adding to iommu group 7 Feb 13 00:34:21.559794 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Feb 13 00:34:21.559834 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Feb 13 00:34:21.559877 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Feb 13 00:34:21.559917 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Feb 13 00:34:21.559959 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Feb 13 00:34:21.560001 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Feb 13 00:34:21.560043 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Feb 13 00:34:21.560084 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Feb 13 00:34:21.560124 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Feb 13 00:34:21.560167 kernel: pci 0000:01:00.0: Adding to iommu group 1 Feb 13 00:34:21.560209 kernel: pci 0000:01:00.1: Adding to iommu group 1 Feb 13 00:34:21.560253 kernel: pci 0000:03:00.0: Adding to iommu group 15 Feb 13 00:34:21.560297 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 13 00:34:21.560343 kernel: pci 0000:06:00.0: Adding to iommu group 17 Feb 13 00:34:21.560387 kernel: pci 0000:07:00.0: Adding to iommu group 17 Feb 13 00:34:21.560394 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 13 00:34:21.560423 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 13 00:34:21.560429 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Feb 13 00:34:21.560434 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Feb 13 00:34:21.560439 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 13 00:34:21.560464 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 13 00:34:21.560471 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 13 00:34:21.560519 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 13 00:34:21.560527 kernel: Initialise system trusted keyrings Feb 13 00:34:21.560532 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 13 00:34:21.560537 kernel: Key type asymmetric registered Feb 13 00:34:21.560542 kernel: Asymmetric key parser 'x509' registered Feb 13 00:34:21.560548 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 13 00:34:21.560553 kernel: io scheduler mq-deadline registered Feb 13 00:34:21.560559 kernel: io scheduler kyber registered Feb 13 00:34:21.560564 kernel: io scheduler bfq registered Feb 13 00:34:21.560604 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Feb 13 00:34:21.560646 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Feb 13 00:34:21.560689 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Feb 13 00:34:21.560730 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Feb 13 00:34:21.560772 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Feb 13 00:34:21.560813 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Feb 13 00:34:21.560861 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 13 00:34:21.560869 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 13 00:34:21.560875 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 13 00:34:21.560880 kernel: pstore: Registered erst as persistent store backend Feb 13 00:34:21.560885 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 13 00:34:21.560890 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 13 00:34:21.560896 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 13 00:34:21.560901 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 13 00:34:21.560908 kernel: hpet_acpi_add: no address or irqs in _CRS Feb 13 00:34:21.560949 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 13 00:34:21.560957 kernel: i8042: PNP: No PS/2 controller found. Feb 13 00:34:21.560994 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 13 00:34:21.561032 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 13 00:34:21.561069 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-13T00:34:20 UTC (1707784460) Feb 13 00:34:21.561107 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 13 00:34:21.561115 kernel: fail to initialize ptp_kvm Feb 13 00:34:21.561121 kernel: intel_pstate: Intel P-state driver initializing Feb 13 00:34:21.561126 kernel: intel_pstate: Disabling energy efficiency optimization Feb 13 00:34:21.561132 kernel: intel_pstate: HWP enabled Feb 13 00:34:21.561137 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 13 00:34:21.561142 kernel: vesafb: scrolling: redraw Feb 13 00:34:21.561147 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 13 00:34:21.561152 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x0000000064357c7d, using 768k, total 768k Feb 13 00:34:21.561158 kernel: Console: switching to colour frame buffer device 128x48 Feb 13 00:34:21.561163 kernel: fb0: VESA VGA frame buffer device Feb 13 00:34:21.561169 kernel: NET: Registered PF_INET6 protocol family Feb 13 00:34:21.561174 kernel: Segment Routing with IPv6 Feb 13 00:34:21.561179 kernel: In-situ OAM (IOAM) with IPv6 Feb 13 00:34:21.561184 kernel: NET: Registered PF_PACKET protocol family Feb 13 00:34:21.561189 kernel: Key type dns_resolver registered Feb 13 00:34:21.561194 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 13 00:34:21.561200 kernel: microcode: Microcode Update Driver: v2.2. Feb 13 00:34:21.561205 kernel: IPI shorthand broadcast: enabled Feb 13 00:34:21.561210 kernel: sched_clock: Marking stable (2597596443, 1339456447)->(4493323743, -556270853) Feb 13 00:34:21.561216 kernel: registered taskstats version 1 Feb 13 00:34:21.561222 kernel: Loading compiled-in X.509 certificates Feb 13 00:34:21.561227 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 13 00:34:21.561232 kernel: Key type .fscrypt registered Feb 13 00:34:21.561237 kernel: Key type fscrypt-provisioning registered Feb 13 00:34:21.561242 kernel: pstore: Using crash dump compression: deflate Feb 13 00:34:21.561247 kernel: ima: Allocated hash algorithm: sha1 Feb 13 00:34:21.561252 kernel: ima: No architecture policies found Feb 13 00:34:21.561258 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 13 00:34:21.561264 kernel: Write protecting the kernel read-only data: 28672k Feb 13 00:34:21.561269 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 13 00:34:21.561274 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 13 00:34:21.561279 kernel: Run /init as init process Feb 13 00:34:21.561284 kernel: with arguments: Feb 13 00:34:21.561290 kernel: /init Feb 13 00:34:21.561295 kernel: with environment: Feb 13 00:34:21.561300 kernel: HOME=/ Feb 13 00:34:21.561305 kernel: TERM=linux Feb 13 00:34:21.561310 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 13 00:34:21.561317 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 00:34:21.561323 systemd[1]: Detected architecture x86-64. Feb 13 00:34:21.561329 systemd[1]: Running in initrd. Feb 13 00:34:21.561334 systemd[1]: No hostname configured, using default hostname. Feb 13 00:34:21.561340 systemd[1]: Hostname set to . Feb 13 00:34:21.561345 systemd[1]: Initializing machine ID from random generator. Feb 13 00:34:21.561351 systemd[1]: Queued start job for default target initrd.target. Feb 13 00:34:21.561357 systemd[1]: Started systemd-ask-password-console.path. Feb 13 00:34:21.561362 systemd[1]: Reached target cryptsetup.target. Feb 13 00:34:21.561367 systemd[1]: Reached target paths.target. Feb 13 00:34:21.561373 systemd[1]: Reached target slices.target. Feb 13 00:34:21.561378 systemd[1]: Reached target swap.target. Feb 13 00:34:21.561383 systemd[1]: Reached target timers.target. Feb 13 00:34:21.561388 systemd[1]: Listening on iscsid.socket. Feb 13 00:34:21.561395 systemd[1]: Listening on iscsiuio.socket. Feb 13 00:34:21.561403 systemd[1]: Listening on systemd-journald-audit.socket. Feb 13 00:34:21.561430 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 13 00:34:21.561435 systemd[1]: Listening on systemd-journald.socket. Feb 13 00:34:21.561441 systemd[1]: Listening on systemd-networkd.socket. Feb 13 00:34:21.561466 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 00:34:21.561471 kernel: tsc: Refined TSC clocksource calibration: 3408.047 MHz Feb 13 00:34:21.561477 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x31200094248, max_idle_ns: 440795318142 ns Feb 13 00:34:21.561483 kernel: clocksource: Switched to clocksource tsc Feb 13 00:34:21.561489 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 00:34:21.561494 systemd[1]: Reached target sockets.target. Feb 13 00:34:21.561499 systemd[1]: Starting kmod-static-nodes.service... Feb 13 00:34:21.561505 systemd[1]: Finished network-cleanup.service. Feb 13 00:34:21.561510 systemd[1]: Starting systemd-fsck-usr.service... Feb 13 00:34:21.561516 systemd[1]: Starting systemd-journald.service... Feb 13 00:34:21.561521 systemd[1]: Starting systemd-modules-load.service... Feb 13 00:34:21.561529 systemd-journald[267]: Journal started Feb 13 00:34:21.561554 systemd-journald[267]: Runtime Journal (/run/log/journal/b038a5c50a514d138169f8700e439add) is 8.0M, max 640.1M, 632.1M free. Feb 13 00:34:21.563708 systemd-modules-load[268]: Inserted module 'overlay' Feb 13 00:34:21.593718 kernel: audit: type=1334 audit(1707784461.570:2): prog-id=6 op=LOAD Feb 13 00:34:21.593728 systemd[1]: Starting systemd-resolved.service... Feb 13 00:34:21.570000 audit: BPF prog-id=6 op=LOAD Feb 13 00:34:21.637403 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 13 00:34:21.637420 systemd[1]: Starting systemd-vconsole-setup.service... Feb 13 00:34:21.669435 kernel: Bridge firewalling registered Feb 13 00:34:21.669453 systemd[1]: Started systemd-journald.service. Feb 13 00:34:21.683502 systemd-modules-load[268]: Inserted module 'br_netfilter' Feb 13 00:34:21.732725 kernel: audit: type=1130 audit(1707784461.691:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:21.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:21.689370 systemd-resolved[270]: Positive Trust Anchors: Feb 13 00:34:21.789176 kernel: SCSI subsystem initialized Feb 13 00:34:21.789186 kernel: audit: type=1130 audit(1707784461.744:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:21.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:21.689376 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 00:34:21.910482 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 13 00:34:21.910497 kernel: audit: type=1130 audit(1707784461.815:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:21.910505 kernel: device-mapper: uevent: version 1.0.3 Feb 13 00:34:21.910512 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 13 00:34:21.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:21.689394 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 00:34:21.983629 kernel: audit: type=1130 audit(1707784461.918:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:21.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:21.691015 systemd-resolved[270]: Defaulting to hostname 'linux'. Feb 13 00:34:21.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:21.691600 systemd[1]: Started systemd-resolved.service. Feb 13 00:34:22.092101 kernel: audit: type=1130 audit(1707784461.992:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:22.092112 kernel: audit: type=1130 audit(1707784462.045:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:22.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:21.744573 systemd[1]: Finished kmod-static-nodes.service. Feb 13 00:34:21.815555 systemd[1]: Finished systemd-fsck-usr.service. Feb 13 00:34:21.911432 systemd-modules-load[268]: Inserted module 'dm_multipath' Feb 13 00:34:21.918842 systemd[1]: Finished systemd-modules-load.service. Feb 13 00:34:21.992735 systemd[1]: Finished systemd-vconsole-setup.service. Feb 13 00:34:22.045716 systemd[1]: Reached target nss-lookup.target. Feb 13 00:34:22.100995 systemd[1]: Starting dracut-cmdline-ask.service... Feb 13 00:34:22.107999 systemd[1]: Starting systemd-sysctl.service... Feb 13 00:34:22.121138 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 00:34:22.121805 systemd[1]: Finished systemd-sysctl.service. Feb 13 00:34:22.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:22.123848 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 00:34:22.169401 kernel: audit: type=1130 audit(1707784462.121:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:22.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:22.185747 systemd[1]: Finished dracut-cmdline-ask.service. Feb 13 00:34:22.252496 kernel: audit: type=1130 audit(1707784462.185:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:22.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:22.245067 systemd[1]: Starting dracut-cmdline.service... Feb 13 00:34:22.266507 dracut-cmdline[292]: dracut-dracut-053 Feb 13 00:34:22.266507 dracut-cmdline[292]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 13 00:34:22.266507 dracut-cmdline[292]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 00:34:22.334490 kernel: Loading iSCSI transport class v2.0-870. Feb 13 00:34:22.334503 kernel: iscsi: registered transport (tcp) Feb 13 00:34:22.387864 kernel: iscsi: registered transport (qla4xxx) Feb 13 00:34:22.387882 kernel: QLogic iSCSI HBA Driver Feb 13 00:34:22.404113 systemd[1]: Finished dracut-cmdline.service. Feb 13 00:34:22.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:22.413102 systemd[1]: Starting dracut-pre-udev.service... Feb 13 00:34:22.468482 kernel: raid6: avx2x4 gen() 48084 MB/s Feb 13 00:34:22.503481 kernel: raid6: avx2x4 xor() 14804 MB/s Feb 13 00:34:22.538438 kernel: raid6: avx2x2 gen() 51897 MB/s Feb 13 00:34:22.573477 kernel: raid6: avx2x2 xor() 32094 MB/s Feb 13 00:34:22.608476 kernel: raid6: avx2x1 gen() 44513 MB/s Feb 13 00:34:22.643480 kernel: raid6: avx2x1 xor() 27944 MB/s Feb 13 00:34:22.678432 kernel: raid6: sse2x4 gen() 21355 MB/s Feb 13 00:34:22.712402 kernel: raid6: sse2x4 xor() 11894 MB/s Feb 13 00:34:22.746477 kernel: raid6: sse2x2 gen() 21684 MB/s Feb 13 00:34:22.780439 kernel: raid6: sse2x2 xor() 13442 MB/s Feb 13 00:34:22.814480 kernel: raid6: sse2x1 gen() 18303 MB/s Feb 13 00:34:22.866393 kernel: raid6: sse2x1 xor() 8926 MB/s Feb 13 00:34:22.866410 kernel: raid6: using algorithm avx2x2 gen() 51897 MB/s Feb 13 00:34:22.866418 kernel: raid6: .... xor() 32094 MB/s, rmw enabled Feb 13 00:34:22.884650 kernel: raid6: using avx2x2 recovery algorithm Feb 13 00:34:22.930402 kernel: xor: automatically using best checksumming function avx Feb 13 00:34:23.009449 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 13 00:34:23.014488 systemd[1]: Finished dracut-pre-udev.service. Feb 13 00:34:23.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:23.014000 audit: BPF prog-id=7 op=LOAD Feb 13 00:34:23.014000 audit: BPF prog-id=8 op=LOAD Feb 13 00:34:23.015146 systemd[1]: Starting systemd-udevd.service... Feb 13 00:34:23.023283 systemd-udevd[474]: Using default interface naming scheme 'v252'. Feb 13 00:34:23.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:23.036756 systemd[1]: Started systemd-udevd.service. Feb 13 00:34:23.078553 dracut-pre-trigger[486]: rd.md=0: removing MD RAID activation Feb 13 00:34:23.053286 systemd[1]: Starting dracut-pre-trigger.service... Feb 13 00:34:23.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:23.082842 systemd[1]: Finished dracut-pre-trigger.service. Feb 13 00:34:23.096592 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 00:34:23.146221 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 00:34:23.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:23.173417 kernel: cryptd: max_cpu_qlen set to 1000 Feb 13 00:34:23.176407 kernel: libata version 3.00 loaded. Feb 13 00:34:23.217447 kernel: AVX2 version of gcm_enc/dec engaged. Feb 13 00:34:23.217508 kernel: AES CTR mode by8 optimization enabled Feb 13 00:34:23.218404 kernel: ahci 0000:00:17.0: version 3.0 Feb 13 00:34:23.218510 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 13 00:34:23.218521 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Feb 13 00:34:23.235771 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 13 00:34:23.275442 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 13 00:34:23.313406 kernel: pps pps0: new PPS source ptp0 Feb 13 00:34:23.313509 kernel: scsi host0: ahci Feb 13 00:34:23.313536 kernel: igb 0000:03:00.0: added PHC on eth0 Feb 13 00:34:23.315405 kernel: ACPI: bus type USB registered Feb 13 00:34:23.315425 kernel: usbcore: registered new interface driver usbfs Feb 13 00:34:23.315434 kernel: usbcore: registered new interface driver hub Feb 13 00:34:23.315442 kernel: usbcore: registered new device driver usb Feb 13 00:34:23.328402 kernel: scsi host1: ahci Feb 13 00:34:23.359571 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 00:34:23.376221 kernel: scsi host2: ahci Feb 13 00:34:23.376247 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 00:25:90:bb:81:6a Feb 13 00:34:23.392343 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Feb 13 00:34:23.408407 kernel: scsi host3: ahci Feb 13 00:34:23.408467 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 00:34:23.468507 kernel: pps pps1: new PPS source ptp1 Feb 13 00:34:23.468760 kernel: scsi host4: ahci Feb 13 00:34:23.468790 kernel: igb 0000:04:00.0: added PHC on eth1 Feb 13 00:34:23.512489 kernel: scsi host5: ahci Feb 13 00:34:23.512687 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 00:34:23.512775 kernel: scsi host6: ahci Feb 13 00:34:23.525415 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 00:25:90:bb:81:6b Feb 13 00:34:23.525702 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Feb 13 00:34:23.549510 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Feb 13 00:34:23.549559 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 00:34:23.658169 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Feb 13 00:34:23.658197 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Feb 13 00:34:23.689349 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Feb 13 00:34:23.689379 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Feb 13 00:34:23.720433 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Feb 13 00:34:23.720451 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Feb 13 00:34:23.770184 kernel: mlx5_core 0000:01:00.0: firmware version: 14.31.1014 Feb 13 00:34:23.770258 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 00:34:24.061430 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 13 00:34:24.061448 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Feb 13 00:34:24.061513 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 13 00:34:24.123881 kernel: port_module: 8 callbacks suppressed Feb 13 00:34:24.123901 kernel: mlx5_core 0000:01:00.0: Port module event: module 0, Cable plugged Feb 13 00:34:24.123964 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 13 00:34:24.139446 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 00:34:24.139530 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 13 00:34:24.172445 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 13 00:34:24.187450 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 00:34:24.202425 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 00:34:24.218432 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Feb 13 00:34:24.234433 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Feb 13 00:34:24.282367 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 00:34:24.282383 kernel: ata1.00: Features: NCQ-prio Feb 13 00:34:24.282390 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 00:34:24.310557 kernel: ata2.00: Features: NCQ-prio Feb 13 00:34:24.329436 kernel: ata1.00: configured for UDMA/133 Feb 13 00:34:24.329475 kernel: ata2.00: configured for UDMA/133 Feb 13 00:34:24.329482 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Feb 13 00:34:24.375454 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Feb 13 00:34:24.391402 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Feb 13 00:34:24.391500 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 00:34:24.441987 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 00:34:24.442128 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 13 00:34:24.476008 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 13 00:34:24.476087 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 00:34:24.476149 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 13 00:34:24.508849 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 13 00:34:24.521773 kernel: hub 1-0:1.0: USB hub found Feb 13 00:34:24.521864 kernel: hub 1-0:1.0: 16 ports detected Feb 13 00:34:24.535438 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 00:34:24.548986 kernel: hub 2-0:1.0: USB hub found Feb 13 00:34:24.549078 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 00:34:24.549087 kernel: sd 1:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 00:34:24.549152 kernel: sd 0:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 00:34:24.549212 kernel: sd 0:0:0:0: [sdb] 4096-byte physical blocks Feb 13 00:34:24.549264 kernel: sd 0:0:0:0: [sdb] Write Protect is off Feb 13 00:34:24.549316 kernel: sd 0:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 13 00:34:24.549368 kernel: sd 0:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 00:34:24.549425 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 00:34:24.551412 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Feb 13 00:34:24.552439 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 13 00:34:24.552456 kernel: GPT:9289727 != 937703087 Feb 13 00:34:24.552463 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 13 00:34:24.552470 kernel: GPT:9289727 != 937703087 Feb 13 00:34:24.552476 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 13 00:34:24.552482 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 00:34:24.552489 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 00:34:24.552495 kernel: sd 0:0:0:0: [sdb] Attached SCSI disk Feb 13 00:34:24.575371 kernel: hub 2-0:1.0: 10 ports detected Feb 13 00:34:24.575449 kernel: sd 1:0:0:0: [sda] 4096-byte physical blocks Feb 13 00:34:24.608273 kernel: usb: port power management may be unreliable Feb 13 00:34:24.608289 kernel: sd 1:0:0:0: [sda] Write Protect is off Feb 13 00:34:24.793664 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 13 00:34:24.793691 kernel: sd 1:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 13 00:34:24.880286 kernel: sd 1:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 00:34:24.893924 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 00:34:24.893941 kernel: mlx5_core 0000:01:00.1: firmware version: 14.31.1014 Feb 13 00:34:24.921404 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 00:34:24.921419 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 00:34:24.921515 kernel: hub 1-14:1.0: USB hub found Feb 13 00:34:24.921610 kernel: hub 1-14:1.0: 4 ports detected Feb 13 00:34:24.941460 kernel: sd 1:0:0:0: [sda] Attached SCSI disk Feb 13 00:34:25.006990 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 13 00:34:25.025479 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 13 00:34:25.057436 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (559) Feb 13 00:34:25.051596 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 13 00:34:25.075144 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 13 00:34:25.087182 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 00:34:25.110898 systemd[1]: Starting disk-uuid.service... Feb 13 00:34:25.141513 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 00:34:25.141525 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 00:34:25.141577 disk-uuid[679]: Primary Header is updated. Feb 13 00:34:25.141577 disk-uuid[679]: Secondary Entries is updated. Feb 13 00:34:25.141577 disk-uuid[679]: Secondary Header is updated. Feb 13 00:34:25.191527 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 00:34:25.191537 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 00:34:25.191544 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 00:34:25.213437 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 00:34:25.213451 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 13 00:34:25.260419 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Feb 13 00:34:25.281630 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Feb 13 00:34:25.323454 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 00:34:25.351405 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 13 00:34:25.382976 kernel: usbcore: registered new interface driver usbhid Feb 13 00:34:25.383000 kernel: usbhid: USB HID core driver Feb 13 00:34:25.416471 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 13 00:34:25.534500 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 13 00:34:25.534642 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 13 00:34:25.534651 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 13 00:34:25.569669 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 00:34:25.622463 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Feb 13 00:34:25.650583 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Feb 13 00:34:26.198296 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 00:34:26.217875 disk-uuid[680]: The operation has completed successfully. Feb 13 00:34:26.226537 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 00:34:26.254523 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 13 00:34:26.353875 kernel: audit: type=1130 audit(1707784466.262:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:26.353904 kernel: audit: type=1131 audit(1707784466.262:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:26.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:26.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:26.254568 systemd[1]: Finished disk-uuid.service. Feb 13 00:34:26.384495 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 13 00:34:26.268075 systemd[1]: Starting verity-setup.service... Feb 13 00:34:26.415822 systemd[1]: Found device dev-mapper-usr.device. Feb 13 00:34:26.425564 systemd[1]: Mounting sysusr-usr.mount... Feb 13 00:34:26.438700 systemd[1]: Finished verity-setup.service. Feb 13 00:34:26.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:26.502403 kernel: audit: type=1130 audit(1707784466.453:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:26.559402 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 13 00:34:26.559556 systemd[1]: Mounted sysusr-usr.mount. Feb 13 00:34:26.566679 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 13 00:34:26.567062 systemd[1]: Starting ignition-setup.service... Feb 13 00:34:26.671263 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 13 00:34:26.671288 kernel: BTRFS info (device sdb6): using free space tree Feb 13 00:34:26.671296 kernel: BTRFS info (device sdb6): has skinny extents Feb 13 00:34:26.671303 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 13 00:34:26.598874 systemd[1]: Starting parse-ip-for-networkd.service... Feb 13 00:34:26.679849 systemd[1]: Finished ignition-setup.service. Feb 13 00:34:26.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:26.696739 systemd[1]: Finished parse-ip-for-networkd.service. Feb 13 00:34:26.804695 kernel: audit: type=1130 audit(1707784466.696:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:26.804713 kernel: audit: type=1130 audit(1707784466.754:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:26.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:26.755064 systemd[1]: Starting ignition-fetch-offline.service... Feb 13 00:34:26.835495 kernel: audit: type=1334 audit(1707784466.812:24): prog-id=9 op=LOAD Feb 13 00:34:26.812000 audit: BPF prog-id=9 op=LOAD Feb 13 00:34:26.813323 systemd[1]: Starting systemd-networkd.service... Feb 13 00:34:26.849289 systemd-networkd[879]: lo: Link UP Feb 13 00:34:26.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:26.880377 ignition[867]: Ignition 2.14.0 Feb 13 00:34:26.924686 kernel: audit: type=1130 audit(1707784466.859:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:26.849292 systemd-networkd[879]: lo: Gained carrier Feb 13 00:34:26.880381 ignition[867]: Stage: fetch-offline Feb 13 00:34:26.849577 systemd-networkd[879]: Enumeration completed Feb 13 00:34:26.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:26.880416 ignition[867]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 00:34:27.024492 kernel: audit: type=1130 audit(1707784466.954:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:27.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:26.849619 systemd[1]: Started systemd-networkd.service. Feb 13 00:34:26.880430 ignition[867]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 00:34:26.850322 systemd-networkd[879]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 00:34:26.883185 ignition[867]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 00:34:27.091158 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 00:34:27.091239 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Feb 13 00:34:27.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:26.859478 systemd[1]: Reached target network.target. Feb 13 00:34:26.883247 ignition[867]: parsed url from cmdline: "" Feb 13 00:34:27.114523 iscsid[900]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 13 00:34:27.114523 iscsid[900]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 13 00:34:27.114523 iscsid[900]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 13 00:34:27.114523 iscsid[900]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 13 00:34:27.114523 iscsid[900]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 13 00:34:27.114523 iscsid[900]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 13 00:34:27.114523 iscsid[900]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 13 00:34:27.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:26.893109 unknown[867]: fetched base config from "system" Feb 13 00:34:27.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:26.883249 ignition[867]: no config URL provided Feb 13 00:34:26.893113 unknown[867]: fetched user config from "system" Feb 13 00:34:26.883252 ignition[867]: reading system config file "/usr/lib/ignition/user.ign" Feb 13 00:34:26.919085 systemd[1]: Starting iscsiuio.service... Feb 13 00:34:26.883262 ignition[867]: parsing config with SHA512: 00a5bda4d9e249bdb01d3a18bd005e5b538971cae6a3785c6ac22372c904516214885fcaf40304bf7df8584df5e354388a261972bb5d86b7cae7451983e7d776 Feb 13 00:34:26.931691 systemd[1]: Started iscsiuio.service. Feb 13 00:34:26.893261 ignition[867]: fetch-offline: fetch-offline passed Feb 13 00:34:26.954663 systemd[1]: Finished ignition-fetch-offline.service. Feb 13 00:34:26.893263 ignition[867]: POST message to Packet Timeline Feb 13 00:34:27.014653 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 13 00:34:26.893267 ignition[867]: POST Status error: resource requires networking Feb 13 00:34:27.015104 systemd[1]: Starting ignition-kargs.service... Feb 13 00:34:26.893297 ignition[867]: Ignition finished successfully Feb 13 00:34:27.031926 systemd[1]: Starting iscsid.service... Feb 13 00:34:27.401527 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 13 00:34:27.019769 ignition[890]: Ignition 2.14.0 Feb 13 00:34:27.038680 systemd[1]: Started iscsid.service. Feb 13 00:34:27.019773 ignition[890]: Stage: kargs Feb 13 00:34:27.070574 systemd-networkd[879]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 00:34:27.019830 ignition[890]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 00:34:27.080927 systemd[1]: Starting dracut-initqueue.service... Feb 13 00:34:27.019838 ignition[890]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 00:34:27.106707 systemd[1]: Finished dracut-initqueue.service. Feb 13 00:34:27.021123 ignition[890]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 00:34:27.122676 systemd[1]: Reached target remote-fs-pre.target. Feb 13 00:34:27.022194 ignition[890]: kargs: kargs passed Feb 13 00:34:27.166541 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 00:34:27.022197 ignition[890]: POST message to Packet Timeline Feb 13 00:34:27.202469 systemd[1]: Reached target remote-fs.target. Feb 13 00:34:27.022208 ignition[890]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 00:34:27.202986 systemd[1]: Starting dracut-pre-mount.service... Feb 13 00:34:27.026286 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:35529->[::1]:53: read: connection refused Feb 13 00:34:27.235685 systemd[1]: Finished dracut-pre-mount.service. Feb 13 00:34:27.226513 ignition[890]: GET https://metadata.packet.net/metadata: attempt #2 Feb 13 00:34:27.396372 systemd-networkd[879]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 00:34:27.226791 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:55405->[::1]:53: read: connection refused Feb 13 00:34:27.424601 systemd-networkd[879]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 00:34:27.454802 systemd-networkd[879]: enp1s0f1np1: Link UP Feb 13 00:34:27.455013 systemd-networkd[879]: enp1s0f1np1: Gained carrier Feb 13 00:34:27.468823 systemd-networkd[879]: enp1s0f0np0: Link UP Feb 13 00:34:27.469095 systemd-networkd[879]: eno2: Link UP Feb 13 00:34:27.469358 systemd-networkd[879]: eno1: Link UP Feb 13 00:34:27.627185 ignition[890]: GET https://metadata.packet.net/metadata: attempt #3 Feb 13 00:34:27.628296 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:42891->[::1]:53: read: connection refused Feb 13 00:34:28.153152 systemd-networkd[879]: enp1s0f0np0: Gained carrier Feb 13 00:34:28.161618 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Feb 13 00:34:28.194555 systemd-networkd[879]: enp1s0f0np0: DHCPv4 address 139.178.94.233/31, gateway 139.178.94.232 acquired from 145.40.83.140 Feb 13 00:34:28.428877 ignition[890]: GET https://metadata.packet.net/metadata: attempt #4 Feb 13 00:34:28.430252 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:50788->[::1]:53: read: connection refused Feb 13 00:34:28.705972 systemd-networkd[879]: enp1s0f1np1: Gained IPv6LL Feb 13 00:34:29.601797 systemd-networkd[879]: enp1s0f0np0: Gained IPv6LL Feb 13 00:34:30.031780 ignition[890]: GET https://metadata.packet.net/metadata: attempt #5 Feb 13 00:34:30.033016 ignition[890]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:49299->[::1]:53: read: connection refused Feb 13 00:34:33.236420 ignition[890]: GET https://metadata.packet.net/metadata: attempt #6 Feb 13 00:34:33.275749 ignition[890]: GET result: OK Feb 13 00:34:33.463080 ignition[890]: Ignition finished successfully Feb 13 00:34:33.467667 systemd[1]: Finished ignition-kargs.service. Feb 13 00:34:33.553878 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 13 00:34:33.553900 kernel: audit: type=1130 audit(1707784473.478:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:33.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:33.487570 ignition[916]: Ignition 2.14.0 Feb 13 00:34:33.480708 systemd[1]: Starting ignition-disks.service... Feb 13 00:34:33.487573 ignition[916]: Stage: disks Feb 13 00:34:33.487649 ignition[916]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 00:34:33.487658 ignition[916]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 00:34:33.489970 ignition[916]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 00:34:33.490389 ignition[916]: disks: disks passed Feb 13 00:34:33.490391 ignition[916]: POST message to Packet Timeline Feb 13 00:34:33.490407 ignition[916]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 00:34:33.513019 ignition[916]: GET result: OK Feb 13 00:34:33.699628 ignition[916]: Ignition finished successfully Feb 13 00:34:33.702511 systemd[1]: Finished ignition-disks.service. Feb 13 00:34:33.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:33.714953 systemd[1]: Reached target initrd-root-device.target. Feb 13 00:34:33.801665 kernel: audit: type=1130 audit(1707784473.714:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:33.778616 systemd[1]: Reached target local-fs-pre.target. Feb 13 00:34:33.787613 systemd[1]: Reached target local-fs.target. Feb 13 00:34:33.787647 systemd[1]: Reached target sysinit.target. Feb 13 00:34:33.810634 systemd[1]: Reached target basic.target. Feb 13 00:34:33.818199 systemd[1]: Starting systemd-fsck-root.service... Feb 13 00:34:33.842302 systemd-fsck[932]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 13 00:34:33.862174 systemd[1]: Finished systemd-fsck-root.service. Feb 13 00:34:33.953185 kernel: audit: type=1130 audit(1707784473.870:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:33.953202 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 13 00:34:33.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:33.870984 systemd[1]: Mounting sysroot.mount... Feb 13 00:34:33.961037 systemd[1]: Mounted sysroot.mount. Feb 13 00:34:33.974680 systemd[1]: Reached target initrd-root-fs.target. Feb 13 00:34:33.991438 systemd[1]: Mounting sysroot-usr.mount... Feb 13 00:34:34.000306 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 13 00:34:34.018994 systemd[1]: Starting flatcar-static-network.service... Feb 13 00:34:34.034555 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 13 00:34:34.034597 systemd[1]: Reached target ignition-diskful.target. Feb 13 00:34:34.053737 systemd[1]: Mounted sysroot-usr.mount. Feb 13 00:34:34.076900 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 00:34:34.132479 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (945) Feb 13 00:34:34.089317 systemd[1]: Starting initrd-setup-root.service... Feb 13 00:34:34.226607 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 13 00:34:34.226630 kernel: BTRFS info (device sdb6): using free space tree Feb 13 00:34:34.226639 kernel: BTRFS info (device sdb6): has skinny extents Feb 13 00:34:34.226646 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 13 00:34:34.157626 systemd[1]: Finished initrd-setup-root.service. Feb 13 00:34:34.288985 kernel: audit: type=1130 audit(1707784474.235:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:34.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:34.289022 coreos-metadata[940]: Feb 13 00:34:34.162 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 00:34:34.289022 coreos-metadata[940]: Feb 13 00:34:34.184 INFO Fetch successful Feb 13 00:34:34.471661 kernel: audit: type=1130 audit(1707784474.298:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:34.471674 kernel: audit: type=1130 audit(1707784474.361:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:34.471682 kernel: audit: type=1131 audit(1707784474.361:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:34.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:34.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:34.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:34.471742 coreos-metadata[939]: Feb 13 00:34:34.162 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 00:34:34.471742 coreos-metadata[939]: Feb 13 00:34:34.184 INFO Fetch successful Feb 13 00:34:34.471742 coreos-metadata[939]: Feb 13 00:34:34.201 INFO wrote hostname ci-3510.3.2-a-a91f18e84b to /sysroot/etc/hostname Feb 13 00:34:34.520619 initrd-setup-root[950]: cut: /sysroot/etc/passwd: No such file or directory Feb 13 00:34:34.236739 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 13 00:34:34.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:34.572612 initrd-setup-root[958]: cut: /sysroot/etc/group: No such file or directory Feb 13 00:34:34.610622 kernel: audit: type=1130 audit(1707784474.544:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:34.298703 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 13 00:34:34.620657 initrd-setup-root[966]: cut: /sysroot/etc/shadow: No such file or directory Feb 13 00:34:34.298741 systemd[1]: Finished flatcar-static-network.service. Feb 13 00:34:34.639737 initrd-setup-root[974]: cut: /sysroot/etc/gshadow: No such file or directory Feb 13 00:34:34.361683 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 00:34:34.657625 ignition[1014]: INFO : Ignition 2.14.0 Feb 13 00:34:34.657625 ignition[1014]: INFO : Stage: mount Feb 13 00:34:34.657625 ignition[1014]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 00:34:34.657625 ignition[1014]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 00:34:34.657625 ignition[1014]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 00:34:34.657625 ignition[1014]: INFO : mount: mount passed Feb 13 00:34:34.657625 ignition[1014]: INFO : POST message to Packet Timeline Feb 13 00:34:34.657625 ignition[1014]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 00:34:34.657625 ignition[1014]: INFO : GET result: OK Feb 13 00:34:34.481014 systemd[1]: Starting ignition-mount.service... Feb 13 00:34:34.507958 systemd[1]: Starting sysroot-boot.service... Feb 13 00:34:34.527836 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 13 00:34:34.527882 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 13 00:34:34.531480 systemd[1]: Finished sysroot-boot.service. Feb 13 00:34:34.813150 ignition[1014]: INFO : Ignition finished successfully Feb 13 00:34:34.815691 systemd[1]: Finished ignition-mount.service. Feb 13 00:34:34.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:34.831609 systemd[1]: Starting ignition-files.service... Feb 13 00:34:34.911586 kernel: audit: type=1130 audit(1707784474.829:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:34.906442 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 00:34:34.959495 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sdb6 scanned by mount (1029) Feb 13 00:34:34.959506 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 13 00:34:34.991491 kernel: BTRFS info (device sdb6): using free space tree Feb 13 00:34:34.991521 kernel: BTRFS info (device sdb6): has skinny extents Feb 13 00:34:35.040453 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 13 00:34:35.041903 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 00:34:35.059559 ignition[1048]: INFO : Ignition 2.14.0 Feb 13 00:34:35.059559 ignition[1048]: INFO : Stage: files Feb 13 00:34:35.059559 ignition[1048]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 00:34:35.059559 ignition[1048]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 00:34:35.059559 ignition[1048]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 00:34:35.059559 ignition[1048]: DEBUG : files: compiled without relabeling support, skipping Feb 13 00:34:35.059559 ignition[1048]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 13 00:34:35.059559 ignition[1048]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 13 00:34:35.178704 kernel: BTRFS info: devid 1 device path /dev/sdb6 changed to /dev/disk/by-label/OEM scanned by ignition (1050) Feb 13 00:34:35.061564 unknown[1048]: wrote ssh authorized keys file for user: core Feb 13 00:34:35.187668 ignition[1048]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 13 00:34:35.187668 ignition[1048]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 13 00:34:35.187668 ignition[1048]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 13 00:34:35.187668 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 00:34:35.187668 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 00:34:35.187668 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 00:34:35.187668 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(4): oem config not found in "/usr/share/oem", looking on oem partition Feb 13 00:34:35.187668 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2625765042" Feb 13 00:34:35.187668 ignition[1048]: CRITICAL : files: createFilesystemsFiles: createFiles: op(4): op(5): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2625765042": device or resource busy Feb 13 00:34:35.187668 ignition[1048]: ERROR : files: createFilesystemsFiles: createFiles: op(4): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2625765042", trying btrfs: device or resource busy Feb 13 00:34:35.187668 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2625765042" Feb 13 00:34:35.187668 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2625765042" Feb 13 00:34:35.187668 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [started] unmounting "/mnt/oem2625765042" Feb 13 00:34:35.187668 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [finished] unmounting "/mnt/oem2625765042" Feb 13 00:34:35.187668 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 00:34:35.187668 ignition[1048]: INFO : files: op(8): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 13 00:34:35.187668 ignition[1048]: INFO : files: op(8): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 13 00:34:35.456744 ignition[1048]: INFO : files: op(9): [started] processing unit "packet-phone-home.service" Feb 13 00:34:35.456744 ignition[1048]: INFO : files: op(9): [finished] processing unit "packet-phone-home.service" Feb 13 00:34:35.456744 ignition[1048]: INFO : files: op(a): [started] processing unit "etcd-member.service" Feb 13 00:34:35.456744 ignition[1048]: INFO : files: op(a): op(b): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 13 00:34:35.456744 ignition[1048]: INFO : files: op(a): op(b): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 13 00:34:35.456744 ignition[1048]: INFO : files: op(a): [finished] processing unit "etcd-member.service" Feb 13 00:34:35.456744 ignition[1048]: INFO : files: op(c): [started] setting preset to enabled for "etcd-member.service" Feb 13 00:34:35.456744 ignition[1048]: INFO : files: op(c): [finished] setting preset to enabled for "etcd-member.service" Feb 13 00:34:35.456744 ignition[1048]: INFO : files: op(d): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 00:34:35.456744 ignition[1048]: INFO : files: op(d): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 00:34:35.456744 ignition[1048]: INFO : files: op(e): [started] setting preset to enabled for "packet-phone-home.service" Feb 13 00:34:35.456744 ignition[1048]: INFO : files: op(e): [finished] setting preset to enabled for "packet-phone-home.service" Feb 13 00:34:35.456744 ignition[1048]: INFO : files: createResultFile: createFiles: op(f): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 13 00:34:35.456744 ignition[1048]: INFO : files: createResultFile: createFiles: op(f): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 13 00:34:35.456744 ignition[1048]: INFO : files: files passed Feb 13 00:34:35.456744 ignition[1048]: INFO : POST message to Packet Timeline Feb 13 00:34:35.456744 ignition[1048]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 00:34:35.456744 ignition[1048]: INFO : GET result: OK Feb 13 00:34:35.758652 kernel: audit: type=1130 audit(1707784475.667:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:35.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:35.651894 systemd[1]: Finished ignition-files.service. Feb 13 00:34:35.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:35.779670 ignition[1048]: INFO : Ignition finished successfully Feb 13 00:34:35.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:35.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:35.674515 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 13 00:34:35.813644 initrd-setup-root-after-ignition[1077]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 13 00:34:35.733670 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 13 00:34:35.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:35.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:35.734051 systemd[1]: Starting ignition-quench.service... Feb 13 00:34:35.742853 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 13 00:34:35.772872 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 13 00:34:35.772928 systemd[1]: Finished ignition-quench.service. Feb 13 00:34:35.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:35.787730 systemd[1]: Reached target ignition-complete.target. Feb 13 00:34:35.804477 systemd[1]: Starting initrd-parse-etc.service... Feb 13 00:34:35.826852 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 13 00:34:35.826910 systemd[1]: Finished initrd-parse-etc.service. Feb 13 00:34:35.842690 systemd[1]: Reached target initrd-fs.target. Feb 13 00:34:35.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:35.867632 systemd[1]: Reached target initrd.target. Feb 13 00:34:35.880785 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 13 00:34:35.882750 systemd[1]: Starting dracut-pre-pivot.service... Feb 13 00:34:35.896752 systemd[1]: Finished dracut-pre-pivot.service. Feb 13 00:34:35.915058 systemd[1]: Starting initrd-cleanup.service... Feb 13 00:34:35.934139 systemd[1]: Stopped target nss-lookup.target. Feb 13 00:34:35.944642 systemd[1]: Stopped target remote-cryptsetup.target. Feb 13 00:34:35.960730 systemd[1]: Stopped target timers.target. Feb 13 00:34:35.975763 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 13 00:34:35.975914 systemd[1]: Stopped dracut-pre-pivot.service. Feb 13 00:34:35.990987 systemd[1]: Stopped target initrd.target. Feb 13 00:34:36.004994 systemd[1]: Stopped target basic.target. Feb 13 00:34:36.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.018996 systemd[1]: Stopped target ignition-complete.target. Feb 13 00:34:36.038982 systemd[1]: Stopped target ignition-diskful.target. Feb 13 00:34:36.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.055974 systemd[1]: Stopped target initrd-root-device.target. Feb 13 00:34:36.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.070988 systemd[1]: Stopped target remote-fs.target. Feb 13 00:34:36.086108 systemd[1]: Stopped target remote-fs-pre.target. Feb 13 00:34:36.101015 systemd[1]: Stopped target sysinit.target. Feb 13 00:34:36.118010 systemd[1]: Stopped target local-fs.target. Feb 13 00:34:36.133102 systemd[1]: Stopped target local-fs-pre.target. Feb 13 00:34:36.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.149980 systemd[1]: Stopped target swap.target. Feb 13 00:34:36.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.163875 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 13 00:34:36.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.164231 systemd[1]: Stopped dracut-pre-mount.service. Feb 13 00:34:36.359679 ignition[1092]: INFO : Ignition 2.14.0 Feb 13 00:34:36.359679 ignition[1092]: INFO : Stage: umount Feb 13 00:34:36.359679 ignition[1092]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 00:34:36.359679 ignition[1092]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 00:34:36.359679 ignition[1092]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 00:34:36.359679 ignition[1092]: INFO : umount: umount passed Feb 13 00:34:36.359679 ignition[1092]: INFO : POST message to Packet Timeline Feb 13 00:34:36.359679 ignition[1092]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 00:34:36.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.180206 systemd[1]: Stopped target cryptsetup.target. Feb 13 00:34:36.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.494798 iscsid[900]: iscsid shutting down. Feb 13 00:34:36.508683 ignition[1092]: INFO : GET result: OK Feb 13 00:34:36.194805 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 13 00:34:36.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.195144 systemd[1]: Stopped dracut-initqueue.service. Feb 13 00:34:36.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.211093 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 13 00:34:36.211458 systemd[1]: Stopped ignition-fetch-offline.service. Feb 13 00:34:36.227087 systemd[1]: Stopped target paths.target. Feb 13 00:34:36.241787 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 13 00:34:36.617658 ignition[1092]: INFO : Ignition finished successfully Feb 13 00:34:36.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.246620 systemd[1]: Stopped systemd-ask-password-console.path. Feb 13 00:34:36.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.258004 systemd[1]: Stopped target slices.target. Feb 13 00:34:36.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.657000 audit: BPF prog-id=6 op=UNLOAD Feb 13 00:34:36.272984 systemd[1]: Stopped target sockets.target. Feb 13 00:34:36.287997 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 13 00:34:36.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.288374 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 13 00:34:36.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.305093 systemd[1]: ignition-files.service: Deactivated successfully. Feb 13 00:34:36.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.305449 systemd[1]: Stopped ignition-files.service. Feb 13 00:34:36.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.320059 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 13 00:34:36.320425 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 13 00:34:36.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.339154 systemd[1]: Stopping ignition-mount.service... Feb 13 00:34:36.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.351705 systemd[1]: Stopping iscsid.service... Feb 13 00:34:36.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.366617 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 13 00:34:36.366693 systemd[1]: Stopped kmod-static-nodes.service. Feb 13 00:34:36.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.386315 systemd[1]: Stopping sysroot-boot.service... Feb 13 00:34:36.396568 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 13 00:34:36.396703 systemd[1]: Stopped systemd-udev-trigger.service. Feb 13 00:34:36.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.429047 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 13 00:34:36.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.429368 systemd[1]: Stopped dracut-pre-trigger.service. Feb 13 00:34:36.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.455711 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 13 00:34:36.457329 systemd[1]: iscsid.service: Deactivated successfully. Feb 13 00:34:36.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.457579 systemd[1]: Stopped iscsid.service. Feb 13 00:34:36.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.471769 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 13 00:34:36.471978 systemd[1]: Stopped sysroot-boot.service. Feb 13 00:34:36.488747 systemd[1]: iscsid.socket: Deactivated successfully. Feb 13 00:34:36.488995 systemd[1]: Closed iscsid.socket. Feb 13 00:34:36.502009 systemd[1]: Stopping iscsiuio.service... Feb 13 00:34:36.516181 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 13 00:34:36.516426 systemd[1]: Stopped iscsiuio.service. Feb 13 00:34:36.530272 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 13 00:34:36.530501 systemd[1]: Finished initrd-cleanup.service. Feb 13 00:34:36.547717 systemd[1]: Stopped target network.target. Feb 13 00:34:36.560774 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 13 00:34:36.560874 systemd[1]: Closed iscsiuio.socket. Feb 13 00:34:36.578011 systemd[1]: Stopping systemd-networkd.service... Feb 13 00:34:36.584553 systemd-networkd[879]: enp1s0f1np1: DHCPv6 lease lost Feb 13 00:34:36.592924 systemd[1]: Stopping systemd-resolved.service... Feb 13 00:34:36.595592 systemd-networkd[879]: enp1s0f0np0: DHCPv6 lease lost Feb 13 00:34:37.092000 audit: BPF prog-id=9 op=UNLOAD Feb 13 00:34:36.608275 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 13 00:34:36.608536 systemd[1]: Stopped systemd-resolved.service. Feb 13 00:34:36.627019 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 13 00:34:36.627386 systemd[1]: Stopped systemd-networkd.service. Feb 13 00:34:36.642283 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 13 00:34:36.642519 systemd[1]: Stopped ignition-mount.service. Feb 13 00:34:36.658020 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 13 00:34:37.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:36.658103 systemd[1]: Closed systemd-networkd.socket. Feb 13 00:34:36.672658 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 13 00:34:36.672790 systemd[1]: Stopped ignition-disks.service. Feb 13 00:34:36.687715 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 13 00:34:36.687825 systemd[1]: Stopped ignition-kargs.service. Feb 13 00:34:36.705930 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 13 00:34:36.706081 systemd[1]: Stopped ignition-setup.service. Feb 13 00:34:36.722804 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 13 00:34:36.722945 systemd[1]: Stopped initrd-setup-root.service. Feb 13 00:34:36.740508 systemd[1]: Stopping network-cleanup.service... Feb 13 00:34:36.753615 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 13 00:34:36.753755 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 13 00:34:36.771864 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 13 00:34:36.772010 systemd[1]: Stopped systemd-sysctl.service. Feb 13 00:34:36.788139 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 13 00:34:36.788278 systemd[1]: Stopped systemd-modules-load.service. Feb 13 00:34:37.242409 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Feb 13 00:34:36.804034 systemd[1]: Stopping systemd-udevd.service... Feb 13 00:34:36.821393 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 13 00:34:36.822878 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 13 00:34:36.823193 systemd[1]: Stopped systemd-udevd.service. Feb 13 00:34:36.838322 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 13 00:34:36.838468 systemd[1]: Closed systemd-udevd-control.socket. Feb 13 00:34:36.850760 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 13 00:34:36.850852 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 13 00:34:36.865663 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 13 00:34:36.865822 systemd[1]: Stopped dracut-pre-udev.service. Feb 13 00:34:36.883913 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 13 00:34:36.884064 systemd[1]: Stopped dracut-cmdline.service. Feb 13 00:34:36.899839 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 13 00:34:36.899984 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 13 00:34:36.920579 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 13 00:34:36.934576 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 13 00:34:36.934755 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 13 00:34:36.953607 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 13 00:34:36.953833 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 13 00:34:37.145500 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 13 00:34:37.145739 systemd[1]: Stopped network-cleanup.service. Feb 13 00:34:37.155905 systemd[1]: Reached target initrd-switch-root.target. Feb 13 00:34:37.173518 systemd[1]: Starting initrd-switch-root.service... Feb 13 00:34:37.194526 systemd[1]: Switching root. Feb 13 00:34:37.242965 systemd-journald[267]: Journal stopped Feb 13 00:34:40.966674 kernel: SELinux: Class mctp_socket not defined in policy. Feb 13 00:34:40.966687 kernel: SELinux: Class anon_inode not defined in policy. Feb 13 00:34:40.966696 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 13 00:34:40.966702 kernel: SELinux: policy capability network_peer_controls=1 Feb 13 00:34:40.966706 kernel: SELinux: policy capability open_perms=1 Feb 13 00:34:40.966712 kernel: SELinux: policy capability extended_socket_class=1 Feb 13 00:34:40.966718 kernel: SELinux: policy capability always_check_network=0 Feb 13 00:34:40.966723 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 13 00:34:40.966728 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 13 00:34:40.966734 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 13 00:34:40.966740 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 13 00:34:40.966746 systemd[1]: Successfully loaded SELinux policy in 298.788ms. Feb 13 00:34:40.966752 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.935ms. Feb 13 00:34:40.966759 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 00:34:40.966767 systemd[1]: Detected architecture x86-64. Feb 13 00:34:40.966772 systemd[1]: Detected first boot. Feb 13 00:34:40.966778 systemd[1]: Hostname set to . Feb 13 00:34:40.966784 systemd[1]: Initializing machine ID from random generator. Feb 13 00:34:40.966790 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 13 00:34:40.966796 systemd[1]: Populated /etc with preset unit settings. Feb 13 00:34:40.966802 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 00:34:40.966809 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 00:34:40.966816 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 00:34:40.966822 kernel: kauditd_printk_skb: 58 callbacks suppressed Feb 13 00:34:40.966828 kernel: audit: type=1334 audit(1707784479.510:92): prog-id=12 op=LOAD Feb 13 00:34:40.966833 kernel: audit: type=1334 audit(1707784479.511:93): prog-id=3 op=UNLOAD Feb 13 00:34:40.966839 kernel: audit: type=1334 audit(1707784479.553:94): prog-id=13 op=LOAD Feb 13 00:34:40.966844 kernel: audit: type=1334 audit(1707784479.595:95): prog-id=14 op=LOAD Feb 13 00:34:40.966850 kernel: audit: type=1334 audit(1707784479.595:96): prog-id=4 op=UNLOAD Feb 13 00:34:40.966856 kernel: audit: type=1334 audit(1707784479.595:97): prog-id=5 op=UNLOAD Feb 13 00:34:40.966861 kernel: audit: type=1334 audit(1707784479.636:98): prog-id=15 op=LOAD Feb 13 00:34:40.966867 kernel: audit: type=1334 audit(1707784479.636:99): prog-id=12 op=UNLOAD Feb 13 00:34:40.966872 kernel: audit: type=1334 audit(1707784479.674:100): prog-id=16 op=LOAD Feb 13 00:34:40.966878 kernel: audit: type=1334 audit(1707784479.711:101): prog-id=17 op=LOAD Feb 13 00:34:40.966883 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 13 00:34:40.966889 systemd[1]: Stopped initrd-switch-root.service. Feb 13 00:34:40.966896 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 13 00:34:40.966902 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 13 00:34:40.966908 systemd[1]: Created slice system-addon\x2drun.slice. Feb 13 00:34:40.966915 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 13 00:34:40.966923 systemd[1]: Created slice system-getty.slice. Feb 13 00:34:40.966930 systemd[1]: Created slice system-modprobe.slice. Feb 13 00:34:40.966937 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 13 00:34:40.966943 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 13 00:34:40.966950 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 13 00:34:40.966956 systemd[1]: Created slice user.slice. Feb 13 00:34:40.966962 systemd[1]: Started systemd-ask-password-console.path. Feb 13 00:34:40.966968 systemd[1]: Started systemd-ask-password-wall.path. Feb 13 00:34:40.966975 systemd[1]: Set up automount boot.automount. Feb 13 00:34:40.966981 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 13 00:34:40.966987 systemd[1]: Stopped target initrd-switch-root.target. Feb 13 00:34:40.966993 systemd[1]: Stopped target initrd-fs.target. Feb 13 00:34:40.966999 systemd[1]: Stopped target initrd-root-fs.target. Feb 13 00:34:40.967006 systemd[1]: Reached target integritysetup.target. Feb 13 00:34:40.967012 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 00:34:40.967019 systemd[1]: Reached target remote-fs.target. Feb 13 00:34:40.967025 systemd[1]: Reached target slices.target. Feb 13 00:34:40.967031 systemd[1]: Reached target swap.target. Feb 13 00:34:40.967037 systemd[1]: Reached target torcx.target. Feb 13 00:34:40.967043 systemd[1]: Reached target veritysetup.target. Feb 13 00:34:40.967050 systemd[1]: Listening on systemd-coredump.socket. Feb 13 00:34:40.967057 systemd[1]: Listening on systemd-initctl.socket. Feb 13 00:34:40.967063 systemd[1]: Listening on systemd-networkd.socket. Feb 13 00:34:40.967069 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 00:34:40.967076 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 00:34:40.967083 systemd[1]: Listening on systemd-userdbd.socket. Feb 13 00:34:40.967090 systemd[1]: Mounting dev-hugepages.mount... Feb 13 00:34:40.967096 systemd[1]: Mounting dev-mqueue.mount... Feb 13 00:34:40.967102 systemd[1]: Mounting media.mount... Feb 13 00:34:40.967109 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 00:34:40.967115 systemd[1]: Mounting sys-kernel-debug.mount... Feb 13 00:34:40.967122 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 13 00:34:40.967128 systemd[1]: Mounting tmp.mount... Feb 13 00:34:40.967134 systemd[1]: Starting flatcar-tmpfiles.service... Feb 13 00:34:40.967142 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 13 00:34:40.967148 systemd[1]: Starting kmod-static-nodes.service... Feb 13 00:34:40.967154 systemd[1]: Starting modprobe@configfs.service... Feb 13 00:34:40.967161 systemd[1]: Starting modprobe@dm_mod.service... Feb 13 00:34:40.967167 systemd[1]: Starting modprobe@drm.service... Feb 13 00:34:40.967173 systemd[1]: Starting modprobe@efi_pstore.service... Feb 13 00:34:40.967180 systemd[1]: Starting modprobe@fuse.service... Feb 13 00:34:40.967186 kernel: fuse: init (API version 7.34) Feb 13 00:34:40.967192 systemd[1]: Starting modprobe@loop.service... Feb 13 00:34:40.967199 kernel: loop: module loaded Feb 13 00:34:40.967205 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 13 00:34:40.967212 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 13 00:34:40.967218 systemd[1]: Stopped systemd-fsck-root.service. Feb 13 00:34:40.967224 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 13 00:34:40.967231 systemd[1]: Stopped systemd-fsck-usr.service. Feb 13 00:34:40.967237 systemd[1]: Stopped systemd-journald.service. Feb 13 00:34:40.967243 systemd[1]: Starting systemd-journald.service... Feb 13 00:34:40.967250 systemd[1]: Starting systemd-modules-load.service... Feb 13 00:34:40.967259 systemd-journald[1241]: Journal started Feb 13 00:34:40.967283 systemd-journald[1241]: Runtime Journal (/run/log/journal/ae661dcdcec048928eb640f1598b9cb0) is 8.0M, max 640.1M, 632.1M free. Feb 13 00:34:37.614000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 13 00:34:37.899000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 00:34:37.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 00:34:37.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 00:34:37.901000 audit: BPF prog-id=10 op=LOAD Feb 13 00:34:37.901000 audit: BPF prog-id=10 op=UNLOAD Feb 13 00:34:37.901000 audit: BPF prog-id=11 op=LOAD Feb 13 00:34:37.901000 audit: BPF prog-id=11 op=UNLOAD Feb 13 00:34:37.967000 audit[1130]: AVC avc: denied { associate } for pid=1130 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 13 00:34:37.967000 audit[1130]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001258dc a1=c00002ce58 a2=c00002bb00 a3=32 items=0 ppid=1113 pid=1130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 00:34:37.967000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 00:34:37.991000 audit[1130]: AVC avc: denied { associate } for pid=1130 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 13 00:34:37.991000 audit[1130]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001259b5 a2=1ed a3=0 items=2 ppid=1113 pid=1130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 00:34:37.991000 audit: CWD cwd="/" Feb 13 00:34:37.991000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:37.991000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:37.991000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 00:34:39.510000 audit: BPF prog-id=12 op=LOAD Feb 13 00:34:39.511000 audit: BPF prog-id=3 op=UNLOAD Feb 13 00:34:39.553000 audit: BPF prog-id=13 op=LOAD Feb 13 00:34:39.595000 audit: BPF prog-id=14 op=LOAD Feb 13 00:34:39.595000 audit: BPF prog-id=4 op=UNLOAD Feb 13 00:34:39.595000 audit: BPF prog-id=5 op=UNLOAD Feb 13 00:34:39.636000 audit: BPF prog-id=15 op=LOAD Feb 13 00:34:39.636000 audit: BPF prog-id=12 op=UNLOAD Feb 13 00:34:39.674000 audit: BPF prog-id=16 op=LOAD Feb 13 00:34:39.711000 audit: BPF prog-id=17 op=LOAD Feb 13 00:34:39.711000 audit: BPF prog-id=13 op=UNLOAD Feb 13 00:34:39.711000 audit: BPF prog-id=14 op=UNLOAD Feb 13 00:34:39.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:39.767000 audit: BPF prog-id=15 op=UNLOAD Feb 13 00:34:39.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:39.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:40.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:40.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:40.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:40.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:40.939000 audit: BPF prog-id=18 op=LOAD Feb 13 00:34:40.940000 audit: BPF prog-id=19 op=LOAD Feb 13 00:34:40.940000 audit: BPF prog-id=20 op=LOAD Feb 13 00:34:40.940000 audit: BPF prog-id=16 op=UNLOAD Feb 13 00:34:40.940000 audit: BPF prog-id=17 op=UNLOAD Feb 13 00:34:40.962000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 00:34:40.962000 audit[1241]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fffe5a4d280 a2=4000 a3=7fffe5a4d31c items=0 ppid=1 pid=1241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 00:34:40.962000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 13 00:34:39.509808 systemd[1]: Queued start job for default target multi-user.target. Feb 13 00:34:37.965280 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 00:34:39.712719 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 13 00:34:37.965788 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 00:34:37.965803 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 00:34:37.965826 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:37Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 13 00:34:37.965834 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:37Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 13 00:34:37.965871 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:37Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 13 00:34:37.965881 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:37Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 13 00:34:37.966022 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:37Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 13 00:34:37.966054 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 00:34:37.966064 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 00:34:37.966559 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 13 00:34:37.966586 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 13 00:34:37.966600 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 13 00:34:37.966611 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 13 00:34:37.966623 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 13 00:34:37.966633 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 13 00:34:39.156172 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:39Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 00:34:39.156321 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:39Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 00:34:39.156377 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:39Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 00:34:39.156474 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:39Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 00:34:39.156505 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:39Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 13 00:34:39.156539 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-02-13T00:34:39Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 13 00:34:40.998461 systemd[1]: Starting systemd-network-generator.service... Feb 13 00:34:41.020443 systemd[1]: Starting systemd-remount-fs.service... Feb 13 00:34:41.042456 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 00:34:41.074849 systemd[1]: verity-setup.service: Deactivated successfully. Feb 13 00:34:41.074870 systemd[1]: Stopped verity-setup.service. Feb 13 00:34:41.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.109445 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 00:34:41.123447 systemd[1]: Started systemd-journald.service. Feb 13 00:34:41.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.131936 systemd[1]: Mounted dev-hugepages.mount. Feb 13 00:34:41.138655 systemd[1]: Mounted dev-mqueue.mount. Feb 13 00:34:41.145666 systemd[1]: Mounted media.mount. Feb 13 00:34:41.152648 systemd[1]: Mounted sys-kernel-debug.mount. Feb 13 00:34:41.161660 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 13 00:34:41.170634 systemd[1]: Mounted tmp.mount. Feb 13 00:34:41.177712 systemd[1]: Finished flatcar-tmpfiles.service. Feb 13 00:34:41.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.185726 systemd[1]: Finished kmod-static-nodes.service. Feb 13 00:34:41.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.194750 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 13 00:34:41.194855 systemd[1]: Finished modprobe@configfs.service. Feb 13 00:34:41.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.203828 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 13 00:34:41.203957 systemd[1]: Finished modprobe@dm_mod.service. Feb 13 00:34:41.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.213939 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 13 00:34:41.214125 systemd[1]: Finished modprobe@drm.service. Feb 13 00:34:41.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.223059 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 13 00:34:41.223288 systemd[1]: Finished modprobe@efi_pstore.service. Feb 13 00:34:41.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.232247 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 13 00:34:41.232565 systemd[1]: Finished modprobe@fuse.service. Feb 13 00:34:41.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.241224 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 13 00:34:41.241553 systemd[1]: Finished modprobe@loop.service. Feb 13 00:34:41.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.250216 systemd[1]: Finished systemd-modules-load.service. Feb 13 00:34:41.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.260199 systemd[1]: Finished systemd-network-generator.service. Feb 13 00:34:41.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.269238 systemd[1]: Finished systemd-remount-fs.service. Feb 13 00:34:41.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.278205 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 00:34:41.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.287677 systemd[1]: Reached target network-pre.target. Feb 13 00:34:41.298097 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 13 00:34:41.308115 systemd[1]: Mounting sys-kernel-config.mount... Feb 13 00:34:41.316603 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 13 00:34:41.317554 systemd[1]: Starting systemd-hwdb-update.service... Feb 13 00:34:41.326046 systemd[1]: Starting systemd-journal-flush.service... Feb 13 00:34:41.329540 systemd-journald[1241]: Time spent on flushing to /var/log/journal/ae661dcdcec048928eb640f1598b9cb0 is 14.870ms for 1556 entries. Feb 13 00:34:41.329540 systemd-journald[1241]: System Journal (/var/log/journal/ae661dcdcec048928eb640f1598b9cb0) is 8.0M, max 195.6M, 187.6M free. Feb 13 00:34:41.363692 systemd-journald[1241]: Received client request to flush runtime journal. Feb 13 00:34:41.345504 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 13 00:34:41.346093 systemd[1]: Starting systemd-random-seed.service... Feb 13 00:34:41.353510 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 13 00:34:41.354047 systemd[1]: Starting systemd-sysctl.service... Feb 13 00:34:41.361215 systemd[1]: Starting systemd-sysusers.service... Feb 13 00:34:41.368988 systemd[1]: Starting systemd-udev-settle.service... Feb 13 00:34:41.377556 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 13 00:34:41.385576 systemd[1]: Mounted sys-kernel-config.mount. Feb 13 00:34:41.393610 systemd[1]: Finished systemd-journal-flush.service. Feb 13 00:34:41.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.401606 systemd[1]: Finished systemd-random-seed.service. Feb 13 00:34:41.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.409545 systemd[1]: Finished systemd-sysctl.service. Feb 13 00:34:41.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.417607 systemd[1]: Finished systemd-sysusers.service. Feb 13 00:34:41.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.426540 systemd[1]: Reached target first-boot-complete.target. Feb 13 00:34:41.434723 udevadm[1257]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 13 00:34:41.618991 systemd[1]: Finished systemd-hwdb-update.service. Feb 13 00:34:41.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.628000 audit: BPF prog-id=21 op=LOAD Feb 13 00:34:41.629000 audit: BPF prog-id=22 op=LOAD Feb 13 00:34:41.629000 audit: BPF prog-id=7 op=UNLOAD Feb 13 00:34:41.629000 audit: BPF prog-id=8 op=UNLOAD Feb 13 00:34:41.629744 systemd[1]: Starting systemd-udevd.service... Feb 13 00:34:41.641197 systemd-udevd[1258]: Using default interface naming scheme 'v252'. Feb 13 00:34:41.660588 systemd[1]: Started systemd-udevd.service. Feb 13 00:34:41.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.670554 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 13 00:34:41.670000 audit: BPF prog-id=23 op=LOAD Feb 13 00:34:41.671857 systemd[1]: Starting systemd-networkd.service... Feb 13 00:34:41.704938 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 13 00:34:41.705001 kernel: ACPI: button: Sleep Button [SLPB] Feb 13 00:34:41.705016 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 13 00:34:41.704000 audit: BPF prog-id=24 op=LOAD Feb 13 00:34:41.720000 audit: BPF prog-id=25 op=LOAD Feb 13 00:34:41.721000 audit: BPF prog-id=26 op=LOAD Feb 13 00:34:41.723551 systemd[1]: Starting systemd-userdbd.service... Feb 13 00:34:41.737541 kernel: mousedev: PS/2 mouse device common for all mice Feb 13 00:34:41.737575 kernel: ACPI: button: Power Button [PWRF] Feb 13 00:34:41.737593 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sdb6 scanned by (udev-worker) (1322) Feb 13 00:34:41.720000 audit[1263]: AVC avc: denied { confidentiality } for pid=1263 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 00:34:41.720000 audit[1263]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56030064ea80 a1=4d8bc a2=7f4fa0406bc5 a3=5 items=42 ppid=1258 pid=1263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 00:34:41.720000 audit: CWD cwd="/" Feb 13 00:34:41.786420 kernel: IPMI message handler: version 39.2 Feb 13 00:34:41.720000 audit: PATH item=0 name=(null) inode=1039 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=1 name=(null) inode=22724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=2 name=(null) inode=22724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=3 name=(null) inode=22725 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=4 name=(null) inode=22724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=5 name=(null) inode=22726 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=6 name=(null) inode=22724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=7 name=(null) inode=22727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=8 name=(null) inode=22727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=9 name=(null) inode=22728 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=10 name=(null) inode=22727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=11 name=(null) inode=22729 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=12 name=(null) inode=22727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=13 name=(null) inode=22730 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=14 name=(null) inode=22727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=15 name=(null) inode=22731 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=16 name=(null) inode=22727 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=17 name=(null) inode=22732 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=18 name=(null) inode=22724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=19 name=(null) inode=22733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=20 name=(null) inode=22733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=21 name=(null) inode=22734 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=22 name=(null) inode=22733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=23 name=(null) inode=22735 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=24 name=(null) inode=22733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=25 name=(null) inode=22736 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=26 name=(null) inode=22733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=27 name=(null) inode=22737 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=28 name=(null) inode=22733 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=29 name=(null) inode=22738 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=30 name=(null) inode=22724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=31 name=(null) inode=22739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=32 name=(null) inode=22739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=33 name=(null) inode=22740 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=34 name=(null) inode=22739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=35 name=(null) inode=22741 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=36 name=(null) inode=22739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=37 name=(null) inode=22742 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=38 name=(null) inode=22739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=39 name=(null) inode=22743 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=40 name=(null) inode=22739 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PATH item=41 name=(null) inode=22744 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 00:34:41.720000 audit: PROCTITLE proctitle="(udev-worker)" Feb 13 00:34:41.792281 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 00:34:41.810799 systemd[1]: Started systemd-userdbd.service. Feb 13 00:34:41.825418 kernel: ipmi device interface Feb 13 00:34:41.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:41.877910 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 13 00:34:41.878144 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 13 00:34:41.878402 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 13 00:34:41.878552 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 13 00:34:41.895402 kernel: i2c i2c-0: 1/4 memory slots populated (from DMI) Feb 13 00:34:41.928403 kernel: ipmi_si: IPMI System Interface driver Feb 13 00:34:41.959906 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 13 00:34:41.959984 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 13 00:34:41.977068 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 13 00:34:42.008926 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 13 00:34:42.009030 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 13 00:34:42.069676 systemd-networkd[1302]: bond0: netdev ready Feb 13 00:34:42.076683 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 13 00:34:42.076780 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 13 00:34:42.076799 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 13 00:34:42.078431 systemd-networkd[1302]: lo: Link UP Feb 13 00:34:42.078442 systemd-networkd[1302]: lo: Gained carrier Feb 13 00:34:42.079549 systemd-networkd[1302]: Enumeration completed Feb 13 00:34:42.079654 systemd[1]: Started systemd-networkd.service. Feb 13 00:34:42.080361 systemd-networkd[1302]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 13 00:34:42.081299 systemd-networkd[1302]: enp1s0f1np1: Configuring with /etc/systemd/network/10-b8:59:9f:de:84:91.network. Feb 13 00:34:42.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:42.110151 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 13 00:34:42.118402 kernel: iTCO_vendor_support: vendor-support=0 Feb 13 00:34:42.158156 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Feb 13 00:34:42.158357 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Feb 13 00:34:42.190750 kernel: intel_rapl_common: Found RAPL domain package Feb 13 00:34:42.190776 kernel: intel_rapl_common: Found RAPL domain core Feb 13 00:34:42.190787 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 13 00:34:42.190863 kernel: intel_rapl_common: Found RAPL domain dram Feb 13 00:34:42.265403 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 00:34:42.265509 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Feb 13 00:34:42.287454 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Feb 13 00:34:42.306241 systemd-networkd[1302]: enp1s0f0np0: Configuring with /etc/systemd/network/10-b8:59:9f:de:84:90.network. Feb 13 00:34:42.306401 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 00:34:42.326436 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 13 00:34:42.344408 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 13 00:34:42.380404 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 13 00:34:42.454527 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 00:34:42.587429 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 13 00:34:42.616505 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Feb 13 00:34:42.619503 systemd-networkd[1302]: bond0: Link UP Feb 13 00:34:42.664052 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Feb 13 00:34:42.664095 kernel: bond0: active interface up! Feb 13 00:34:42.700349 systemd-networkd[1302]: enp1s0f1np1: Link UP Feb 13 00:34:42.700400 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 25000 Mbps full duplex Feb 13 00:34:42.700471 systemd-networkd[1302]: enp1s0f1np1: Gained carrier Feb 13 00:34:42.701384 systemd-networkd[1302]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-b8:59:9f:de:84:90.network. Feb 13 00:34:42.720667 systemd[1]: Finished systemd-udev-settle.service. Feb 13 00:34:42.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:42.730244 systemd[1]: Starting lvm2-activation-early.service... Feb 13 00:34:42.746084 lvm[1362]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 00:34:42.778810 systemd[1]: Finished lvm2-activation-early.service. Feb 13 00:34:42.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:42.788531 systemd[1]: Reached target cryptsetup.target. Feb 13 00:34:42.798067 systemd[1]: Starting lvm2-activation.service... Feb 13 00:34:42.800184 lvm[1363]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 00:34:42.824407 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:42.847472 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:42.870472 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:42.871887 systemd[1]: Finished lvm2-activation.service. Feb 13 00:34:42.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:42.888571 systemd[1]: Reached target local-fs-pre.target. Feb 13 00:34:42.894475 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:42.910443 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 13 00:34:42.910480 systemd[1]: Reached target local-fs.target. Feb 13 00:34:42.916446 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:42.933504 systemd[1]: Reached target machines.target. Feb 13 00:34:42.937473 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:42.954049 systemd[1]: Starting ldconfig.service... Feb 13 00:34:42.959438 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:42.975085 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 13 00:34:42.975107 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 00:34:42.975616 systemd[1]: Starting systemd-boot-update.service... Feb 13 00:34:42.981459 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:42.996932 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 13 00:34:43.003402 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.003457 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.020980 systemd[1]: Starting systemd-machine-id-commit.service... Feb 13 00:34:43.022870 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 13 00:34:43.022934 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 13 00:34:43.023522 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 13 00:34:43.023769 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1365 (bootctl) Feb 13 00:34:43.024697 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 13 00:34:43.044440 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.053284 systemd-tmpfiles[1369]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 00:34:43.056499 systemd-tmpfiles[1369]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 00:34:43.062229 systemd-tmpfiles[1369]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 00:34:43.064404 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.065234 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 13 00:34:43.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:43.083403 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.083787 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 13 00:34:43.084078 systemd[1]: Finished systemd-machine-id-commit.service. Feb 13 00:34:43.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:43.104402 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.124401 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.144404 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.161632 systemd-fsck[1373]: fsck.fat 4.2 (2021-01-31) Feb 13 00:34:43.161632 systemd-fsck[1373]: /dev/sdb1: 789 files, 115339/258078 clusters Feb 13 00:34:43.162264 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 13 00:34:43.164401 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:43.183310 systemd[1]: Mounting boot.mount... Feb 13 00:34:43.183402 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.198296 systemd[1]: Mounted boot.mount. Feb 13 00:34:43.203404 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.222402 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.232399 systemd[1]: Finished systemd-boot-update.service. Feb 13 00:34:43.241402 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:43.260402 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.262893 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 13 00:34:43.278406 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:34:43.295868 ldconfig[1364]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 13 00:34:43.296211 systemd[1]: Starting audit-rules.service... Feb 13 00:34:43.297433 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.313067 systemd[1]: Starting clean-ca-certificates.service... Feb 13 00:34:43.313000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 13 00:34:43.313000 audit[1393]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffef34d5200 a2=420 a3=0 items=0 ppid=1378 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 00:34:43.313000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 13 00:34:43.314281 augenrules[1393]: No rules Feb 13 00:34:43.315401 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.332023 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 13 00:34:43.332426 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.350232 systemd[1]: Starting systemd-resolved.service... Feb 13 00:34:43.350400 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.368201 systemd[1]: Starting systemd-timesyncd.service... Feb 13 00:34:43.368402 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.383961 systemd[1]: Starting systemd-update-utmp.service... Feb 13 00:34:43.386455 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.401762 systemd[1]: Finished ldconfig.service. Feb 13 00:34:43.404451 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.419625 systemd[1]: Finished audit-rules.service. Feb 13 00:34:43.421447 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.436601 systemd[1]: Finished clean-ca-certificates.service. Feb 13 00:34:43.438449 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.454431 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.470431 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.481207 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 13 00:34:43.486455 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.503460 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.516213 systemd[1]: Starting systemd-update-done.service... Feb 13 00:34:43.518432 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.532447 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.542048 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 13 00:34:43.542274 systemd[1]: Finished systemd-update-utmp.service. Feb 13 00:34:43.545438 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.558405 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.568958 systemd[1]: Finished systemd-update-done.service. Feb 13 00:34:43.572404 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.587435 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.591360 systemd[1]: Started systemd-timesyncd.service. Feb 13 00:34:43.593197 systemd-resolved[1400]: Positive Trust Anchors: Feb 13 00:34:43.593202 systemd-resolved[1400]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 00:34:43.593221 systemd-resolved[1400]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 00:34:43.596762 systemd-resolved[1400]: Using system hostname 'ci-3510.3.2-a-a91f18e84b'. Feb 13 00:34:43.600503 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.614455 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.625097 systemd[1]: Reached target time-set.target. Feb 13 00:34:43.627462 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.640459 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.653453 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.665447 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.677436 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.688436 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.699451 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.711436 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.723440 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.735437 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.747434 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.759404 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.771404 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.784436 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.796435 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.808435 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.821514 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.821537 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.843570 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.856571 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.856711 systemd-networkd[1302]: bond0: Gained carrier Feb 13 00:34:43.856902 systemd-networkd[1302]: enp1s0f0np0: Link UP Feb 13 00:34:43.856902 systemd-timesyncd[1401]: Network configuration changed, trying to establish connection. Feb 13 00:34:43.857128 systemd-networkd[1302]: enp1s0f0np0: Gained carrier Feb 13 00:34:43.857880 systemd[1]: Started systemd-resolved.service. Feb 13 00:34:43.877092 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 00:34:43.877114 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Feb 13 00:34:43.879773 systemd-timesyncd[1401]: Network configuration changed, trying to establish connection. Feb 13 00:34:43.879839 systemd-networkd[1302]: enp1s0f1np1: Link DOWN Feb 13 00:34:43.879841 systemd-networkd[1302]: enp1s0f1np1: Lost carrier Feb 13 00:34:43.882702 systemd[1]: Reached target network.target. Feb 13 00:34:43.890786 systemd-timesyncd[1401]: Network configuration changed, trying to establish connection. Feb 13 00:34:43.890957 systemd-timesyncd[1401]: Network configuration changed, trying to establish connection. Feb 13 00:34:43.892489 systemd[1]: Reached target nss-lookup.target. Feb 13 00:34:43.901472 systemd[1]: Reached target sysinit.target. Feb 13 00:34:43.909537 systemd[1]: Started motdgen.path. Feb 13 00:34:43.916733 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 13 00:34:43.926539 systemd[1]: Started logrotate.timer. Feb 13 00:34:43.933640 systemd[1]: Started mdadm.timer. Feb 13 00:34:43.940483 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 13 00:34:43.948474 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 13 00:34:43.948490 systemd[1]: Reached target paths.target. Feb 13 00:34:43.955571 systemd[1]: Reached target timers.target. Feb 13 00:34:43.962665 systemd[1]: Listening on dbus.socket. Feb 13 00:34:43.970087 systemd[1]: Starting docker.socket... Feb 13 00:34:43.977940 systemd[1]: Listening on sshd.socket. Feb 13 00:34:43.984583 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 00:34:43.984831 systemd[1]: Listening on docker.socket. Feb 13 00:34:43.991531 systemd[1]: Reached target sockets.target. Feb 13 00:34:43.999483 systemd[1]: Reached target basic.target. Feb 13 00:34:44.006496 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 00:34:44.006511 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 00:34:44.006979 systemd[1]: Starting containerd.service... Feb 13 00:34:44.013887 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 13 00:34:44.022956 systemd[1]: Starting coreos-metadata.service... Feb 13 00:34:44.029969 systemd[1]: Starting dbus.service... Feb 13 00:34:44.035993 systemd[1]: Starting enable-oem-cloudinit.service... Feb 13 00:34:44.041405 jq[1415]: false Feb 13 00:34:44.042049 coreos-metadata[1408]: Feb 13 00:34:44.042 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 00:34:44.043043 systemd[1]: Starting extend-filesystems.service... Feb 13 00:34:44.047367 dbus-daemon[1414]: [system] SELinux support is enabled Feb 13 00:34:44.049509 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 13 00:34:44.050073 systemd[1]: Starting motdgen.service... Feb 13 00:34:44.050265 extend-filesystems[1417]: Found sda Feb 13 00:34:44.073518 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Feb 13 00:34:44.058657 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 13 00:34:44.073603 coreos-metadata[1411]: Feb 13 00:34:44.051 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 00:34:44.073708 extend-filesystems[1417]: Found sdb Feb 13 00:34:44.073708 extend-filesystems[1417]: Found sdb1 Feb 13 00:34:44.073708 extend-filesystems[1417]: Found sdb2 Feb 13 00:34:44.073708 extend-filesystems[1417]: Found sdb3 Feb 13 00:34:44.073708 extend-filesystems[1417]: Found usr Feb 13 00:34:44.073708 extend-filesystems[1417]: Found sdb4 Feb 13 00:34:44.073708 extend-filesystems[1417]: Found sdb6 Feb 13 00:34:44.073708 extend-filesystems[1417]: Found sdb7 Feb 13 00:34:44.073708 extend-filesystems[1417]: Found sdb9 Feb 13 00:34:44.073708 extend-filesystems[1417]: Checking size of /dev/sdb9 Feb 13 00:34:44.073708 extend-filesystems[1417]: Resized partition /dev/sdb9 Feb 13 00:34:44.227528 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 00:34:44.227636 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 13 00:34:44.227649 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Feb 13 00:34:44.227664 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 13 00:34:44.227675 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Feb 13 00:34:44.227738 extend-filesystems[1432]: resize2fs 1.46.5 (30-Dec-2021) Feb 13 00:34:44.081229 systemd[1]: Starting sshd-keygen.service... Feb 13 00:34:44.118591 systemd-networkd[1302]: enp1s0f1np1: Link UP Feb 13 00:34:44.118771 systemd-networkd[1302]: enp1s0f1np1: Gained carrier Feb 13 00:34:44.249743 update_engine[1444]: I0213 00:34:44.214372 1444 main.cc:92] Flatcar Update Engine starting Feb 13 00:34:44.249743 update_engine[1444]: I0213 00:34:44.217761 1444 update_check_scheduler.cc:74] Next update check in 10m18s Feb 13 00:34:44.124153 systemd-timesyncd[1401]: Network configuration changed, trying to establish connection. Feb 13 00:34:44.249895 jq[1445]: true Feb 13 00:34:44.124648 systemd[1]: Starting systemd-logind.service... Feb 13 00:34:44.147449 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 00:34:44.148010 systemd[1]: Starting tcsd.service... Feb 13 00:34:44.151633 systemd-timesyncd[1401]: Network configuration changed, trying to establish connection. Feb 13 00:34:44.151709 systemd-timesyncd[1401]: Network configuration changed, trying to establish connection. Feb 13 00:34:44.156401 systemd-logind[1442]: Watching system buttons on /dev/input/event3 (Power Button) Feb 13 00:34:44.156412 systemd-logind[1442]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 13 00:34:44.156422 systemd-logind[1442]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 13 00:34:44.156511 systemd-logind[1442]: New seat seat0. Feb 13 00:34:44.166766 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 13 00:34:44.167126 systemd[1]: Starting update-engine.service... Feb 13 00:34:44.186068 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 13 00:34:44.205838 systemd[1]: Started dbus.service. Feb 13 00:34:44.221229 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 13 00:34:44.221317 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 13 00:34:44.221464 systemd[1]: motdgen.service: Deactivated successfully. Feb 13 00:34:44.221540 systemd[1]: Finished motdgen.service. Feb 13 00:34:44.241713 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 13 00:34:44.241788 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 13 00:34:44.260058 jq[1447]: true Feb 13 00:34:44.260745 dbus-daemon[1414]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 13 00:34:44.266159 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 13 00:34:44.266266 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 13 00:34:44.266344 systemd[1]: Started systemd-logind.service. Feb 13 00:34:44.269668 env[1448]: time="2024-02-13T00:34:44.269643936Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 13 00:34:44.278368 env[1448]: time="2024-02-13T00:34:44.278352794Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 13 00:34:44.279608 env[1448]: time="2024-02-13T00:34:44.279594142Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 13 00:34:44.280185 env[1448]: time="2024-02-13T00:34:44.280170515Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 13 00:34:44.281609 env[1448]: time="2024-02-13T00:34:44.280185789Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 13 00:34:44.280310 systemd[1]: Started update-engine.service. Feb 13 00:34:44.282098 env[1448]: time="2024-02-13T00:34:44.282060767Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 00:34:44.282098 env[1448]: time="2024-02-13T00:34:44.282073561Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 13 00:34:44.282098 env[1448]: time="2024-02-13T00:34:44.282081893Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 13 00:34:44.282098 env[1448]: time="2024-02-13T00:34:44.282087475Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 13 00:34:44.282169 env[1448]: time="2024-02-13T00:34:44.282132647Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 13 00:34:44.282262 env[1448]: time="2024-02-13T00:34:44.282254057Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 13 00:34:44.282329 env[1448]: time="2024-02-13T00:34:44.282320001Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 00:34:44.282347 env[1448]: time="2024-02-13T00:34:44.282329729Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 13 00:34:44.284172 env[1448]: time="2024-02-13T00:34:44.284136720Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 13 00:34:44.284172 env[1448]: time="2024-02-13T00:34:44.284148343Z" level=info msg="metadata content store policy set" policy=shared Feb 13 00:34:44.286510 bash[1477]: Updated "/home/core/.ssh/authorized_keys" Feb 13 00:34:44.288624 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 13 00:34:44.290667 env[1448]: time="2024-02-13T00:34:44.290632447Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 13 00:34:44.290667 env[1448]: time="2024-02-13T00:34:44.290646648Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 13 00:34:44.290667 env[1448]: time="2024-02-13T00:34:44.290654306Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 13 00:34:44.290716 env[1448]: time="2024-02-13T00:34:44.290669375Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 13 00:34:44.290716 env[1448]: time="2024-02-13T00:34:44.290681472Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 13 00:34:44.290716 env[1448]: time="2024-02-13T00:34:44.290689209Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 13 00:34:44.290716 env[1448]: time="2024-02-13T00:34:44.290696379Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 13 00:34:44.290716 env[1448]: time="2024-02-13T00:34:44.290703384Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 13 00:34:44.290716 env[1448]: time="2024-02-13T00:34:44.290710331Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 13 00:34:44.290802 env[1448]: time="2024-02-13T00:34:44.290717432Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 13 00:34:44.290802 env[1448]: time="2024-02-13T00:34:44.290723984Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 13 00:34:44.290802 env[1448]: time="2024-02-13T00:34:44.290734109Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 13 00:34:44.290802 env[1448]: time="2024-02-13T00:34:44.290791706Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 13 00:34:44.290863 env[1448]: time="2024-02-13T00:34:44.290838128Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 13 00:34:44.291014 env[1448]: time="2024-02-13T00:34:44.290981266Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 13 00:34:44.291014 env[1448]: time="2024-02-13T00:34:44.290996901Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 13 00:34:44.291014 env[1448]: time="2024-02-13T00:34:44.291004687Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 13 00:34:44.291062 env[1448]: time="2024-02-13T00:34:44.291032640Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 13 00:34:44.291062 env[1448]: time="2024-02-13T00:34:44.291042084Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 13 00:34:44.291062 env[1448]: time="2024-02-13T00:34:44.291049021Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 13 00:34:44.291062 env[1448]: time="2024-02-13T00:34:44.291055872Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 13 00:34:44.291119 env[1448]: time="2024-02-13T00:34:44.291062224Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 13 00:34:44.291119 env[1448]: time="2024-02-13T00:34:44.291068820Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 13 00:34:44.291119 env[1448]: time="2024-02-13T00:34:44.291074947Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 13 00:34:44.291119 env[1448]: time="2024-02-13T00:34:44.291080705Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 13 00:34:44.291119 env[1448]: time="2024-02-13T00:34:44.291089303Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 13 00:34:44.291195 env[1448]: time="2024-02-13T00:34:44.291161004Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 13 00:34:44.291195 env[1448]: time="2024-02-13T00:34:44.291170388Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 13 00:34:44.291195 env[1448]: time="2024-02-13T00:34:44.291177902Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 13 00:34:44.291195 env[1448]: time="2024-02-13T00:34:44.291184311Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 13 00:34:44.291195 env[1448]: time="2024-02-13T00:34:44.291192043Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 13 00:34:44.291268 env[1448]: time="2024-02-13T00:34:44.291197898Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 13 00:34:44.291268 env[1448]: time="2024-02-13T00:34:44.291209984Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 13 00:34:44.291268 env[1448]: time="2024-02-13T00:34:44.291229786Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 13 00:34:44.291357 env[1448]: time="2024-02-13T00:34:44.291332797Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 13 00:34:44.293101 env[1448]: time="2024-02-13T00:34:44.291366943Z" level=info msg="Connect containerd service" Feb 13 00:34:44.293101 env[1448]: time="2024-02-13T00:34:44.291385138Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 13 00:34:44.293101 env[1448]: time="2024-02-13T00:34:44.292004412Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 13 00:34:44.293101 env[1448]: time="2024-02-13T00:34:44.292091677Z" level=info msg="Start subscribing containerd event" Feb 13 00:34:44.293101 env[1448]: time="2024-02-13T00:34:44.292120697Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 13 00:34:44.293101 env[1448]: time="2024-02-13T00:34:44.292121802Z" level=info msg="Start recovering state" Feb 13 00:34:44.293101 env[1448]: time="2024-02-13T00:34:44.292144430Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 13 00:34:44.293101 env[1448]: time="2024-02-13T00:34:44.292159778Z" level=info msg="Start event monitor" Feb 13 00:34:44.293101 env[1448]: time="2024-02-13T00:34:44.292169099Z" level=info msg="Start snapshots syncer" Feb 13 00:34:44.293101 env[1448]: time="2024-02-13T00:34:44.292169456Z" level=info msg="containerd successfully booted in 0.022904s" Feb 13 00:34:44.293101 env[1448]: time="2024-02-13T00:34:44.292174312Z" level=info msg="Start cni network conf syncer for default" Feb 13 00:34:44.293101 env[1448]: time="2024-02-13T00:34:44.292183224Z" level=info msg="Start streaming server" Feb 13 00:34:44.299480 systemd[1]: Started containerd.service. Feb 13 00:34:44.309130 systemd[1]: Started locksmithd.service. Feb 13 00:34:44.316514 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 13 00:34:44.316592 systemd[1]: Reached target system-config.target. Feb 13 00:34:44.324483 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 13 00:34:44.324550 systemd[1]: Reached target user-config.target. Feb 13 00:34:44.364704 locksmithd[1481]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 13 00:34:44.545474 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Feb 13 00:34:44.572968 extend-filesystems[1432]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Feb 13 00:34:44.572968 extend-filesystems[1432]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 13 00:34:44.572968 extend-filesystems[1432]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Feb 13 00:34:44.612500 extend-filesystems[1417]: Resized filesystem in /dev/sdb9 Feb 13 00:34:44.573478 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 13 00:34:44.573579 systemd[1]: Finished extend-filesystems.service. Feb 13 00:34:44.670998 sshd_keygen[1441]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 13 00:34:44.682532 systemd[1]: Finished sshd-keygen.service. Feb 13 00:34:44.691300 systemd[1]: Starting issuegen.service... Feb 13 00:34:44.698695 systemd[1]: issuegen.service: Deactivated successfully. Feb 13 00:34:44.698768 systemd[1]: Finished issuegen.service. Feb 13 00:34:44.706170 systemd[1]: Starting systemd-user-sessions.service... Feb 13 00:34:44.715700 systemd[1]: Finished systemd-user-sessions.service. Feb 13 00:34:44.725127 systemd[1]: Started getty@tty1.service. Feb 13 00:34:44.732091 systemd[1]: Started serial-getty@ttyS1.service. Feb 13 00:34:44.740578 systemd[1]: Reached target getty.target. Feb 13 00:34:44.897518 systemd-networkd[1302]: bond0: Gained IPv6LL Feb 13 00:34:44.897778 systemd-timesyncd[1401]: Network configuration changed, trying to establish connection. Feb 13 00:34:45.603589 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 13 00:34:45.793785 systemd-timesyncd[1401]: Network configuration changed, trying to establish connection. Feb 13 00:34:45.793880 systemd-timesyncd[1401]: Network configuration changed, trying to establish connection. Feb 13 00:34:45.794754 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 13 00:34:45.804717 systemd[1]: Reached target network-online.target. Feb 13 00:34:49.758462 login[1508]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 00:34:49.764623 login[1507]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 00:34:49.772226 systemd-logind[1442]: New session 1 of user core. Feb 13 00:34:49.773262 systemd[1]: Created slice user-500.slice. Feb 13 00:34:49.774358 systemd[1]: Starting user-runtime-dir@500.service... Feb 13 00:34:49.776907 systemd-logind[1442]: New session 2 of user core. Feb 13 00:34:49.784092 systemd[1]: Finished user-runtime-dir@500.service. Feb 13 00:34:49.785457 systemd[1]: Starting user@500.service... Feb 13 00:34:49.788655 (systemd)[1512]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:34:49.922269 systemd[1512]: Queued start job for default target default.target. Feb 13 00:34:49.922524 systemd[1512]: Reached target paths.target. Feb 13 00:34:49.922536 systemd[1512]: Reached target sockets.target. Feb 13 00:34:49.922544 systemd[1512]: Reached target timers.target. Feb 13 00:34:49.922551 systemd[1512]: Reached target basic.target. Feb 13 00:34:49.922570 systemd[1512]: Reached target default.target. Feb 13 00:34:49.922584 systemd[1512]: Startup finished in 127ms. Feb 13 00:34:49.922638 systemd[1]: Started user@500.service. Feb 13 00:34:49.923201 systemd[1]: Started session-1.scope. Feb 13 00:34:49.923546 systemd[1]: Started session-2.scope. Feb 13 00:34:50.210600 coreos-metadata[1411]: Feb 13 00:34:50.210 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 00:34:50.211349 coreos-metadata[1408]: Feb 13 00:34:50.210 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 00:34:50.696439 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Feb 13 00:34:50.696587 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 13 00:34:50.881756 systemd[1]: Created slice system-sshd.slice. Feb 13 00:34:50.882340 systemd[1]: Started sshd@0-139.178.94.233:22-139.178.68.195:38116.service. Feb 13 00:34:50.927954 sshd[1533]: Accepted publickey for core from 139.178.68.195 port 38116 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:34:50.929323 sshd[1533]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:34:50.934383 systemd-logind[1442]: New session 3 of user core. Feb 13 00:34:50.935616 systemd[1]: Started session-3.scope. Feb 13 00:34:50.997322 systemd[1]: Started sshd@1-139.178.94.233:22-139.178.68.195:38128.service. Feb 13 00:34:51.031633 sshd[1538]: Accepted publickey for core from 139.178.68.195 port 38128 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:34:51.032317 sshd[1538]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:34:51.034761 systemd-logind[1442]: New session 4 of user core. Feb 13 00:34:51.035152 systemd[1]: Started session-4.scope. Feb 13 00:34:51.085523 sshd[1538]: pam_unix(sshd:session): session closed for user core Feb 13 00:34:51.086916 systemd[1]: sshd@1-139.178.94.233:22-139.178.68.195:38128.service: Deactivated successfully. Feb 13 00:34:51.087215 systemd[1]: session-4.scope: Deactivated successfully. Feb 13 00:34:51.087630 systemd-logind[1442]: Session 4 logged out. Waiting for processes to exit. Feb 13 00:34:51.088122 systemd[1]: Started sshd@2-139.178.94.233:22-139.178.68.195:38144.service. Feb 13 00:34:51.088578 systemd-logind[1442]: Removed session 4. Feb 13 00:34:51.123708 sshd[1544]: Accepted publickey for core from 139.178.68.195 port 38144 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:34:51.126822 sshd[1544]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:34:51.137080 systemd-logind[1442]: New session 5 of user core. Feb 13 00:34:51.139424 systemd[1]: Started session-5.scope. Feb 13 00:34:51.210646 coreos-metadata[1411]: Feb 13 00:34:51.210 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 00:34:51.211426 coreos-metadata[1408]: Feb 13 00:34:51.210 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 00:34:51.220927 sshd[1544]: pam_unix(sshd:session): session closed for user core Feb 13 00:34:51.226561 systemd[1]: sshd@2-139.178.94.233:22-139.178.68.195:38144.service: Deactivated successfully. Feb 13 00:34:51.228212 systemd[1]: session-5.scope: Deactivated successfully. Feb 13 00:34:51.229910 systemd-logind[1442]: Session 5 logged out. Waiting for processes to exit. Feb 13 00:34:51.232226 systemd-logind[1442]: Removed session 5. Feb 13 00:34:51.236426 coreos-metadata[1411]: Feb 13 00:34:51.236 INFO Fetch successful Feb 13 00:34:51.236705 coreos-metadata[1408]: Feb 13 00:34:51.236 INFO Fetch successful Feb 13 00:34:51.297178 systemd[1]: Finished coreos-metadata.service. Feb 13 00:34:51.297768 unknown[1408]: wrote ssh authorized keys file for user: core Feb 13 00:34:51.298113 systemd[1]: Starting etcd-member.service... Feb 13 00:34:51.298876 systemd[1]: Started packet-phone-home.service. Feb 13 00:34:51.307030 curl[1553]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 13 00:34:51.307204 curl[1553]: Dload Upload Total Spent Left Speed Feb 13 00:34:51.310863 update-ssh-keys[1554]: Updated "/home/core/.ssh/authorized_keys" Feb 13 00:34:51.311172 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 13 00:34:51.315554 systemd[1]: Starting docker.service... Feb 13 00:34:51.333440 env[1568]: time="2024-02-13T00:34:51.333411112Z" level=info msg="Starting up" Feb 13 00:34:51.334100 env[1568]: time="2024-02-13T00:34:51.334061204Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 00:34:51.334100 env[1568]: time="2024-02-13T00:34:51.334069625Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 00:34:51.334100 env[1568]: time="2024-02-13T00:34:51.334082050Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 00:34:51.334100 env[1568]: time="2024-02-13T00:34:51.334088632Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 00:34:51.334907 env[1568]: time="2024-02-13T00:34:51.334872540Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 00:34:51.334907 env[1568]: time="2024-02-13T00:34:51.334879762Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 00:34:51.334907 env[1568]: time="2024-02-13T00:34:51.334886414Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 00:34:51.334907 env[1568]: time="2024-02-13T00:34:51.334892116Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 00:34:51.349567 env[1568]: time="2024-02-13T00:34:51.349525015Z" level=info msg="Loading containers: start." Feb 13 00:34:51.529295 curl[1553]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 13 00:34:51.531909 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 13 00:34:51.560461 kernel: Initializing XFRM netlink socket Feb 13 00:34:51.638604 env[1568]: time="2024-02-13T00:34:51.638578580Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 13 00:34:51.639583 systemd-timesyncd[1401]: Network configuration changed, trying to establish connection. Feb 13 00:34:51.639674 systemd-timesyncd[1401]: Network configuration changed, trying to establish connection. Feb 13 00:34:51.643716 systemd-timesyncd[1401]: Network configuration changed, trying to establish connection. Feb 13 00:34:51.643818 systemd-timesyncd[1401]: Network configuration changed, trying to establish connection. Feb 13 00:34:51.690418 systemd-networkd[1302]: docker0: Link UP Feb 13 00:34:51.690607 systemd-timesyncd[1401]: Network configuration changed, trying to establish connection. Feb 13 00:34:51.696753 env[1568]: time="2024-02-13T00:34:51.696727403Z" level=info msg="Loading containers: done." Feb 13 00:34:51.705624 env[1568]: time="2024-02-13T00:34:51.705586407Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 13 00:34:51.705850 env[1568]: time="2024-02-13T00:34:51.705818185Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 13 00:34:51.705839 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2797583112-merged.mount: Deactivated successfully. Feb 13 00:34:51.706124 env[1568]: time="2024-02-13T00:34:51.705957203Z" level=info msg="Daemon has completed initialization" Feb 13 00:34:51.720680 systemd[1]: Started docker.service. Feb 13 00:34:51.733829 env[1568]: time="2024-02-13T00:34:51.733705214Z" level=info msg="API listen on /run/docker.sock" Feb 13 00:34:51.735539 etcd-wrapper[1558]: Error response from daemon: No such container: etcd-member Feb 13 00:34:51.776064 etcd-wrapper[1692]: Error: No such container: etcd-member Feb 13 00:34:51.818626 etcd-wrapper[1714]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Feb 13 00:34:53.054985 etcd-wrapper[1714]: v3.5.0: Pulling from coreos/etcd Feb 13 00:34:53.364619 etcd-wrapper[1714]: 1813d21adc01: Pulling fs layer Feb 13 00:34:53.364619 etcd-wrapper[1714]: 6e96907ab677: Pulling fs layer Feb 13 00:34:53.364619 etcd-wrapper[1714]: 444ed0ea8673: Pulling fs layer Feb 13 00:34:53.364619 etcd-wrapper[1714]: 0fd2df5633f0: Pulling fs layer Feb 13 00:34:53.364619 etcd-wrapper[1714]: 8cc22b9456bb: Pulling fs layer Feb 13 00:34:53.364619 etcd-wrapper[1714]: 7ac70aecd290: Pulling fs layer Feb 13 00:34:53.364619 etcd-wrapper[1714]: 4b376c64dfe4: Pulling fs layer Feb 13 00:34:53.364619 etcd-wrapper[1714]: 0fd2df5633f0: Waiting Feb 13 00:34:53.365554 etcd-wrapper[1714]: 8cc22b9456bb: Waiting Feb 13 00:34:53.365554 etcd-wrapper[1714]: 7ac70aecd290: Waiting Feb 13 00:34:53.365554 etcd-wrapper[1714]: 4b376c64dfe4: Waiting Feb 13 00:34:53.727498 etcd-wrapper[1714]: 444ed0ea8673: Verifying Checksum Feb 13 00:34:53.727498 etcd-wrapper[1714]: 444ed0ea8673: Download complete Feb 13 00:34:53.737195 etcd-wrapper[1714]: 6e96907ab677: Verifying Checksum Feb 13 00:34:53.737195 etcd-wrapper[1714]: 6e96907ab677: Download complete Feb 13 00:34:53.847612 etcd-wrapper[1714]: 1813d21adc01: Verifying Checksum Feb 13 00:34:53.847612 etcd-wrapper[1714]: 1813d21adc01: Download complete Feb 13 00:34:54.026859 etcd-wrapper[1714]: 8cc22b9456bb: Verifying Checksum Feb 13 00:34:54.026859 etcd-wrapper[1714]: 8cc22b9456bb: Download complete Feb 13 00:34:54.072357 etcd-wrapper[1714]: 0fd2df5633f0: Download complete Feb 13 00:34:54.156299 etcd-wrapper[1714]: 7ac70aecd290: Verifying Checksum Feb 13 00:34:54.156299 etcd-wrapper[1714]: 7ac70aecd290: Download complete Feb 13 00:34:54.324198 etcd-wrapper[1714]: 4b376c64dfe4: Download complete Feb 13 00:34:54.346894 etcd-wrapper[1714]: 1813d21adc01: Pull complete Feb 13 00:34:54.533224 systemd[1]: var-lib-docker-overlay2-a0743c173894e147c08be6f8b42f46bd9a7dfb34c03b4bd9428ea713fb83c69f-merged.mount: Deactivated successfully. Feb 13 00:34:54.764285 etcd-wrapper[1714]: 6e96907ab677: Pull complete Feb 13 00:34:54.941654 systemd[1]: var-lib-docker-overlay2-8dbeb2a6b953c0af4ecbde7fc58340966a53326735be60a85b60cf15382b8590-merged.mount: Deactivated successfully. Feb 13 00:34:54.986189 etcd-wrapper[1714]: 444ed0ea8673: Pull complete Feb 13 00:34:55.164984 etcd-wrapper[1714]: 0fd2df5633f0: Pull complete Feb 13 00:34:55.202539 etcd-wrapper[1714]: 8cc22b9456bb: Pull complete Feb 13 00:34:55.228303 etcd-wrapper[1714]: 7ac70aecd290: Pull complete Feb 13 00:34:55.250971 etcd-wrapper[1714]: 4b376c64dfe4: Pull complete Feb 13 00:34:55.253597 etcd-wrapper[1714]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Feb 13 00:34:55.254487 etcd-wrapper[1714]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Feb 13 00:34:55.294763 env[1448]: time="2024-02-13T00:34:55.294663143Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 00:34:55.294763 env[1448]: time="2024-02-13T00:34:55.294685881Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 00:34:55.294763 env[1448]: time="2024-02-13T00:34:55.294693807Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 00:34:55.295044 env[1448]: time="2024-02-13T00:34:55.294767116Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/f2e4b9e8aba0c1021c9b13abd7f783a6830877da946502dfd50c79c5d458649b pid=1896 runtime=io.containerd.runc.v2 Feb 13 00:34:55.300634 systemd[1]: Started docker-f2e4b9e8aba0c1021c9b13abd7f783a6830877da946502dfd50c79c5d458649b.scope. Feb 13 00:34:55.339057 etcd-wrapper[1714]: {"level":"info","ts":1707784495.3388531,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Feb 13 00:34:55.339057 etcd-wrapper[1714]: {"level":"info","ts":1707784495.3389106,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"ae661dcdcec048928eb640f1598b9cb0"} Feb 13 00:34:55.339057 etcd-wrapper[1714]: {"level":"warn","ts":1707784495.3389335,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Feb 13 00:34:55.339057 etcd-wrapper[1714]: {"level":"warn","ts":1707784495.3389397,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Feb 13 00:34:55.339057 etcd-wrapper[1714]: {"level":"warn","ts":1707784495.3389444,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Feb 13 00:34:55.339057 etcd-wrapper[1714]: {"level":"warn","ts":1707784495.3389487,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Feb 13 00:34:55.339284 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.338Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-client-urls=http://0.0.0.0:2379","--advertise-client-urls=http://10.67.80.13:2379"]} Feb 13 00:34:55.339284 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.339Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://localhost:2380"]} Feb 13 00:34:55.339461 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.339Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Feb 13 00:34:55.339573 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.339Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"ae661dcdcec048928eb640f1598b9cb0","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.13:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"ae661dcdcec048928eb640f1598b9cb0=http://localhost:2380","initial-cluster-state":"new","initial-cluster-token":"etcd-cluster","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} Feb 13 00:34:55.340272 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.340Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"550.812µs"} Feb 13 00:34:55.341793 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.341Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"8e9e05c52164694d","cluster-id":"cdf818194e3a8c32"} Feb 13 00:34:55.341793 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.341Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=()"} Feb 13 00:34:55.341793 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.341Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 0"} Feb 13 00:34:55.341793 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.341Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8e9e05c52164694d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Feb 13 00:34:55.341793 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.341Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 1"} Feb 13 00:34:55.341956 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.341Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 13 00:34:55.342518 etcd-wrapper[1714]: {"level":"warn","ts":"2024-02-13T00:34:55.342Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Feb 13 00:34:55.342927 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.342Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Feb 13 00:34:55.343128 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.342Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Feb 13 00:34:55.343286 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.343Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"8e9e05c52164694d","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Feb 13 00:34:55.343376 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.343Z","caller":"etcdserver/server.go:728","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"8e9e05c52164694d","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Feb 13 00:34:55.344024 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.343Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Feb 13 00:34:55.344076 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.343Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","added-peer-id":"8e9e05c52164694d","added-peer-peer-urls":["http://localhost:2380"]} Feb 13 00:34:55.345147 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.345Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"8e9e05c52164694d","initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.13:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Feb 13 00:34:55.345147 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.345Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"127.0.0.1:2380"} Feb 13 00:34:55.345147 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:55.345Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"127.0.0.1:2380"} Feb 13 00:34:55.349931 systemd[1]: var-lib-docker-overlay2-562e11447f11614acd1a7a79f08ec5210ff85cfc07f182a9421fca55efa9cbfb-merged.mount: Deactivated successfully. Feb 13 00:34:56.143041 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:56.142Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d is starting a new election at term 1"} Feb 13 00:34:56.143041 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:56.142Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became pre-candidate at term 1"} Feb 13 00:34:56.143041 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:56.142Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgPreVoteResp from 8e9e05c52164694d at term 1"} Feb 13 00:34:56.143041 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:56.142Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became candidate at term 2"} Feb 13 00:34:56.143041 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:56.142Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgVoteResp from 8e9e05c52164694d at term 2"} Feb 13 00:34:56.143041 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:56.142Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became leader at term 2"} Feb 13 00:34:56.143041 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:56.142Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8e9e05c52164694d elected leader 8e9e05c52164694d at term 2"} Feb 13 00:34:56.143952 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:56.143Z","caller":"etcdserver/server.go:2476","msg":"setting up initial cluster version using v2 API","cluster-version":"3.5"} Feb 13 00:34:56.144066 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:56.143Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","cluster-version":"3.5"} Feb 13 00:34:56.144066 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:56.143Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Feb 13 00:34:56.144066 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:56.143Z","caller":"etcdserver/server.go:2500","msg":"cluster version is updated","cluster-version":"3.5"} Feb 13 00:34:56.144066 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:56.143Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Feb 13 00:34:56.144066 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:56.143Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"8e9e05c52164694d","local-member-attributes":"{Name:ae661dcdcec048928eb640f1598b9cb0 ClientURLs:[http://10.67.80.13:2379]}","request-path":"/0/members/8e9e05c52164694d/attributes","cluster-id":"cdf818194e3a8c32","publish-timeout":"7s"} Feb 13 00:34:56.144764 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:56.144Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Feb 13 00:34:56.144875 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:56.144Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Feb 13 00:34:56.144797 systemd[1]: Started etcd-member.service. Feb 13 00:34:56.145605 systemd[1]: Reached target multi-user.target. Feb 13 00:34:56.146059 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:34:56.145Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Feb 13 00:34:56.149021 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 13 00:34:56.153685 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 13 00:34:56.153765 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 13 00:34:56.153909 systemd[1]: Startup finished in 2.765s (kernel) + 16.464s (initrd) + 18.859s (userspace) = 38.089s. Feb 13 00:35:01.229268 systemd[1]: Started sshd@3-139.178.94.233:22-139.178.68.195:54246.service. Feb 13 00:35:01.263827 sshd[1946]: Accepted publickey for core from 139.178.68.195 port 54246 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:35:01.264762 sshd[1946]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:35:01.268006 systemd-logind[1442]: New session 6 of user core. Feb 13 00:35:01.268721 systemd[1]: Started session-6.scope. Feb 13 00:35:01.324296 sshd[1946]: pam_unix(sshd:session): session closed for user core Feb 13 00:35:01.325925 systemd[1]: sshd@3-139.178.94.233:22-139.178.68.195:54246.service: Deactivated successfully. Feb 13 00:35:01.326230 systemd[1]: session-6.scope: Deactivated successfully. Feb 13 00:35:01.326626 systemd-logind[1442]: Session 6 logged out. Waiting for processes to exit. Feb 13 00:35:01.327112 systemd[1]: Started sshd@4-139.178.94.233:22-139.178.68.195:54248.service. Feb 13 00:35:01.327499 systemd-logind[1442]: Removed session 6. Feb 13 00:35:01.361751 sshd[1952]: Accepted publickey for core from 139.178.68.195 port 54248 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:35:01.362806 sshd[1952]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:35:01.366485 systemd-logind[1442]: New session 7 of user core. Feb 13 00:35:01.367355 systemd[1]: Started session-7.scope. Feb 13 00:35:01.424623 sshd[1952]: pam_unix(sshd:session): session closed for user core Feb 13 00:35:01.431340 systemd[1]: sshd@4-139.178.94.233:22-139.178.68.195:54248.service: Deactivated successfully. Feb 13 00:35:01.432156 systemd[1]: session-7.scope: Deactivated successfully. Feb 13 00:35:01.432575 systemd-logind[1442]: Session 7 logged out. Waiting for processes to exit. Feb 13 00:35:01.432975 systemd[1]: Started sshd@5-139.178.94.233:22-139.178.68.195:54260.service. Feb 13 00:35:01.433356 systemd-logind[1442]: Removed session 7. Feb 13 00:35:01.467832 sshd[1958]: Accepted publickey for core from 139.178.68.195 port 54260 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:35:01.468881 sshd[1958]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:35:01.472481 systemd-logind[1442]: New session 8 of user core. Feb 13 00:35:01.473357 systemd[1]: Started session-8.scope. Feb 13 00:35:01.541036 sshd[1958]: pam_unix(sshd:session): session closed for user core Feb 13 00:35:01.547485 systemd[1]: sshd@5-139.178.94.233:22-139.178.68.195:54260.service: Deactivated successfully. Feb 13 00:35:01.549036 systemd[1]: session-8.scope: Deactivated successfully. Feb 13 00:35:01.550662 systemd-logind[1442]: Session 8 logged out. Waiting for processes to exit. Feb 13 00:35:01.553208 systemd[1]: Started sshd@6-139.178.94.233:22-139.178.68.195:54270.service. Feb 13 00:35:01.555549 systemd-logind[1442]: Removed session 8. Feb 13 00:35:01.590830 sshd[1964]: Accepted publickey for core from 139.178.68.195 port 54270 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:35:01.591588 sshd[1964]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:35:01.594137 systemd-logind[1442]: New session 9 of user core. Feb 13 00:35:01.594737 systemd[1]: Started session-9.scope. Feb 13 00:35:01.656983 sudo[1967]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 13 00:35:01.657105 sudo[1967]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 00:35:01.673817 dbus-daemon[1414]: \xd0=\x9b\xab\x98U: received setenforce notice (enforcing=-237504864) Feb 13 00:35:01.675486 sudo[1967]: pam_unix(sudo:session): session closed for user root Feb 13 00:35:01.677660 sshd[1964]: pam_unix(sshd:session): session closed for user core Feb 13 00:35:01.680010 systemd[1]: sshd@6-139.178.94.233:22-139.178.68.195:54270.service: Deactivated successfully. Feb 13 00:35:01.680546 systemd[1]: session-9.scope: Deactivated successfully. Feb 13 00:35:01.681172 systemd-logind[1442]: Session 9 logged out. Waiting for processes to exit. Feb 13 00:35:01.681997 systemd[1]: Started sshd@7-139.178.94.233:22-139.178.68.195:54284.service. Feb 13 00:35:01.682660 systemd-logind[1442]: Removed session 9. Feb 13 00:35:01.726642 sshd[1971]: Accepted publickey for core from 139.178.68.195 port 54284 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:35:01.728657 sshd[1971]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:35:01.735131 systemd-logind[1442]: New session 10 of user core. Feb 13 00:35:01.736936 systemd[1]: Started session-10.scope. Feb 13 00:35:01.804773 sudo[1975]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 13 00:35:01.804882 sudo[1975]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 00:35:01.806737 sudo[1975]: pam_unix(sudo:session): session closed for user root Feb 13 00:35:01.809049 sudo[1974]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 13 00:35:01.809156 sudo[1974]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 00:35:01.814477 systemd[1]: Stopping audit-rules.service... Feb 13 00:35:01.814000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 00:35:01.815365 auditctl[1978]: No rules Feb 13 00:35:01.815571 systemd[1]: audit-rules.service: Deactivated successfully. Feb 13 00:35:01.815664 systemd[1]: Stopped audit-rules.service. Feb 13 00:35:01.816509 systemd[1]: Starting audit-rules.service... Feb 13 00:35:01.820791 kernel: kauditd_printk_skb: 111 callbacks suppressed Feb 13 00:35:01.820834 kernel: audit: type=1305 audit(1707784501.814:164): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 00:35:01.827325 augenrules[1995]: No rules Feb 13 00:35:01.827695 systemd[1]: Finished audit-rules.service. Feb 13 00:35:01.814000 audit[1978]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffa2b7a0a0 a2=420 a3=0 items=0 ppid=1 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 00:35:01.835929 sudo[1974]: pam_unix(sudo:session): session closed for user root Feb 13 00:35:01.836727 sshd[1971]: pam_unix(sshd:session): session closed for user core Feb 13 00:35:01.838164 systemd[1]: sshd@7-139.178.94.233:22-139.178.68.195:54284.service: Deactivated successfully. Feb 13 00:35:01.838483 systemd[1]: session-10.scope: Deactivated successfully. Feb 13 00:35:01.838867 systemd-logind[1442]: Session 10 logged out. Waiting for processes to exit. Feb 13 00:35:01.839322 systemd[1]: Started sshd@8-139.178.94.233:22-139.178.68.195:54290.service. Feb 13 00:35:01.839777 systemd-logind[1442]: Removed session 10. Feb 13 00:35:01.867416 kernel: audit: type=1300 audit(1707784501.814:164): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffa2b7a0a0 a2=420 a3=0 items=0 ppid=1 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 00:35:01.867492 kernel: audit: type=1327 audit(1707784501.814:164): proctitle=2F7362696E2F617564697463746C002D44 Feb 13 00:35:01.814000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 13 00:35:01.876933 kernel: audit: type=1131 audit(1707784501.815:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:35:01.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:35:01.899410 kernel: audit: type=1130 audit(1707784501.827:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:35:01.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:35:01.905716 sshd[2001]: Accepted publickey for core from 139.178.68.195 port 54290 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:35:01.908714 sshd[2001]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:35:01.910950 systemd-logind[1442]: New session 11 of user core. Feb 13 00:35:01.911393 systemd[1]: Started session-11.scope. Feb 13 00:35:01.921878 kernel: audit: type=1106 audit(1707784501.835:167): pid=1974 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 00:35:01.835000 audit[1974]: USER_END pid=1974 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 00:35:01.947966 kernel: audit: type=1104 audit(1707784501.835:168): pid=1974 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 00:35:01.835000 audit[1974]: CRED_DISP pid=1974 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 00:35:01.956507 sshd[2001]: pam_unix(sshd:session): session closed for user core Feb 13 00:35:01.957937 systemd[1]: sshd@8-139.178.94.233:22-139.178.68.195:54290.service: Deactivated successfully. Feb 13 00:35:01.958231 systemd[1]: session-11.scope: Deactivated successfully. Feb 13 00:35:01.958644 systemd-logind[1442]: Session 11 logged out. Waiting for processes to exit. Feb 13 00:35:01.959110 systemd[1]: Started sshd@9-139.178.94.233:22-139.178.68.195:54294.service. Feb 13 00:35:01.959434 systemd-logind[1442]: Removed session 11. Feb 13 00:35:01.971586 kernel: audit: type=1106 audit(1707784501.836:169): pid=1971 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 00:35:01.836000 audit[1971]: USER_END pid=1971 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 00:35:02.003900 kernel: audit: type=1104 audit(1707784501.837:170): pid=1971 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 00:35:01.837000 audit[1971]: CRED_DISP pid=1971 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 00:35:02.029992 kernel: audit: type=1131 audit(1707784501.837:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.94.233:22-139.178.68.195:54284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:35:01.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.94.233:22-139.178.68.195:54284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:35:02.032381 sshd[2009]: Accepted publickey for core from 139.178.68.195 port 54294 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 00:35:02.033705 sshd[2009]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 00:35:02.035892 systemd-logind[1442]: New session 12 of user core. Feb 13 00:35:02.036319 systemd[1]: Started session-12.scope. Feb 13 00:35:01.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.94.233:22-139.178.68.195:54290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:35:01.905000 audit[2001]: USER_ACCT pid=2001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 00:35:01.908000 audit[2001]: CRED_ACQ pid=2001 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 00:35:01.908000 audit[2001]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6afd03e0 a2=3 a3=0 items=0 ppid=1 pid=2001 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 00:35:01.908000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 00:35:01.913000 audit[2001]: USER_START pid=2001 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 00:35:01.913000 audit[2003]: CRED_ACQ pid=2003 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 00:35:01.956000 audit[2001]: USER_END pid=2001 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 00:35:01.956000 audit[2001]: CRED_DISP pid=2001 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 00:35:01.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.94.233:22-139.178.68.195:54290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:35:01.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.94.233:22-139.178.68.195:54294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:35:02.031000 audit[2009]: USER_ACCT pid=2009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 00:35:02.033000 audit[2009]: CRED_ACQ pid=2009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 00:35:02.033000 audit[2009]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0cb0adc0 a2=3 a3=0 items=0 ppid=1 pid=2009 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 00:35:02.033000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 00:35:02.037000 audit[2009]: USER_START pid=2009 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 00:35:02.038000 audit[2011]: CRED_ACQ pid=2011 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 00:35:02.393939 sshd[2009]: pam_unix(sshd:session): session closed for user core Feb 13 00:35:02.395000 audit[2009]: USER_END pid=2009 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 00:35:02.396000 audit[2009]: CRED_DISP pid=2009 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 00:35:02.399413 systemd[1]: sshd@9-139.178.94.233:22-139.178.68.195:54294.service: Deactivated successfully. Feb 13 00:35:02.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.94.233:22-139.178.68.195:54294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:35:02.400988 systemd[1]: session-12.scope: Deactivated successfully. Feb 13 00:35:02.402480 systemd-logind[1442]: Session 12 logged out. Waiting for processes to exit. Feb 13 00:35:02.404653 systemd-logind[1442]: Removed session 12. Feb 13 00:35:22.139115 systemd-timesyncd[1401]: Contacted time server [2607:5600:182:500::1]:123 (2.flatcar.pool.ntp.org). Feb 13 00:35:22.139252 systemd-timesyncd[1401]: Initial clock synchronization to Tue 2024-02-13 00:35:22.293527 UTC. Feb 13 00:35:29.079162 update_engine[1444]: I0213 00:35:29.079069 1444 update_attempter.cc:509] Updating boot flags... Feb 13 00:45:02.165440 update_engine[1444]: I0213 00:45:02.165351 1444 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 13 00:45:02.168069 update_engine[1444]: I0213 00:45:02.165479 1444 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 13 00:45:02.168069 update_engine[1444]: I0213 00:45:02.167299 1444 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 13 00:45:02.168575 update_engine[1444]: I0213 00:45:02.168529 1444 omaha_request_params.cc:62] Current group set to lts Feb 13 00:45:02.168934 update_engine[1444]: I0213 00:45:02.168890 1444 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 13 00:45:02.168934 update_engine[1444]: I0213 00:45:02.168915 1444 update_attempter.cc:643] Scheduling an action processor start. Feb 13 00:45:02.169283 update_engine[1444]: I0213 00:45:02.168962 1444 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 00:45:02.169283 update_engine[1444]: I0213 00:45:02.169055 1444 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 13 00:45:02.169283 update_engine[1444]: I0213 00:45:02.169266 1444 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 00:45:02.169767 update_engine[1444]: I0213 00:45:02.169293 1444 omaha_request_action.cc:271] Request: Feb 13 00:45:02.169767 update_engine[1444]: Feb 13 00:45:02.169767 update_engine[1444]: Feb 13 00:45:02.169767 update_engine[1444]: Feb 13 00:45:02.169767 update_engine[1444]: Feb 13 00:45:02.169767 update_engine[1444]: Feb 13 00:45:02.169767 update_engine[1444]: Feb 13 00:45:02.169767 update_engine[1444]: Feb 13 00:45:02.169767 update_engine[1444]: Feb 13 00:45:02.169767 update_engine[1444]: I0213 00:45:02.169310 1444 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 00:45:02.171205 locksmithd[1481]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 13 00:45:02.172705 update_engine[1444]: I0213 00:45:02.172695 1444 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 00:45:02.172770 update_engine[1444]: E0213 00:45:02.172762 1444 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 00:45:02.172806 update_engine[1444]: I0213 00:45:02.172802 1444 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 13 00:45:12.075109 update_engine[1444]: I0213 00:45:12.074920 1444 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 00:45:12.076278 update_engine[1444]: I0213 00:45:12.075516 1444 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 00:45:12.076278 update_engine[1444]: E0213 00:45:12.075785 1444 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 00:45:12.076278 update_engine[1444]: I0213 00:45:12.076036 1444 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 13 00:45:22.075356 update_engine[1444]: I0213 00:45:22.075264 1444 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 00:45:22.076602 update_engine[1444]: I0213 00:45:22.075848 1444 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 00:45:22.076602 update_engine[1444]: E0213 00:45:22.076113 1444 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 00:45:22.076602 update_engine[1444]: I0213 00:45:22.076361 1444 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 13 00:45:32.074618 update_engine[1444]: I0213 00:45:32.074525 1444 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 00:45:32.075874 update_engine[1444]: I0213 00:45:32.075084 1444 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 00:45:32.075874 update_engine[1444]: E0213 00:45:32.075363 1444 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 00:45:32.075874 update_engine[1444]: I0213 00:45:32.075611 1444 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 00:45:32.075874 update_engine[1444]: I0213 00:45:32.075639 1444 omaha_request_action.cc:621] Omaha request response: Feb 13 00:45:32.075874 update_engine[1444]: E0213 00:45:32.075816 1444 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 13 00:45:32.075874 update_engine[1444]: I0213 00:45:32.075855 1444 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 13 00:45:32.075874 update_engine[1444]: I0213 00:45:32.075870 1444 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 00:45:32.075874 update_engine[1444]: I0213 00:45:32.075882 1444 update_attempter.cc:306] Processing Done. Feb 13 00:45:32.077226 update_engine[1444]: E0213 00:45:32.075918 1444 update_attempter.cc:619] Update failed. Feb 13 00:45:32.077226 update_engine[1444]: I0213 00:45:32.075933 1444 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 13 00:45:32.077226 update_engine[1444]: I0213 00:45:32.075948 1444 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 13 00:45:32.077226 update_engine[1444]: I0213 00:45:32.075964 1444 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 13 00:45:32.077226 update_engine[1444]: I0213 00:45:32.076182 1444 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 00:45:32.077226 update_engine[1444]: I0213 00:45:32.076256 1444 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 00:45:32.077226 update_engine[1444]: I0213 00:45:32.076273 1444 omaha_request_action.cc:271] Request: Feb 13 00:45:32.077226 update_engine[1444]: Feb 13 00:45:32.077226 update_engine[1444]: Feb 13 00:45:32.077226 update_engine[1444]: Feb 13 00:45:32.077226 update_engine[1444]: Feb 13 00:45:32.077226 update_engine[1444]: Feb 13 00:45:32.077226 update_engine[1444]: Feb 13 00:45:32.077226 update_engine[1444]: I0213 00:45:32.076289 1444 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 00:45:32.077226 update_engine[1444]: I0213 00:45:32.076915 1444 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 00:45:32.077226 update_engine[1444]: E0213 00:45:32.077150 1444 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 00:45:32.078931 locksmithd[1481]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 13 00:45:32.078931 locksmithd[1481]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 13 00:45:32.079625 update_engine[1444]: I0213 00:45:32.077349 1444 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 00:45:32.079625 update_engine[1444]: I0213 00:45:32.077374 1444 omaha_request_action.cc:621] Omaha request response: Feb 13 00:45:32.079625 update_engine[1444]: I0213 00:45:32.077391 1444 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 00:45:32.079625 update_engine[1444]: I0213 00:45:32.077425 1444 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 00:45:32.079625 update_engine[1444]: I0213 00:45:32.077437 1444 update_attempter.cc:306] Processing Done. Feb 13 00:45:32.079625 update_engine[1444]: I0213 00:45:32.077450 1444 update_attempter.cc:310] Error event sent. Feb 13 00:45:32.079625 update_engine[1444]: I0213 00:45:32.077486 1444 update_check_scheduler.cc:74] Next update check in 44m40s Feb 13 00:49:44.694142 systemd[1]: Started sshd@10-139.178.94.233:22-85.209.11.254:5000.service. Feb 13 00:49:44.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.94.233:22-85.209.11.254:5000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:49:44.694836 systemd[1]: Starting systemd-tmpfiles-clean.service... Feb 13 00:49:44.699723 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 13 00:49:44.699762 kernel: audit: type=1130 audit(1707785384.692:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.94.233:22-85.209.11.254:5000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:49:44.745944 systemd-tmpfiles[2085]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 00:49:44.746150 systemd-tmpfiles[2085]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 00:49:44.746864 systemd-tmpfiles[2085]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 00:49:44.756894 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 13 00:49:44.757020 systemd[1]: Finished systemd-tmpfiles-clean.service. Feb 13 00:49:44.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:49:44.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:49:44.831452 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 13 00:49:44.905864 kernel: audit: type=1130 audit(1707785384.755:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:49:44.905895 kernel: audit: type=1131 audit(1707785384.755:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:49:46.567222 sshd[2084]: Invalid user mysql from 85.209.11.254 port 5000 Feb 13 00:49:46.916084 sshd[2084]: Failed none for invalid user mysql from 85.209.11.254 port 5000 ssh2 Feb 13 00:49:47.106901 sshd[2084]: Connection closed by invalid user mysql 85.209.11.254 port 5000 [preauth] Feb 13 00:49:47.106000 audit[2084]: USER_ERR pid=2084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=85.209.11.254 addr=85.209.11.254 terminal=ssh res=failed' Feb 13 00:49:47.109618 systemd[1]: sshd@10-139.178.94.233:22-85.209.11.254:5000.service: Deactivated successfully. Feb 13 00:49:47.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.94.233:22-85.209.11.254:5000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:49:47.274984 kernel: audit: type=1109 audit(1707785387.106:193): pid=2084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:bad_ident grantors=? acct="?" exe="/usr/sbin/sshd" hostname=85.209.11.254 addr=85.209.11.254 terminal=ssh res=failed' Feb 13 00:49:47.275012 kernel: audit: type=1131 audit(1707785387.108:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.94.233:22-85.209.11.254:5000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:51:13.998358 systemd[1]: Started sshd@11-139.178.94.233:22-39.105.33.137:41618.service. Feb 13 00:51:13.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.94.233:22-39.105.33.137:41618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:51:14.087451 kernel: audit: type=1130 audit(1707785473.998:195): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.94.233:22-39.105.33.137:41618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:51:14.927508 sshd[2096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.105.33.137 user=root Feb 13 00:51:14.927000 audit[2096]: USER_AUTH pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=39.105.33.137 addr=39.105.33.137 terminal=ssh res=failed' Feb 13 00:51:15.018590 kernel: audit: type=1100 audit(1707785474.927:196): pid=2096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=39.105.33.137 addr=39.105.33.137 terminal=ssh res=failed' Feb 13 00:51:17.570012 sshd[2096]: Failed password for root from 39.105.33.137 port 41618 ssh2 Feb 13 00:51:19.054864 sshd[2096]: Received disconnect from 39.105.33.137 port 41618:11: Bye Bye [preauth] Feb 13 00:51:19.054864 sshd[2096]: Disconnected from authenticating user root 39.105.33.137 port 41618 [preauth] Feb 13 00:51:19.057419 systemd[1]: sshd@11-139.178.94.233:22-39.105.33.137:41618.service: Deactivated successfully. Feb 13 00:51:19.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.94.233:22-39.105.33.137:41618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:51:19.150588 kernel: audit: type=1131 audit(1707785479.057:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.94.233:22-39.105.33.137:41618 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:51:32.696172 systemd[1]: Started sshd@12-139.178.94.233:22-179.27.60.34:19312.service. Feb 13 00:51:32.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.94.233:22-179.27.60.34:19312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:51:32.788603 kernel: audit: type=1130 audit(1707785492.694:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.94.233:22-179.27.60.34:19312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:51:33.813867 sshd[2102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 00:51:33.812000 audit[2102]: USER_AUTH pid=2102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 00:51:33.907595 kernel: audit: type=1100 audit(1707785493.812:199): pid=2102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 00:51:35.397537 sshd[2102]: Failed password for root from 179.27.60.34 port 19312 ssh2 Feb 13 00:51:35.992152 sshd[2102]: Received disconnect from 179.27.60.34 port 19312:11: Bye Bye [preauth] Feb 13 00:51:35.992152 sshd[2102]: Disconnected from authenticating user root 179.27.60.34 port 19312 [preauth] Feb 13 00:51:35.994786 systemd[1]: sshd@12-139.178.94.233:22-179.27.60.34:19312.service: Deactivated successfully. Feb 13 00:51:35.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.94.233:22-179.27.60.34:19312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:51:36.088476 kernel: audit: type=1131 audit(1707785495.993:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.94.233:22-179.27.60.34:19312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:51:37.792515 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:51:37.791Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":1012} Feb 13 00:51:37.810971 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:51:37.810Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":1012,"took":"18.234624ms"} Feb 13 00:54:06.078684 systemd[1]: Started sshd@13-139.178.94.233:22-62.99.74.172:57268.service. Feb 13 00:54:06.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.94.233:22-62.99.74.172:57268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:54:06.170599 kernel: audit: type=1130 audit(1707785646.077:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.94.233:22-62.99.74.172:57268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:54:07.001843 sshd[2111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 00:54:07.000000 audit[2111]: USER_AUTH pid=2111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 00:54:07.093587 kernel: audit: type=1100 audit(1707785647.000:202): pid=2111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 00:54:08.590443 sshd[2111]: Failed password for root from 62.99.74.172 port 57268 ssh2 Feb 13 00:54:09.140823 sshd[2111]: Received disconnect from 62.99.74.172 port 57268:11: Bye Bye [preauth] Feb 13 00:54:09.140823 sshd[2111]: Disconnected from authenticating user root 62.99.74.172 port 57268 [preauth] Feb 13 00:54:09.143334 systemd[1]: sshd@13-139.178.94.233:22-62.99.74.172:57268.service: Deactivated successfully. Feb 13 00:54:09.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.94.233:22-62.99.74.172:57268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:54:09.234469 kernel: audit: type=1131 audit(1707785649.142:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.94.233:22-62.99.74.172:57268 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:54:20.395874 systemd[1]: Started sshd@14-139.178.94.233:22-152.32.207.133:50834.service. Feb 13 00:54:20.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.94.233:22-152.32.207.133:50834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:54:20.488463 kernel: audit: type=1130 audit(1707785660.394:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.94.233:22-152.32.207.133:50834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:54:38.872585 sshd[2115]: Connection closed by 152.32.207.133 port 50834 [preauth] Feb 13 00:54:38.873069 systemd[1]: sshd@14-139.178.94.233:22-152.32.207.133:50834.service: Deactivated successfully. Feb 13 00:54:38.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.94.233:22-152.32.207.133:50834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:54:38.966592 kernel: audit: type=1131 audit(1707785678.871:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.94.233:22-152.32.207.133:50834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:56:37.787791 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:56:37.787Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":1550} Feb 13 00:56:37.790381 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T00:56:37.790Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":1550,"took":"2.174754ms"} Feb 13 00:58:13.338054 systemd[1]: Started sshd@15-139.178.94.233:22-62.99.74.172:46168.service. Feb 13 00:58:13.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.94.233:22-62.99.74.172:46168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:58:13.431595 kernel: audit: type=1130 audit(1707785893.337:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.94.233:22-62.99.74.172:46168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:58:14.234769 sshd[2127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 00:58:14.234000 audit[2127]: USER_AUTH pid=2127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 00:58:14.236845 systemd[1]: Started sshd@16-139.178.94.233:22-101.42.135.207:47548.service. Feb 13 00:58:14.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.94.233:22-101.42.135.207:47548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:58:14.416997 kernel: audit: type=1100 audit(1707785894.234:207): pid=2127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 00:58:14.417029 kernel: audit: type=1130 audit(1707785894.236:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.94.233:22-101.42.135.207:47548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:58:16.200066 sshd[2127]: Failed password for root from 62.99.74.172 port 46168 ssh2 Feb 13 00:58:16.369116 sshd[2127]: Received disconnect from 62.99.74.172 port 46168:11: Bye Bye [preauth] Feb 13 00:58:16.369116 sshd[2127]: Disconnected from authenticating user root 62.99.74.172 port 46168 [preauth] Feb 13 00:58:16.371684 systemd[1]: sshd@15-139.178.94.233:22-62.99.74.172:46168.service: Deactivated successfully. Feb 13 00:58:16.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.94.233:22-62.99.74.172:46168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:58:16.465595 kernel: audit: type=1131 audit(1707785896.371:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.94.233:22-62.99.74.172:46168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:58:19.562683 systemd[1]: Started sshd@17-139.178.94.233:22-179.27.60.34:23841.service. Feb 13 00:58:19.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.94.233:22-179.27.60.34:23841 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:58:19.655403 kernel: audit: type=1130 audit(1707785899.562:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.94.233:22-179.27.60.34:23841 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:58:20.684341 sshd[2134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 00:58:20.684000 audit[2134]: USER_AUTH pid=2134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 00:58:20.776446 kernel: audit: type=1100 audit(1707785900.684:211): pid=2134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 00:58:22.473966 sshd[2134]: Failed password for root from 179.27.60.34 port 23841 ssh2 Feb 13 00:58:22.869730 sshd[2134]: Received disconnect from 179.27.60.34 port 23841:11: Bye Bye [preauth] Feb 13 00:58:22.869730 sshd[2134]: Disconnected from authenticating user root 179.27.60.34 port 23841 [preauth] Feb 13 00:58:22.872224 systemd[1]: sshd@17-139.178.94.233:22-179.27.60.34:23841.service: Deactivated successfully. Feb 13 00:58:22.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.94.233:22-179.27.60.34:23841 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:58:22.965596 kernel: audit: type=1131 audit(1707785902.872:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.94.233:22-179.27.60.34:23841 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:59:07.808242 systemd[1]: Started sshd@18-139.178.94.233:22-62.99.74.172:54310.service. Feb 13 00:59:07.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.94.233:22-62.99.74.172:54310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:59:07.901461 kernel: audit: type=1130 audit(1707785947.806:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.94.233:22-62.99.74.172:54310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:59:08.694530 sshd[2141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 00:59:08.693000 audit[2141]: USER_AUTH pid=2141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 00:59:08.786462 kernel: audit: type=1100 audit(1707785948.693:214): pid=2141 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 00:59:10.739804 sshd[2141]: Failed password for root from 62.99.74.172 port 54310 ssh2 Feb 13 00:59:12.814936 sshd[2141]: Received disconnect from 62.99.74.172 port 54310:11: Bye Bye [preauth] Feb 13 00:59:12.814936 sshd[2141]: Disconnected from authenticating user root 62.99.74.172 port 54310 [preauth] Feb 13 00:59:12.817418 systemd[1]: sshd@18-139.178.94.233:22-62.99.74.172:54310.service: Deactivated successfully. Feb 13 00:59:12.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.94.233:22-62.99.74.172:54310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:59:12.910587 kernel: audit: type=1131 audit(1707785952.816:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.94.233:22-62.99.74.172:54310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:59:31.783677 systemd[1]: Started sshd@19-139.178.94.233:22-179.27.60.34:42533.service. Feb 13 00:59:31.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.94.233:22-179.27.60.34:42533 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:59:31.876446 kernel: audit: type=1130 audit(1707785971.782:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.94.233:22-179.27.60.34:42533 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:59:32.904557 sshd[2147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 00:59:32.903000 audit[2147]: USER_AUTH pid=2147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 00:59:32.997467 kernel: audit: type=1100 audit(1707785972.903:217): pid=2147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 00:59:34.914570 sshd[2147]: Failed password for root from 179.27.60.34 port 42533 ssh2 Feb 13 00:59:37.077045 sshd[2147]: Received disconnect from 179.27.60.34 port 42533:11: Bye Bye [preauth] Feb 13 00:59:37.077045 sshd[2147]: Disconnected from authenticating user root 179.27.60.34 port 42533 [preauth] Feb 13 00:59:37.079519 systemd[1]: sshd@19-139.178.94.233:22-179.27.60.34:42533.service: Deactivated successfully. Feb 13 00:59:37.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.94.233:22-179.27.60.34:42533 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 00:59:37.172455 kernel: audit: type=1131 audit(1707785977.079:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.94.233:22-179.27.60.34:42533 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:00:03.002137 systemd[1]: Started sshd@20-139.178.94.233:22-62.99.74.172:58032.service. Feb 13 01:00:03.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.94.233:22-62.99.74.172:58032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:00:03.095594 kernel: audit: type=1130 audit(1707786003.001:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.94.233:22-62.99.74.172:58032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:00:03.878450 sshd[2153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:00:03.878000 audit[2153]: ANOM_LOGIN_FAILURES pid=2153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:00:03.878693 sshd[2153]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:00:03.878000 audit[2153]: USER_AUTH pid=2153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:00:04.034804 kernel: audit: type=2100 audit(1707786003.878:220): pid=2153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:00:04.034837 kernel: audit: type=1100 audit(1707786003.878:221): pid=2153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:00:05.808601 sshd[2153]: Failed password for root from 62.99.74.172 port 58032 ssh2 Feb 13 01:00:06.008878 sshd[2153]: Received disconnect from 62.99.74.172 port 58032:11: Bye Bye [preauth] Feb 13 01:00:06.008878 sshd[2153]: Disconnected from authenticating user root 62.99.74.172 port 58032 [preauth] Feb 13 01:00:06.011337 systemd[1]: sshd@20-139.178.94.233:22-62.99.74.172:58032.service: Deactivated successfully. Feb 13 01:00:06.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.94.233:22-62.99.74.172:58032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:00:06.105595 kernel: audit: type=1131 audit(1707786006.011:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.94.233:22-62.99.74.172:58032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:00:14.241802 sshd[2130]: Timeout before authentication for 101.42.135.207 port 47548 Feb 13 01:00:14.242521 systemd[1]: sshd@16-139.178.94.233:22-101.42.135.207:47548.service: Deactivated successfully. Feb 13 01:00:14.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.94.233:22-101.42.135.207:47548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:00:14.334463 kernel: audit: type=1131 audit(1707786014.241:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.94.233:22-101.42.135.207:47548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:00:45.796327 systemd[1]: Started sshd@21-139.178.94.233:22-179.27.60.34:61221.service. Feb 13 01:00:45.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.94.233:22-179.27.60.34:61221 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:00:45.889596 kernel: audit: type=1130 audit(1707786045.794:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.94.233:22-179.27.60.34:61221 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:00:46.917363 sshd[2162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:00:46.916000 audit[2162]: USER_AUTH pid=2162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:00:47.010589 kernel: audit: type=1100 audit(1707786046.916:225): pid=2162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:00:49.083220 sshd[2162]: Failed password for root from 179.27.60.34 port 61221 ssh2 Feb 13 01:00:51.088803 sshd[2162]: Received disconnect from 179.27.60.34 port 61221:11: Bye Bye [preauth] Feb 13 01:00:51.088803 sshd[2162]: Disconnected from authenticating user root 179.27.60.34 port 61221 [preauth] Feb 13 01:00:51.091310 systemd[1]: sshd@21-139.178.94.233:22-179.27.60.34:61221.service: Deactivated successfully. Feb 13 01:00:51.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.94.233:22-179.27.60.34:61221 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:00:51.185608 kernel: audit: type=1131 audit(1707786051.090:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.94.233:22-179.27.60.34:61221 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:01:00.172372 systemd[1]: Started sshd@22-139.178.94.233:22-62.99.74.172:42462.service. Feb 13 01:01:00.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.94.233:22-62.99.74.172:42462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:01:00.265438 kernel: audit: type=1130 audit(1707786060.171:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.94.233:22-62.99.74.172:42462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:01:01.043494 sshd[2167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:01:01.042000 audit[2167]: ANOM_LOGIN_FAILURES pid=2167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:01:01.043737 sshd[2167]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:01:01.042000 audit[2167]: USER_AUTH pid=2167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:01:01.200342 kernel: audit: type=2100 audit(1707786061.042:228): pid=2167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:01:01.200375 kernel: audit: type=1100 audit(1707786061.042:229): pid=2167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:01:02.938004 sshd[2167]: Failed password for root from 62.99.74.172 port 42462 ssh2 Feb 13 01:01:03.172321 sshd[2167]: Received disconnect from 62.99.74.172 port 42462:11: Bye Bye [preauth] Feb 13 01:01:03.172321 sshd[2167]: Disconnected from authenticating user root 62.99.74.172 port 42462 [preauth] Feb 13 01:01:03.174889 systemd[1]: sshd@22-139.178.94.233:22-62.99.74.172:42462.service: Deactivated successfully. Feb 13 01:01:03.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.94.233:22-62.99.74.172:42462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:01:03.269519 kernel: audit: type=1131 audit(1707786063.174:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.94.233:22-62.99.74.172:42462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:01:17.085629 systemd[1]: Started sshd@23-139.178.94.233:22-185.161.248.87:64001.service. Feb 13 01:01:17.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.94.233:22-185.161.248.87:64001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:01:17.178611 kernel: audit: type=1130 audit(1707786077.085:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.94.233:22-185.161.248.87:64001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:01:17.279395 sshd[2172]: kex_exchange_identification: Connection closed by remote host Feb 13 01:01:17.279395 sshd[2172]: Connection closed by 185.161.248.87 port 64001 Feb 13 01:01:17.280166 systemd[1]: sshd@23-139.178.94.233:22-185.161.248.87:64001.service: Deactivated successfully. Feb 13 01:01:17.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.94.233:22-185.161.248.87:64001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:01:17.380581 kernel: audit: type=1131 audit(1707786077.280:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.94.233:22-185.161.248.87:64001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:01:37.796589 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:01:37.795Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":2089} Feb 13 01:01:37.799590 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:01:37.798Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":2089,"took":"2.054159ms"} Feb 13 01:01:56.903885 systemd[1]: Started sshd@24-139.178.94.233:22-179.27.60.34:29406.service. Feb 13 01:01:56.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.94.233:22-179.27.60.34:29406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:01:56.997597 kernel: audit: type=1130 audit(1707786116.902:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.94.233:22-179.27.60.34:29406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:01:57.022289 systemd[1]: Started sshd@25-139.178.94.233:22-62.99.74.172:43816.service. Feb 13 01:01:57.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.94.233:22-62.99.74.172:43816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:01:57.115619 kernel: audit: type=1130 audit(1707786117.020:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.94.233:22-62.99.74.172:43816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:01:57.904784 sshd[2180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:01:57.903000 audit[2180]: USER_AUTH pid=2180 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:01:57.997589 kernel: audit: type=1100 audit(1707786117.903:235): pid=2180 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:01:58.022909 sshd[2177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:01:58.021000 audit[2177]: ANOM_LOGIN_FAILURES pid=2177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:01:58.022964 sshd[2177]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:01:58.021000 audit[2177]: USER_AUTH pid=2177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:01:58.178096 kernel: audit: type=2100 audit(1707786118.021:236): pid=2177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:01:58.178125 kernel: audit: type=1100 audit(1707786118.021:237): pid=2177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:02:00.408785 sshd[2177]: Failed password for root from 179.27.60.34 port 29406 ssh2 Feb 13 01:02:00.486877 sshd[2180]: Failed password for root from 62.99.74.172 port 43816 ssh2 Feb 13 01:02:02.033338 sshd[2180]: Received disconnect from 62.99.74.172 port 43816:11: Bye Bye [preauth] Feb 13 01:02:02.033338 sshd[2180]: Disconnected from authenticating user root 62.99.74.172 port 43816 [preauth] Feb 13 01:02:02.035944 systemd[1]: sshd@25-139.178.94.233:22-62.99.74.172:43816.service: Deactivated successfully. Feb 13 01:02:02.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.94.233:22-62.99.74.172:43816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:02:02.129466 kernel: audit: type=1131 audit(1707786122.035:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.94.233:22-62.99.74.172:43816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:02:02.200058 sshd[2177]: Received disconnect from 179.27.60.34 port 29406:11: Bye Bye [preauth] Feb 13 01:02:02.200058 sshd[2177]: Disconnected from authenticating user root 179.27.60.34 port 29406 [preauth] Feb 13 01:02:02.202536 systemd[1]: sshd@24-139.178.94.233:22-179.27.60.34:29406.service: Deactivated successfully. Feb 13 01:02:02.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.94.233:22-179.27.60.34:29406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:02:02.299587 kernel: audit: type=1131 audit(1707786122.201:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.94.233:22-179.27.60.34:29406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:02:51.250342 systemd[1]: Started sshd@26-139.178.94.233:22-62.99.74.172:39552.service. Feb 13 01:02:51.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.94.233:22-62.99.74.172:39552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:02:51.343600 kernel: audit: type=1130 audit(1707786171.250:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.94.233:22-62.99.74.172:39552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:02:52.146658 sshd[2186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:02:52.146000 audit[2186]: USER_AUTH pid=2186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:02:52.237402 kernel: audit: type=1100 audit(1707786172.146:241): pid=2186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:02:53.945613 sshd[2186]: Failed password for root from 62.99.74.172 port 39552 ssh2 Feb 13 01:02:54.286376 sshd[2186]: Received disconnect from 62.99.74.172 port 39552:11: Bye Bye [preauth] Feb 13 01:02:54.286376 sshd[2186]: Disconnected from authenticating user root 62.99.74.172 port 39552 [preauth] Feb 13 01:02:54.288955 systemd[1]: sshd@26-139.178.94.233:22-62.99.74.172:39552.service: Deactivated successfully. Feb 13 01:02:54.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.94.233:22-62.99.74.172:39552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:02:54.382585 kernel: audit: type=1131 audit(1707786174.289:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.94.233:22-62.99.74.172:39552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:03:07.172847 systemd[1]: Started sshd@27-139.178.94.233:22-179.27.60.34:48094.service. Feb 13 01:03:07.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.94.233:22-179.27.60.34:48094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:03:07.266554 kernel: audit: type=1130 audit(1707786187.171:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.94.233:22-179.27.60.34:48094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:03:08.306940 sshd[2190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:03:08.305000 audit[2190]: USER_AUTH pid=2190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:03:08.399436 kernel: audit: type=1100 audit(1707786188.305:244): pid=2190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:03:10.302019 sshd[2190]: Failed password for root from 179.27.60.34 port 48094 ssh2 Feb 13 01:03:12.478176 sshd[2190]: Received disconnect from 179.27.60.34 port 48094:11: Bye Bye [preauth] Feb 13 01:03:12.478176 sshd[2190]: Disconnected from authenticating user root 179.27.60.34 port 48094 [preauth] Feb 13 01:03:12.480555 systemd[1]: sshd@27-139.178.94.233:22-179.27.60.34:48094.service: Deactivated successfully. Feb 13 01:03:12.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.94.233:22-179.27.60.34:48094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:03:12.574592 kernel: audit: type=1131 audit(1707786192.479:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.94.233:22-179.27.60.34:48094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:03:43.819090 systemd[1]: Started sshd@28-139.178.94.233:22-62.99.74.172:36920.service. Feb 13 01:03:43.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.94.233:22-62.99.74.172:36920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:03:43.911473 kernel: audit: type=1130 audit(1707786223.818:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.94.233:22-62.99.74.172:36920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:03:44.711917 sshd[2194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:03:44.711000 audit[2194]: ANOM_LOGIN_FAILURES pid=2194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:03:44.712149 sshd[2194]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:03:44.711000 audit[2194]: USER_AUTH pid=2194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:03:44.867355 kernel: audit: type=2100 audit(1707786224.711:247): pid=2194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:03:44.867391 kernel: audit: type=1100 audit(1707786224.711:248): pid=2194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:03:46.647197 sshd[2194]: Failed password for root from 62.99.74.172 port 36920 ssh2 Feb 13 01:03:46.848043 sshd[2194]: Received disconnect from 62.99.74.172 port 36920:11: Bye Bye [preauth] Feb 13 01:03:46.848043 sshd[2194]: Disconnected from authenticating user root 62.99.74.172 port 36920 [preauth] Feb 13 01:03:46.850671 systemd[1]: sshd@28-139.178.94.233:22-62.99.74.172:36920.service: Deactivated successfully. Feb 13 01:03:46.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.94.233:22-62.99.74.172:36920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:03:46.943464 kernel: audit: type=1131 audit(1707786226.850:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.94.233:22-62.99.74.172:36920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:03:56.783342 systemd[1]: Started sshd@29-139.178.94.233:22-141.98.11.11:39888.service. Feb 13 01:03:56.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.94.233:22-141.98.11.11:39888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:03:56.876580 kernel: audit: type=1130 audit(1707786236.783:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.94.233:22-141.98.11.11:39888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:03:58.031573 sshd[2199]: Invalid user support from 141.98.11.11 port 39888 Feb 13 01:03:58.779138 sshd[2199]: pam_faillock(sshd:auth): User unknown Feb 13 01:03:58.780355 sshd[2199]: pam_unix(sshd:auth): check pass; user unknown Feb 13 01:03:58.780469 sshd[2199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.11 Feb 13 01:03:58.781360 sshd[2199]: pam_faillock(sshd:auth): User unknown Feb 13 01:03:58.781000 audit[2199]: USER_AUTH pid=2199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="support" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Feb 13 01:03:58.874599 kernel: audit: type=1100 audit(1707786238.781:251): pid=2199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="support" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Feb 13 01:04:00.640891 sshd[2199]: Failed password for invalid user support from 141.98.11.11 port 39888 ssh2 Feb 13 01:04:01.398545 sshd[2199]: Connection closed by invalid user support 141.98.11.11 port 39888 [preauth] Feb 13 01:04:01.401052 systemd[1]: sshd@29-139.178.94.233:22-141.98.11.11:39888.service: Deactivated successfully. Feb 13 01:04:01.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.94.233:22-141.98.11.11:39888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:04:01.494594 kernel: audit: type=1131 audit(1707786241.401:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.94.233:22-141.98.11.11:39888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:04:13.167720 systemd[1]: Started sshd@30-139.178.94.233:22-179.27.60.34:16281.service. Feb 13 01:04:13.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.94.233:22-179.27.60.34:16281 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:04:13.260402 kernel: audit: type=1130 audit(1707786253.166:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.94.233:22-179.27.60.34:16281 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:04:14.288299 sshd[2204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:04:14.287000 audit[2204]: USER_AUTH pid=2204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:04:14.381588 kernel: audit: type=1100 audit(1707786254.287:254): pid=2204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:04:15.676189 sshd[2204]: Failed password for root from 179.27.60.34 port 16281 ssh2 Feb 13 01:04:16.472021 sshd[2204]: Received disconnect from 179.27.60.34 port 16281:11: Bye Bye [preauth] Feb 13 01:04:16.472021 sshd[2204]: Disconnected from authenticating user root 179.27.60.34 port 16281 [preauth] Feb 13 01:04:16.474528 systemd[1]: sshd@30-139.178.94.233:22-179.27.60.34:16281.service: Deactivated successfully. Feb 13 01:04:16.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.94.233:22-179.27.60.34:16281 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:04:16.568604 kernel: audit: type=1131 audit(1707786256.473:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.94.233:22-179.27.60.34:16281 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:04:36.149406 systemd[1]: Started sshd@31-139.178.94.233:22-62.99.74.172:34262.service. Feb 13 01:04:36.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.94.233:22-62.99.74.172:34262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:04:36.242404 kernel: audit: type=1130 audit(1707786276.148:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.94.233:22-62.99.74.172:34262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:04:37.087541 sshd[2208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:04:37.086000 audit[2208]: ANOM_LOGIN_FAILURES pid=2208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:04:37.087780 sshd[2208]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:04:37.086000 audit[2208]: USER_AUTH pid=2208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:04:37.244193 kernel: audit: type=2100 audit(1707786277.086:257): pid=2208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:04:37.244225 kernel: audit: type=1100 audit(1707786277.086:258): pid=2208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:04:38.967254 sshd[2208]: Failed password for root from 62.99.74.172 port 34262 ssh2 Feb 13 01:04:39.229831 sshd[2208]: Received disconnect from 62.99.74.172 port 34262:11: Bye Bye [preauth] Feb 13 01:04:39.229831 sshd[2208]: Disconnected from authenticating user root 62.99.74.172 port 34262 [preauth] Feb 13 01:04:39.232262 systemd[1]: sshd@31-139.178.94.233:22-62.99.74.172:34262.service: Deactivated successfully. Feb 13 01:04:39.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.94.233:22-62.99.74.172:34262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:04:39.325611 kernel: audit: type=1131 audit(1707786279.231:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.94.233:22-62.99.74.172:34262 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:05:18.839161 systemd[1]: Started sshd@32-139.178.94.233:22-179.27.60.34:34965.service. Feb 13 01:05:18.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.94.233:22-179.27.60.34:34965 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:05:18.932586 kernel: audit: type=1130 audit(1707786318.838:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.94.233:22-179.27.60.34:34965 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:05:19.961572 sshd[2215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:05:19.961000 audit[2215]: USER_AUTH pid=2215 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:05:20.054584 kernel: audit: type=1100 audit(1707786319.961:261): pid=2215 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:05:21.603809 sshd[2215]: Failed password for root from 179.27.60.34 port 34965 ssh2 Feb 13 01:05:22.145779 sshd[2215]: Received disconnect from 179.27.60.34 port 34965:11: Bye Bye [preauth] Feb 13 01:05:22.145779 sshd[2215]: Disconnected from authenticating user root 179.27.60.34 port 34965 [preauth] Feb 13 01:05:22.148296 systemd[1]: sshd@32-139.178.94.233:22-179.27.60.34:34965.service: Deactivated successfully. Feb 13 01:05:22.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.94.233:22-179.27.60.34:34965 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:05:22.241611 kernel: audit: type=1131 audit(1707786322.148:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.94.233:22-179.27.60.34:34965 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:05:26.783224 systemd[1]: Started sshd@33-139.178.94.233:22-62.99.74.172:56842.service. Feb 13 01:05:26.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.94.233:22-62.99.74.172:56842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:05:26.876405 kernel: audit: type=1130 audit(1707786326.782:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.94.233:22-62.99.74.172:56842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:05:27.698270 sshd[2220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:05:27.697000 audit[2220]: ANOM_LOGIN_FAILURES pid=2220 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:05:27.698517 sshd[2220]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:05:27.697000 audit[2220]: USER_AUTH pid=2220 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:05:27.854500 kernel: audit: type=2100 audit(1707786327.697:264): pid=2220 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:05:27.854531 kernel: audit: type=1100 audit(1707786327.697:265): pid=2220 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:05:29.442234 sshd[2220]: Failed password for root from 62.99.74.172 port 56842 ssh2 Feb 13 01:05:29.839920 sshd[2220]: Received disconnect from 62.99.74.172 port 56842:11: Bye Bye [preauth] Feb 13 01:05:29.839920 sshd[2220]: Disconnected from authenticating user root 62.99.74.172 port 56842 [preauth] Feb 13 01:05:29.842451 systemd[1]: sshd@33-139.178.94.233:22-62.99.74.172:56842.service: Deactivated successfully. Feb 13 01:05:29.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.94.233:22-62.99.74.172:56842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:05:29.935468 kernel: audit: type=1131 audit(1707786329.841:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.94.233:22-62.99.74.172:56842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:05:58.219808 systemd[1]: Started sshd@34-139.178.94.233:22-185.196.8.151:35860.service. Feb 13 01:05:58.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.94.233:22-185.196.8.151:35860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:05:58.312594 kernel: audit: type=1130 audit(1707786358.218:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.94.233:22-185.196.8.151:35860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:05:58.375600 sshd[2226]: kex_exchange_identification: Connection closed by remote host Feb 13 01:05:58.375600 sshd[2226]: Connection closed by 185.196.8.151 port 35860 Feb 13 01:05:58.377096 systemd[1]: sshd@34-139.178.94.233:22-185.196.8.151:35860.service: Deactivated successfully. Feb 13 01:05:58.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.94.233:22-185.196.8.151:35860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:05:58.474590 kernel: audit: type=1131 audit(1707786358.376:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.94.233:22-185.196.8.151:35860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:06:03.406829 systemd[1]: Started sshd@35-139.178.94.233:22-185.196.8.151:35876.service. Feb 13 01:06:03.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.94.233:22-185.196.8.151:35876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:06:03.499402 kernel: audit: type=1130 audit(1707786363.405:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.94.233:22-185.196.8.151:35876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:06:03.562608 sshd[2229]: Unable to negotiate with 185.196.8.151 port 35876: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 01:06:03.563274 systemd[1]: sshd@35-139.178.94.233:22-185.196.8.151:35876.service: Deactivated successfully. Feb 13 01:06:03.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.94.233:22-185.196.8.151:35876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:06:03.655474 kernel: audit: type=1131 audit(1707786363.562:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.94.233:22-185.196.8.151:35876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:06:19.249096 systemd[1]: Started sshd@36-139.178.94.233:22-62.99.74.172:39996.service. Feb 13 01:06:19.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.94.233:22-62.99.74.172:39996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:06:19.342523 kernel: audit: type=1130 audit(1707786379.248:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.94.233:22-62.99.74.172:39996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:06:20.135682 sshd[2233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:06:20.135000 audit[2233]: USER_AUTH pid=2233 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:06:20.228577 kernel: audit: type=1100 audit(1707786380.135:272): pid=2233 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:06:22.155815 sshd[2233]: Failed password for root from 62.99.74.172 port 39996 ssh2 Feb 13 01:06:24.253528 sshd[2233]: Received disconnect from 62.99.74.172 port 39996:11: Bye Bye [preauth] Feb 13 01:06:24.253528 sshd[2233]: Disconnected from authenticating user root 62.99.74.172 port 39996 [preauth] Feb 13 01:06:24.256041 systemd[1]: sshd@36-139.178.94.233:22-62.99.74.172:39996.service: Deactivated successfully. Feb 13 01:06:24.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.94.233:22-62.99.74.172:39996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:06:24.349596 kernel: audit: type=1131 audit(1707786384.256:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.94.233:22-62.99.74.172:39996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:06:24.618089 systemd[1]: Started sshd@37-139.178.94.233:22-179.27.60.34:53651.service. Feb 13 01:06:24.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.94.233:22-179.27.60.34:53651 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:06:24.711610 kernel: audit: type=1130 audit(1707786384.618:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.94.233:22-179.27.60.34:53651 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:06:25.751199 sshd[2237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:06:25.750000 audit[2237]: ANOM_LOGIN_FAILURES pid=2237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:06:25.751455 sshd[2237]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:06:25.751000 audit[2237]: USER_AUTH pid=2237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:06:25.908263 kernel: audit: type=2100 audit(1707786385.750:275): pid=2237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:06:25.908294 kernel: audit: type=1100 audit(1707786385.751:276): pid=2237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:06:27.790776 sshd[2237]: Failed password for root from 179.27.60.34 port 53651 ssh2 Feb 13 01:06:29.914238 sshd[2237]: Received disconnect from 179.27.60.34 port 53651:11: Bye Bye [preauth] Feb 13 01:06:29.914238 sshd[2237]: Disconnected from authenticating user root 179.27.60.34 port 53651 [preauth] Feb 13 01:06:29.916775 systemd[1]: sshd@37-139.178.94.233:22-179.27.60.34:53651.service: Deactivated successfully. Feb 13 01:06:29.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.94.233:22-179.27.60.34:53651 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:06:30.010446 kernel: audit: type=1131 audit(1707786389.916:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.94.233:22-179.27.60.34:53651 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:06:37.800294 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:06:37.799Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":2628} Feb 13 01:06:37.802957 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:06:37.802Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":2628,"took":"2.421115ms"} Feb 13 01:07:12.752814 systemd[1]: Started sshd@38-139.178.94.233:22-62.99.74.172:41442.service. Feb 13 01:07:12.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.94.233:22-62.99.74.172:41442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:07:12.845401 kernel: audit: type=1130 audit(1707786432.751:278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.94.233:22-62.99.74.172:41442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:07:13.676162 sshd[2244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:07:13.674000 audit[2244]: ANOM_LOGIN_FAILURES pid=2244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:07:13.676435 sshd[2244]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:07:13.675000 audit[2244]: USER_AUTH pid=2244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:07:13.832817 kernel: audit: type=2100 audit(1707786433.674:279): pid=2244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:07:13.832848 kernel: audit: type=1100 audit(1707786433.675:280): pid=2244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:07:15.972197 sshd[2244]: Failed password for root from 62.99.74.172 port 41442 ssh2 Feb 13 01:07:17.800958 sshd[2244]: Received disconnect from 62.99.74.172 port 41442:11: Bye Bye [preauth] Feb 13 01:07:17.800958 sshd[2244]: Disconnected from authenticating user root 62.99.74.172 port 41442 [preauth] Feb 13 01:07:17.803476 systemd[1]: sshd@38-139.178.94.233:22-62.99.74.172:41442.service: Deactivated successfully. Feb 13 01:07:17.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.94.233:22-62.99.74.172:41442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:07:17.896421 kernel: audit: type=1131 audit(1707786437.802:281): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.94.233:22-62.99.74.172:41442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:07:31.137963 systemd[1]: Started sshd@39-139.178.94.233:22-179.27.60.34:21842.service. Feb 13 01:07:31.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.94.233:22-179.27.60.34:21842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:07:31.229406 kernel: audit: type=1130 audit(1707786451.137:282): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.94.233:22-179.27.60.34:21842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:07:32.249615 sshd[2250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:07:32.249000 audit[2250]: USER_AUTH pid=2250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:07:32.341465 kernel: audit: type=1100 audit(1707786452.249:283): pid=2250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:07:34.820790 sshd[2250]: Failed password for root from 179.27.60.34 port 21842 ssh2 Feb 13 01:07:36.416669 sshd[2250]: Received disconnect from 179.27.60.34 port 21842:11: Bye Bye [preauth] Feb 13 01:07:36.416669 sshd[2250]: Disconnected from authenticating user root 179.27.60.34 port 21842 [preauth] Feb 13 01:07:36.419121 systemd[1]: sshd@39-139.178.94.233:22-179.27.60.34:21842.service: Deactivated successfully. Feb 13 01:07:36.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.94.233:22-179.27.60.34:21842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:07:36.511430 kernel: audit: type=1131 audit(1707786456.419:284): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.94.233:22-179.27.60.34:21842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:08:08.253268 systemd[1]: Started sshd@40-139.178.94.233:22-62.99.74.172:37640.service. Feb 13 01:08:08.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.94.233:22-62.99.74.172:37640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:08:08.346594 kernel: audit: type=1130 audit(1707786488.251:285): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.94.233:22-62.99.74.172:37640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:08:09.142996 sshd[2256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:08:09.141000 audit[2256]: ANOM_LOGIN_FAILURES pid=2256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:08:09.143233 sshd[2256]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:08:09.141000 audit[2256]: USER_AUTH pid=2256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:08:09.300177 kernel: audit: type=2100 audit(1707786489.141:286): pid=2256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:08:09.300211 kernel: audit: type=1100 audit(1707786489.141:287): pid=2256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:08:11.794761 sshd[2256]: Failed password for root from 62.99.74.172 port 37640 ssh2 Feb 13 01:08:13.262852 sshd[2256]: Received disconnect from 62.99.74.172 port 37640:11: Bye Bye [preauth] Feb 13 01:08:13.262852 sshd[2256]: Disconnected from authenticating user root 62.99.74.172 port 37640 [preauth] Feb 13 01:08:13.265452 systemd[1]: sshd@40-139.178.94.233:22-62.99.74.172:37640.service: Deactivated successfully. Feb 13 01:08:13.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.94.233:22-62.99.74.172:37640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:08:13.359592 kernel: audit: type=1131 audit(1707786493.264:288): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.94.233:22-62.99.74.172:37640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:08:38.594642 systemd[1]: Started sshd@41-139.178.94.233:22-179.27.60.34:40528.service. Feb 13 01:08:38.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.94.233:22-179.27.60.34:40528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:08:38.688597 kernel: audit: type=1130 audit(1707786518.594:289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.94.233:22-179.27.60.34:40528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:08:39.740377 sshd[2262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:08:39.740000 audit[2262]: USER_AUTH pid=2262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:08:39.833589 kernel: audit: type=1100 audit(1707786519.740:290): pid=2262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:08:42.176923 sshd[2262]: Failed password for root from 179.27.60.34 port 40528 ssh2 Feb 13 01:08:43.915831 sshd[2262]: Received disconnect from 179.27.60.34 port 40528:11: Bye Bye [preauth] Feb 13 01:08:43.915831 sshd[2262]: Disconnected from authenticating user root 179.27.60.34 port 40528 [preauth] Feb 13 01:08:43.918437 systemd[1]: sshd@41-139.178.94.233:22-179.27.60.34:40528.service: Deactivated successfully. Feb 13 01:08:43.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.94.233:22-179.27.60.34:40528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:08:44.012453 kernel: audit: type=1131 audit(1707786523.918:291): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.94.233:22-179.27.60.34:40528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:09:02.668035 systemd[1]: Started sshd@42-139.178.94.233:22-62.99.74.172:47264.service. Feb 13 01:09:02.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.94.233:22-62.99.74.172:47264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:09:02.761598 kernel: audit: type=1130 audit(1707786542.667:292): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.94.233:22-62.99.74.172:47264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:09:03.558033 sshd[2267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:09:03.557000 audit[2267]: ANOM_LOGIN_FAILURES pid=2267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:09:03.558285 sshd[2267]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:09:03.558000 audit[2267]: USER_AUTH pid=2267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:09:03.712969 kernel: audit: type=2100 audit(1707786543.557:293): pid=2267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:09:03.713018 kernel: audit: type=1100 audit(1707786543.558:294): pid=2267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:09:06.290444 sshd[2267]: Failed password for root from 62.99.74.172 port 47264 ssh2 Feb 13 01:09:07.676459 sshd[2267]: Received disconnect from 62.99.74.172 port 47264:11: Bye Bye [preauth] Feb 13 01:09:07.676459 sshd[2267]: Disconnected from authenticating user root 62.99.74.172 port 47264 [preauth] Feb 13 01:09:07.679090 systemd[1]: sshd@42-139.178.94.233:22-62.99.74.172:47264.service: Deactivated successfully. Feb 13 01:09:07.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.94.233:22-62.99.74.172:47264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:09:07.773533 kernel: audit: type=1131 audit(1707786547.679:295): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.94.233:22-62.99.74.172:47264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:09:46.900963 systemd[1]: Started sshd@43-139.178.94.233:22-179.27.60.34:59212.service. Feb 13 01:09:46.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.94.233:22-179.27.60.34:59212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:09:46.994460 kernel: audit: type=1130 audit(1707786586.900:296): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.94.233:22-179.27.60.34:59212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:09:48.028471 sshd[2272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:09:48.028000 audit[2272]: USER_AUTH pid=2272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:09:48.121571 kernel: audit: type=1100 audit(1707786588.028:297): pid=2272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:09:49.937848 sshd[2272]: Failed password for root from 179.27.60.34 port 59212 ssh2 Feb 13 01:09:50.209678 sshd[2272]: Received disconnect from 179.27.60.34 port 59212:11: Bye Bye [preauth] Feb 13 01:09:50.209678 sshd[2272]: Disconnected from authenticating user root 179.27.60.34 port 59212 [preauth] Feb 13 01:09:50.212132 systemd[1]: sshd@43-139.178.94.233:22-179.27.60.34:59212.service: Deactivated successfully. Feb 13 01:09:50.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.94.233:22-179.27.60.34:59212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:09:50.305459 kernel: audit: type=1131 audit(1707786590.212:298): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.94.233:22-179.27.60.34:59212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:09:56.669908 systemd[1]: Started sshd@44-139.178.94.233:22-62.99.74.172:44048.service. Feb 13 01:09:56.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.94.233:22-62.99.74.172:44048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:09:56.762425 kernel: audit: type=1130 audit(1707786596.669:299): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.94.233:22-62.99.74.172:44048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:09:57.570257 sshd[2277]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:09:57.570000 audit[2277]: ANOM_LOGIN_FAILURES pid=2277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:09:57.570508 sshd[2277]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:09:57.570000 audit[2277]: USER_AUTH pid=2277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:09:57.725087 kernel: audit: type=2100 audit(1707786597.570:300): pid=2277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:09:57.725117 kernel: audit: type=1100 audit(1707786597.570:301): pid=2277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:10:00.382877 sshd[2277]: Failed password for root from 62.99.74.172 port 44048 ssh2 Feb 13 01:10:01.689453 sshd[2277]: Received disconnect from 62.99.74.172 port 44048:11: Bye Bye [preauth] Feb 13 01:10:01.689453 sshd[2277]: Disconnected from authenticating user root 62.99.74.172 port 44048 [preauth] Feb 13 01:10:01.691945 systemd[1]: sshd@44-139.178.94.233:22-62.99.74.172:44048.service: Deactivated successfully. Feb 13 01:10:01.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.94.233:22-62.99.74.172:44048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:10:01.786596 kernel: audit: type=1131 audit(1707786601.692:302): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.94.233:22-62.99.74.172:44048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:10:18.104682 systemd[1]: Started sshd@45-139.178.94.233:22-104.28.225.103:64315.service. Feb 13 01:10:18.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.94.233:22-104.28.225.103:64315 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:10:18.197402 kernel: audit: type=1130 audit(1707786618.104:303): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.94.233:22-104.28.225.103:64315 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:10:18.245771 sshd[2288]: kex_exchange_identification: Connection closed by remote host Feb 13 01:10:18.245771 sshd[2288]: Connection closed by 104.28.225.103 port 64315 Feb 13 01:10:18.246179 systemd[1]: sshd@45-139.178.94.233:22-104.28.225.103:64315.service: Deactivated successfully. Feb 13 01:10:18.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.94.233:22-104.28.225.103:64315 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:10:18.339599 kernel: audit: type=1131 audit(1707786618.245:304): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.94.233:22-104.28.225.103:64315 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:10:50.289594 systemd[1]: Started sshd@46-139.178.94.233:22-62.99.74.172:44856.service. Feb 13 01:10:50.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.94.233:22-62.99.74.172:44856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:10:50.383602 kernel: audit: type=1130 audit(1707786650.289:305): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.94.233:22-62.99.74.172:44856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:10:51.176522 sshd[2291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:10:51.176000 audit[2291]: USER_AUTH pid=2291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:10:51.267587 kernel: audit: type=1100 audit(1707786651.176:306): pid=2291 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:10:53.401813 sshd[2291]: Failed password for root from 62.99.74.172 port 44856 ssh2 Feb 13 01:10:55.293585 sshd[2291]: Received disconnect from 62.99.74.172 port 44856:11: Bye Bye [preauth] Feb 13 01:10:55.293585 sshd[2291]: Disconnected from authenticating user root 62.99.74.172 port 44856 [preauth] Feb 13 01:10:55.296387 systemd[1]: sshd@46-139.178.94.233:22-62.99.74.172:44856.service: Deactivated successfully. Feb 13 01:10:55.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.94.233:22-62.99.74.172:44856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:10:55.390601 kernel: audit: type=1131 audit(1707786655.296:307): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.94.233:22-62.99.74.172:44856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:10:57.949045 systemd[1]: Started sshd@47-139.178.94.233:22-179.27.60.34:27401.service. Feb 13 01:10:57.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.94.233:22-179.27.60.34:27401 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:10:58.042585 kernel: audit: type=1130 audit(1707786657.948:308): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.94.233:22-179.27.60.34:27401 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:10:59.086273 sshd[2297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:10:59.086000 audit[2297]: ANOM_LOGIN_FAILURES pid=2297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:10:59.086523 sshd[2297]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:10:59.086000 audit[2297]: USER_AUTH pid=2297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:10:59.242344 kernel: audit: type=2100 audit(1707786659.086:309): pid=2297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:10:59.242376 kernel: audit: type=1100 audit(1707786659.086:310): pid=2297 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:11:01.075904 sshd[2297]: Failed password for root from 179.27.60.34 port 27401 ssh2 Feb 13 01:11:03.260438 sshd[2297]: Received disconnect from 179.27.60.34 port 27401:11: Bye Bye [preauth] Feb 13 01:11:03.260438 sshd[2297]: Disconnected from authenticating user root 179.27.60.34 port 27401 [preauth] Feb 13 01:11:03.263027 systemd[1]: sshd@47-139.178.94.233:22-179.27.60.34:27401.service: Deactivated successfully. Feb 13 01:11:03.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.94.233:22-179.27.60.34:27401 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:11:03.356411 kernel: audit: type=1131 audit(1707786663.263:311): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.94.233:22-179.27.60.34:27401 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:11:37.796562 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:11:37.796Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":3166} Feb 13 01:11:37.798952 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:11:37.798Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":3166,"took":"2.036561ms"} Feb 13 01:11:44.888621 systemd[1]: Started sshd@48-139.178.94.233:22-62.99.74.172:55772.service. Feb 13 01:11:44.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.94.233:22-62.99.74.172:55772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:11:44.981590 kernel: audit: type=1130 audit(1707786704.888:312): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.94.233:22-62.99.74.172:55772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:11:45.778440 sshd[2303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:11:45.778000 audit[2303]: ANOM_LOGIN_FAILURES pid=2303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:11:45.778691 sshd[2303]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:11:45.778000 audit[2303]: USER_AUTH pid=2303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:11:45.934719 kernel: audit: type=2100 audit(1707786705.778:313): pid=2303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:11:45.934756 kernel: audit: type=1100 audit(1707786705.778:314): pid=2303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:11:48.084335 sshd[2303]: Failed password for root from 62.99.74.172 port 55772 ssh2 Feb 13 01:11:49.897911 sshd[2303]: Received disconnect from 62.99.74.172 port 55772:11: Bye Bye [preauth] Feb 13 01:11:49.897911 sshd[2303]: Disconnected from authenticating user root 62.99.74.172 port 55772 [preauth] Feb 13 01:11:49.900416 systemd[1]: sshd@48-139.178.94.233:22-62.99.74.172:55772.service: Deactivated successfully. Feb 13 01:11:49.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.94.233:22-62.99.74.172:55772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:11:49.994595 kernel: audit: type=1131 audit(1707786709.900:315): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.94.233:22-62.99.74.172:55772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:12:03.539371 systemd[1]: Started sshd@49-139.178.94.233:22-179.27.60.34:46089.service. Feb 13 01:12:03.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.94.233:22-179.27.60.34:46089 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:12:03.632463 kernel: audit: type=1130 audit(1707786723.539:316): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.94.233:22-179.27.60.34:46089 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:12:04.649934 sshd[2307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:12:04.649000 audit[2307]: USER_AUTH pid=2307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:12:04.741586 kernel: audit: type=1100 audit(1707786724.649:317): pid=2307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:12:06.564198 sshd[2307]: Failed password for root from 179.27.60.34 port 46089 ssh2 Feb 13 01:12:06.827464 sshd[2307]: Received disconnect from 179.27.60.34 port 46089:11: Bye Bye [preauth] Feb 13 01:12:06.827464 sshd[2307]: Disconnected from authenticating user root 179.27.60.34 port 46089 [preauth] Feb 13 01:12:06.829854 systemd[1]: sshd@49-139.178.94.233:22-179.27.60.34:46089.service: Deactivated successfully. Feb 13 01:12:06.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.94.233:22-179.27.60.34:46089 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:12:06.923594 kernel: audit: type=1131 audit(1707786726.829:318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.94.233:22-179.27.60.34:46089 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:12:40.312267 systemd[1]: Started sshd@50-139.178.94.233:22-62.99.74.172:47884.service. Feb 13 01:12:40.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.94.233:22-62.99.74.172:47884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:12:40.404585 kernel: audit: type=1130 audit(1707786760.311:319): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.94.233:22-62.99.74.172:47884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:12:41.221598 sshd[2312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:12:41.221000 audit[2312]: ANOM_LOGIN_FAILURES pid=2312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:12:41.221845 sshd[2312]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:12:41.221000 audit[2312]: USER_AUTH pid=2312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:12:41.376605 kernel: audit: type=2100 audit(1707786761.221:320): pid=2312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:12:41.376644 kernel: audit: type=1100 audit(1707786761.221:321): pid=2312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:12:42.880106 sshd[2312]: Failed password for root from 62.99.74.172 port 47884 ssh2 Feb 13 01:12:43.357020 sshd[2312]: Received disconnect from 62.99.74.172 port 47884:11: Bye Bye [preauth] Feb 13 01:12:43.357020 sshd[2312]: Disconnected from authenticating user root 62.99.74.172 port 47884 [preauth] Feb 13 01:12:43.359702 systemd[1]: sshd@50-139.178.94.233:22-62.99.74.172:47884.service: Deactivated successfully. Feb 13 01:12:43.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.94.233:22-62.99.74.172:47884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:12:43.453595 kernel: audit: type=1131 audit(1707786763.359:322): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.94.233:22-62.99.74.172:47884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:13:12.995209 systemd[1]: Started sshd@51-139.178.94.233:22-179.27.60.34:64777.service. Feb 13 01:13:12.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.94.233:22-179.27.60.34:64777 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:13:13.088574 kernel: audit: type=1130 audit(1707786792.994:323): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.94.233:22-179.27.60.34:64777 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:13:14.123488 sshd[2317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:13:14.123000 audit[2317]: USER_AUTH pid=2317 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:13:14.216583 kernel: audit: type=1100 audit(1707786794.123:324): pid=2317 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:13:16.313631 sshd[2317]: Failed password for root from 179.27.60.34 port 64777 ssh2 Feb 13 01:13:18.287849 sshd[2317]: Received disconnect from 179.27.60.34 port 64777:11: Bye Bye [preauth] Feb 13 01:13:18.287849 sshd[2317]: Disconnected from authenticating user root 179.27.60.34 port 64777 [preauth] Feb 13 01:13:18.290315 systemd[1]: sshd@51-139.178.94.233:22-179.27.60.34:64777.service: Deactivated successfully. Feb 13 01:13:18.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.94.233:22-179.27.60.34:64777 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:13:18.383449 kernel: audit: type=1131 audit(1707786798.290:325): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.94.233:22-179.27.60.34:64777 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:13:37.679793 systemd[1]: Started sshd@52-139.178.94.233:22-62.99.74.172:51600.service. Feb 13 01:13:37.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.94.233:22-62.99.74.172:51600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:13:37.772532 kernel: audit: type=1130 audit(1707786817.679:326): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.94.233:22-62.99.74.172:51600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:13:38.632242 sshd[2321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:13:38.632000 audit[2321]: ANOM_LOGIN_FAILURES pid=2321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:13:38.632502 sshd[2321]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:13:38.632000 audit[2321]: USER_AUTH pid=2321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:13:38.789537 kernel: audit: type=2100 audit(1707786818.632:327): pid=2321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:13:38.789562 kernel: audit: type=1100 audit(1707786818.632:328): pid=2321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:13:40.782613 sshd[2321]: Failed password for root from 62.99.74.172 port 51600 ssh2 Feb 13 01:13:42.762925 sshd[2321]: Received disconnect from 62.99.74.172 port 51600:11: Bye Bye [preauth] Feb 13 01:13:42.762925 sshd[2321]: Disconnected from authenticating user root 62.99.74.172 port 51600 [preauth] Feb 13 01:13:42.765443 systemd[1]: sshd@52-139.178.94.233:22-62.99.74.172:51600.service: Deactivated successfully. Feb 13 01:13:42.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.94.233:22-62.99.74.172:51600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:13:42.858455 kernel: audit: type=1131 audit(1707786822.765:329): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.94.233:22-62.99.74.172:51600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:14:25.007552 systemd[1]: Started sshd@53-139.178.94.233:22-179.27.60.34:32966.service. Feb 13 01:14:25.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.94.233:22-179.27.60.34:32966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:14:25.100421 kernel: audit: type=1130 audit(1707786865.006:330): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.94.233:22-179.27.60.34:32966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:14:26.122770 sshd[2326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:14:26.121000 audit[2326]: USER_AUTH pid=2326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:14:26.215470 kernel: audit: type=1100 audit(1707786866.121:331): pid=2326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:14:28.864755 sshd[2326]: Failed password for root from 179.27.60.34 port 32966 ssh2 Feb 13 01:14:30.288268 sshd[2326]: Received disconnect from 179.27.60.34 port 32966:11: Bye Bye [preauth] Feb 13 01:14:30.288268 sshd[2326]: Disconnected from authenticating user root 179.27.60.34 port 32966 [preauth] Feb 13 01:14:30.291111 systemd[1]: sshd@53-139.178.94.233:22-179.27.60.34:32966.service: Deactivated successfully. Feb 13 01:14:30.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.94.233:22-179.27.60.34:32966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:14:30.385608 kernel: audit: type=1131 audit(1707786870.290:332): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.94.233:22-179.27.60.34:32966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:14:36.021641 systemd[1]: Started sshd@54-139.178.94.233:22-62.99.74.172:42464.service. Feb 13 01:14:36.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.94.233:22-62.99.74.172:42464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:14:36.114597 kernel: audit: type=1130 audit(1707786876.020:333): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.94.233:22-62.99.74.172:42464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:14:36.897497 sshd[2330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:14:36.896000 audit[2330]: ANOM_LOGIN_FAILURES pid=2330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:14:36.897746 sshd[2330]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:14:36.896000 audit[2330]: USER_AUTH pid=2330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:14:37.053366 kernel: audit: type=2100 audit(1707786876.896:334): pid=2330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:14:37.053399 kernel: audit: type=1100 audit(1707786876.896:335): pid=2330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:14:38.344610 sshd[2330]: Failed password for root from 62.99.74.172 port 42464 ssh2 Feb 13 01:14:39.028080 sshd[2330]: Received disconnect from 62.99.74.172 port 42464:11: Bye Bye [preauth] Feb 13 01:14:39.028080 sshd[2330]: Disconnected from authenticating user root 62.99.74.172 port 42464 [preauth] Feb 13 01:14:39.030631 systemd[1]: sshd@54-139.178.94.233:22-62.99.74.172:42464.service: Deactivated successfully. Feb 13 01:14:39.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.94.233:22-62.99.74.172:42464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:14:39.124543 kernel: audit: type=1131 audit(1707786879.029:336): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.94.233:22-62.99.74.172:42464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:15:32.492887 systemd[1]: Started sshd@55-139.178.94.233:22-62.99.74.172:57878.service. Feb 13 01:15:32.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.94.233:22-62.99.74.172:57878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:15:32.586465 kernel: audit: type=1130 audit(1707786932.491:337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.94.233:22-62.99.74.172:57878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:15:33.384309 sshd[2339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:15:33.383000 audit[2339]: USER_AUTH pid=2339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:15:33.477584 kernel: audit: type=1100 audit(1707786933.383:338): pid=2339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:15:35.323527 sshd[2339]: Failed password for root from 62.99.74.172 port 57878 ssh2 Feb 13 01:15:35.521587 sshd[2339]: Received disconnect from 62.99.74.172 port 57878:11: Bye Bye [preauth] Feb 13 01:15:35.521587 sshd[2339]: Disconnected from authenticating user root 62.99.74.172 port 57878 [preauth] Feb 13 01:15:35.524155 systemd[1]: sshd@55-139.178.94.233:22-62.99.74.172:57878.service: Deactivated successfully. Feb 13 01:15:35.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.94.233:22-62.99.74.172:57878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:15:35.583538 systemd[1]: Started sshd@56-139.178.94.233:22-179.27.60.34:51656.service. Feb 13 01:15:35.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.94.233:22-179.27.60.34:51656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:15:35.708863 kernel: audit: type=1131 audit(1707786935.523:339): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.94.233:22-62.99.74.172:57878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:15:35.708891 kernel: audit: type=1130 audit(1707786935.582:340): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.94.233:22-179.27.60.34:51656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:15:36.700661 sshd[2343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:15:36.699000 audit[2343]: ANOM_LOGIN_FAILURES pid=2343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:15:36.700897 sshd[2343]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:15:36.699000 audit[2343]: USER_AUTH pid=2343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:15:36.856476 kernel: audit: type=2100 audit(1707786936.699:341): pid=2343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:15:36.856523 kernel: audit: type=1100 audit(1707786936.699:342): pid=2343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:15:39.051723 sshd[2343]: Failed password for root from 179.27.60.34 port 51656 ssh2 Feb 13 01:15:40.866506 sshd[2343]: Received disconnect from 179.27.60.34 port 51656:11: Bye Bye [preauth] Feb 13 01:15:40.866506 sshd[2343]: Disconnected from authenticating user root 179.27.60.34 port 51656 [preauth] Feb 13 01:15:40.869037 systemd[1]: sshd@56-139.178.94.233:22-179.27.60.34:51656.service: Deactivated successfully. Feb 13 01:15:40.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.94.233:22-179.27.60.34:51656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:15:40.962603 kernel: audit: type=1131 audit(1707786940.868:343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.94.233:22-179.27.60.34:51656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:16:25.547393 systemd[1]: Started sshd@57-139.178.94.233:22-62.99.74.172:41994.service. Feb 13 01:16:25.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.94.233:22-62.99.74.172:41994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:16:25.640595 kernel: audit: type=1130 audit(1707786985.547:344): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.94.233:22-62.99.74.172:41994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:16:26.442892 sshd[2349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:16:26.442000 audit[2349]: USER_AUTH pid=2349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:16:26.534593 kernel: audit: type=1100 audit(1707786986.442:345): pid=2349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:16:28.658326 sshd[2349]: Failed password for root from 62.99.74.172 port 41994 ssh2 Feb 13 01:16:30.563498 sshd[2349]: Received disconnect from 62.99.74.172 port 41994:11: Bye Bye [preauth] Feb 13 01:16:30.563498 sshd[2349]: Disconnected from authenticating user root 62.99.74.172 port 41994 [preauth] Feb 13 01:16:30.566001 systemd[1]: sshd@57-139.178.94.233:22-62.99.74.172:41994.service: Deactivated successfully. Feb 13 01:16:30.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.94.233:22-62.99.74.172:41994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:16:30.659597 kernel: audit: type=1131 audit(1707786990.566:346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.94.233:22-62.99.74.172:41994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:16:37.798555 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:16:37.797Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":3704} Feb 13 01:16:37.803216 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:16:37.802Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":3704,"took":"4.410464ms"} Feb 13 01:16:43.870014 systemd[1]: Started sshd@58-139.178.94.233:22-179.27.60.34:19853.service. Feb 13 01:16:43.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.94.233:22-179.27.60.34:19853 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:16:43.963613 kernel: audit: type=1130 audit(1707787003.869:347): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.94.233:22-179.27.60.34:19853 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:16:44.978861 sshd[2353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:16:44.978000 audit[2353]: USER_AUTH pid=2353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:16:45.071587 kernel: audit: type=1100 audit(1707787004.978:348): pid=2353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:16:46.661779 sshd[2353]: Failed password for root from 179.27.60.34 port 19853 ssh2 Feb 13 01:16:47.155430 sshd[2353]: Received disconnect from 179.27.60.34 port 19853:11: Bye Bye [preauth] Feb 13 01:16:47.155430 sshd[2353]: Disconnected from authenticating user root 179.27.60.34 port 19853 [preauth] Feb 13 01:16:47.158023 systemd[1]: sshd@58-139.178.94.233:22-179.27.60.34:19853.service: Deactivated successfully. Feb 13 01:16:47.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.94.233:22-179.27.60.34:19853 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:16:47.251614 kernel: audit: type=1131 audit(1707787007.158:349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.94.233:22-179.27.60.34:19853 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:17:18.389964 systemd[1]: Started sshd@59-139.178.94.233:22-62.99.74.172:35926.service. Feb 13 01:17:18.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.94.233:22-62.99.74.172:35926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:17:18.483598 kernel: audit: type=1130 audit(1707787038.389:350): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.94.233:22-62.99.74.172:35926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:17:19.284132 sshd[2359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:17:19.282000 audit[2359]: ANOM_LOGIN_FAILURES pid=2359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:17:19.284370 sshd[2359]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:17:19.283000 audit[2359]: USER_AUTH pid=2359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:17:19.439754 kernel: audit: type=2100 audit(1707787039.282:351): pid=2359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:17:19.439816 kernel: audit: type=1100 audit(1707787039.283:352): pid=2359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:17:20.772517 sshd[2359]: Failed password for root from 62.99.74.172 port 35926 ssh2 Feb 13 01:17:21.418459 sshd[2359]: Received disconnect from 62.99.74.172 port 35926:11: Bye Bye [preauth] Feb 13 01:17:21.418459 sshd[2359]: Disconnected from authenticating user root 62.99.74.172 port 35926 [preauth] Feb 13 01:17:21.421004 systemd[1]: sshd@59-139.178.94.233:22-62.99.74.172:35926.service: Deactivated successfully. Feb 13 01:17:21.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.94.233:22-62.99.74.172:35926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:17:21.514617 kernel: audit: type=1131 audit(1707787041.420:353): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.94.233:22-62.99.74.172:35926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:17:51.003153 systemd[1]: Started sshd@60-139.178.94.233:22-179.27.60.34:38541.service. Feb 13 01:17:51.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.94.233:22-179.27.60.34:38541 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:17:51.095466 kernel: audit: type=1130 audit(1707787071.001:354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.94.233:22-179.27.60.34:38541 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:17:52.118739 sshd[2363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:17:52.117000 audit[2363]: USER_AUTH pid=2363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:17:52.211587 kernel: audit: type=1100 audit(1707787072.117:355): pid=2363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:17:53.471285 sshd[2363]: Failed password for root from 179.27.60.34 port 38541 ssh2 Feb 13 01:17:54.305668 sshd[2363]: Received disconnect from 179.27.60.34 port 38541:11: Bye Bye [preauth] Feb 13 01:17:54.305668 sshd[2363]: Disconnected from authenticating user root 179.27.60.34 port 38541 [preauth] Feb 13 01:17:54.308143 systemd[1]: sshd@60-139.178.94.233:22-179.27.60.34:38541.service: Deactivated successfully. Feb 13 01:17:54.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.94.233:22-179.27.60.34:38541 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:17:54.401598 kernel: audit: type=1131 audit(1707787074.307:356): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.94.233:22-179.27.60.34:38541 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:17:56.658655 systemd[1]: Started sshd@61-139.178.94.233:22-138.197.18.220:46636.service. Feb 13 01:17:56.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.94.233:22-138.197.18.220:46636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:17:56.731751 sshd[2368]: kex_exchange_identification: Connection closed by remote host Feb 13 01:17:56.731751 sshd[2368]: Connection closed by 138.197.18.220 port 46636 Feb 13 01:17:56.732261 systemd[1]: sshd@61-139.178.94.233:22-138.197.18.220:46636.service: Deactivated successfully. Feb 13 01:17:56.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.94.233:22-138.197.18.220:46636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:17:56.841670 kernel: audit: type=1130 audit(1707787076.657:357): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.94.233:22-138.197.18.220:46636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:17:56.841702 kernel: audit: type=1131 audit(1707787076.731:358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.94.233:22-138.197.18.220:46636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:18:09.452198 systemd[1]: Started sshd@62-139.178.94.233:22-62.99.74.172:50628.service. Feb 13 01:18:09.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.94.233:22-62.99.74.172:50628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:18:09.544404 kernel: audit: type=1130 audit(1707787089.450:359): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.94.233:22-62.99.74.172:50628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:18:10.329950 sshd[2372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:18:10.328000 audit[2372]: ANOM_LOGIN_FAILURES pid=2372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:18:10.330190 sshd[2372]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:18:10.328000 audit[2372]: USER_AUTH pid=2372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:18:10.486868 kernel: audit: type=2100 audit(1707787090.328:360): pid=2372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:18:10.486895 kernel: audit: type=1100 audit(1707787090.328:361): pid=2372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:18:12.154516 sshd[2372]: Failed password for root from 62.99.74.172 port 50628 ssh2 Feb 13 01:18:12.458283 sshd[2372]: Received disconnect from 62.99.74.172 port 50628:11: Bye Bye [preauth] Feb 13 01:18:12.458283 sshd[2372]: Disconnected from authenticating user root 62.99.74.172 port 50628 [preauth] Feb 13 01:18:12.460695 systemd[1]: sshd@62-139.178.94.233:22-62.99.74.172:50628.service: Deactivated successfully. Feb 13 01:18:12.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.94.233:22-62.99.74.172:50628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:18:12.554602 kernel: audit: type=1131 audit(1707787092.459:362): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.94.233:22-62.99.74.172:50628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:19:00.316994 systemd[1]: Started sshd@63-139.178.94.233:22-179.27.60.34:57231.service. Feb 13 01:19:00.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.94.233:22-179.27.60.34:57231 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:19:00.410601 kernel: audit: type=1130 audit(1707787140.316:363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.94.233:22-179.27.60.34:57231 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:19:01.433422 sshd[2380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:19:01.433000 audit[2380]: USER_AUTH pid=2380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:19:01.525585 kernel: audit: type=1100 audit(1707787141.433:364): pid=2380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:19:01.589230 systemd[1]: Started sshd@64-139.178.94.233:22-62.99.74.172:52746.service. Feb 13 01:19:01.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.94.233:22-62.99.74.172:52746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:19:01.682599 kernel: audit: type=1130 audit(1707787141.588:365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.94.233:22-62.99.74.172:52746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:19:02.461945 sshd[2383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:19:02.461000 audit[2383]: ANOM_LOGIN_FAILURES pid=2383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:19:02.462183 sshd[2383]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:19:02.461000 audit[2383]: USER_AUTH pid=2383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:19:02.617121 kernel: audit: type=2100 audit(1707787142.461:366): pid=2383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:19:02.617171 kernel: audit: type=1100 audit(1707787142.461:367): pid=2383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:19:03.593747 sshd[2380]: Failed password for root from 179.27.60.34 port 57231 ssh2 Feb 13 01:19:04.426605 sshd[2383]: Failed password for root from 62.99.74.172 port 52746 ssh2 Feb 13 01:19:04.590812 sshd[2383]: Received disconnect from 62.99.74.172 port 52746:11: Bye Bye [preauth] Feb 13 01:19:04.590812 sshd[2383]: Disconnected from authenticating user root 62.99.74.172 port 52746 [preauth] Feb 13 01:19:04.593324 systemd[1]: sshd@64-139.178.94.233:22-62.99.74.172:52746.service: Deactivated successfully. Feb 13 01:19:04.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.94.233:22-62.99.74.172:52746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:19:04.686455 kernel: audit: type=1131 audit(1707787144.593:368): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.94.233:22-62.99.74.172:52746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:19:05.596978 sshd[2380]: Received disconnect from 179.27.60.34 port 57231:11: Bye Bye [preauth] Feb 13 01:19:05.596978 sshd[2380]: Disconnected from authenticating user root 179.27.60.34 port 57231 [preauth] Feb 13 01:19:05.599524 systemd[1]: sshd@63-139.178.94.233:22-179.27.60.34:57231.service: Deactivated successfully. Feb 13 01:19:05.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.94.233:22-179.27.60.34:57231 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:19:05.692597 kernel: audit: type=1131 audit(1707787145.599:369): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.94.233:22-179.27.60.34:57231 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:19:55.714444 systemd[1]: Started sshd@65-139.178.94.233:22-62.99.74.172:42012.service. Feb 13 01:19:55.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.94.233:22-62.99.74.172:42012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:19:55.807591 kernel: audit: type=1130 audit(1707787195.713:370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.94.233:22-62.99.74.172:42012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:19:57.004295 sshd[2389]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:19:57.003000 audit[2389]: USER_AUTH pid=2389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:19:57.097464 kernel: audit: type=1100 audit(1707787197.003:371): pid=2389 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:19:59.520442 sshd[2389]: Failed password for root from 62.99.74.172 port 42012 ssh2 Feb 13 01:20:01.118573 sshd[2389]: Received disconnect from 62.99.74.172 port 42012:11: Bye Bye [preauth] Feb 13 01:20:01.118573 sshd[2389]: Disconnected from authenticating user root 62.99.74.172 port 42012 [preauth] Feb 13 01:20:01.121212 systemd[1]: sshd@65-139.178.94.233:22-62.99.74.172:42012.service: Deactivated successfully. Feb 13 01:20:01.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.94.233:22-62.99.74.172:42012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:20:01.214593 kernel: audit: type=1131 audit(1707787201.120:372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.94.233:22-62.99.74.172:42012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:20:07.170025 systemd[1]: Started sshd@66-139.178.94.233:22-179.27.60.34:25416.service. Feb 13 01:20:07.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.94.233:22-179.27.60.34:25416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:20:07.263600 kernel: audit: type=1130 audit(1707787207.168:373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.94.233:22-179.27.60.34:25416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:20:08.296331 sshd[2395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:20:08.295000 audit[2395]: ANOM_LOGIN_FAILURES pid=2395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:20:08.296584 sshd[2395]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:20:08.295000 audit[2395]: USER_AUTH pid=2395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:20:08.453574 kernel: audit: type=2100 audit(1707787208.295:374): pid=2395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:20:08.453609 kernel: audit: type=1100 audit(1707787208.295:375): pid=2395 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:20:10.321119 sshd[2395]: Failed password for root from 179.27.60.34 port 25416 ssh2 Feb 13 01:20:12.461873 sshd[2395]: Received disconnect from 179.27.60.34 port 25416:11: Bye Bye [preauth] Feb 13 01:20:12.461873 sshd[2395]: Disconnected from authenticating user root 179.27.60.34 port 25416 [preauth] Feb 13 01:20:12.464366 systemd[1]: sshd@66-139.178.94.233:22-179.27.60.34:25416.service: Deactivated successfully. Feb 13 01:20:12.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.94.233:22-179.27.60.34:25416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:20:12.557444 kernel: audit: type=1131 audit(1707787212.463:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.94.233:22-179.27.60.34:25416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:20:29.573938 systemd[1]: Started sshd@67-139.178.94.233:22-111.229.16.113:58460.service. Feb 13 01:20:29.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.94.233:22-111.229.16.113:58460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:20:29.666404 kernel: audit: type=1130 audit(1707787229.572:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.94.233:22-111.229.16.113:58460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:20:30.472098 sshd[2402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:20:30.470000 audit[2402]: ANOM_LOGIN_FAILURES pid=2402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:20:30.472336 sshd[2402]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:20:30.471000 audit[2402]: USER_AUTH pid=2402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:20:30.628532 kernel: audit: type=2100 audit(1707787230.470:378): pid=2402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:20:30.628565 kernel: audit: type=1100 audit(1707787230.471:379): pid=2402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:20:32.516761 sshd[2402]: Failed password for root from 111.229.16.113 port 58460 ssh2 Feb 13 01:20:34.592471 sshd[2402]: Received disconnect from 111.229.16.113 port 58460:11: Bye Bye [preauth] Feb 13 01:20:34.592471 sshd[2402]: Disconnected from authenticating user root 111.229.16.113 port 58460 [preauth] Feb 13 01:20:34.595032 systemd[1]: sshd@67-139.178.94.233:22-111.229.16.113:58460.service: Deactivated successfully. Feb 13 01:20:34.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.94.233:22-111.229.16.113:58460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:20:34.688472 kernel: audit: type=1131 audit(1707787234.594:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.94.233:22-111.229.16.113:58460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:20:51.712752 systemd[1]: Started sshd@68-139.178.94.233:22-62.99.74.172:35816.service. Feb 13 01:20:51.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.94.233:22-62.99.74.172:35816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:20:51.805419 kernel: audit: type=1130 audit(1707787251.712:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.94.233:22-62.99.74.172:35816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:20:52.580087 sshd[2407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:20:52.579000 audit[2407]: USER_AUTH pid=2407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:20:52.673594 kernel: audit: type=1100 audit(1707787252.579:382): pid=2407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:20:55.312120 sshd[2407]: Failed password for root from 62.99.74.172 port 35816 ssh2 Feb 13 01:20:56.698353 sshd[2407]: Received disconnect from 62.99.74.172 port 35816:11: Bye Bye [preauth] Feb 13 01:20:56.698353 sshd[2407]: Disconnected from authenticating user root 62.99.74.172 port 35816 [preauth] Feb 13 01:20:56.700855 systemd[1]: sshd@68-139.178.94.233:22-62.99.74.172:35816.service: Deactivated successfully. Feb 13 01:20:56.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.94.233:22-62.99.74.172:35816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:20:56.794598 kernel: audit: type=1131 audit(1707787256.700:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.94.233:22-62.99.74.172:35816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:21:16.298581 systemd[1]: Started sshd@69-139.178.94.233:22-179.27.60.34:44102.service. Feb 13 01:21:16.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.94.233:22-179.27.60.34:44102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:21:16.391464 kernel: audit: type=1130 audit(1707787276.298:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.94.233:22-179.27.60.34:44102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:21:17.432809 sshd[2414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:21:17.432000 audit[2414]: ANOM_LOGIN_FAILURES pid=2414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:21:17.433047 sshd[2414]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:21:17.432000 audit[2414]: USER_AUTH pid=2414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:21:17.588332 kernel: audit: type=2100 audit(1707787277.432:385): pid=2414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:21:17.588363 kernel: audit: type=1100 audit(1707787277.432:386): pid=2414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:21:19.262063 sshd[2414]: Failed password for root from 179.27.60.34 port 44102 ssh2 Feb 13 01:21:19.618299 sshd[2414]: Received disconnect from 179.27.60.34 port 44102:11: Bye Bye [preauth] Feb 13 01:21:19.618299 sshd[2414]: Disconnected from authenticating user root 179.27.60.34 port 44102 [preauth] Feb 13 01:21:19.620744 systemd[1]: sshd@69-139.178.94.233:22-179.27.60.34:44102.service: Deactivated successfully. Feb 13 01:21:19.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.94.233:22-179.27.60.34:44102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:21:19.714599 kernel: audit: type=1131 audit(1707787279.620:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.94.233:22-179.27.60.34:44102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:21:37.808563 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:21:37.807Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":4242} Feb 13 01:21:37.811109 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:21:37.810Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":4242,"took":"2.094545ms"} Feb 13 01:21:47.982567 systemd[1]: Started sshd@70-139.178.94.233:22-62.99.74.172:48344.service. Feb 13 01:21:47.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.94.233:22-62.99.74.172:48344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:21:48.075402 kernel: audit: type=1130 audit(1707787307.981:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.94.233:22-62.99.74.172:48344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:21:48.877382 sshd[2419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:21:48.876000 audit[2419]: USER_AUTH pid=2419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:21:48.969441 kernel: audit: type=1100 audit(1707787308.876:389): pid=2419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:21:50.631040 sshd[2419]: Failed password for root from 62.99.74.172 port 48344 ssh2 Feb 13 01:21:51.013011 sshd[2419]: Received disconnect from 62.99.74.172 port 48344:11: Bye Bye [preauth] Feb 13 01:21:51.013011 sshd[2419]: Disconnected from authenticating user root 62.99.74.172 port 48344 [preauth] Feb 13 01:21:51.015572 systemd[1]: sshd@70-139.178.94.233:22-62.99.74.172:48344.service: Deactivated successfully. Feb 13 01:21:51.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.94.233:22-62.99.74.172:48344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:21:51.108593 kernel: audit: type=1131 audit(1707787311.014:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.94.233:22-62.99.74.172:48344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:22:14.648359 systemd[1]: Started sshd@71-139.178.94.233:22-104.131.180.171:57216.service. Feb 13 01:22:14.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.94.233:22-104.131.180.171:57216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:22:14.742560 kernel: audit: type=1130 audit(1707787334.647:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.94.233:22-104.131.180.171:57216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:22:15.088201 sshd[2423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:22:15.086000 audit[2423]: ANOM_LOGIN_FAILURES pid=2423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:22:15.088461 sshd[2423]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:22:15.087000 audit[2423]: USER_AUTH pid=2423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:22:15.257285 kernel: audit: type=2100 audit(1707787335.086:392): pid=2423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:22:15.257316 kernel: audit: type=1100 audit(1707787335.087:393): pid=2423 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:22:17.880785 sshd[2423]: Failed password for root from 104.131.180.171 port 57216 ssh2 Feb 13 01:22:19.124578 sshd[2423]: Received disconnect from 104.131.180.171 port 57216:11: Bye Bye [preauth] Feb 13 01:22:19.124578 sshd[2423]: Disconnected from authenticating user root 104.131.180.171 port 57216 [preauth] Feb 13 01:22:19.127155 systemd[1]: sshd@71-139.178.94.233:22-104.131.180.171:57216.service: Deactivated successfully. Feb 13 01:22:19.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.94.233:22-104.131.180.171:57216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:22:19.193580 systemd[1]: Started sshd@72-139.178.94.233:22-43.139.62.169:40222.service. Feb 13 01:22:19.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.94.233:22-43.139.62.169:40222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:22:19.221466 kernel: audit: type=1131 audit(1707787339.126:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.94.233:22-104.131.180.171:57216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:22:19.221515 kernel: audit: type=1130 audit(1707787339.192:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.94.233:22-43.139.62.169:40222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:22:23.930336 systemd[1]: Started sshd@73-139.178.94.233:22-179.27.60.34:62788.service. Feb 13 01:22:23.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.94.233:22-179.27.60.34:62788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:22:24.022594 kernel: audit: type=1130 audit(1707787343.929:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.94.233:22-179.27.60.34:62788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:22:25.053099 sshd[2430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:22:25.051000 audit[2430]: USER_AUTH pid=2430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:22:25.144585 kernel: audit: type=1100 audit(1707787345.051:397): pid=2430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:22:26.550788 sshd[2430]: Failed password for root from 179.27.60.34 port 62788 ssh2 Feb 13 01:22:27.233449 sshd[2430]: Received disconnect from 179.27.60.34 port 62788:11: Bye Bye [preauth] Feb 13 01:22:27.233449 sshd[2430]: Disconnected from authenticating user root 179.27.60.34 port 62788 [preauth] Feb 13 01:22:27.235960 systemd[1]: sshd@73-139.178.94.233:22-179.27.60.34:62788.service: Deactivated successfully. Feb 13 01:22:27.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.94.233:22-179.27.60.34:62788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:22:27.328591 kernel: audit: type=1131 audit(1707787347.235:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.94.233:22-179.27.60.34:62788 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:22:45.462884 systemd[1]: Started sshd@74-139.178.94.233:22-62.99.74.172:43366.service. Feb 13 01:22:45.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.94.233:22-62.99.74.172:43366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:22:45.556609 kernel: audit: type=1130 audit(1707787365.462:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.94.233:22-62.99.74.172:43366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:22:46.346370 sshd[2434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:22:46.346000 audit[2434]: USER_AUTH pid=2434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:22:46.439403 kernel: audit: type=1100 audit(1707787366.346:400): pid=2434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:22:48.726782 sshd[2434]: Failed password for root from 62.99.74.172 port 43366 ssh2 Feb 13 01:22:50.464299 sshd[2434]: Received disconnect from 62.99.74.172 port 43366:11: Bye Bye [preauth] Feb 13 01:22:50.464299 sshd[2434]: Disconnected from authenticating user root 62.99.74.172 port 43366 [preauth] Feb 13 01:22:50.466724 systemd[1]: sshd@74-139.178.94.233:22-62.99.74.172:43366.service: Deactivated successfully. Feb 13 01:22:50.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.94.233:22-62.99.74.172:43366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:22:50.560613 kernel: audit: type=1131 audit(1707787370.466:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.94.233:22-62.99.74.172:43366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:30.348093 systemd[1]: Started sshd@75-139.178.94.233:22-179.27.60.34:30967.service. Feb 13 01:23:30.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.94.233:22-179.27.60.34:30967 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:30.440403 kernel: audit: type=1130 audit(1707787410.346:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.94.233:22-179.27.60.34:30967 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:31.319670 systemd[1]: Started sshd@76-139.178.94.233:22-138.197.18.220:54374.service. Feb 13 01:23:31.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.94.233:22-138.197.18.220:54374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:31.412404 kernel: audit: type=1130 audit(1707787411.318:403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.94.233:22-138.197.18.220:54374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:31.480562 sshd[2440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:23:31.479000 audit[2440]: ANOM_LOGIN_FAILURES pid=2440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:31.480637 sshd[2440]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:23:31.479000 audit[2440]: USER_AUTH pid=2440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:23:31.635250 kernel: audit: type=2100 audit(1707787411.479:404): pid=2440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:31.635285 kernel: audit: type=1100 audit(1707787411.479:405): pid=2440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:23:31.645385 sshd[2443]: Invalid user a3user from 138.197.18.220 port 54374 Feb 13 01:23:31.723932 sshd[2443]: pam_faillock(sshd:auth): User unknown Feb 13 01:23:31.724446 sshd[2443]: pam_unix(sshd:auth): check pass; user unknown Feb 13 01:23:31.724487 sshd[2443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.18.220 Feb 13 01:23:31.724967 sshd[2443]: pam_faillock(sshd:auth): User unknown Feb 13 01:23:31.723000 audit[2443]: USER_AUTH pid=2443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="a3user" exe="/usr/sbin/sshd" hostname=138.197.18.220 addr=138.197.18.220 terminal=ssh res=failed' Feb 13 01:23:31.821613 kernel: audit: type=1100 audit(1707787411.723:406): pid=2443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="a3user" exe="/usr/sbin/sshd" hostname=138.197.18.220 addr=138.197.18.220 terminal=ssh res=failed' Feb 13 01:23:33.038388 sshd[2440]: Failed password for root from 179.27.60.34 port 30967 ssh2 Feb 13 01:23:33.282850 sshd[2443]: Failed password for invalid user a3user from 138.197.18.220 port 54374 ssh2 Feb 13 01:23:33.666840 sshd[2440]: Received disconnect from 179.27.60.34 port 30967:11: Bye Bye [preauth] Feb 13 01:23:33.666840 sshd[2440]: Disconnected from authenticating user root 179.27.60.34 port 30967 [preauth] Feb 13 01:23:33.669330 systemd[1]: sshd@75-139.178.94.233:22-179.27.60.34:30967.service: Deactivated successfully. Feb 13 01:23:33.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.94.233:22-179.27.60.34:30967 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:33.763615 kernel: audit: type=1131 audit(1707787413.668:407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.94.233:22-179.27.60.34:30967 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:34.510503 sshd[2443]: Connection closed by invalid user a3user 138.197.18.220 port 54374 [preauth] Feb 13 01:23:34.512978 systemd[1]: sshd@76-139.178.94.233:22-138.197.18.220:54374.service: Deactivated successfully. Feb 13 01:23:34.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.94.233:22-138.197.18.220:54374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:34.606591 kernel: audit: type=1131 audit(1707787414.512:408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.94.233:22-138.197.18.220:54374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:38.051338 systemd[1]: Started sshd@77-139.178.94.233:22-62.99.74.172:43550.service. Feb 13 01:23:38.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.94.233:22-62.99.74.172:43550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:38.143441 kernel: audit: type=1130 audit(1707787418.050:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.94.233:22-62.99.74.172:43550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:38.938110 sshd[2448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.99.74.172 user=root Feb 13 01:23:38.936000 audit[2448]: USER_AUTH pid=2448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:23:39.030479 kernel: audit: type=1100 audit(1707787418.936:410): pid=2448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.99.74.172 addr=62.99.74.172 terminal=ssh res=failed' Feb 13 01:23:40.792066 sshd[2448]: Failed password for root from 62.99.74.172 port 43550 ssh2 Feb 13 01:23:41.070089 sshd[2448]: Received disconnect from 62.99.74.172 port 43550:11: Bye Bye [preauth] Feb 13 01:23:41.070089 sshd[2448]: Disconnected from authenticating user root 62.99.74.172 port 43550 [preauth] Feb 13 01:23:41.072505 systemd[1]: sshd@77-139.178.94.233:22-62.99.74.172:43550.service: Deactivated successfully. Feb 13 01:23:41.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.94.233:22-62.99.74.172:43550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:41.166603 kernel: audit: type=1131 audit(1707787421.071:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.94.233:22-62.99.74.172:43550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:49.431239 systemd[1]: Started sshd@78-139.178.94.233:22-62.234.47.75:44362.service. Feb 13 01:23:49.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.94.233:22-62.234.47.75:44362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:49.524453 kernel: audit: type=1130 audit(1707787429.429:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.94.233:22-62.234.47.75:44362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:50.970561 sshd[2452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:23:50.969000 audit[2452]: USER_AUTH pid=2452 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:23:51.062460 kernel: audit: type=1100 audit(1707787430.969:413): pid=2452 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:23:52.804777 sshd[2452]: Failed password for root from 62.234.47.75 port 44362 ssh2 Feb 13 01:23:53.098686 sshd[2452]: Received disconnect from 62.234.47.75 port 44362:11: Bye Bye [preauth] Feb 13 01:23:53.098686 sshd[2452]: Disconnected from authenticating user root 62.234.47.75 port 44362 [preauth] Feb 13 01:23:53.101132 systemd[1]: sshd@78-139.178.94.233:22-62.234.47.75:44362.service: Deactivated successfully. Feb 13 01:23:53.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.94.233:22-62.234.47.75:44362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:23:53.194593 kernel: audit: type=1131 audit(1707787433.100:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.94.233:22-62.234.47.75:44362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:24:19.198657 sshd[2427]: Timeout before authentication for 43.139.62.169 port 40222 Feb 13 01:24:19.200140 systemd[1]: sshd@72-139.178.94.233:22-43.139.62.169:40222.service: Deactivated successfully. Feb 13 01:24:19.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.94.233:22-43.139.62.169:40222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:24:19.293594 kernel: audit: type=1131 audit(1707787459.199:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.94.233:22-43.139.62.169:40222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:24:22.914553 systemd[1]: Started sshd@79-139.178.94.233:22-85.209.11.254:46800.service. Feb 13 01:24:22.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.94.233:22-85.209.11.254:46800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:24:23.007595 kernel: audit: type=1130 audit(1707787462.913:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.94.233:22-85.209.11.254:46800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:24:28.546676 sshd[2458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.11.254 user=root Feb 13 01:24:28.545000 audit[2458]: ANOM_LOGIN_FAILURES pid=2458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:24:28.546927 sshd[2458]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:24:28.545000 audit[2458]: USER_AUTH pid=2458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=85.209.11.254 addr=85.209.11.254 terminal=ssh res=failed' Feb 13 01:24:28.703543 kernel: audit: type=2100 audit(1707787468.545:417): pid=2458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:24:28.703576 kernel: audit: type=1100 audit(1707787468.545:418): pid=2458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=85.209.11.254 addr=85.209.11.254 terminal=ssh res=failed' Feb 13 01:24:30.596855 sshd[2458]: Failed password for root from 85.209.11.254 port 46800 ssh2 Feb 13 01:24:32.715090 sshd[2458]: Connection closed by authenticating user root 85.209.11.254 port 46800 [preauth] Feb 13 01:24:32.717777 systemd[1]: sshd@79-139.178.94.233:22-85.209.11.254:46800.service: Deactivated successfully. Feb 13 01:24:32.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.94.233:22-85.209.11.254:46800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:24:32.810581 kernel: audit: type=1131 audit(1707787472.717:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.94.233:22-85.209.11.254:46800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:24:35.975287 systemd[1]: Started sshd@80-139.178.94.233:22-179.27.60.34:49653.service. Feb 13 01:24:35.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.94.233:22-179.27.60.34:49653 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:24:36.068595 kernel: audit: type=1130 audit(1707787475.974:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.94.233:22-179.27.60.34:49653 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:24:37.105415 sshd[2462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:24:37.105000 audit[2462]: USER_AUTH pid=2462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:24:37.198586 kernel: audit: type=1100 audit(1707787477.105:421): pid=2462 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:24:38.724038 sshd[2462]: Failed password for root from 179.27.60.34 port 49653 ssh2 Feb 13 01:24:39.284447 sshd[2462]: Received disconnect from 179.27.60.34 port 49653:11: Bye Bye [preauth] Feb 13 01:24:39.284447 sshd[2462]: Disconnected from authenticating user root 179.27.60.34 port 49653 [preauth] Feb 13 01:24:39.287018 systemd[1]: sshd@80-139.178.94.233:22-179.27.60.34:49653.service: Deactivated successfully. Feb 13 01:24:39.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.94.233:22-179.27.60.34:49653 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:24:39.380607 kernel: audit: type=1131 audit(1707787479.287:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.94.233:22-179.27.60.34:49653 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:25:32.260051 systemd[1]: Started sshd@81-139.178.94.233:22-43.155.159.34:53940.service. Feb 13 01:25:32.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.94.233:22-43.155.159.34:53940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:25:32.353620 kernel: audit: type=1130 audit(1707787532.258:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.94.233:22-43.155.159.34:53940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:25:33.070861 sshd[2466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:25:33.069000 audit[2466]: ANOM_LOGIN_FAILURES pid=2466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:25:33.071096 sshd[2466]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:25:33.069000 audit[2466]: USER_AUTH pid=2466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:25:33.227095 kernel: audit: type=2100 audit(1707787533.069:424): pid=2466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:25:33.227125 kernel: audit: type=1100 audit(1707787533.069:425): pid=2466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:25:35.045334 sshd[2466]: Failed password for root from 43.155.159.34 port 53940 ssh2 Feb 13 01:25:35.192572 sshd[2466]: Received disconnect from 43.155.159.34 port 53940:11: Bye Bye [preauth] Feb 13 01:25:35.192572 sshd[2466]: Disconnected from authenticating user root 43.155.159.34 port 53940 [preauth] Feb 13 01:25:35.195105 systemd[1]: sshd@81-139.178.94.233:22-43.155.159.34:53940.service: Deactivated successfully. Feb 13 01:25:35.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.94.233:22-43.155.159.34:53940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:25:35.288610 kernel: audit: type=1131 audit(1707787535.194:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.94.233:22-43.155.159.34:53940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:25:44.196357 systemd[1]: Started sshd@82-139.178.94.233:22-179.27.60.34:17842.service. Feb 13 01:25:44.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.94.233:22-179.27.60.34:17842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:25:44.289403 kernel: audit: type=1130 audit(1707787544.195:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.94.233:22-179.27.60.34:17842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:25:45.324677 sshd[2473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:25:45.323000 audit[2473]: ANOM_LOGIN_FAILURES pid=2473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:25:45.324922 sshd[2473]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:25:45.323000 audit[2473]: USER_AUTH pid=2473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:25:45.482029 kernel: audit: type=2100 audit(1707787545.323:428): pid=2473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:25:45.482055 kernel: audit: type=1100 audit(1707787545.323:429): pid=2473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:25:47.279543 sshd[2473]: Failed password for root from 179.27.60.34 port 17842 ssh2 Feb 13 01:25:47.509422 sshd[2473]: Received disconnect from 179.27.60.34 port 17842:11: Bye Bye [preauth] Feb 13 01:25:47.509422 sshd[2473]: Disconnected from authenticating user root 179.27.60.34 port 17842 [preauth] Feb 13 01:25:47.511978 systemd[1]: sshd@82-139.178.94.233:22-179.27.60.34:17842.service: Deactivated successfully. Feb 13 01:25:47.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.94.233:22-179.27.60.34:17842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:25:47.605595 kernel: audit: type=1131 audit(1707787547.511:430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.94.233:22-179.27.60.34:17842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:26:30.552340 systemd[1]: Started sshd@83-139.178.94.233:22-104.131.180.171:44588.service. Feb 13 01:26:30.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.94.233:22-104.131.180.171:44588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:26:30.646500 kernel: audit: type=1130 audit(1707787590.552:431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.94.233:22-104.131.180.171:44588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:26:31.013367 sshd[2479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:26:31.013000 audit[2479]: USER_AUTH pid=2479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:26:31.112587 kernel: audit: type=1100 audit(1707787591.013:432): pid=2479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:26:32.948217 sshd[2479]: Failed password for root from 104.131.180.171 port 44588 ssh2 Feb 13 01:26:33.066171 sshd[2479]: Received disconnect from 104.131.180.171 port 44588:11: Bye Bye [preauth] Feb 13 01:26:33.066171 sshd[2479]: Disconnected from authenticating user root 104.131.180.171 port 44588 [preauth] Feb 13 01:26:33.068687 systemd[1]: sshd@83-139.178.94.233:22-104.131.180.171:44588.service: Deactivated successfully. Feb 13 01:26:33.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.94.233:22-104.131.180.171:44588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:26:33.162467 kernel: audit: type=1131 audit(1707787593.068:433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.94.233:22-104.131.180.171:44588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:26:37.813213 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:26:37.812Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":4780} Feb 13 01:26:37.815591 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:26:37.815Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":4780,"took":"2.037608ms"} Feb 13 01:26:51.444325 systemd[1]: Started sshd@84-139.178.94.233:22-179.27.60.34:36542.service. Feb 13 01:26:51.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.94.233:22-179.27.60.34:36542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:26:51.537596 kernel: audit: type=1130 audit(1707787611.443:434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.94.233:22-179.27.60.34:36542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:26:52.584895 sshd[2486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:26:52.583000 audit[2486]: USER_AUTH pid=2486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:26:52.678598 kernel: audit: type=1100 audit(1707787612.583:435): pid=2486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:26:55.071192 sshd[2486]: Failed password for root from 179.27.60.34 port 36542 ssh2 Feb 13 01:26:56.752101 sshd[2486]: Received disconnect from 179.27.60.34 port 36542:11: Bye Bye [preauth] Feb 13 01:26:56.752101 sshd[2486]: Disconnected from authenticating user root 179.27.60.34 port 36542 [preauth] Feb 13 01:26:56.754654 systemd[1]: sshd@84-139.178.94.233:22-179.27.60.34:36542.service: Deactivated successfully. Feb 13 01:26:56.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.94.233:22-179.27.60.34:36542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:26:56.848597 kernel: audit: type=1131 audit(1707787616.753:436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.94.233:22-179.27.60.34:36542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:27:19.142888 systemd[1]: Started sshd@85-139.178.94.233:22-43.155.159.34:48502.service. Feb 13 01:27:19.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.94.233:22-43.155.159.34:48502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:27:19.236603 kernel: audit: type=1130 audit(1707787639.141:437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.94.233:22-43.155.159.34:48502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:27:19.977682 sshd[2490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:27:19.976000 audit[2490]: ANOM_LOGIN_FAILURES pid=2490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:27:19.977918 sshd[2490]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:27:19.976000 audit[2490]: USER_AUTH pid=2490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:27:20.134020 kernel: audit: type=2100 audit(1707787639.976:438): pid=2490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:27:20.134053 kernel: audit: type=1100 audit(1707787639.976:439): pid=2490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:27:22.504327 sshd[2490]: Failed password for root from 43.155.159.34 port 48502 ssh2 Feb 13 01:27:24.083267 sshd[2490]: Received disconnect from 43.155.159.34 port 48502:11: Bye Bye [preauth] Feb 13 01:27:24.083267 sshd[2490]: Disconnected from authenticating user root 43.155.159.34 port 48502 [preauth] Feb 13 01:27:24.085851 systemd[1]: sshd@85-139.178.94.233:22-43.155.159.34:48502.service: Deactivated successfully. Feb 13 01:27:24.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.94.233:22-43.155.159.34:48502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:27:24.179534 kernel: audit: type=1131 audit(1707787644.084:440): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.94.233:22-43.155.159.34:48502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:27:25.828521 systemd[1]: Started sshd@86-139.178.94.233:22-104.131.180.171:48606.service. Feb 13 01:27:25.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.94.233:22-104.131.180.171:48606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:27:25.922585 kernel: audit: type=1130 audit(1707787645.827:441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.94.233:22-104.131.180.171:48606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:27:26.263828 sshd[2495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:27:26.262000 audit[2495]: USER_AUTH pid=2495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:27:26.362444 kernel: audit: type=1100 audit(1707787646.262:442): pid=2495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:27:28.083152 sshd[2495]: Failed password for root from 104.131.180.171 port 48606 ssh2 Feb 13 01:27:28.314068 sshd[2495]: Received disconnect from 104.131.180.171 port 48606:11: Bye Bye [preauth] Feb 13 01:27:28.314068 sshd[2495]: Disconnected from authenticating user root 104.131.180.171 port 48606 [preauth] Feb 13 01:27:28.316670 systemd[1]: sshd@86-139.178.94.233:22-104.131.180.171:48606.service: Deactivated successfully. Feb 13 01:27:28.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.94.233:22-104.131.180.171:48606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:27:28.410458 kernel: audit: type=1131 audit(1707787648.315:443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.94.233:22-104.131.180.171:48606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:04.426169 systemd[1]: Started sshd@87-139.178.94.233:22-179.27.60.34:55234.service. Feb 13 01:28:04.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.94.233:22-179.27.60.34:55234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:04.519479 kernel: audit: type=1130 audit(1707787684.425:444): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.94.233:22-179.27.60.34:55234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:05.543913 sshd[2500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:28:05.543000 audit[2500]: ANOM_LOGIN_FAILURES pid=2500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:05.544151 sshd[2500]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:28:05.543000 audit[2500]: USER_AUTH pid=2500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:28:05.700996 kernel: audit: type=2100 audit(1707787685.543:445): pid=2500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:05.701027 kernel: audit: type=1100 audit(1707787685.543:446): pid=2500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:28:07.719091 sshd[2500]: Failed password for root from 179.27.60.34 port 55234 ssh2 Feb 13 01:28:09.714997 sshd[2500]: Received disconnect from 179.27.60.34 port 55234:11: Bye Bye [preauth] Feb 13 01:28:09.714997 sshd[2500]: Disconnected from authenticating user root 179.27.60.34 port 55234 [preauth] Feb 13 01:28:09.717523 systemd[1]: sshd@87-139.178.94.233:22-179.27.60.34:55234.service: Deactivated successfully. Feb 13 01:28:09.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.94.233:22-179.27.60.34:55234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:09.811459 kernel: audit: type=1131 audit(1707787689.717:447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.94.233:22-179.27.60.34:55234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:11.548917 systemd[1]: Started sshd@88-139.178.94.233:22-111.229.16.113:54948.service. Feb 13 01:28:11.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.94.233:22-111.229.16.113:54948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:11.641482 kernel: audit: type=1130 audit(1707787691.548:448): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.94.233:22-111.229.16.113:54948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:13.225764 sshd[2506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:28:13.225000 audit[2506]: USER_AUTH pid=2506 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:28:13.319587 kernel: audit: type=1100 audit(1707787693.225:449): pid=2506 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:28:15.165148 sshd[2506]: Failed password for root from 111.229.16.113 port 54948 ssh2 Feb 13 01:28:15.362751 sshd[2506]: Received disconnect from 111.229.16.113 port 54948:11: Bye Bye [preauth] Feb 13 01:28:15.362751 sshd[2506]: Disconnected from authenticating user root 111.229.16.113 port 54948 [preauth] Feb 13 01:28:15.365577 systemd[1]: sshd@88-139.178.94.233:22-111.229.16.113:54948.service: Deactivated successfully. Feb 13 01:28:15.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.94.233:22-111.229.16.113:54948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:15.459462 kernel: audit: type=1131 audit(1707787695.365:450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.94.233:22-111.229.16.113:54948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:25.315232 systemd[1]: Started sshd@89-139.178.94.233:22-104.131.180.171:37590.service. Feb 13 01:28:25.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.94.233:22-104.131.180.171:37590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:25.408594 kernel: audit: type=1130 audit(1707787705.313:451): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.94.233:22-104.131.180.171:37590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:25.754369 sshd[2510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:28:25.753000 audit[2510]: USER_AUTH pid=2510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:28:25.847586 kernel: audit: type=1100 audit(1707787705.753:452): pid=2510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:28:26.886337 systemd[1]: Started sshd@90-139.178.94.233:22-43.155.159.34:39184.service. Feb 13 01:28:26.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.94.233:22-43.155.159.34:39184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:26.979402 kernel: audit: type=1130 audit(1707787706.885:453): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.94.233:22-43.155.159.34:39184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:27.673985 sshd[2510]: Failed password for root from 104.131.180.171 port 37590 ssh2 Feb 13 01:28:27.725353 sshd[2513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:28:27.724000 audit[2513]: USER_AUTH pid=2513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:28:27.807156 sshd[2510]: Received disconnect from 104.131.180.171 port 37590:11: Bye Bye [preauth] Feb 13 01:28:27.807156 sshd[2510]: Disconnected from authenticating user root 104.131.180.171 port 37590 [preauth] Feb 13 01:28:27.807769 systemd[1]: sshd@89-139.178.94.233:22-104.131.180.171:37590.service: Deactivated successfully. Feb 13 01:28:27.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.94.233:22-104.131.180.171:37590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:27.910458 kernel: audit: type=1100 audit(1707787707.724:454): pid=2513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:28:27.910504 kernel: audit: type=1131 audit(1707787707.806:455): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.94.233:22-104.131.180.171:37590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:29.253288 sshd[2513]: Failed password for root from 43.155.159.34 port 39184 ssh2 Feb 13 01:28:29.851588 sshd[2513]: Received disconnect from 43.155.159.34 port 39184:11: Bye Bye [preauth] Feb 13 01:28:29.851588 sshd[2513]: Disconnected from authenticating user root 43.155.159.34 port 39184 [preauth] Feb 13 01:28:29.854108 systemd[1]: sshd@90-139.178.94.233:22-43.155.159.34:39184.service: Deactivated successfully. Feb 13 01:28:29.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.94.233:22-43.155.159.34:39184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:29.948609 kernel: audit: type=1131 audit(1707787709.853:456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.94.233:22-43.155.159.34:39184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:58.269383 systemd[1]: Started sshd@91-139.178.94.233:22-62.234.47.75:50426.service. Feb 13 01:28:58.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.94.233:22-62.234.47.75:50426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:28:58.362472 kernel: audit: type=1130 audit(1707787738.268:457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.94.233:22-62.234.47.75:50426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:13.558813 sshd[2522]: Connection closed by 62.234.47.75 port 50426 [preauth] Feb 13 01:29:13.560582 systemd[1]: sshd@91-139.178.94.233:22-62.234.47.75:50426.service: Deactivated successfully. Feb 13 01:29:13.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.94.233:22-62.234.47.75:50426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:13.653587 kernel: audit: type=1131 audit(1707787753.559:458): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.94.233:22-62.234.47.75:50426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:14.046665 systemd[1]: Started sshd@92-139.178.94.233:22-179.27.60.34:23417.service. Feb 13 01:29:14.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.94.233:22-179.27.60.34:23417 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:14.138445 kernel: audit: type=1130 audit(1707787754.045:459): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.94.233:22-179.27.60.34:23417 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:15.169760 sshd[2526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:29:15.168000 audit[2526]: USER_AUTH pid=2526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:29:15.261584 kernel: audit: type=1100 audit(1707787755.168:460): pid=2526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:29:17.620943 sshd[2526]: Failed password for root from 179.27.60.34 port 23417 ssh2 Feb 13 01:29:19.332952 sshd[2526]: Received disconnect from 179.27.60.34 port 23417:11: Bye Bye [preauth] Feb 13 01:29:19.332952 sshd[2526]: Disconnected from authenticating user root 179.27.60.34 port 23417 [preauth] Feb 13 01:29:19.335444 systemd[1]: sshd@92-139.178.94.233:22-179.27.60.34:23417.service: Deactivated successfully. Feb 13 01:29:19.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.94.233:22-179.27.60.34:23417 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:19.395066 systemd[1]: Started sshd@93-139.178.94.233:22-104.131.180.171:45626.service. Feb 13 01:29:19.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.94.233:22-104.131.180.171:45626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:19.520939 kernel: audit: type=1131 audit(1707787759.335:461): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.94.233:22-179.27.60.34:23417 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:19.520994 kernel: audit: type=1130 audit(1707787759.394:462): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.94.233:22-104.131.180.171:45626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:19.881877 sshd[2530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:29:19.881000 audit[2530]: USER_AUTH pid=2530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:29:19.981586 kernel: audit: type=1100 audit(1707787759.881:463): pid=2530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:29:21.881705 sshd[2530]: Failed password for root from 104.131.180.171 port 45626 ssh2 Feb 13 01:29:23.918252 sshd[2530]: Received disconnect from 104.131.180.171 port 45626:11: Bye Bye [preauth] Feb 13 01:29:23.918252 sshd[2530]: Disconnected from authenticating user root 104.131.180.171 port 45626 [preauth] Feb 13 01:29:23.920831 systemd[1]: sshd@93-139.178.94.233:22-104.131.180.171:45626.service: Deactivated successfully. Feb 13 01:29:23.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.94.233:22-104.131.180.171:45626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:24.013490 kernel: audit: type=1131 audit(1707787763.920:464): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.94.233:22-104.131.180.171:45626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:24.600909 systemd[1]: Started sshd@94-139.178.94.233:22-138.197.18.220:45112.service. Feb 13 01:29:24.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.94.233:22-138.197.18.220:45112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:24.692995 systemd[1]: Started sshd@95-139.178.94.233:22-111.229.16.113:42728.service. Feb 13 01:29:24.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.94.233:22-111.229.16.113:42728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:24.786730 kernel: audit: type=1130 audit(1707787764.600:465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.94.233:22-138.197.18.220:45112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:24.786768 kernel: audit: type=1130 audit(1707787764.692:466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.94.233:22-111.229.16.113:42728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:24.905217 sshd[2535]: Invalid user loginuser from 138.197.18.220 port 45112 Feb 13 01:29:24.976526 sshd[2535]: pam_faillock(sshd:auth): User unknown Feb 13 01:29:24.977724 sshd[2535]: pam_unix(sshd:auth): check pass; user unknown Feb 13 01:29:24.977816 sshd[2535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.18.220 Feb 13 01:29:24.978724 sshd[2535]: pam_faillock(sshd:auth): User unknown Feb 13 01:29:24.978000 audit[2535]: USER_AUTH pid=2535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="loginuser" exe="/usr/sbin/sshd" hostname=138.197.18.220 addr=138.197.18.220 terminal=ssh res=failed' Feb 13 01:29:25.076461 kernel: audit: type=1100 audit(1707787764.978:467): pid=2535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="loginuser" exe="/usr/sbin/sshd" hostname=138.197.18.220 addr=138.197.18.220 terminal=ssh res=failed' Feb 13 01:29:26.331189 sshd[2535]: Failed password for invalid user loginuser from 138.197.18.220 port 45112 ssh2 Feb 13 01:29:26.654677 sshd[2535]: Connection closed by invalid user loginuser 138.197.18.220 port 45112 [preauth] Feb 13 01:29:26.657059 systemd[1]: sshd@94-139.178.94.233:22-138.197.18.220:45112.service: Deactivated successfully. Feb 13 01:29:26.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.94.233:22-138.197.18.220:45112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:26.751590 kernel: audit: type=1131 audit(1707787766.657:468): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.94.233:22-138.197.18.220:45112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:31.928833 systemd[1]: Started sshd@96-139.178.94.233:22-43.155.159.34:58096.service. Feb 13 01:29:31.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.94.233:22-43.155.159.34:58096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:32.022597 kernel: audit: type=1130 audit(1707787771.928:469): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.94.233:22-43.155.159.34:58096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:32.740711 sshd[2542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:29:32.740000 audit[2542]: USER_AUTH pid=2542 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:29:32.834611 kernel: audit: type=1100 audit(1707787772.740:470): pid=2542 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:29:32.976363 systemd[1]: Started sshd@97-139.178.94.233:22-62.234.47.75:59064.service. Feb 13 01:29:32.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.94.233:22-62.234.47.75:59064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:33.069452 kernel: audit: type=1130 audit(1707787772.976:471): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.94.233:22-62.234.47.75:59064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:33.876450 sshd[2545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:29:33.876000 audit[2545]: USER_AUTH pid=2545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:29:33.970609 kernel: audit: type=1100 audit(1707787773.876:472): pid=2545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:29:34.524671 sshd[2542]: Failed password for root from 43.155.159.34 port 58096 ssh2 Feb 13 01:29:34.865063 sshd[2542]: Received disconnect from 43.155.159.34 port 58096:11: Bye Bye [preauth] Feb 13 01:29:34.865063 sshd[2542]: Disconnected from authenticating user root 43.155.159.34 port 58096 [preauth] Feb 13 01:29:34.867474 systemd[1]: sshd@96-139.178.94.233:22-43.155.159.34:58096.service: Deactivated successfully. Feb 13 01:29:34.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.94.233:22-43.155.159.34:58096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:34.961461 kernel: audit: type=1131 audit(1707787774.867:473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.94.233:22-43.155.159.34:58096 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:36.131939 sshd[2545]: Failed password for root from 62.234.47.75 port 59064 ssh2 Feb 13 01:29:37.997595 sshd[2545]: Received disconnect from 62.234.47.75 port 59064:11: Bye Bye [preauth] Feb 13 01:29:37.997595 sshd[2545]: Disconnected from authenticating user root 62.234.47.75 port 59064 [preauth] Feb 13 01:29:38.000154 systemd[1]: sshd@97-139.178.94.233:22-62.234.47.75:59064.service: Deactivated successfully. Feb 13 01:29:38.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.94.233:22-62.234.47.75:59064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:29:38.093595 kernel: audit: type=1131 audit(1707787778.000:474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.94.233:22-62.234.47.75:59064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:04.293586 systemd[1]: Started sshd@98-139.178.94.233:22-62.234.47.75:39466.service. Feb 13 01:30:04.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.94.233:22-62.234.47.75:39466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:04.387590 kernel: audit: type=1130 audit(1707787804.292:475): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.94.233:22-62.234.47.75:39466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:05.158478 sshd[2552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:30:05.157000 audit[2552]: USER_AUTH pid=2552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:30:05.251591 kernel: audit: type=1100 audit(1707787805.157:476): pid=2552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:30:06.806967 sshd[2552]: Failed password for root from 62.234.47.75 port 39466 ssh2 Feb 13 01:30:07.286122 sshd[2552]: Received disconnect from 62.234.47.75 port 39466:11: Bye Bye [preauth] Feb 13 01:30:07.286122 sshd[2552]: Disconnected from authenticating user root 62.234.47.75 port 39466 [preauth] Feb 13 01:30:07.288656 systemd[1]: sshd@98-139.178.94.233:22-62.234.47.75:39466.service: Deactivated successfully. Feb 13 01:30:07.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.94.233:22-62.234.47.75:39466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:07.382596 kernel: audit: type=1131 audit(1707787807.287:477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.94.233:22-62.234.47.75:39466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:12.132951 update_engine[1444]: I0213 01:30:12.132763 1444 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 13 01:30:12.132951 update_engine[1444]: I0213 01:30:12.132838 1444 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 13 01:30:12.134088 update_engine[1444]: I0213 01:30:12.133525 1444 omaha_request_params.cc:62] Current group set to lts Feb 13 01:30:12.134088 update_engine[1444]: I0213 01:30:12.133715 1444 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 13 01:30:12.134088 update_engine[1444]: I0213 01:30:12.133730 1444 update_attempter.cc:643] Scheduling an action processor start. Feb 13 01:30:12.134088 update_engine[1444]: I0213 01:30:12.133762 1444 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 01:30:12.134088 update_engine[1444]: I0213 01:30:12.133961 1444 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 01:30:12.134088 update_engine[1444]: I0213 01:30:12.133977 1444 omaha_request_action.cc:271] Request: Feb 13 01:30:12.134088 update_engine[1444]: Feb 13 01:30:12.134088 update_engine[1444]: Feb 13 01:30:12.134088 update_engine[1444]: Feb 13 01:30:12.134088 update_engine[1444]: Feb 13 01:30:12.134088 update_engine[1444]: Feb 13 01:30:12.134088 update_engine[1444]: Feb 13 01:30:12.134088 update_engine[1444]: Feb 13 01:30:12.134088 update_engine[1444]: Feb 13 01:30:12.134088 update_engine[1444]: I0213 01:30:12.133987 1444 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 01:30:12.135485 update_engine[1444]: I0213 01:30:12.134358 1444 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 01:30:12.135485 update_engine[1444]: E0213 01:30:12.134580 1444 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 01:30:12.135485 update_engine[1444]: I0213 01:30:12.134696 1444 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 13 01:30:12.135776 locksmithd[1481]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 13 01:30:14.495448 systemd[1]: Started sshd@99-139.178.94.233:22-104.131.180.171:35476.service. Feb 13 01:30:14.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.94.233:22-104.131.180.171:35476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:14.589462 kernel: audit: type=1130 audit(1707787814.494:478): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.94.233:22-104.131.180.171:35476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:14.919881 sshd[2556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:30:14.918000 audit[2556]: USER_AUTH pid=2556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:30:15.018567 kernel: audit: type=1100 audit(1707787814.918:479): pid=2556 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:30:16.803939 sshd[2556]: Failed password for root from 104.131.180.171 port 35476 ssh2 Feb 13 01:30:16.967795 sshd[2556]: Received disconnect from 104.131.180.171 port 35476:11: Bye Bye [preauth] Feb 13 01:30:16.967795 sshd[2556]: Disconnected from authenticating user root 104.131.180.171 port 35476 [preauth] Feb 13 01:30:16.970288 systemd[1]: sshd@99-139.178.94.233:22-104.131.180.171:35476.service: Deactivated successfully. Feb 13 01:30:16.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.94.233:22-104.131.180.171:35476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:17.064599 kernel: audit: type=1131 audit(1707787816.969:480): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.94.233:22-104.131.180.171:35476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:22.074705 update_engine[1444]: I0213 01:30:22.074517 1444 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 01:30:22.075565 update_engine[1444]: I0213 01:30:22.074914 1444 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 01:30:22.075565 update_engine[1444]: E0213 01:30:22.075105 1444 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 01:30:22.075565 update_engine[1444]: I0213 01:30:22.075225 1444 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 13 01:30:26.609798 systemd[1]: Started sshd@100-139.178.94.233:22-179.27.60.34:42107.service. Feb 13 01:30:26.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.94.233:22-179.27.60.34:42107 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:26.702424 kernel: audit: type=1130 audit(1707787826.608:481): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.94.233:22-179.27.60.34:42107 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:27.745529 sshd[2560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.60.34 user=root Feb 13 01:30:27.744000 audit[2560]: USER_AUTH pid=2560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:30:27.837575 kernel: audit: type=1100 audit(1707787827.744:482): pid=2560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=179.27.60.34 addr=179.27.60.34 terminal=ssh res=failed' Feb 13 01:30:30.081463 sshd[2560]: Failed password for root from 179.27.60.34 port 42107 ssh2 Feb 13 01:30:31.912107 sshd[2560]: Received disconnect from 179.27.60.34 port 42107:11: Bye Bye [preauth] Feb 13 01:30:31.912107 sshd[2560]: Disconnected from authenticating user root 179.27.60.34 port 42107 [preauth] Feb 13 01:30:31.914530 systemd[1]: sshd@100-139.178.94.233:22-179.27.60.34:42107.service: Deactivated successfully. Feb 13 01:30:31.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.94.233:22-179.27.60.34:42107 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:32.008596 kernel: audit: type=1131 audit(1707787831.913:483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.94.233:22-179.27.60.34:42107 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:32.067105 update_engine[1444]: I0213 01:30:32.066989 1444 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 01:30:32.067911 update_engine[1444]: I0213 01:30:32.067440 1444 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 01:30:32.067911 update_engine[1444]: E0213 01:30:32.067647 1444 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 01:30:32.067911 update_engine[1444]: I0213 01:30:32.067767 1444 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 13 01:30:35.480284 systemd[1]: Started sshd@101-139.178.94.233:22-111.229.16.113:58632.service. Feb 13 01:30:35.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.94.233:22-111.229.16.113:58632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:35.500481 systemd[1]: Started sshd@102-139.178.94.233:22-62.234.47.75:48102.service. Feb 13 01:30:35.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.94.233:22-62.234.47.75:48102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:35.664091 kernel: audit: type=1130 audit(1707787835.478:484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.94.233:22-111.229.16.113:58632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:35.664123 kernel: audit: type=1130 audit(1707787835.499:485): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.94.233:22-62.234.47.75:48102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:36.387325 sshd[2564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:30:36.386000 audit[2564]: USER_AUTH pid=2564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:30:36.394318 sshd[2567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:30:36.392000 audit[2567]: USER_AUTH pid=2567 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:30:36.572054 kernel: audit: type=1100 audit(1707787836.386:486): pid=2564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:30:36.572084 kernel: audit: type=1100 audit(1707787836.392:487): pid=2567 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:30:37.004419 systemd[1]: Started sshd@103-139.178.94.233:22-43.155.159.34:48772.service. Feb 13 01:30:37.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.94.233:22-43.155.159.34:48772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:37.097424 kernel: audit: type=1130 audit(1707787837.003:488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.94.233:22-43.155.159.34:48772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:37.830444 sshd[2570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:30:37.829000 audit[2570]: USER_AUTH pid=2570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:30:37.922586 kernel: audit: type=1100 audit(1707787837.829:489): pid=2570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:30:38.291463 sshd[2564]: Failed password for root from 111.229.16.113 port 58632 ssh2 Feb 13 01:30:38.298183 sshd[2567]: Failed password for root from 62.234.47.75 port 48102 ssh2 Feb 13 01:30:38.522984 sshd[2564]: Received disconnect from 111.229.16.113 port 58632:11: Bye Bye [preauth] Feb 13 01:30:38.522984 sshd[2564]: Disconnected from authenticating user root 111.229.16.113 port 58632 [preauth] Feb 13 01:30:38.525759 systemd[1]: sshd@101-139.178.94.233:22-111.229.16.113:58632.service: Deactivated successfully. Feb 13 01:30:38.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.94.233:22-111.229.16.113:58632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:38.536598 sshd[2567]: Received disconnect from 62.234.47.75 port 48102:11: Bye Bye [preauth] Feb 13 01:30:38.536598 sshd[2567]: Disconnected from authenticating user root 62.234.47.75 port 48102 [preauth] Feb 13 01:30:38.537095 systemd[1]: sshd@102-139.178.94.233:22-62.234.47.75:48102.service: Deactivated successfully. Feb 13 01:30:38.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.94.233:22-62.234.47.75:48102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:38.711012 kernel: audit: type=1131 audit(1707787838.524:490): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.94.233:22-111.229.16.113:58632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:38.711046 kernel: audit: type=1131 audit(1707787838.535:491): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.94.233:22-62.234.47.75:48102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:39.538674 sshd[2570]: Failed password for root from 43.155.159.34 port 48772 ssh2 Feb 13 01:30:39.948810 sshd[2570]: Received disconnect from 43.155.159.34 port 48772:11: Bye Bye [preauth] Feb 13 01:30:39.948810 sshd[2570]: Disconnected from authenticating user root 43.155.159.34 port 48772 [preauth] Feb 13 01:30:39.951222 systemd[1]: sshd@103-139.178.94.233:22-43.155.159.34:48772.service: Deactivated successfully. Feb 13 01:30:39.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.94.233:22-43.155.159.34:48772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:40.044448 kernel: audit: type=1131 audit(1707787839.950:492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.94.233:22-43.155.159.34:48772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:30:42.075267 update_engine[1444]: I0213 01:30:42.075153 1444 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 01:30:42.076099 update_engine[1444]: I0213 01:30:42.075608 1444 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 01:30:42.076099 update_engine[1444]: E0213 01:30:42.075798 1444 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 01:30:42.076099 update_engine[1444]: I0213 01:30:42.075907 1444 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 01:30:42.076099 update_engine[1444]: I0213 01:30:42.075922 1444 omaha_request_action.cc:621] Omaha request response: Feb 13 01:30:42.076099 update_engine[1444]: E0213 01:30:42.076030 1444 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 13 01:30:42.076099 update_engine[1444]: I0213 01:30:42.076056 1444 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 13 01:30:42.076099 update_engine[1444]: I0213 01:30:42.076066 1444 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 01:30:42.076099 update_engine[1444]: I0213 01:30:42.076074 1444 update_attempter.cc:306] Processing Done. Feb 13 01:30:42.076099 update_engine[1444]: E0213 01:30:42.076102 1444 update_attempter.cc:619] Update failed. Feb 13 01:30:42.076099 update_engine[1444]: I0213 01:30:42.076112 1444 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 13 01:30:42.077212 update_engine[1444]: I0213 01:30:42.076121 1444 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 13 01:30:42.077212 update_engine[1444]: I0213 01:30:42.076133 1444 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 13 01:30:42.077212 update_engine[1444]: I0213 01:30:42.076282 1444 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 01:30:42.077212 update_engine[1444]: I0213 01:30:42.076333 1444 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 01:30:42.077212 update_engine[1444]: I0213 01:30:42.076342 1444 omaha_request_action.cc:271] Request: Feb 13 01:30:42.077212 update_engine[1444]: Feb 13 01:30:42.077212 update_engine[1444]: Feb 13 01:30:42.077212 update_engine[1444]: Feb 13 01:30:42.077212 update_engine[1444]: Feb 13 01:30:42.077212 update_engine[1444]: Feb 13 01:30:42.077212 update_engine[1444]: Feb 13 01:30:42.077212 update_engine[1444]: I0213 01:30:42.076352 1444 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 01:30:42.077212 update_engine[1444]: I0213 01:30:42.076664 1444 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 01:30:42.077212 update_engine[1444]: E0213 01:30:42.076864 1444 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 01:30:42.077212 update_engine[1444]: I0213 01:30:42.077020 1444 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 01:30:42.077212 update_engine[1444]: I0213 01:30:42.077041 1444 omaha_request_action.cc:621] Omaha request response: Feb 13 01:30:42.077212 update_engine[1444]: I0213 01:30:42.077057 1444 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 01:30:42.077212 update_engine[1444]: I0213 01:30:42.077072 1444 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 01:30:42.077212 update_engine[1444]: I0213 01:30:42.077085 1444 update_attempter.cc:306] Processing Done. Feb 13 01:30:42.079091 locksmithd[1481]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 13 01:30:42.079091 locksmithd[1481]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 13 01:30:42.079760 update_engine[1444]: I0213 01:30:42.077097 1444 update_attempter.cc:310] Error event sent. Feb 13 01:30:42.079760 update_engine[1444]: I0213 01:30:42.077124 1444 update_check_scheduler.cc:74] Next update check in 40m20s Feb 13 01:31:05.464205 systemd[1]: Started sshd@104-139.178.94.233:22-104.131.180.171:49864.service. Feb 13 01:31:05.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.94.233:22-104.131.180.171:49864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:05.558605 kernel: audit: type=1130 audit(1707787865.463:493): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.94.233:22-104.131.180.171:49864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:05.884801 sshd[2580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:31:05.884000 audit[2580]: USER_AUTH pid=2580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:31:05.983452 kernel: audit: type=1100 audit(1707787865.884:494): pid=2580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:31:07.101782 sshd[2580]: Failed password for root from 104.131.180.171 port 49864 ssh2 Feb 13 01:31:07.262272 systemd[1]: Started sshd@105-139.178.94.233:22-62.234.47.75:56742.service. Feb 13 01:31:07.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.94.233:22-62.234.47.75:56742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:07.355472 kernel: audit: type=1130 audit(1707787867.261:495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.94.233:22-62.234.47.75:56742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:07.931673 sshd[2580]: Received disconnect from 104.131.180.171 port 49864:11: Bye Bye [preauth] Feb 13 01:31:07.931673 sshd[2580]: Disconnected from authenticating user root 104.131.180.171 port 49864 [preauth] Feb 13 01:31:07.934149 systemd[1]: sshd@104-139.178.94.233:22-104.131.180.171:49864.service: Deactivated successfully. Feb 13 01:31:07.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.94.233:22-104.131.180.171:49864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:08.027463 kernel: audit: type=1131 audit(1707787867.934:496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.94.233:22-104.131.180.171:49864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:08.196137 sshd[2583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:31:08.196000 audit[2583]: USER_AUTH pid=2583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:31:08.294583 kernel: audit: type=1100 audit(1707787868.196:497): pid=2583 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:31:10.160451 sshd[2583]: Failed password for root from 62.234.47.75 port 56742 ssh2 Feb 13 01:31:10.339768 sshd[2583]: Received disconnect from 62.234.47.75 port 56742:11: Bye Bye [preauth] Feb 13 01:31:10.339768 sshd[2583]: Disconnected from authenticating user root 62.234.47.75 port 56742 [preauth] Feb 13 01:31:10.342222 systemd[1]: sshd@105-139.178.94.233:22-62.234.47.75:56742.service: Deactivated successfully. Feb 13 01:31:10.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.94.233:22-62.234.47.75:56742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:10.435603 kernel: audit: type=1131 audit(1707787870.342:498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.94.233:22-62.234.47.75:56742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:22.139766 systemd[1]: Started sshd@106-139.178.94.233:22-111.229.16.113:44820.service. Feb 13 01:31:22.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.94.233:22-111.229.16.113:44820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:22.232466 kernel: audit: type=1130 audit(1707787882.139:499): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.94.233:22-111.229.16.113:44820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:23.015229 sshd[2589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:31:23.015000 audit[2589]: USER_AUTH pid=2589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:31:23.107584 kernel: audit: type=1100 audit(1707787883.015:500): pid=2589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:31:24.697920 sshd[2538]: Timeout before authentication for 111.229.16.113 port 42728 Feb 13 01:31:24.699324 systemd[1]: sshd@95-139.178.94.233:22-111.229.16.113:42728.service: Deactivated successfully. Feb 13 01:31:24.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.94.233:22-111.229.16.113:42728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:24.703571 sshd[2589]: Failed password for root from 111.229.16.113 port 44820 ssh2 Feb 13 01:31:24.792592 kernel: audit: type=1131 audit(1707787884.699:501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.94.233:22-111.229.16.113:42728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:25.145503 sshd[2589]: Received disconnect from 111.229.16.113 port 44820:11: Bye Bye [preauth] Feb 13 01:31:25.145503 sshd[2589]: Disconnected from authenticating user root 111.229.16.113 port 44820 [preauth] Feb 13 01:31:25.148025 systemd[1]: sshd@106-139.178.94.233:22-111.229.16.113:44820.service: Deactivated successfully. Feb 13 01:31:25.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.94.233:22-111.229.16.113:44820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:25.241510 kernel: audit: type=1131 audit(1707787885.148:502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.94.233:22-111.229.16.113:44820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:37.815911 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:31:37.815Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":5318} Feb 13 01:31:37.818255 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:31:37.817Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":5318,"took":"2.048436ms"} Feb 13 01:31:38.789927 systemd[1]: Started sshd@107-139.178.94.233:22-62.234.47.75:37142.service. Feb 13 01:31:38.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.94.233:22-62.234.47.75:37142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:38.883600 kernel: audit: type=1130 audit(1707787898.788:503): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.94.233:22-62.234.47.75:37142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:39.345311 systemd[1]: Started sshd@108-139.178.94.233:22-43.155.159.34:39444.service. Feb 13 01:31:39.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.94.233:22-43.155.159.34:39444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:39.438603 kernel: audit: type=1130 audit(1707787899.343:504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.94.233:22-43.155.159.34:39444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:39.653876 sshd[2594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:31:39.652000 audit[2594]: USER_AUTH pid=2594 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:31:39.751504 kernel: audit: type=1100 audit(1707787899.652:505): pid=2594 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:31:40.147913 sshd[2597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:31:40.146000 audit[2597]: USER_AUTH pid=2597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:31:40.240603 kernel: audit: type=1100 audit(1707787900.146:506): pid=2597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:31:41.538440 sshd[2594]: Failed password for root from 62.234.47.75 port 37142 ssh2 Feb 13 01:31:41.783937 sshd[2594]: Received disconnect from 62.234.47.75 port 37142:11: Bye Bye [preauth] Feb 13 01:31:41.783937 sshd[2594]: Disconnected from authenticating user root 62.234.47.75 port 37142 [preauth] Feb 13 01:31:41.786468 systemd[1]: sshd@107-139.178.94.233:22-62.234.47.75:37142.service: Deactivated successfully. Feb 13 01:31:41.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.94.233:22-62.234.47.75:37142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:41.880619 kernel: audit: type=1131 audit(1707787901.785:507): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.94.233:22-62.234.47.75:37142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:42.503959 sshd[2597]: Failed password for root from 43.155.159.34 port 39444 ssh2 Feb 13 01:31:44.257447 sshd[2597]: Received disconnect from 43.155.159.34 port 39444:11: Bye Bye [preauth] Feb 13 01:31:44.257447 sshd[2597]: Disconnected from authenticating user root 43.155.159.34 port 39444 [preauth] Feb 13 01:31:44.259997 systemd[1]: sshd@108-139.178.94.233:22-43.155.159.34:39444.service: Deactivated successfully. Feb 13 01:31:44.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.94.233:22-43.155.159.34:39444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:44.353591 kernel: audit: type=1131 audit(1707787904.259:508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.94.233:22-43.155.159.34:39444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:57.915327 systemd[1]: Started sshd@109-139.178.94.233:22-104.131.180.171:52812.service. Feb 13 01:31:57.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.94.233:22-104.131.180.171:52812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:58.008402 kernel: audit: type=1130 audit(1707787917.913:509): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.94.233:22-104.131.180.171:52812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:31:58.350452 sshd[2603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:31:58.349000 audit[2603]: USER_AUTH pid=2603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:31:58.442450 kernel: audit: type=1100 audit(1707787918.349:510): pid=2603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:32:00.510952 sshd[2603]: Failed password for root from 104.131.180.171 port 52812 ssh2 Feb 13 01:32:02.386212 sshd[2603]: Received disconnect from 104.131.180.171 port 52812:11: Bye Bye [preauth] Feb 13 01:32:02.386212 sshd[2603]: Disconnected from authenticating user root 104.131.180.171 port 52812 [preauth] Feb 13 01:32:02.388849 systemd[1]: sshd@109-139.178.94.233:22-104.131.180.171:52812.service: Deactivated successfully. Feb 13 01:32:02.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.94.233:22-104.131.180.171:52812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:02.482596 kernel: audit: type=1131 audit(1707787922.387:511): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.94.233:22-104.131.180.171:52812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:06.422087 systemd[1]: Started sshd@110-139.178.94.233:22-111.229.16.113:59066.service. Feb 13 01:32:06.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.94.233:22-111.229.16.113:59066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:06.515589 kernel: audit: type=1130 audit(1707787926.420:512): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.94.233:22-111.229.16.113:59066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:07.451547 sshd[2608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:32:07.450000 audit[2608]: USER_AUTH pid=2608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:32:07.543581 kernel: audit: type=1100 audit(1707787927.450:513): pid=2608 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:32:09.180453 sshd[2608]: Failed password for root from 111.229.16.113 port 59066 ssh2 Feb 13 01:32:09.357370 systemd[1]: Started sshd@111-139.178.94.233:22-62.234.47.75:45778.service. Feb 13 01:32:09.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.94.233:22-62.234.47.75:45778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:09.450404 kernel: audit: type=1130 audit(1707787929.356:514): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.94.233:22-62.234.47.75:45778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:09.613514 sshd[2608]: Received disconnect from 111.229.16.113 port 59066:11: Bye Bye [preauth] Feb 13 01:32:09.613514 sshd[2608]: Disconnected from authenticating user root 111.229.16.113 port 59066 [preauth] Feb 13 01:32:09.616074 systemd[1]: sshd@110-139.178.94.233:22-111.229.16.113:59066.service: Deactivated successfully. Feb 13 01:32:09.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.94.233:22-111.229.16.113:59066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:09.714583 kernel: audit: type=1131 audit(1707787929.615:515): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.94.233:22-111.229.16.113:59066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:10.207073 sshd[2611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:32:10.205000 audit[2611]: USER_AUTH pid=2611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:32:10.300586 kernel: audit: type=1100 audit(1707787930.205:516): pid=2611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:32:12.347606 sshd[2611]: Failed password for root from 62.234.47.75 port 45778 ssh2 Feb 13 01:32:14.322729 sshd[2611]: Received disconnect from 62.234.47.75 port 45778:11: Bye Bye [preauth] Feb 13 01:32:14.322729 sshd[2611]: Disconnected from authenticating user root 62.234.47.75 port 45778 [preauth] Feb 13 01:32:14.325252 systemd[1]: sshd@111-139.178.94.233:22-62.234.47.75:45778.service: Deactivated successfully. Feb 13 01:32:14.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.94.233:22-62.234.47.75:45778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:14.417454 kernel: audit: type=1131 audit(1707787934.324:517): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.94.233:22-62.234.47.75:45778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:41.353672 systemd[1]: Started sshd@112-139.178.94.233:22-43.155.159.34:58360.service. Feb 13 01:32:41.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.94.233:22-43.155.159.34:58360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:41.447475 kernel: audit: type=1130 audit(1707787961.353:518): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.94.233:22-43.155.159.34:58360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:42.160777 sshd[2616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:32:42.160000 audit[2616]: USER_AUTH pid=2616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:32:42.253585 kernel: audit: type=1100 audit(1707787962.160:519): pid=2616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:32:43.915764 systemd[1]: Started sshd@113-139.178.94.233:22-62.234.47.75:54414.service. Feb 13 01:32:43.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.94.233:22-62.234.47.75:54414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:44.008404 kernel: audit: type=1130 audit(1707787963.915:520): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.94.233:22-62.234.47.75:54414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:44.361259 sshd[2616]: Failed password for root from 43.155.159.34 port 58360 ssh2 Feb 13 01:32:44.795147 sshd[2619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:32:44.795000 audit[2619]: USER_AUTH pid=2619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:32:44.887451 kernel: audit: type=1100 audit(1707787964.795:521): pid=2619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:32:46.262719 sshd[2616]: Received disconnect from 43.155.159.34 port 58360:11: Bye Bye [preauth] Feb 13 01:32:46.262719 sshd[2616]: Disconnected from authenticating user root 43.155.159.34 port 58360 [preauth] Feb 13 01:32:46.265190 systemd[1]: sshd@112-139.178.94.233:22-43.155.159.34:58360.service: Deactivated successfully. Feb 13 01:32:46.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.94.233:22-43.155.159.34:58360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:46.359609 kernel: audit: type=1131 audit(1707787966.265:522): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.94.233:22-43.155.159.34:58360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:46.604165 sshd[2619]: Failed password for root from 62.234.47.75 port 54414 ssh2 Feb 13 01:32:46.930979 sshd[2619]: Received disconnect from 62.234.47.75 port 54414:11: Bye Bye [preauth] Feb 13 01:32:46.930979 sshd[2619]: Disconnected from authenticating user root 62.234.47.75 port 54414 [preauth] Feb 13 01:32:46.933386 systemd[1]: sshd@113-139.178.94.233:22-62.234.47.75:54414.service: Deactivated successfully. Feb 13 01:32:46.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.94.233:22-62.234.47.75:54414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:47.026439 kernel: audit: type=1131 audit(1707787966.933:523): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.94.233:22-62.234.47.75:54414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:50.312165 systemd[1]: Started sshd@114-139.178.94.233:22-111.229.16.113:45084.service. Feb 13 01:32:50.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.94.233:22-111.229.16.113:45084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:50.405595 kernel: audit: type=1130 audit(1707787970.311:524): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.94.233:22-111.229.16.113:45084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:51.195509 sshd[2625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:32:51.195000 audit[2625]: USER_AUTH pid=2625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:32:51.288590 kernel: audit: type=1100 audit(1707787971.195:525): pid=2625 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:32:53.632064 sshd[2625]: Failed password for root from 111.229.16.113 port 45084 ssh2 Feb 13 01:32:55.311435 sshd[2625]: Received disconnect from 111.229.16.113 port 45084:11: Bye Bye [preauth] Feb 13 01:32:55.311435 sshd[2625]: Disconnected from authenticating user root 111.229.16.113 port 45084 [preauth] Feb 13 01:32:55.313967 systemd[1]: sshd@114-139.178.94.233:22-111.229.16.113:45084.service: Deactivated successfully. Feb 13 01:32:55.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.94.233:22-111.229.16.113:45084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:55.407455 kernel: audit: type=1131 audit(1707787975.313:526): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.94.233:22-111.229.16.113:45084 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:56.165318 systemd[1]: Started sshd@115-139.178.94.233:22-104.131.180.171:46296.service. Feb 13 01:32:56.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.94.233:22-104.131.180.171:46296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:56.259598 kernel: audit: type=1130 audit(1707787976.164:527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.94.233:22-104.131.180.171:46296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:56.587089 sshd[2629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:32:56.585000 audit[2629]: USER_AUTH pid=2629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:32:56.686585 kernel: audit: type=1100 audit(1707787976.585:528): pid=2629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:32:58.376081 sshd[2629]: Failed password for root from 104.131.180.171 port 46296 ssh2 Feb 13 01:32:58.634593 sshd[2629]: Received disconnect from 104.131.180.171 port 46296:11: Bye Bye [preauth] Feb 13 01:32:58.634593 sshd[2629]: Disconnected from authenticating user root 104.131.180.171 port 46296 [preauth] Feb 13 01:32:58.637015 systemd[1]: sshd@115-139.178.94.233:22-104.131.180.171:46296.service: Deactivated successfully. Feb 13 01:32:58.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.94.233:22-104.131.180.171:46296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:32:58.731603 kernel: audit: type=1131 audit(1707787978.636:529): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.94.233:22-104.131.180.171:46296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:17.764410 systemd[1]: Started sshd@116-139.178.94.233:22-62.234.47.75:34824.service. Feb 13 01:33:17.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.94.233:22-62.234.47.75:34824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:17.857403 kernel: audit: type=1130 audit(1707787997.763:530): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.94.233:22-62.234.47.75:34824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:18.669250 sshd[2633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:33:18.668000 audit[2633]: USER_AUTH pid=2633 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:33:18.762571 kernel: audit: type=1100 audit(1707787998.668:531): pid=2633 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:33:20.478431 sshd[2633]: Failed password for root from 62.234.47.75 port 34824 ssh2 Feb 13 01:33:20.805692 sshd[2633]: Received disconnect from 62.234.47.75 port 34824:11: Bye Bye [preauth] Feb 13 01:33:20.805692 sshd[2633]: Disconnected from authenticating user root 62.234.47.75 port 34824 [preauth] Feb 13 01:33:20.808216 systemd[1]: sshd@116-139.178.94.233:22-62.234.47.75:34824.service: Deactivated successfully. Feb 13 01:33:20.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.94.233:22-62.234.47.75:34824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:20.901472 kernel: audit: type=1131 audit(1707788000.807:532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.94.233:22-62.234.47.75:34824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:38.190442 systemd[1]: Started sshd@117-139.178.94.233:22-111.229.16.113:59576.service. Feb 13 01:33:38.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.94.233:22-111.229.16.113:59576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:38.284593 kernel: audit: type=1130 audit(1707788018.189:533): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.94.233:22-111.229.16.113:59576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:39.118797 sshd[2638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:33:39.117000 audit[2638]: USER_AUTH pid=2638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:33:39.211460 kernel: audit: type=1100 audit(1707788019.117:534): pid=2638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:33:41.143787 sshd[2638]: Failed password for root from 111.229.16.113 port 59576 ssh2 Feb 13 01:33:43.244006 sshd[2638]: Received disconnect from 111.229.16.113 port 59576:11: Bye Bye [preauth] Feb 13 01:33:43.244006 sshd[2638]: Disconnected from authenticating user root 111.229.16.113 port 59576 [preauth] Feb 13 01:33:43.246543 systemd[1]: sshd@117-139.178.94.233:22-111.229.16.113:59576.service: Deactivated successfully. Feb 13 01:33:43.245000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.94.233:22-111.229.16.113:59576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:43.340608 kernel: audit: type=1131 audit(1707788023.245:535): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.94.233:22-111.229.16.113:59576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:45.675156 systemd[1]: Started sshd@118-139.178.94.233:22-43.155.159.34:49042.service. Feb 13 01:33:45.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.94.233:22-43.155.159.34:49042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:45.768403 kernel: audit: type=1130 audit(1707788025.674:536): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.94.233:22-43.155.159.34:49042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:46.503707 sshd[2645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:33:46.503000 audit[2645]: USER_AUTH pid=2645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:33:46.596436 kernel: audit: type=1100 audit(1707788026.503:537): pid=2645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:33:48.824676 sshd[2645]: Failed password for root from 43.155.159.34 port 49042 ssh2 Feb 13 01:33:49.527272 systemd[1]: Started sshd@119-139.178.94.233:22-104.131.180.171:33122.service. Feb 13 01:33:49.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.94.233:22-104.131.180.171:33122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:49.621600 kernel: audit: type=1130 audit(1707788029.526:538): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.94.233:22-104.131.180.171:33122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:49.951488 sshd[2648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:33:49.951000 audit[2648]: USER_AUTH pid=2648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:33:50.009542 systemd[1]: Started sshd@120-139.178.94.233:22-62.234.47.75:43454.service. Feb 13 01:33:50.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.94.233:22-62.234.47.75:43454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:50.143788 kernel: audit: type=1100 audit(1707788029.951:539): pid=2648 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:33:50.143819 kernel: audit: type=1130 audit(1707788030.009:540): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.94.233:22-62.234.47.75:43454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:50.613000 sshd[2645]: Received disconnect from 43.155.159.34 port 49042:11: Bye Bye [preauth] Feb 13 01:33:50.613000 sshd[2645]: Disconnected from authenticating user root 43.155.159.34 port 49042 [preauth] Feb 13 01:33:50.615531 systemd[1]: sshd@118-139.178.94.233:22-43.155.159.34:49042.service: Deactivated successfully. Feb 13 01:33:50.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.94.233:22-43.155.159.34:49042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:50.709600 kernel: audit: type=1131 audit(1707788030.615:541): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.94.233:22-43.155.159.34:49042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:50.873794 sshd[2651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:33:50.873000 audit[2651]: USER_AUTH pid=2651 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:33:50.972593 kernel: audit: type=1100 audit(1707788030.873:542): pid=2651 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:33:52.016532 sshd[2648]: Failed password for root from 104.131.180.171 port 33122 ssh2 Feb 13 01:33:52.742928 sshd[2651]: Failed password for root from 62.234.47.75 port 43454 ssh2 Feb 13 01:33:53.003653 sshd[2651]: Received disconnect from 62.234.47.75 port 43454:11: Bye Bye [preauth] Feb 13 01:33:53.003653 sshd[2651]: Disconnected from authenticating user root 62.234.47.75 port 43454 [preauth] Feb 13 01:33:53.006333 systemd[1]: sshd@120-139.178.94.233:22-62.234.47.75:43454.service: Deactivated successfully. Feb 13 01:33:53.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.94.233:22-62.234.47.75:43454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:53.099534 kernel: audit: type=1131 audit(1707788033.006:543): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.94.233:22-62.234.47.75:43454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:53.984363 sshd[2648]: Received disconnect from 104.131.180.171 port 33122:11: Bye Bye [preauth] Feb 13 01:33:53.984363 sshd[2648]: Disconnected from authenticating user root 104.131.180.171 port 33122 [preauth] Feb 13 01:33:53.986926 systemd[1]: sshd@119-139.178.94.233:22-104.131.180.171:33122.service: Deactivated successfully. Feb 13 01:33:53.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.94.233:22-104.131.180.171:33122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:33:54.081599 kernel: audit: type=1131 audit(1707788033.986:544): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.94.233:22-104.131.180.171:33122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:21.913231 systemd[1]: Started sshd@121-139.178.94.233:22-111.229.16.113:45528.service. Feb 13 01:34:21.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.94.233:22-111.229.16.113:45528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:22.006421 kernel: audit: type=1130 audit(1707788061.911:545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.94.233:22-111.229.16.113:45528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:22.848987 sshd[2658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:34:22.847000 audit[2658]: USER_AUTH pid=2658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:34:22.942618 kernel: audit: type=1100 audit(1707788062.847:546): pid=2658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:34:25.445624 sshd[2658]: Failed password for root from 111.229.16.113 port 45528 ssh2 Feb 13 01:34:25.604764 systemd[1]: Started sshd@122-139.178.94.233:22-62.234.47.75:52094.service. Feb 13 01:34:25.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.94.233:22-62.234.47.75:52094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:25.698586 kernel: audit: type=1130 audit(1707788065.603:547): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.94.233:22-62.234.47.75:52094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:26.490482 sshd[2661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:34:26.489000 audit[2661]: USER_AUTH pid=2661 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:34:26.583584 kernel: audit: type=1100 audit(1707788066.489:548): pid=2661 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:34:26.976272 sshd[2658]: Received disconnect from 111.229.16.113 port 45528:11: Bye Bye [preauth] Feb 13 01:34:26.976272 sshd[2658]: Disconnected from authenticating user root 111.229.16.113 port 45528 [preauth] Feb 13 01:34:26.978662 systemd[1]: sshd@121-139.178.94.233:22-111.229.16.113:45528.service: Deactivated successfully. Feb 13 01:34:26.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.94.233:22-111.229.16.113:45528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:27.072599 kernel: audit: type=1131 audit(1707788066.977:549): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.94.233:22-111.229.16.113:45528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:28.635848 sshd[2661]: Failed password for root from 62.234.47.75 port 52094 ssh2 Feb 13 01:34:30.610185 sshd[2661]: Received disconnect from 62.234.47.75 port 52094:11: Bye Bye [preauth] Feb 13 01:34:30.610185 sshd[2661]: Disconnected from authenticating user root 62.234.47.75 port 52094 [preauth] Feb 13 01:34:30.612684 systemd[1]: sshd@122-139.178.94.233:22-62.234.47.75:52094.service: Deactivated successfully. Feb 13 01:34:30.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.94.233:22-62.234.47.75:52094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:30.705402 kernel: audit: type=1131 audit(1707788070.611:550): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.94.233:22-62.234.47.75:52094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:45.509225 systemd[1]: Started sshd@123-139.178.94.233:22-104.131.180.171:43150.service. Feb 13 01:34:45.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.94.233:22-104.131.180.171:43150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:45.603609 kernel: audit: type=1130 audit(1707788085.507:551): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.94.233:22-104.131.180.171:43150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:45.962964 sshd[2668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:34:45.961000 audit[2668]: USER_AUTH pid=2668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:34:46.059470 kernel: audit: type=1100 audit(1707788085.961:552): pid=2668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:34:48.383959 sshd[2668]: Failed password for root from 104.131.180.171 port 43150 ssh2 Feb 13 01:34:49.776474 systemd[1]: Started sshd@124-139.178.94.233:22-43.155.159.34:39714.service. Feb 13 01:34:49.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.94.233:22-43.155.159.34:39714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:49.869403 kernel: audit: type=1130 audit(1707788089.775:553): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.94.233:22-43.155.159.34:39714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:49.999034 sshd[2668]: Received disconnect from 104.131.180.171 port 43150:11: Bye Bye [preauth] Feb 13 01:34:49.999034 sshd[2668]: Disconnected from authenticating user root 104.131.180.171 port 43150 [preauth] Feb 13 01:34:50.001566 systemd[1]: sshd@123-139.178.94.233:22-104.131.180.171:43150.service: Deactivated successfully. Feb 13 01:34:50.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.94.233:22-104.131.180.171:43150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:50.100599 kernel: audit: type=1131 audit(1707788090.000:554): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.94.233:22-104.131.180.171:43150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:50.573555 sshd[2671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:34:50.572000 audit[2671]: USER_AUTH pid=2671 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:34:50.666579 kernel: audit: type=1100 audit(1707788090.572:555): pid=2671 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:34:52.347324 sshd[2671]: Failed password for root from 43.155.159.34 port 39714 ssh2 Feb 13 01:34:52.696680 sshd[2671]: Received disconnect from 43.155.159.34 port 39714:11: Bye Bye [preauth] Feb 13 01:34:52.696680 sshd[2671]: Disconnected from authenticating user root 43.155.159.34 port 39714 [preauth] Feb 13 01:34:52.699071 systemd[1]: sshd@124-139.178.94.233:22-43.155.159.34:39714.service: Deactivated successfully. Feb 13 01:34:52.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.94.233:22-43.155.159.34:39714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:52.792603 kernel: audit: type=1131 audit(1707788092.698:556): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.94.233:22-43.155.159.34:39714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:56.198612 systemd[1]: Started sshd@125-139.178.94.233:22-62.234.47.75:60724.service. Feb 13 01:34:56.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.94.233:22-62.234.47.75:60724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:56.292503 kernel: audit: type=1130 audit(1707788096.197:557): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.94.233:22-62.234.47.75:60724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:34:57.154086 sshd[2677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:34:57.152000 audit[2677]: USER_AUTH pid=2677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:34:57.246590 kernel: audit: type=1100 audit(1707788097.152:558): pid=2677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:34:59.555370 sshd[2677]: Failed password for root from 62.234.47.75 port 60724 ssh2 Feb 13 01:35:01.286301 sshd[2677]: Received disconnect from 62.234.47.75 port 60724:11: Bye Bye [preauth] Feb 13 01:35:01.286301 sshd[2677]: Disconnected from authenticating user root 62.234.47.75 port 60724 [preauth] Feb 13 01:35:01.288820 systemd[1]: sshd@125-139.178.94.233:22-62.234.47.75:60724.service: Deactivated successfully. Feb 13 01:35:01.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.94.233:22-62.234.47.75:60724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:01.382598 kernel: audit: type=1131 audit(1707788101.287:559): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.94.233:22-62.234.47.75:60724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:05.171955 systemd[1]: Started sshd@126-139.178.94.233:22-111.229.16.113:59770.service. Feb 13 01:35:05.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.94.233:22-111.229.16.113:59770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:05.264403 kernel: audit: type=1130 audit(1707788105.170:560): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.94.233:22-111.229.16.113:59770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:06.046156 sshd[2682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:35:06.045000 audit[2682]: USER_AUTH pid=2682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:35:06.139585 kernel: audit: type=1100 audit(1707788106.045:561): pid=2682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:35:08.015650 sshd[2682]: Failed password for root from 111.229.16.113 port 59770 ssh2 Feb 13 01:35:08.176018 sshd[2682]: Received disconnect from 111.229.16.113 port 59770:11: Bye Bye [preauth] Feb 13 01:35:08.176018 sshd[2682]: Disconnected from authenticating user root 111.229.16.113 port 59770 [preauth] Feb 13 01:35:08.178577 systemd[1]: sshd@126-139.178.94.233:22-111.229.16.113:59770.service: Deactivated successfully. Feb 13 01:35:08.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.94.233:22-111.229.16.113:59770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:08.272597 kernel: audit: type=1131 audit(1707788108.177:562): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.94.233:22-111.229.16.113:59770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:19.249119 systemd[1]: Started sshd@127-139.178.94.233:22-138.197.18.220:54048.service. Feb 13 01:35:19.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.94.233:22-138.197.18.220:54048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:19.342602 kernel: audit: type=1130 audit(1707788119.248:563): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.94.233:22-138.197.18.220:54048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:19.577594 sshd[2687]: Invalid user test from 138.197.18.220 port 54048 Feb 13 01:35:19.655277 sshd[2687]: pam_faillock(sshd:auth): User unknown Feb 13 01:35:19.656481 sshd[2687]: pam_unix(sshd:auth): check pass; user unknown Feb 13 01:35:19.656570 sshd[2687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.18.220 Feb 13 01:35:19.657492 sshd[2687]: pam_faillock(sshd:auth): User unknown Feb 13 01:35:19.657000 audit[2687]: USER_AUTH pid=2687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=138.197.18.220 addr=138.197.18.220 terminal=ssh res=failed' Feb 13 01:35:19.756584 kernel: audit: type=1100 audit(1707788119.657:564): pid=2687 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=138.197.18.220 addr=138.197.18.220 terminal=ssh res=failed' Feb 13 01:35:22.077927 sshd[2687]: Failed password for invalid user test from 138.197.18.220 port 54048 ssh2 Feb 13 01:35:22.796176 sshd[2687]: Connection closed by invalid user test 138.197.18.220 port 54048 [preauth] Feb 13 01:35:22.798657 systemd[1]: sshd@127-139.178.94.233:22-138.197.18.220:54048.service: Deactivated successfully. Feb 13 01:35:22.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.94.233:22-138.197.18.220:54048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:22.892449 kernel: audit: type=1131 audit(1707788122.798:565): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.94.233:22-138.197.18.220:54048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:28.570232 systemd[1]: Started sshd@128-139.178.94.233:22-62.234.47.75:41128.service. Feb 13 01:35:28.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.94.233:22-62.234.47.75:41128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:28.663604 kernel: audit: type=1130 audit(1707788128.569:566): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.94.233:22-62.234.47.75:41128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:29.433963 sshd[2691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:35:29.433000 audit[2691]: USER_AUTH pid=2691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:35:29.526583 kernel: audit: type=1100 audit(1707788129.433:567): pid=2691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:35:31.228072 sshd[2691]: Failed password for root from 62.234.47.75 port 41128 ssh2 Feb 13 01:35:31.564185 sshd[2691]: Received disconnect from 62.234.47.75 port 41128:11: Bye Bye [preauth] Feb 13 01:35:31.564185 sshd[2691]: Disconnected from authenticating user root 62.234.47.75 port 41128 [preauth] Feb 13 01:35:31.566853 systemd[1]: sshd@128-139.178.94.233:22-62.234.47.75:41128.service: Deactivated successfully. Feb 13 01:35:31.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.94.233:22-62.234.47.75:41128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:31.660587 kernel: audit: type=1131 audit(1707788131.567:568): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.94.233:22-62.234.47.75:41128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:39.232179 systemd[1]: Started sshd@129-139.178.94.233:22-104.131.180.171:42880.service. Feb 13 01:35:39.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.94.233:22-104.131.180.171:42880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:39.324600 kernel: audit: type=1130 audit(1707788139.231:569): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.94.233:22-104.131.180.171:42880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:39.649423 sshd[2695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:35:39.649000 audit[2695]: USER_AUTH pid=2695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:35:39.749445 kernel: audit: type=1100 audit(1707788139.649:570): pid=2695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:35:41.147708 sshd[2695]: Failed password for root from 104.131.180.171 port 42880 ssh2 Feb 13 01:35:41.695510 sshd[2695]: Received disconnect from 104.131.180.171 port 42880:11: Bye Bye [preauth] Feb 13 01:35:41.695510 sshd[2695]: Disconnected from authenticating user root 104.131.180.171 port 42880 [preauth] Feb 13 01:35:41.698027 systemd[1]: sshd@129-139.178.94.233:22-104.131.180.171:42880.service: Deactivated successfully. Feb 13 01:35:41.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.94.233:22-104.131.180.171:42880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:41.792593 kernel: audit: type=1131 audit(1707788141.698:571): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.94.233:22-104.131.180.171:42880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:47.941433 systemd[1]: Started sshd@130-139.178.94.233:22-111.229.16.113:45660.service. Feb 13 01:35:47.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.94.233:22-111.229.16.113:45660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:48.035608 kernel: audit: type=1130 audit(1707788147.940:572): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.94.233:22-111.229.16.113:45660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:48.858784 sshd[2702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:35:48.857000 audit[2702]: USER_AUTH pid=2702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:35:48.952593 kernel: audit: type=1100 audit(1707788148.857:573): pid=2702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:35:50.260590 sshd[2702]: Failed password for root from 111.229.16.113 port 45660 ssh2 Feb 13 01:35:50.997662 sshd[2702]: Received disconnect from 111.229.16.113 port 45660:11: Bye Bye [preauth] Feb 13 01:35:50.997662 sshd[2702]: Disconnected from authenticating user root 111.229.16.113 port 45660 [preauth] Feb 13 01:35:51.000164 systemd[1]: sshd@130-139.178.94.233:22-111.229.16.113:45660.service: Deactivated successfully. Feb 13 01:35:50.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.94.233:22-111.229.16.113:45660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:51.094602 kernel: audit: type=1131 audit(1707788150.999:574): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.94.233:22-111.229.16.113:45660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:53.395378 systemd[1]: Started sshd@131-139.178.94.233:22-43.155.159.34:58626.service. Feb 13 01:35:53.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.94.233:22-43.155.159.34:58626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:53.489603 kernel: audit: type=1130 audit(1707788153.394:575): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.94.233:22-43.155.159.34:58626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:54.186034 sshd[2708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:35:54.184000 audit[2708]: USER_AUTH pid=2708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:35:54.279589 kernel: audit: type=1100 audit(1707788154.184:576): pid=2708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:35:56.410782 sshd[2708]: Failed password for root from 43.155.159.34 port 58626 ssh2 Feb 13 01:35:58.229221 systemd[1]: Started sshd@132-139.178.94.233:22-62.234.47.75:49764.service. Feb 13 01:35:58.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.94.233:22-62.234.47.75:49764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:58.289124 sshd[2708]: Received disconnect from 43.155.159.34 port 58626:11: Bye Bye [preauth] Feb 13 01:35:58.289124 sshd[2708]: Disconnected from authenticating user root 43.155.159.34 port 58626 [preauth] Feb 13 01:35:58.289591 systemd[1]: sshd@131-139.178.94.233:22-43.155.159.34:58626.service: Deactivated successfully. Feb 13 01:35:58.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.94.233:22-43.155.159.34:58626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:58.414205 kernel: audit: type=1130 audit(1707788158.227:577): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.94.233:22-62.234.47.75:49764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:58.414238 kernel: audit: type=1131 audit(1707788158.288:578): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.94.233:22-43.155.159.34:58626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:35:59.240721 sshd[2711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:35:59.239000 audit[2711]: USER_AUTH pid=2711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:35:59.332589 kernel: audit: type=1100 audit(1707788159.239:579): pid=2711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:36:01.486523 sshd[2711]: Failed password for root from 62.234.47.75 port 49764 ssh2 Feb 13 01:36:03.382689 sshd[2711]: Received disconnect from 62.234.47.75 port 49764:11: Bye Bye [preauth] Feb 13 01:36:03.382689 sshd[2711]: Disconnected from authenticating user root 62.234.47.75 port 49764 [preauth] Feb 13 01:36:03.385189 systemd[1]: sshd@132-139.178.94.233:22-62.234.47.75:49764.service: Deactivated successfully. Feb 13 01:36:03.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.94.233:22-62.234.47.75:49764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:03.479593 kernel: audit: type=1131 audit(1707788163.384:580): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.94.233:22-62.234.47.75:49764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:29.871744 systemd[1]: Started sshd@133-139.178.94.233:22-62.234.47.75:58402.service. Feb 13 01:36:29.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-139.178.94.233:22-62.234.47.75:58402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:29.965602 kernel: audit: type=1130 audit(1707788189.870:581): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-139.178.94.233:22-62.234.47.75:58402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:30.097740 systemd[1]: Started sshd@134-139.178.94.233:22-111.229.16.113:59782.service. Feb 13 01:36:30.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-139.178.94.233:22-111.229.16.113:59782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:30.191402 kernel: audit: type=1130 audit(1707788190.096:582): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-139.178.94.233:22-111.229.16.113:59782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:30.799452 sshd[2720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:36:30.798000 audit[2720]: USER_AUTH pid=2720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:36:30.895587 kernel: audit: type=1100 audit(1707788190.798:583): pid=2720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:36:31.043537 sshd[2723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:36:31.042000 audit[2723]: USER_AUTH pid=2723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:36:31.143596 kernel: audit: type=1100 audit(1707788191.042:584): pid=2723 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:36:32.633856 sshd[2720]: Failed password for root from 62.234.47.75 port 58402 ssh2 Feb 13 01:36:32.681776 sshd[2723]: Failed password for root from 111.229.16.113 port 59782 ssh2 Feb 13 01:36:32.945355 sshd[2720]: Received disconnect from 62.234.47.75 port 58402:11: Bye Bye [preauth] Feb 13 01:36:32.945355 sshd[2720]: Disconnected from authenticating user root 62.234.47.75 port 58402 [preauth] Feb 13 01:36:32.947801 systemd[1]: sshd@133-139.178.94.233:22-62.234.47.75:58402.service: Deactivated successfully. Feb 13 01:36:32.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-139.178.94.233:22-62.234.47.75:58402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:33.041454 kernel: audit: type=1131 audit(1707788192.946:585): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-139.178.94.233:22-62.234.47.75:58402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:33.188578 sshd[2723]: Received disconnect from 111.229.16.113 port 59782:11: Bye Bye [preauth] Feb 13 01:36:33.188578 sshd[2723]: Disconnected from authenticating user root 111.229.16.113 port 59782 [preauth] Feb 13 01:36:33.191061 systemd[1]: sshd@134-139.178.94.233:22-111.229.16.113:59782.service: Deactivated successfully. Feb 13 01:36:33.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-139.178.94.233:22-111.229.16.113:59782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:33.285477 kernel: audit: type=1131 audit(1707788193.190:586): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-139.178.94.233:22-111.229.16.113:59782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:33.454283 systemd[1]: Started sshd@135-139.178.94.233:22-104.131.180.171:34848.service. Feb 13 01:36:33.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-139.178.94.233:22-104.131.180.171:34848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:33.547403 kernel: audit: type=1130 audit(1707788193.453:587): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-139.178.94.233:22-104.131.180.171:34848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:33.894033 sshd[2728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:36:33.892000 audit[2728]: USER_AUTH pid=2728 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:36:33.986447 kernel: audit: type=1100 audit(1707788193.892:588): pid=2728 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:36:36.139754 sshd[2728]: Failed password for root from 104.131.180.171 port 34848 ssh2 Feb 13 01:36:37.817466 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:36:37.816Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":5858} Feb 13 01:36:37.820050 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:36:37.819Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":5858,"took":"2.073562ms"} Feb 13 01:36:37.930561 sshd[2728]: Received disconnect from 104.131.180.171 port 34848:11: Bye Bye [preauth] Feb 13 01:36:37.930561 sshd[2728]: Disconnected from authenticating user root 104.131.180.171 port 34848 [preauth] Feb 13 01:36:37.933126 systemd[1]: sshd@135-139.178.94.233:22-104.131.180.171:34848.service: Deactivated successfully. Feb 13 01:36:37.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-139.178.94.233:22-104.131.180.171:34848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:38.026407 kernel: audit: type=1131 audit(1707788197.933:589): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-139.178.94.233:22-104.131.180.171:34848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:54.670110 systemd[1]: Started sshd@136-139.178.94.233:22-43.155.159.34:49294.service. Feb 13 01:36:54.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-139.178.94.233:22-43.155.159.34:49294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:54.763598 kernel: audit: type=1130 audit(1707788214.669:590): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-139.178.94.233:22-43.155.159.34:49294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:55.481029 sshd[2733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:36:55.480000 audit[2733]: USER_AUTH pid=2733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:36:55.573436 kernel: audit: type=1100 audit(1707788215.480:591): pid=2733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:36:57.414789 sshd[2733]: Failed password for root from 43.155.159.34 port 49294 ssh2 Feb 13 01:36:57.595569 sshd[2733]: Received disconnect from 43.155.159.34 port 49294:11: Bye Bye [preauth] Feb 13 01:36:57.595569 sshd[2733]: Disconnected from authenticating user root 43.155.159.34 port 49294 [preauth] Feb 13 01:36:57.598091 systemd[1]: sshd@136-139.178.94.233:22-43.155.159.34:49294.service: Deactivated successfully. Feb 13 01:36:57.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-139.178.94.233:22-43.155.159.34:49294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:36:57.692600 kernel: audit: type=1131 audit(1707788217.598:592): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-139.178.94.233:22-43.155.159.34:49294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:00.362765 systemd[1]: Started sshd@137-139.178.94.233:22-62.234.47.75:38802.service. Feb 13 01:37:00.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-139.178.94.233:22-62.234.47.75:38802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:00.456570 kernel: audit: type=1130 audit(1707788220.362:593): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-139.178.94.233:22-62.234.47.75:38802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:01.263192 sshd[2738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:37:01.263000 audit[2738]: USER_AUTH pid=2738 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:37:01.355591 kernel: audit: type=1100 audit(1707788221.263:594): pid=2738 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:37:03.021768 sshd[2738]: Failed password for root from 62.234.47.75 port 38802 ssh2 Feb 13 01:37:03.399574 sshd[2738]: Received disconnect from 62.234.47.75 port 38802:11: Bye Bye [preauth] Feb 13 01:37:03.399574 sshd[2738]: Disconnected from authenticating user root 62.234.47.75 port 38802 [preauth] Feb 13 01:37:03.402044 systemd[1]: sshd@137-139.178.94.233:22-62.234.47.75:38802.service: Deactivated successfully. Feb 13 01:37:03.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-139.178.94.233:22-62.234.47.75:38802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:03.496591 kernel: audit: type=1131 audit(1707788223.402:595): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-139.178.94.233:22-62.234.47.75:38802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:12.675755 systemd[1]: Started sshd@138-139.178.94.233:22-111.229.16.113:45726.service. Feb 13 01:37:12.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.94.233:22-111.229.16.113:45726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:12.769607 kernel: audit: type=1130 audit(1707788232.674:596): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.94.233:22-111.229.16.113:45726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:13.638040 sshd[2742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:37:13.636000 audit[2742]: USER_AUTH pid=2742 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:37:13.731560 kernel: audit: type=1100 audit(1707788233.636:597): pid=2742 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:37:15.376668 sshd[2742]: Failed password for root from 111.229.16.113 port 45726 ssh2 Feb 13 01:37:15.780796 sshd[2742]: Received disconnect from 111.229.16.113 port 45726:11: Bye Bye [preauth] Feb 13 01:37:15.780796 sshd[2742]: Disconnected from authenticating user root 111.229.16.113 port 45726 [preauth] Feb 13 01:37:15.783290 systemd[1]: sshd@138-139.178.94.233:22-111.229.16.113:45726.service: Deactivated successfully. Feb 13 01:37:15.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.94.233:22-111.229.16.113:45726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:15.877595 kernel: audit: type=1131 audit(1707788235.782:598): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.94.233:22-111.229.16.113:45726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:29.063504 systemd[1]: Started sshd@139-139.178.94.233:22-104.131.180.171:32794.service. Feb 13 01:37:29.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-139.178.94.233:22-104.131.180.171:32794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:29.157593 kernel: audit: type=1130 audit(1707788249.062:599): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-139.178.94.233:22-104.131.180.171:32794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:29.486932 sshd[2746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:37:29.485000 audit[2746]: USER_AUTH pid=2746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:37:29.585460 kernel: audit: type=1100 audit(1707788249.485:600): pid=2746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:37:31.421277 sshd[2746]: Failed password for root from 104.131.180.171 port 32794 ssh2 Feb 13 01:37:31.519090 systemd[1]: Started sshd@140-139.178.94.233:22-62.234.47.75:47434.service. Feb 13 01:37:31.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-139.178.94.233:22-62.234.47.75:47434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:31.533572 sshd[2746]: Received disconnect from 104.131.180.171 port 32794:11: Bye Bye [preauth] Feb 13 01:37:31.533572 sshd[2746]: Disconnected from authenticating user root 104.131.180.171 port 32794 [preauth] Feb 13 01:37:31.534158 systemd[1]: sshd@139-139.178.94.233:22-104.131.180.171:32794.service: Deactivated successfully. Feb 13 01:37:31.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-139.178.94.233:22-104.131.180.171:32794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:31.703091 kernel: audit: type=1130 audit(1707788251.517:601): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-139.178.94.233:22-62.234.47.75:47434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:31.703120 kernel: audit: type=1131 audit(1707788251.532:602): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-139.178.94.233:22-104.131.180.171:32794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:32.411539 sshd[2749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:37:32.410000 audit[2749]: USER_AUTH pid=2749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:37:32.503617 kernel: audit: type=1100 audit(1707788252.410:603): pid=2749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:37:34.090317 sshd[2749]: Failed password for root from 62.234.47.75 port 47434 ssh2 Feb 13 01:37:34.544975 sshd[2749]: Received disconnect from 62.234.47.75 port 47434:11: Bye Bye [preauth] Feb 13 01:37:34.544975 sshd[2749]: Disconnected from authenticating user root 62.234.47.75 port 47434 [preauth] Feb 13 01:37:34.547583 systemd[1]: sshd@140-139.178.94.233:22-62.234.47.75:47434.service: Deactivated successfully. Feb 13 01:37:34.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-139.178.94.233:22-62.234.47.75:47434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:34.641601 kernel: audit: type=1131 audit(1707788254.546:604): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-139.178.94.233:22-62.234.47.75:47434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:55.791904 systemd[1]: Started sshd@141-139.178.94.233:22-111.229.16.113:59900.service. Feb 13 01:37:55.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-139.178.94.233:22-111.229.16.113:59900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:55.885456 kernel: audit: type=1130 audit(1707788275.790:605): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-139.178.94.233:22-111.229.16.113:59900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:56.552751 systemd[1]: Started sshd@142-139.178.94.233:22-43.155.159.34:39968.service. Feb 13 01:37:56.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-139.178.94.233:22-43.155.159.34:39968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:56.646599 kernel: audit: type=1130 audit(1707788276.551:606): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-139.178.94.233:22-43.155.159.34:39968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:56.690528 sshd[2755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:37:56.689000 audit[2755]: USER_AUTH pid=2755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:37:56.781584 kernel: audit: type=1100 audit(1707788276.689:607): pid=2755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:37:57.396076 sshd[2758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:37:57.394000 audit[2758]: USER_AUTH pid=2758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:37:57.488480 kernel: audit: type=1100 audit(1707788277.394:608): pid=2758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:37:58.665076 sshd[2755]: Failed password for root from 111.229.16.113 port 59900 ssh2 Feb 13 01:37:58.832484 sshd[2755]: Received disconnect from 111.229.16.113 port 59900:11: Bye Bye [preauth] Feb 13 01:37:58.832484 sshd[2755]: Disconnected from authenticating user root 111.229.16.113 port 59900 [preauth] Feb 13 01:37:58.835067 systemd[1]: sshd@141-139.178.94.233:22-111.229.16.113:59900.service: Deactivated successfully. Feb 13 01:37:58.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-139.178.94.233:22-111.229.16.113:59900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:58.929598 kernel: audit: type=1131 audit(1707788278.834:609): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-139.178.94.233:22-111.229.16.113:59900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:37:59.841950 sshd[2758]: Failed password for root from 43.155.159.34 port 39968 ssh2 Feb 13 01:38:01.494345 sshd[2758]: Received disconnect from 43.155.159.34 port 39968:11: Bye Bye [preauth] Feb 13 01:38:01.494345 sshd[2758]: Disconnected from authenticating user root 43.155.159.34 port 39968 [preauth] Feb 13 01:38:01.496993 systemd[1]: sshd@142-139.178.94.233:22-43.155.159.34:39968.service: Deactivated successfully. Feb 13 01:38:01.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-139.178.94.233:22-43.155.159.34:39968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:01.591494 kernel: audit: type=1131 audit(1707788281.497:610): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-139.178.94.233:22-43.155.159.34:39968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:04.333690 systemd[1]: Started sshd@143-139.178.94.233:22-62.234.47.75:56076.service. Feb 13 01:38:04.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-139.178.94.233:22-62.234.47.75:56076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:04.427602 kernel: audit: type=1130 audit(1707788284.333:611): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-139.178.94.233:22-62.234.47.75:56076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:05.245451 sshd[2763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:38:05.245000 audit[2763]: USER_AUTH pid=2763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:38:05.337461 kernel: audit: type=1100 audit(1707788285.245:612): pid=2763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:38:07.119917 sshd[2763]: Failed password for root from 62.234.47.75 port 56076 ssh2 Feb 13 01:38:07.384881 sshd[2763]: Received disconnect from 62.234.47.75 port 56076:11: Bye Bye [preauth] Feb 13 01:38:07.384881 sshd[2763]: Disconnected from authenticating user root 62.234.47.75 port 56076 [preauth] Feb 13 01:38:07.387320 systemd[1]: sshd@143-139.178.94.233:22-62.234.47.75:56076.service: Deactivated successfully. Feb 13 01:38:07.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-139.178.94.233:22-62.234.47.75:56076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:07.481480 kernel: audit: type=1131 audit(1707788287.387:613): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-139.178.94.233:22-62.234.47.75:56076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:21.873253 systemd[1]: Started sshd@144-139.178.94.233:22-104.131.180.171:39860.service. Feb 13 01:38:21.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-139.178.94.233:22-104.131.180.171:39860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:21.967597 kernel: audit: type=1130 audit(1707788301.872:614): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-139.178.94.233:22-104.131.180.171:39860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:22.320531 sshd[2769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:38:22.320000 audit[2769]: USER_AUTH pid=2769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:38:22.420471 kernel: audit: type=1100 audit(1707788302.320:615): pid=2769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:38:24.531145 sshd[2769]: Failed password for root from 104.131.180.171 port 39860 ssh2 Feb 13 01:38:26.360657 sshd[2769]: Received disconnect from 104.131.180.171 port 39860:11: Bye Bye [preauth] Feb 13 01:38:26.360657 sshd[2769]: Disconnected from authenticating user root 104.131.180.171 port 39860 [preauth] Feb 13 01:38:26.363195 systemd[1]: sshd@144-139.178.94.233:22-104.131.180.171:39860.service: Deactivated successfully. Feb 13 01:38:26.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-139.178.94.233:22-104.131.180.171:39860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:26.457598 kernel: audit: type=1131 audit(1707788306.363:616): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-139.178.94.233:22-104.131.180.171:39860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:36.191421 systemd[1]: Started sshd@145-139.178.94.233:22-62.234.47.75:36480.service. Feb 13 01:38:36.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@145-139.178.94.233:22-62.234.47.75:36480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:36.284403 kernel: audit: type=1130 audit(1707788316.190:617): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@145-139.178.94.233:22-62.234.47.75:36480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:37.102554 sshd[2773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:38:37.101000 audit[2773]: USER_AUTH pid=2773 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:38:37.194452 kernel: audit: type=1100 audit(1707788317.101:618): pid=2773 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:38:38.943974 systemd[1]: Started sshd@146-139.178.94.233:22-111.229.16.113:45868.service. Feb 13 01:38:38.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@146-139.178.94.233:22-111.229.16.113:45868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:39.036568 sshd[2773]: Failed password for root from 62.234.47.75 port 36480 ssh2 Feb 13 01:38:39.037608 kernel: audit: type=1130 audit(1707788318.942:619): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@146-139.178.94.233:22-111.229.16.113:45868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:39.238702 sshd[2773]: Received disconnect from 62.234.47.75 port 36480:11: Bye Bye [preauth] Feb 13 01:38:39.238702 sshd[2773]: Disconnected from authenticating user root 62.234.47.75 port 36480 [preauth] Feb 13 01:38:39.241166 systemd[1]: sshd@145-139.178.94.233:22-62.234.47.75:36480.service: Deactivated successfully. Feb 13 01:38:39.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@145-139.178.94.233:22-62.234.47.75:36480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:39.340610 kernel: audit: type=1131 audit(1707788319.240:620): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@145-139.178.94.233:22-62.234.47.75:36480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:39.810257 sshd[2776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:38:39.809000 audit[2776]: USER_AUTH pid=2776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:38:39.902452 kernel: audit: type=1100 audit(1707788319.809:621): pid=2776 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:38:42.020932 sshd[2776]: Failed password for root from 111.229.16.113 port 45868 ssh2 Feb 13 01:38:43.932767 sshd[2776]: Received disconnect from 111.229.16.113 port 45868:11: Bye Bye [preauth] Feb 13 01:38:43.932767 sshd[2776]: Disconnected from authenticating user root 111.229.16.113 port 45868 [preauth] Feb 13 01:38:43.935276 systemd[1]: sshd@146-139.178.94.233:22-111.229.16.113:45868.service: Deactivated successfully. Feb 13 01:38:43.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@146-139.178.94.233:22-111.229.16.113:45868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:38:44.029598 kernel: audit: type=1131 audit(1707788323.934:622): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@146-139.178.94.233:22-111.229.16.113:45868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:00.282138 systemd[1]: Started sshd@147-139.178.94.233:22-43.155.159.34:58872.service. Feb 13 01:39:00.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@147-139.178.94.233:22-43.155.159.34:58872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:00.375596 kernel: audit: type=1130 audit(1707788340.280:623): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@147-139.178.94.233:22-43.155.159.34:58872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:01.078929 sshd[2782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:39:01.077000 audit[2782]: USER_AUTH pid=2782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:39:01.171454 kernel: audit: type=1100 audit(1707788341.077:624): pid=2782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:39:02.642052 sshd[2782]: Failed password for root from 43.155.159.34 port 58872 ssh2 Feb 13 01:39:03.196823 sshd[2782]: Received disconnect from 43.155.159.34 port 58872:11: Bye Bye [preauth] Feb 13 01:39:03.196823 sshd[2782]: Disconnected from authenticating user root 43.155.159.34 port 58872 [preauth] Feb 13 01:39:03.199369 systemd[1]: sshd@147-139.178.94.233:22-43.155.159.34:58872.service: Deactivated successfully. Feb 13 01:39:03.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@147-139.178.94.233:22-43.155.159.34:58872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:03.292474 kernel: audit: type=1131 audit(1707788343.198:625): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@147-139.178.94.233:22-43.155.159.34:58872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:07.507274 systemd[1]: Started sshd@148-139.178.94.233:22-62.234.47.75:45116.service. Feb 13 01:39:07.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@148-139.178.94.233:22-62.234.47.75:45116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:07.599447 kernel: audit: type=1130 audit(1707788347.505:626): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@148-139.178.94.233:22-62.234.47.75:45116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:08.406187 sshd[2786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:39:08.405000 audit[2786]: USER_AUTH pid=2786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:39:08.498454 kernel: audit: type=1100 audit(1707788348.405:627): pid=2786 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:39:10.264624 sshd[2786]: Failed password for root from 62.234.47.75 port 45116 ssh2 Feb 13 01:39:10.540560 sshd[2786]: Received disconnect from 62.234.47.75 port 45116:11: Bye Bye [preauth] Feb 13 01:39:10.540560 sshd[2786]: Disconnected from authenticating user root 62.234.47.75 port 45116 [preauth] Feb 13 01:39:10.542998 systemd[1]: sshd@148-139.178.94.233:22-62.234.47.75:45116.service: Deactivated successfully. Feb 13 01:39:10.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@148-139.178.94.233:22-62.234.47.75:45116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:10.636593 kernel: audit: type=1131 audit(1707788350.542:628): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@148-139.178.94.233:22-62.234.47.75:45116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:19.005328 systemd[1]: Started sshd@149-139.178.94.233:22-104.131.180.171:38384.service. Feb 13 01:39:19.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@149-139.178.94.233:22-104.131.180.171:38384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:19.098404 kernel: audit: type=1130 audit(1707788359.003:629): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@149-139.178.94.233:22-104.131.180.171:38384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:19.443697 sshd[2790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:39:19.442000 audit[2790]: USER_AUTH pid=2790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:39:19.542578 kernel: audit: type=1100 audit(1707788359.442:630): pid=2790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:39:21.478780 sshd[2790]: Failed password for root from 104.131.180.171 port 38384 ssh2 Feb 13 01:39:22.400724 systemd[1]: Started sshd@150-139.178.94.233:22-111.229.16.113:60100.service. Feb 13 01:39:22.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@150-139.178.94.233:22-111.229.16.113:60100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:22.493595 kernel: audit: type=1130 audit(1707788362.399:631): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@150-139.178.94.233:22-111.229.16.113:60100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:23.361111 sshd[2793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:39:23.359000 audit[2793]: USER_AUTH pid=2793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:39:23.453467 kernel: audit: type=1100 audit(1707788363.359:632): pid=2793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:39:23.525115 sshd[2790]: Received disconnect from 104.131.180.171 port 38384:11: Bye Bye [preauth] Feb 13 01:39:23.525115 sshd[2790]: Disconnected from authenticating user root 104.131.180.171 port 38384 [preauth] Feb 13 01:39:23.525997 systemd[1]: sshd@149-139.178.94.233:22-104.131.180.171:38384.service: Deactivated successfully. Feb 13 01:39:23.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@149-139.178.94.233:22-104.131.180.171:38384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:23.618595 kernel: audit: type=1131 audit(1707788363.524:633): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@149-139.178.94.233:22-104.131.180.171:38384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:25.611787 sshd[2793]: Failed password for root from 111.229.16.113 port 60100 ssh2 Feb 13 01:39:27.494290 sshd[2793]: Received disconnect from 111.229.16.113 port 60100:11: Bye Bye [preauth] Feb 13 01:39:27.494290 sshd[2793]: Disconnected from authenticating user root 111.229.16.113 port 60100 [preauth] Feb 13 01:39:27.496881 systemd[1]: sshd@150-139.178.94.233:22-111.229.16.113:60100.service: Deactivated successfully. Feb 13 01:39:27.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@150-139.178.94.233:22-111.229.16.113:60100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:27.590456 kernel: audit: type=1131 audit(1707788367.496:634): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@150-139.178.94.233:22-111.229.16.113:60100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:37.742208 systemd[1]: Started sshd@151-139.178.94.233:22-62.234.47.75:53742.service. Feb 13 01:39:37.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@151-139.178.94.233:22-62.234.47.75:53742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:37.835402 kernel: audit: type=1130 audit(1707788377.741:635): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@151-139.178.94.233:22-62.234.47.75:53742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:38.700127 sshd[2798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:39:38.700000 audit[2798]: USER_AUTH pid=2798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:39:38.793448 kernel: audit: type=1100 audit(1707788378.700:636): pid=2798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:39:41.010944 sshd[2798]: Failed password for root from 62.234.47.75 port 53742 ssh2 Feb 13 01:39:42.835225 sshd[2798]: Received disconnect from 62.234.47.75 port 53742:11: Bye Bye [preauth] Feb 13 01:39:42.835225 sshd[2798]: Disconnected from authenticating user root 62.234.47.75 port 53742 [preauth] Feb 13 01:39:42.837757 systemd[1]: sshd@151-139.178.94.233:22-62.234.47.75:53742.service: Deactivated successfully. Feb 13 01:39:42.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@151-139.178.94.233:22-62.234.47.75:53742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:42.931451 kernel: audit: type=1131 audit(1707788382.837:637): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@151-139.178.94.233:22-62.234.47.75:53742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:48.302334 systemd[1]: Started sshd@152-139.178.94.233:22-141.98.11.90:49582.service. Feb 13 01:39:48.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@152-139.178.94.233:22-141.98.11.90:49582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:48.395598 kernel: audit: type=1130 audit(1707788388.302:638): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@152-139.178.94.233:22-141.98.11.90:49582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:50.681297 sshd[2802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.90 user=root Feb 13 01:39:50.681000 audit[2802]: USER_AUTH pid=2802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.90 addr=141.98.11.90 terminal=ssh res=failed' Feb 13 01:39:50.774585 kernel: audit: type=1100 audit(1707788390.681:639): pid=2802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=141.98.11.90 addr=141.98.11.90 terminal=ssh res=failed' Feb 13 01:39:52.972152 sshd[2802]: Failed password for root from 141.98.11.90 port 49582 ssh2 Feb 13 01:39:54.826177 sshd[2802]: Connection closed by authenticating user root 141.98.11.90 port 49582 [preauth] Feb 13 01:39:54.828729 systemd[1]: sshd@152-139.178.94.233:22-141.98.11.90:49582.service: Deactivated successfully. Feb 13 01:39:54.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@152-139.178.94.233:22-141.98.11.90:49582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:39:54.922596 kernel: audit: type=1131 audit(1707788394.828:640): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@152-139.178.94.233:22-141.98.11.90:49582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:04.513879 systemd[1]: Started sshd@153-139.178.94.233:22-43.155.159.34:49544.service. Feb 13 01:40:04.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@153-139.178.94.233:22-43.155.159.34:49544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:04.607474 kernel: audit: type=1130 audit(1707788404.512:641): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@153-139.178.94.233:22-43.155.159.34:49544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:05.323764 sshd[2806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:40:05.322000 audit[2806]: USER_AUTH pid=2806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:40:05.416462 kernel: audit: type=1100 audit(1707788405.322:642): pid=2806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:40:06.346335 systemd[1]: Started sshd@154-139.178.94.233:22-111.229.16.113:46100.service. Feb 13 01:40:06.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@154-139.178.94.233:22-111.229.16.113:46100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:06.440599 kernel: audit: type=1130 audit(1707788406.345:643): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@154-139.178.94.233:22-111.229.16.113:46100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:07.291795 sshd[2809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:40:07.290000 audit[2809]: USER_AUTH pid=2809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:40:07.385586 kernel: audit: type=1100 audit(1707788407.290:644): pid=2809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:40:07.674874 sshd[2806]: Failed password for root from 43.155.159.34 port 49544 ssh2 Feb 13 01:40:08.915148 sshd[2809]: Failed password for root from 111.229.16.113 port 46100 ssh2 Feb 13 01:40:09.423308 sshd[2806]: Received disconnect from 43.155.159.34 port 49544:11: Bye Bye [preauth] Feb 13 01:40:09.423308 sshd[2806]: Disconnected from authenticating user root 43.155.159.34 port 49544 [preauth] Feb 13 01:40:09.425791 systemd[1]: sshd@153-139.178.94.233:22-43.155.159.34:49544.service: Deactivated successfully. Feb 13 01:40:09.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@153-139.178.94.233:22-43.155.159.34:49544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:09.435530 sshd[2809]: Received disconnect from 111.229.16.113 port 46100:11: Bye Bye [preauth] Feb 13 01:40:09.435530 sshd[2809]: Disconnected from authenticating user root 111.229.16.113 port 46100 [preauth] Feb 13 01:40:09.435986 systemd[1]: sshd@154-139.178.94.233:22-111.229.16.113:46100.service: Deactivated successfully. Feb 13 01:40:09.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@154-139.178.94.233:22-111.229.16.113:46100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:09.611318 kernel: audit: type=1131 audit(1707788409.424:645): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@153-139.178.94.233:22-43.155.159.34:49544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:09.611356 kernel: audit: type=1131 audit(1707788409.434:646): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@154-139.178.94.233:22-111.229.16.113:46100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:11.488497 systemd[1]: Started sshd@155-139.178.94.233:22-62.234.47.75:34150.service. Feb 13 01:40:11.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@155-139.178.94.233:22-62.234.47.75:34150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:11.582474 kernel: audit: type=1130 audit(1707788411.487:647): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@155-139.178.94.233:22-62.234.47.75:34150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:12.351227 sshd[2814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:40:12.350000 audit[2814]: USER_AUTH pid=2814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:40:12.444588 kernel: audit: type=1100 audit(1707788412.350:648): pid=2814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:40:14.662084 sshd[2814]: Failed password for root from 62.234.47.75 port 34150 ssh2 Feb 13 01:40:15.361702 systemd[1]: Started sshd@156-139.178.94.233:22-104.131.180.171:58292.service. Feb 13 01:40:15.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@156-139.178.94.233:22-104.131.180.171:58292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:15.455600 kernel: audit: type=1130 audit(1707788415.360:649): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@156-139.178.94.233:22-104.131.180.171:58292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:15.815847 sshd[2817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:40:15.814000 audit[2817]: USER_AUTH pid=2817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:40:15.917591 kernel: audit: type=1100 audit(1707788415.814:650): pid=2817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:40:16.465381 sshd[2814]: Received disconnect from 62.234.47.75 port 34150:11: Bye Bye [preauth] Feb 13 01:40:16.465381 sshd[2814]: Disconnected from authenticating user root 62.234.47.75 port 34150 [preauth] Feb 13 01:40:16.467868 systemd[1]: sshd@155-139.178.94.233:22-62.234.47.75:34150.service: Deactivated successfully. Feb 13 01:40:16.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@155-139.178.94.233:22-62.234.47.75:34150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:16.562476 kernel: audit: type=1131 audit(1707788416.466:651): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@155-139.178.94.233:22-62.234.47.75:34150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:17.870664 sshd[2817]: Failed password for root from 104.131.180.171 port 58292 ssh2 Feb 13 01:40:19.852079 sshd[2817]: Received disconnect from 104.131.180.171 port 58292:11: Bye Bye [preauth] Feb 13 01:40:19.852079 sshd[2817]: Disconnected from authenticating user root 104.131.180.171 port 58292 [preauth] Feb 13 01:40:19.854746 systemd[1]: sshd@156-139.178.94.233:22-104.131.180.171:58292.service: Deactivated successfully. Feb 13 01:40:19.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@156-139.178.94.233:22-104.131.180.171:58292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:19.949607 kernel: audit: type=1131 audit(1707788419.853:652): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@156-139.178.94.233:22-104.131.180.171:58292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:43.738327 systemd[1]: Started sshd@157-139.178.94.233:22-62.234.47.75:42782.service. Feb 13 01:40:43.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@157-139.178.94.233:22-62.234.47.75:42782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:43.830598 kernel: audit: type=1130 audit(1707788443.736:653): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@157-139.178.94.233:22-62.234.47.75:42782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:44.729550 sshd[2826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:40:44.728000 audit[2826]: USER_AUTH pid=2826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:40:44.822460 kernel: audit: type=1100 audit(1707788444.728:654): pid=2826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:40:46.433428 sshd[2826]: Failed password for root from 62.234.47.75 port 42782 ssh2 Feb 13 01:40:46.884909 sshd[2826]: Received disconnect from 62.234.47.75 port 42782:11: Bye Bye [preauth] Feb 13 01:40:46.884909 sshd[2826]: Disconnected from authenticating user root 62.234.47.75 port 42782 [preauth] Feb 13 01:40:46.887527 systemd[1]: sshd@157-139.178.94.233:22-62.234.47.75:42782.service: Deactivated successfully. Feb 13 01:40:46.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@157-139.178.94.233:22-62.234.47.75:42782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:46.980438 kernel: audit: type=1131 audit(1707788446.886:655): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@157-139.178.94.233:22-62.234.47.75:42782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:50.256743 systemd[1]: Started sshd@158-139.178.94.233:22-111.229.16.113:60298.service. Feb 13 01:40:50.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@158-139.178.94.233:22-111.229.16.113:60298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:50.350598 kernel: audit: type=1130 audit(1707788450.256:656): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@158-139.178.94.233:22-111.229.16.113:60298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:51.178275 sshd[2833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:40:51.178000 audit[2833]: USER_AUTH pid=2833 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:40:51.271457 kernel: audit: type=1100 audit(1707788451.178:657): pid=2833 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:40:53.509239 sshd[2833]: Failed password for root from 111.229.16.113 port 60298 ssh2 Feb 13 01:40:55.305200 sshd[2833]: Received disconnect from 111.229.16.113 port 60298:11: Bye Bye [preauth] Feb 13 01:40:55.305200 sshd[2833]: Disconnected from authenticating user root 111.229.16.113 port 60298 [preauth] Feb 13 01:40:55.307794 systemd[1]: sshd@158-139.178.94.233:22-111.229.16.113:60298.service: Deactivated successfully. Feb 13 01:40:55.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@158-139.178.94.233:22-111.229.16.113:60298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:40:55.401434 kernel: audit: type=1131 audit(1707788455.307:658): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@158-139.178.94.233:22-111.229.16.113:60298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:08.599640 systemd[1]: Started sshd@159-139.178.94.233:22-138.197.18.220:33282.service. Feb 13 01:41:08.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@159-139.178.94.233:22-138.197.18.220:33282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:08.692402 kernel: audit: type=1130 audit(1707788468.599:659): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@159-139.178.94.233:22-138.197.18.220:33282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:08.921101 sshd[2838]: Invalid user oracle from 138.197.18.220 port 33282 Feb 13 01:41:08.996499 sshd[2838]: pam_faillock(sshd:auth): User unknown Feb 13 01:41:08.997541 sshd[2838]: pam_unix(sshd:auth): check pass; user unknown Feb 13 01:41:08.997630 sshd[2838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.18.220 Feb 13 01:41:08.998532 sshd[2838]: pam_faillock(sshd:auth): User unknown Feb 13 01:41:08.998000 audit[2838]: USER_AUTH pid=2838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=138.197.18.220 addr=138.197.18.220 terminal=ssh res=failed' Feb 13 01:41:09.097557 kernel: audit: type=1100 audit(1707788468.998:660): pid=2838 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=138.197.18.220 addr=138.197.18.220 terminal=ssh res=failed' Feb 13 01:41:10.252589 systemd[1]: Started sshd@160-139.178.94.233:22-43.155.159.34:40222.service. Feb 13 01:41:10.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@160-139.178.94.233:22-43.155.159.34:40222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:10.329562 sshd[2838]: Failed password for invalid user oracle from 138.197.18.220 port 33282 ssh2 Feb 13 01:41:10.346469 kernel: audit: type=1130 audit(1707788470.252:661): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@160-139.178.94.233:22-43.155.159.34:40222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:10.597982 sshd[2838]: Connection closed by invalid user oracle 138.197.18.220 port 33282 [preauth] Feb 13 01:41:10.599532 systemd[1]: sshd@159-139.178.94.233:22-138.197.18.220:33282.service: Deactivated successfully. Feb 13 01:41:10.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@159-139.178.94.233:22-138.197.18.220:33282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:10.692458 kernel: audit: type=1131 audit(1707788470.599:662): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@159-139.178.94.233:22-138.197.18.220:33282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:11.070210 sshd[2841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:41:11.070000 audit[2841]: USER_AUTH pid=2841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:41:11.162463 kernel: audit: type=1100 audit(1707788471.070:663): pid=2841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:41:12.185143 systemd[1]: Started sshd@161-139.178.94.233:22-104.131.180.171:41416.service. Feb 13 01:41:12.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@161-139.178.94.233:22-104.131.180.171:41416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:12.278469 kernel: audit: type=1130 audit(1707788472.184:664): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@161-139.178.94.233:22-104.131.180.171:41416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:12.610580 sshd[2845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:41:12.610000 audit[2845]: USER_AUTH pid=2845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:41:12.709588 kernel: audit: type=1100 audit(1707788472.610:665): pid=2845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:41:13.481469 sshd[2841]: Failed password for root from 43.155.159.34 port 40222 ssh2 Feb 13 01:41:14.825926 sshd[2845]: Failed password for root from 104.131.180.171 port 41416 ssh2 Feb 13 01:41:15.178238 sshd[2841]: Received disconnect from 43.155.159.34 port 40222:11: Bye Bye [preauth] Feb 13 01:41:15.178238 sshd[2841]: Disconnected from authenticating user root 43.155.159.34 port 40222 [preauth] Feb 13 01:41:15.180630 systemd[1]: sshd@160-139.178.94.233:22-43.155.159.34:40222.service: Deactivated successfully. Feb 13 01:41:15.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@160-139.178.94.233:22-43.155.159.34:40222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:15.274600 kernel: audit: type=1131 audit(1707788475.180:666): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@160-139.178.94.233:22-43.155.159.34:40222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:16.643712 sshd[2845]: Received disconnect from 104.131.180.171 port 41416:11: Bye Bye [preauth] Feb 13 01:41:16.643712 sshd[2845]: Disconnected from authenticating user root 104.131.180.171 port 41416 [preauth] Feb 13 01:41:16.646211 systemd[1]: sshd@161-139.178.94.233:22-104.131.180.171:41416.service: Deactivated successfully. Feb 13 01:41:16.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@161-139.178.94.233:22-104.131.180.171:41416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:16.740599 kernel: audit: type=1131 audit(1707788476.646:667): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@161-139.178.94.233:22-104.131.180.171:41416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:17.588577 systemd[1]: Started sshd@162-139.178.94.233:22-62.234.47.75:51426.service. Feb 13 01:41:17.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@162-139.178.94.233:22-62.234.47.75:51426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:17.681422 kernel: audit: type=1130 audit(1707788477.588:668): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@162-139.178.94.233:22-62.234.47.75:51426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:18.465343 sshd[2851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:41:18.465000 audit[2851]: USER_AUTH pid=2851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:41:18.556568 kernel: audit: type=1100 audit(1707788478.465:669): pid=2851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:41:19.837716 sshd[2851]: Failed password for root from 62.234.47.75 port 51426 ssh2 Feb 13 01:41:20.596044 sshd[2851]: Received disconnect from 62.234.47.75 port 51426:11: Bye Bye [preauth] Feb 13 01:41:20.596044 sshd[2851]: Disconnected from authenticating user root 62.234.47.75 port 51426 [preauth] Feb 13 01:41:20.598653 systemd[1]: sshd@162-139.178.94.233:22-62.234.47.75:51426.service: Deactivated successfully. Feb 13 01:41:20.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@162-139.178.94.233:22-62.234.47.75:51426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:20.692595 kernel: audit: type=1131 audit(1707788480.598:670): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@162-139.178.94.233:22-62.234.47.75:51426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:33.359049 systemd[1]: Started sshd@163-139.178.94.233:22-111.229.16.113:46260.service. Feb 13 01:41:33.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@163-139.178.94.233:22-111.229.16.113:46260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:33.452455 kernel: audit: type=1130 audit(1707788493.357:671): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@163-139.178.94.233:22-111.229.16.113:46260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:34.284674 sshd[2855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:41:34.283000 audit[2855]: USER_AUTH pid=2855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:41:34.378601 kernel: audit: type=1100 audit(1707788494.283:672): pid=2855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:41:36.520192 sshd[2855]: Failed password for root from 111.229.16.113 port 46260 ssh2 Feb 13 01:41:37.818563 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:41:37.817Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":6396} Feb 13 01:41:37.820961 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:41:37.820Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":6396,"took":"2.097013ms"} Feb 13 01:41:38.410225 sshd[2855]: Received disconnect from 111.229.16.113 port 46260:11: Bye Bye [preauth] Feb 13 01:41:38.410225 sshd[2855]: Disconnected from authenticating user root 111.229.16.113 port 46260 [preauth] Feb 13 01:41:38.412694 systemd[1]: sshd@163-139.178.94.233:22-111.229.16.113:46260.service: Deactivated successfully. Feb 13 01:41:38.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@163-139.178.94.233:22-111.229.16.113:46260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:38.506601 kernel: audit: type=1131 audit(1707788498.411:673): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@163-139.178.94.233:22-111.229.16.113:46260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:50.413566 systemd[1]: Started sshd@164-139.178.94.233:22-62.234.47.75:60060.service. Feb 13 01:41:50.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@164-139.178.94.233:22-62.234.47.75:60060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:50.506403 kernel: audit: type=1130 audit(1707788510.412:674): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@164-139.178.94.233:22-62.234.47.75:60060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:51.423841 sshd[2859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:41:51.422000 audit[2859]: USER_AUTH pid=2859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:41:51.516595 kernel: audit: type=1100 audit(1707788511.422:675): pid=2859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:41:52.992181 sshd[2859]: Failed password for root from 62.234.47.75 port 60060 ssh2 Feb 13 01:41:53.580936 sshd[2859]: Received disconnect from 62.234.47.75 port 60060:11: Bye Bye [preauth] Feb 13 01:41:53.580936 sshd[2859]: Disconnected from authenticating user root 62.234.47.75 port 60060 [preauth] Feb 13 01:41:53.583472 systemd[1]: sshd@164-139.178.94.233:22-62.234.47.75:60060.service: Deactivated successfully. Feb 13 01:41:53.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@164-139.178.94.233:22-62.234.47.75:60060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:41:53.677597 kernel: audit: type=1131 audit(1707788513.582:676): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@164-139.178.94.233:22-62.234.47.75:60060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:05.592815 systemd[1]: Started sshd@165-139.178.94.233:22-104.131.180.171:56978.service. Feb 13 01:42:05.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@165-139.178.94.233:22-104.131.180.171:56978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:05.686593 kernel: audit: type=1130 audit(1707788525.591:677): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@165-139.178.94.233:22-104.131.180.171:56978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:06.031866 sshd[2865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:42:06.030000 audit[2865]: USER_AUTH pid=2865 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:42:06.131448 kernel: audit: type=1100 audit(1707788526.030:678): pid=2865 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:42:07.324289 sshd[2865]: Failed password for root from 104.131.180.171 port 56978 ssh2 Feb 13 01:42:08.082811 sshd[2865]: Received disconnect from 104.131.180.171 port 56978:11: Bye Bye [preauth] Feb 13 01:42:08.082811 sshd[2865]: Disconnected from authenticating user root 104.131.180.171 port 56978 [preauth] Feb 13 01:42:08.085380 systemd[1]: sshd@165-139.178.94.233:22-104.131.180.171:56978.service: Deactivated successfully. Feb 13 01:42:08.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@165-139.178.94.233:22-104.131.180.171:56978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:08.179576 kernel: audit: type=1131 audit(1707788528.084:679): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@165-139.178.94.233:22-104.131.180.171:56978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:15.984934 systemd[1]: Started sshd@166-139.178.94.233:22-43.155.159.34:59130.service. Feb 13 01:42:15.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@166-139.178.94.233:22-43.155.159.34:59130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:16.001199 systemd[1]: Started sshd@167-139.178.94.233:22-111.229.16.113:60426.service. Feb 13 01:42:16.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@167-139.178.94.233:22-111.229.16.113:60426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:16.168866 kernel: audit: type=1130 audit(1707788535.984:680): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@166-139.178.94.233:22-43.155.159.34:59130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:16.168899 kernel: audit: type=1130 audit(1707788536.000:681): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@167-139.178.94.233:22-111.229.16.113:60426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:16.775441 sshd[2869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:42:16.775000 audit[2869]: USER_AUTH pid=2869 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:42:16.868461 kernel: audit: type=1100 audit(1707788536.775:682): pid=2869 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:42:16.869512 sshd[2872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:42:16.869000 audit[2872]: USER_AUTH pid=2872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:42:16.960609 kernel: audit: type=1100 audit(1707788536.869:683): pid=2872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:42:18.775166 sshd[2869]: Failed password for root from 43.155.159.34 port 59130 ssh2 Feb 13 01:42:18.869219 sshd[2872]: Failed password for root from 111.229.16.113 port 60426 ssh2 Feb 13 01:42:20.880346 sshd[2869]: Received disconnect from 43.155.159.34 port 59130:11: Bye Bye [preauth] Feb 13 01:42:20.880346 sshd[2869]: Disconnected from authenticating user root 43.155.159.34 port 59130 [preauth] Feb 13 01:42:20.882811 systemd[1]: sshd@166-139.178.94.233:22-43.155.159.34:59130.service: Deactivated successfully. Feb 13 01:42:20.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@166-139.178.94.233:22-43.155.159.34:59130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:20.976403 kernel: audit: type=1131 audit(1707788540.882:684): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@166-139.178.94.233:22-43.155.159.34:59130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:20.997509 sshd[2872]: Received disconnect from 111.229.16.113 port 60426:11: Bye Bye [preauth] Feb 13 01:42:20.997509 sshd[2872]: Disconnected from authenticating user root 111.229.16.113 port 60426 [preauth] Feb 13 01:42:20.998180 systemd[1]: sshd@167-139.178.94.233:22-111.229.16.113:60426.service: Deactivated successfully. Feb 13 01:42:20.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@167-139.178.94.233:22-111.229.16.113:60426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:21.089433 kernel: audit: type=1131 audit(1707788540.997:685): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@167-139.178.94.233:22-111.229.16.113:60426 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:22.638653 systemd[1]: Started sshd@168-139.178.94.233:22-62.234.47.75:40468.service. Feb 13 01:42:22.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@168-139.178.94.233:22-62.234.47.75:40468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:22.732602 kernel: audit: type=1130 audit(1707788542.638:686): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@168-139.178.94.233:22-62.234.47.75:40468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:23.552080 sshd[2879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:42:23.551000 audit[2879]: USER_AUTH pid=2879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:42:23.644511 kernel: audit: type=1100 audit(1707788543.551:687): pid=2879 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:42:25.847644 sshd[2879]: Failed password for root from 62.234.47.75 port 40468 ssh2 Feb 13 01:42:27.677292 sshd[2879]: Received disconnect from 62.234.47.75 port 40468:11: Bye Bye [preauth] Feb 13 01:42:27.677292 sshd[2879]: Disconnected from authenticating user root 62.234.47.75 port 40468 [preauth] Feb 13 01:42:27.679859 systemd[1]: sshd@168-139.178.94.233:22-62.234.47.75:40468.service: Deactivated successfully. Feb 13 01:42:27.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@168-139.178.94.233:22-62.234.47.75:40468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:27.774598 kernel: audit: type=1131 audit(1707788547.679:688): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@168-139.178.94.233:22-62.234.47.75:40468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:58.702316 systemd[1]: Started sshd@169-139.178.94.233:22-111.229.16.113:46374.service. Feb 13 01:42:58.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@169-139.178.94.233:22-111.229.16.113:46374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:58.795430 kernel: audit: type=1130 audit(1707788578.700:689): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@169-139.178.94.233:22-111.229.16.113:46374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:42:59.631586 sshd[2885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:42:59.630000 audit[2885]: USER_AUTH pid=2885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:42:59.724497 kernel: audit: type=1100 audit(1707788579.630:690): pid=2885 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:43:00.582879 systemd[1]: Started sshd@170-139.178.94.233:22-62.234.47.75:49110.service. Feb 13 01:43:00.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@170-139.178.94.233:22-62.234.47.75:49110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:00.675448 kernel: audit: type=1130 audit(1707788580.581:691): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@170-139.178.94.233:22-62.234.47.75:49110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:01.447623 sshd[2888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:43:01.446000 audit[2888]: USER_AUTH pid=2888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:43:01.535533 sshd[2885]: Failed password for root from 111.229.16.113 port 46374 ssh2 Feb 13 01:43:01.539597 kernel: audit: type=1100 audit(1707788581.446:692): pid=2888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:43:01.772215 sshd[2885]: Received disconnect from 111.229.16.113 port 46374:11: Bye Bye [preauth] Feb 13 01:43:01.772215 sshd[2885]: Disconnected from authenticating user root 111.229.16.113 port 46374 [preauth] Feb 13 01:43:01.774708 systemd[1]: sshd@169-139.178.94.233:22-111.229.16.113:46374.service: Deactivated successfully. Feb 13 01:43:01.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@169-139.178.94.233:22-111.229.16.113:46374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:01.868403 kernel: audit: type=1131 audit(1707788581.773:693): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@169-139.178.94.233:22-111.229.16.113:46374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:02.261792 systemd[1]: Started sshd@171-139.178.94.233:22-104.131.180.171:49552.service. Feb 13 01:43:02.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@171-139.178.94.233:22-104.131.180.171:49552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:02.355583 kernel: audit: type=1130 audit(1707788582.260:694): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@171-139.178.94.233:22-104.131.180.171:49552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:02.685041 sshd[2893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:43:02.683000 audit[2893]: USER_AUTH pid=2893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:43:02.778592 kernel: audit: type=1100 audit(1707788582.683:695): pid=2893 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:43:03.291981 sshd[2888]: Failed password for root from 62.234.47.75 port 49110 ssh2 Feb 13 01:43:03.575016 sshd[2888]: Received disconnect from 62.234.47.75 port 49110:11: Bye Bye [preauth] Feb 13 01:43:03.575016 sshd[2888]: Disconnected from authenticating user root 62.234.47.75 port 49110 [preauth] Feb 13 01:43:03.577533 systemd[1]: sshd@170-139.178.94.233:22-62.234.47.75:49110.service: Deactivated successfully. Feb 13 01:43:03.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@170-139.178.94.233:22-62.234.47.75:49110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:03.670586 kernel: audit: type=1131 audit(1707788583.576:696): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@170-139.178.94.233:22-62.234.47.75:49110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:04.333678 sshd[2893]: Failed password for root from 104.131.180.171 port 49552 ssh2 Feb 13 01:43:04.732162 sshd[2893]: Received disconnect from 104.131.180.171 port 49552:11: Bye Bye [preauth] Feb 13 01:43:04.732162 sshd[2893]: Disconnected from authenticating user root 104.131.180.171 port 49552 [preauth] Feb 13 01:43:04.734646 systemd[1]: sshd@171-139.178.94.233:22-104.131.180.171:49552.service: Deactivated successfully. Feb 13 01:43:04.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@171-139.178.94.233:22-104.131.180.171:49552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:04.828599 kernel: audit: type=1131 audit(1707788584.733:697): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@171-139.178.94.233:22-104.131.180.171:49552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:20.215019 systemd[1]: Started sshd@172-139.178.94.233:22-43.155.159.34:49808.service. Feb 13 01:43:20.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@172-139.178.94.233:22-43.155.159.34:49808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:20.308462 kernel: audit: type=1130 audit(1707788600.213:698): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@172-139.178.94.233:22-43.155.159.34:49808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:21.028940 sshd[2900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:43:21.027000 audit[2900]: USER_AUTH pid=2900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:43:21.121464 kernel: audit: type=1100 audit(1707788601.027:699): pid=2900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:43:22.953335 sshd[2900]: Failed password for root from 43.155.159.34 port 49808 ssh2 Feb 13 01:43:23.152473 sshd[2900]: Received disconnect from 43.155.159.34 port 49808:11: Bye Bye [preauth] Feb 13 01:43:23.152473 sshd[2900]: Disconnected from authenticating user root 43.155.159.34 port 49808 [preauth] Feb 13 01:43:23.155102 systemd[1]: sshd@172-139.178.94.233:22-43.155.159.34:49808.service: Deactivated successfully. Feb 13 01:43:23.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@172-139.178.94.233:22-43.155.159.34:49808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:23.249602 kernel: audit: type=1131 audit(1707788603.155:700): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@172-139.178.94.233:22-43.155.159.34:49808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:35.106209 systemd[1]: Started sshd@173-139.178.94.233:22-62.234.47.75:57750.service. Feb 13 01:43:35.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@173-139.178.94.233:22-62.234.47.75:57750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:35.199604 kernel: audit: type=1130 audit(1707788615.105:701): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@173-139.178.94.233:22-62.234.47.75:57750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:35.998574 sshd[2904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:43:35.998000 audit[2904]: USER_AUTH pid=2904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:43:36.090456 kernel: audit: type=1100 audit(1707788615.998:702): pid=2904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:43:37.843067 sshd[2904]: Failed password for root from 62.234.47.75 port 57750 ssh2 Feb 13 01:43:38.133128 sshd[2904]: Received disconnect from 62.234.47.75 port 57750:11: Bye Bye [preauth] Feb 13 01:43:38.133128 sshd[2904]: Disconnected from authenticating user root 62.234.47.75 port 57750 [preauth] Feb 13 01:43:38.135525 systemd[1]: sshd@173-139.178.94.233:22-62.234.47.75:57750.service: Deactivated successfully. Feb 13 01:43:38.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@173-139.178.94.233:22-62.234.47.75:57750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:38.229595 kernel: audit: type=1131 audit(1707788618.135:703): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@173-139.178.94.233:22-62.234.47.75:57750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:41.528856 systemd[1]: Started sshd@174-139.178.94.233:22-111.229.16.113:60522.service. Feb 13 01:43:41.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@174-139.178.94.233:22-111.229.16.113:60522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:41.622603 kernel: audit: type=1130 audit(1707788621.528:704): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@174-139.178.94.233:22-111.229.16.113:60522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:42.458272 sshd[2910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:43:42.458000 audit[2910]: USER_AUTH pid=2910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:43:42.551575 kernel: audit: type=1100 audit(1707788622.458:705): pid=2910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:43:43.931272 sshd[2910]: Failed password for root from 111.229.16.113 port 60522 ssh2 Feb 13 01:43:44.599732 sshd[2910]: Received disconnect from 111.229.16.113 port 60522:11: Bye Bye [preauth] Feb 13 01:43:44.599732 sshd[2910]: Disconnected from authenticating user root 111.229.16.113 port 60522 [preauth] Feb 13 01:43:44.602252 systemd[1]: sshd@174-139.178.94.233:22-111.229.16.113:60522.service: Deactivated successfully. Feb 13 01:43:44.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@174-139.178.94.233:22-111.229.16.113:60522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:44.695459 kernel: audit: type=1131 audit(1707788624.602:706): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@174-139.178.94.233:22-111.229.16.113:60522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:58.517477 systemd[1]: Started sshd@175-139.178.94.233:22-104.131.180.171:41406.service. Feb 13 01:43:58.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@175-139.178.94.233:22-104.131.180.171:41406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:58.610421 kernel: audit: type=1130 audit(1707788638.516:707): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@175-139.178.94.233:22-104.131.180.171:41406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:43:58.940096 sshd[2914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:43:58.938000 audit[2914]: USER_AUTH pid=2914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:43:59.040581 kernel: audit: type=1100 audit(1707788638.938:708): pid=2914 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:44:00.608749 sshd[2914]: Failed password for root from 104.131.180.171 port 41406 ssh2 Feb 13 01:44:00.987580 sshd[2914]: Received disconnect from 104.131.180.171 port 41406:11: Bye Bye [preauth] Feb 13 01:44:00.987580 sshd[2914]: Disconnected from authenticating user root 104.131.180.171 port 41406 [preauth] Feb 13 01:44:00.990285 systemd[1]: sshd@175-139.178.94.233:22-104.131.180.171:41406.service: Deactivated successfully. Feb 13 01:44:00.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@175-139.178.94.233:22-104.131.180.171:41406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:01.084592 kernel: audit: type=1131 audit(1707788640.989:709): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@175-139.178.94.233:22-104.131.180.171:41406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:12.055657 systemd[1]: Started sshd@176-139.178.94.233:22-62.234.47.75:38162.service. Feb 13 01:44:12.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@176-139.178.94.233:22-62.234.47.75:38162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:12.148403 kernel: audit: type=1130 audit(1707788652.054:710): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@176-139.178.94.233:22-62.234.47.75:38162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:12.955422 sshd[2918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.47.75 user=root Feb 13 01:44:12.954000 audit[2918]: USER_AUTH pid=2918 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:44:13.047466 kernel: audit: type=1100 audit(1707788652.954:711): pid=2918 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=62.234.47.75 addr=62.234.47.75 terminal=ssh res=failed' Feb 13 01:44:14.548506 sshd[2918]: Failed password for root from 62.234.47.75 port 38162 ssh2 Feb 13 01:44:15.090755 sshd[2918]: Received disconnect from 62.234.47.75 port 38162:11: Bye Bye [preauth] Feb 13 01:44:15.090755 sshd[2918]: Disconnected from authenticating user root 62.234.47.75 port 38162 [preauth] Feb 13 01:44:15.093292 systemd[1]: sshd@176-139.178.94.233:22-62.234.47.75:38162.service: Deactivated successfully. Feb 13 01:44:15.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@176-139.178.94.233:22-62.234.47.75:38162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:15.186597 kernel: audit: type=1131 audit(1707788655.092:712): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@176-139.178.94.233:22-62.234.47.75:38162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:25.171922 systemd[1]: Started sshd@177-139.178.94.233:22-111.229.16.113:46518.service. Feb 13 01:44:25.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@177-139.178.94.233:22-111.229.16.113:46518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:25.265457 kernel: audit: type=1130 audit(1707788665.170:713): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@177-139.178.94.233:22-111.229.16.113:46518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:25.705223 systemd[1]: Started sshd@178-139.178.94.233:22-43.155.159.34:40484.service. Feb 13 01:44:25.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@178-139.178.94.233:22-43.155.159.34:40484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:25.798476 kernel: audit: type=1130 audit(1707788665.703:714): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@178-139.178.94.233:22-43.155.159.34:40484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:26.043178 sshd[2923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:44:26.042000 audit[2923]: USER_AUTH pid=2923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:44:26.134444 kernel: audit: type=1100 audit(1707788666.042:715): pid=2923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:44:26.519500 sshd[2926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:44:26.518000 audit[2926]: USER_AUTH pid=2926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:44:26.612571 kernel: audit: type=1100 audit(1707788666.518:716): pid=2926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:44:28.223737 sshd[2923]: Failed password for root from 111.229.16.113 port 46518 ssh2 Feb 13 01:44:28.699807 sshd[2926]: Failed password for root from 43.155.159.34 port 40484 ssh2 Feb 13 01:44:30.165356 sshd[2923]: Received disconnect from 111.229.16.113 port 46518:11: Bye Bye [preauth] Feb 13 01:44:30.165356 sshd[2923]: Disconnected from authenticating user root 111.229.16.113 port 46518 [preauth] Feb 13 01:44:30.167880 systemd[1]: sshd@177-139.178.94.233:22-111.229.16.113:46518.service: Deactivated successfully. Feb 13 01:44:30.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@177-139.178.94.233:22-111.229.16.113:46518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:30.261597 kernel: audit: type=1131 audit(1707788670.166:717): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@177-139.178.94.233:22-111.229.16.113:46518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:30.631442 sshd[2926]: Received disconnect from 43.155.159.34 port 40484:11: Bye Bye [preauth] Feb 13 01:44:30.631442 sshd[2926]: Disconnected from authenticating user root 43.155.159.34 port 40484 [preauth] Feb 13 01:44:30.634014 systemd[1]: sshd@178-139.178.94.233:22-43.155.159.34:40484.service: Deactivated successfully. Feb 13 01:44:30.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@178-139.178.94.233:22-43.155.159.34:40484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:30.727474 kernel: audit: type=1131 audit(1707788670.633:718): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@178-139.178.94.233:22-43.155.159.34:40484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:52.388976 systemd[1]: Started sshd@179-139.178.94.233:22-104.131.180.171:44196.service. Feb 13 01:44:52.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@179-139.178.94.233:22-104.131.180.171:44196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:52.482598 kernel: audit: type=1130 audit(1707788692.388:719): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@179-139.178.94.233:22-104.131.180.171:44196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:52.837100 sshd[2931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:44:52.836000 audit[2931]: USER_AUTH pid=2931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:44:52.935590 kernel: audit: type=1100 audit(1707788692.836:720): pid=2931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:44:55.253298 sshd[2931]: Failed password for root from 104.131.180.171 port 44196 ssh2 Feb 13 01:44:56.876187 sshd[2931]: Received disconnect from 104.131.180.171 port 44196:11: Bye Bye [preauth] Feb 13 01:44:56.876187 sshd[2931]: Disconnected from authenticating user root 104.131.180.171 port 44196 [preauth] Feb 13 01:44:56.878714 systemd[1]: sshd@179-139.178.94.233:22-104.131.180.171:44196.service: Deactivated successfully. Feb 13 01:44:56.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@179-139.178.94.233:22-104.131.180.171:44196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:44:56.972596 kernel: audit: type=1131 audit(1707788696.878:721): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@179-139.178.94.233:22-104.131.180.171:44196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:08.907743 systemd[1]: Started sshd@180-139.178.94.233:22-111.229.16.113:60768.service. Feb 13 01:45:08.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@180-139.178.94.233:22-111.229.16.113:60768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:09.000466 kernel: audit: type=1130 audit(1707788708.906:722): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@180-139.178.94.233:22-111.229.16.113:60768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:09.841139 sshd[2935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:45:09.840000 audit[2935]: USER_AUTH pid=2935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:45:09.934608 kernel: audit: type=1100 audit(1707788709.840:723): pid=2935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:45:11.926277 sshd[2935]: Failed password for root from 111.229.16.113 port 60768 ssh2 Feb 13 01:45:13.971997 sshd[2935]: Received disconnect from 111.229.16.113 port 60768:11: Bye Bye [preauth] Feb 13 01:45:13.971997 sshd[2935]: Disconnected from authenticating user root 111.229.16.113 port 60768 [preauth] Feb 13 01:45:13.974663 systemd[1]: sshd@180-139.178.94.233:22-111.229.16.113:60768.service: Deactivated successfully. Feb 13 01:45:13.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@180-139.178.94.233:22-111.229.16.113:60768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:14.069600 kernel: audit: type=1131 audit(1707788713.973:724): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@180-139.178.94.233:22-111.229.16.113:60768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:32.750005 systemd[1]: Started sshd@181-139.178.94.233:22-43.155.159.34:59396.service. Feb 13 01:45:32.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@181-139.178.94.233:22-43.155.159.34:59396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:32.843515 kernel: audit: type=1130 audit(1707788732.748:725): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@181-139.178.94.233:22-43.155.159.34:59396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:33.539121 sshd[2939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:45:33.538000 audit[2939]: USER_AUTH pid=2939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:45:33.630454 kernel: audit: type=1100 audit(1707788733.538:726): pid=2939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:45:35.584255 sshd[2939]: Failed password for root from 43.155.159.34 port 59396 ssh2 Feb 13 01:45:37.643592 sshd[2939]: Received disconnect from 43.155.159.34 port 59396:11: Bye Bye [preauth] Feb 13 01:45:37.643592 sshd[2939]: Disconnected from authenticating user root 43.155.159.34 port 59396 [preauth] Feb 13 01:45:37.646203 systemd[1]: sshd@181-139.178.94.233:22-43.155.159.34:59396.service: Deactivated successfully. Feb 13 01:45:37.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@181-139.178.94.233:22-43.155.159.34:59396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:37.740600 kernel: audit: type=1131 audit(1707788737.645:727): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@181-139.178.94.233:22-43.155.159.34:59396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:44.183057 systemd[1]: Started sshd@182-139.178.94.233:22-104.131.180.171:45386.service. Feb 13 01:45:44.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@182-139.178.94.233:22-104.131.180.171:45386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:44.276402 kernel: audit: type=1130 audit(1707788744.181:728): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@182-139.178.94.233:22-104.131.180.171:45386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:44.624183 sshd[2943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:45:44.623000 audit[2943]: USER_AUTH pid=2943 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:45:44.723402 kernel: audit: type=1100 audit(1707788744.623:729): pid=2943 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:45:46.513438 sshd[2943]: Failed password for root from 104.131.180.171 port 45386 ssh2 Feb 13 01:45:46.676109 sshd[2943]: Received disconnect from 104.131.180.171 port 45386:11: Bye Bye [preauth] Feb 13 01:45:46.676109 sshd[2943]: Disconnected from authenticating user root 104.131.180.171 port 45386 [preauth] Feb 13 01:45:46.678655 systemd[1]: sshd@182-139.178.94.233:22-104.131.180.171:45386.service: Deactivated successfully. Feb 13 01:45:46.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@182-139.178.94.233:22-104.131.180.171:45386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:46.772483 kernel: audit: type=1131 audit(1707788746.677:730): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@182-139.178.94.233:22-104.131.180.171:45386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:59.170056 systemd[1]: Started sshd@183-139.178.94.233:22-111.229.16.113:47138.service. Feb 13 01:45:59.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@183-139.178.94.233:22-111.229.16.113:47138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:45:59.263402 kernel: audit: type=1130 audit(1707788759.168:731): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@183-139.178.94.233:22-111.229.16.113:47138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:00.077608 sshd[2947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:46:00.076000 audit[2947]: USER_AUTH pid=2947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:46:00.171591 kernel: audit: type=1100 audit(1707788760.076:732): pid=2947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:46:01.495375 sshd[2947]: Failed password for root from 111.229.16.113 port 47138 ssh2 Feb 13 01:46:02.216786 sshd[2947]: Received disconnect from 111.229.16.113 port 47138:11: Bye Bye [preauth] Feb 13 01:46:02.216786 sshd[2947]: Disconnected from authenticating user root 111.229.16.113 port 47138 [preauth] Feb 13 01:46:02.219306 systemd[1]: sshd@183-139.178.94.233:22-111.229.16.113:47138.service: Deactivated successfully. Feb 13 01:46:02.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@183-139.178.94.233:22-111.229.16.113:47138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:02.313611 kernel: audit: type=1131 audit(1707788762.219:733): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@183-139.178.94.233:22-111.229.16.113:47138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:37.593952 systemd[1]: Started sshd@184-139.178.94.233:22-104.131.180.171:51644.service. Feb 13 01:46:37.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@184-139.178.94.233:22-104.131.180.171:51644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:37.687606 kernel: audit: type=1130 audit(1707788797.593:734): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@184-139.178.94.233:22-104.131.180.171:51644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:37.812553 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:46:37.811Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":6935} Feb 13 01:46:37.814998 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:46:37.814Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":6935,"took":"2.119714ms"} Feb 13 01:46:38.021038 sshd[2956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:46:38.020000 audit[2956]: USER_AUTH pid=2956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:46:38.068039 systemd[1]: Started sshd@185-139.178.94.233:22-43.155.159.34:50072.service. Feb 13 01:46:38.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@185-139.178.94.233:22-43.155.159.34:50072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:38.122449 kernel: audit: type=1100 audit(1707788798.020:735): pid=2956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:46:38.122502 kernel: audit: type=1130 audit(1707788798.067:736): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@185-139.178.94.233:22-43.155.159.34:50072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:38.858974 sshd[2959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:46:38.858000 audit[2959]: USER_AUTH pid=2959 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:46:38.951585 kernel: audit: type=1100 audit(1707788798.858:737): pid=2959 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:46:39.990626 sshd[2956]: Failed password for root from 104.131.180.171 port 51644 ssh2 Feb 13 01:46:40.068748 sshd[2956]: Received disconnect from 104.131.180.171 port 51644:11: Bye Bye [preauth] Feb 13 01:46:40.068748 sshd[2956]: Disconnected from authenticating user root 104.131.180.171 port 51644 [preauth] Feb 13 01:46:40.071224 systemd[1]: sshd@184-139.178.94.233:22-104.131.180.171:51644.service: Deactivated successfully. Feb 13 01:46:40.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@184-139.178.94.233:22-104.131.180.171:51644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:40.165600 kernel: audit: type=1131 audit(1707788800.071:738): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@184-139.178.94.233:22-104.131.180.171:51644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:40.828336 sshd[2959]: Failed password for root from 43.155.159.34 port 50072 ssh2 Feb 13 01:46:40.976997 sshd[2959]: Received disconnect from 43.155.159.34 port 50072:11: Bye Bye [preauth] Feb 13 01:46:40.976997 sshd[2959]: Disconnected from authenticating user root 43.155.159.34 port 50072 [preauth] Feb 13 01:46:40.979427 systemd[1]: sshd@185-139.178.94.233:22-43.155.159.34:50072.service: Deactivated successfully. Feb 13 01:46:40.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@185-139.178.94.233:22-43.155.159.34:50072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:41.073601 kernel: audit: type=1131 audit(1707788800.979:739): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@185-139.178.94.233:22-43.155.159.34:50072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:43.957452 systemd[1]: Started sshd@186-139.178.94.233:22-111.229.16.113:33220.service. Feb 13 01:46:43.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@186-139.178.94.233:22-111.229.16.113:33220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:44.051602 kernel: audit: type=1130 audit(1707788803.957:740): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@186-139.178.94.233:22-111.229.16.113:33220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:44.870435 sshd[2965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:46:44.870000 audit[2965]: USER_AUTH pid=2965 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:46:44.963454 kernel: audit: type=1100 audit(1707788804.870:741): pid=2965 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:46:46.995434 sshd[2965]: Failed password for root from 111.229.16.113 port 33220 ssh2 Feb 13 01:46:48.998902 sshd[2965]: Received disconnect from 111.229.16.113 port 33220:11: Bye Bye [preauth] Feb 13 01:46:48.998902 sshd[2965]: Disconnected from authenticating user root 111.229.16.113 port 33220 [preauth] Feb 13 01:46:49.001441 systemd[1]: sshd@186-139.178.94.233:22-111.229.16.113:33220.service: Deactivated successfully. Feb 13 01:46:49.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@186-139.178.94.233:22-111.229.16.113:33220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:49.094462 kernel: audit: type=1131 audit(1707788809.001:742): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@186-139.178.94.233:22-111.229.16.113:33220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:53.297846 systemd[1]: Started sshd@187-139.178.94.233:22-138.197.18.220:34418.service. Feb 13 01:46:53.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@187-139.178.94.233:22-138.197.18.220:34418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:53.391604 kernel: audit: type=1130 audit(1707788813.296:743): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@187-139.178.94.233:22-138.197.18.220:34418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:53.605216 sshd[2969]: Invalid user oracle from 138.197.18.220 port 34418 Feb 13 01:46:53.682187 sshd[2969]: pam_faillock(sshd:auth): User unknown Feb 13 01:46:53.683451 sshd[2969]: pam_unix(sshd:auth): check pass; user unknown Feb 13 01:46:53.683562 sshd[2969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.18.220 Feb 13 01:46:53.684809 sshd[2969]: pam_faillock(sshd:auth): User unknown Feb 13 01:46:53.683000 audit[2969]: USER_AUTH pid=2969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=138.197.18.220 addr=138.197.18.220 terminal=ssh res=failed' Feb 13 01:46:53.785596 kernel: audit: type=1100 audit(1707788813.683:744): pid=2969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="oracle" exe="/usr/sbin/sshd" hostname=138.197.18.220 addr=138.197.18.220 terminal=ssh res=failed' Feb 13 01:46:56.045635 sshd[2969]: Failed password for invalid user oracle from 138.197.18.220 port 34418 ssh2 Feb 13 01:46:56.809282 sshd[2969]: Connection closed by invalid user oracle 138.197.18.220 port 34418 [preauth] Feb 13 01:46:56.811817 systemd[1]: sshd@187-139.178.94.233:22-138.197.18.220:34418.service: Deactivated successfully. Feb 13 01:46:56.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@187-139.178.94.233:22-138.197.18.220:34418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:46:56.905594 kernel: audit: type=1131 audit(1707788816.810:745): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@187-139.178.94.233:22-138.197.18.220:34418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:31.044772 systemd[1]: Started sshd@188-139.178.94.233:22-111.229.16.113:47662.service. Feb 13 01:47:31.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@188-139.178.94.233:22-111.229.16.113:47662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:31.138550 kernel: audit: type=1130 audit(1707788851.043:746): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@188-139.178.94.233:22-111.229.16.113:47662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:31.985445 sshd[2976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:47:31.984000 audit[2976]: USER_AUTH pid=2976 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:47:32.078464 kernel: audit: type=1100 audit(1707788851.984:747): pid=2976 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:47:32.102622 systemd[1]: Started sshd@189-139.178.94.233:22-104.131.180.171:44696.service. Feb 13 01:47:32.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@189-139.178.94.233:22-104.131.180.171:44696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:32.195412 kernel: audit: type=1130 audit(1707788852.101:748): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@189-139.178.94.233:22-104.131.180.171:44696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:32.520116 sshd[2979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:47:32.519000 audit[2979]: USER_AUTH pid=2979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:47:32.613591 kernel: audit: type=1100 audit(1707788852.519:749): pid=2979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:47:33.563600 sshd[2976]: Failed password for root from 111.229.16.113 port 47662 ssh2 Feb 13 01:47:33.902745 sshd[2979]: Failed password for root from 104.131.180.171 port 44696 ssh2 Feb 13 01:47:34.129265 sshd[2976]: Received disconnect from 111.229.16.113 port 47662:11: Bye Bye [preauth] Feb 13 01:47:34.129265 sshd[2976]: Disconnected from authenticating user root 111.229.16.113 port 47662 [preauth] Feb 13 01:47:34.131783 systemd[1]: sshd@188-139.178.94.233:22-111.229.16.113:47662.service: Deactivated successfully. Feb 13 01:47:34.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@188-139.178.94.233:22-111.229.16.113:47662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:34.225592 kernel: audit: type=1131 audit(1707788854.130:750): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@188-139.178.94.233:22-111.229.16.113:47662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:34.566124 sshd[2979]: Received disconnect from 104.131.180.171 port 44696:11: Bye Bye [preauth] Feb 13 01:47:34.566124 sshd[2979]: Disconnected from authenticating user root 104.131.180.171 port 44696 [preauth] Feb 13 01:47:34.568674 systemd[1]: sshd@189-139.178.94.233:22-104.131.180.171:44696.service: Deactivated successfully. Feb 13 01:47:34.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@189-139.178.94.233:22-104.131.180.171:44696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:34.667585 kernel: audit: type=1131 audit(1707788854.567:751): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@189-139.178.94.233:22-104.131.180.171:44696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:41.718764 systemd[1]: Started sshd@190-139.178.94.233:22-43.155.159.34:40746.service. Feb 13 01:47:41.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@190-139.178.94.233:22-43.155.159.34:40746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:41.811607 kernel: audit: type=1130 audit(1707788861.717:752): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@190-139.178.94.233:22-43.155.159.34:40746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:42.532934 sshd[2987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:47:42.531000 audit[2987]: USER_AUTH pid=2987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:47:42.624584 kernel: audit: type=1100 audit(1707788862.531:753): pid=2987 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:47:44.622856 sshd[2987]: Failed password for root from 43.155.159.34 port 40746 ssh2 Feb 13 01:47:46.633185 sshd[2987]: Received disconnect from 43.155.159.34 port 40746:11: Bye Bye [preauth] Feb 13 01:47:46.633185 sshd[2987]: Disconnected from authenticating user root 43.155.159.34 port 40746 [preauth] Feb 13 01:47:46.635729 systemd[1]: sshd@190-139.178.94.233:22-43.155.159.34:40746.service: Deactivated successfully. Feb 13 01:47:46.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@190-139.178.94.233:22-43.155.159.34:40746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:47:46.730482 kernel: audit: type=1131 audit(1707788866.634:754): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@190-139.178.94.233:22-43.155.159.34:40746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:48:14.681116 systemd[1]: Started sshd@191-139.178.94.233:22-111.229.16.113:33672.service. Feb 13 01:48:14.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@191-139.178.94.233:22-111.229.16.113:33672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:48:14.774596 kernel: audit: type=1130 audit(1707788894.679:755): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@191-139.178.94.233:22-111.229.16.113:33672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:48:15.668031 sshd[2991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:48:15.666000 audit[2991]: USER_AUTH pid=2991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:48:15.761581 kernel: audit: type=1100 audit(1707788895.666:756): pid=2991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:48:17.286681 sshd[2991]: Failed password for root from 111.229.16.113 port 33672 ssh2 Feb 13 01:48:17.824002 sshd[2991]: Received disconnect from 111.229.16.113 port 33672:11: Bye Bye [preauth] Feb 13 01:48:17.824002 sshd[2991]: Disconnected from authenticating user root 111.229.16.113 port 33672 [preauth] Feb 13 01:48:17.826676 systemd[1]: sshd@191-139.178.94.233:22-111.229.16.113:33672.service: Deactivated successfully. Feb 13 01:48:17.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@191-139.178.94.233:22-111.229.16.113:33672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:48:17.920592 kernel: audit: type=1131 audit(1707788897.825:757): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@191-139.178.94.233:22-111.229.16.113:33672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:48:25.058333 systemd[1]: Started sshd@192-139.178.94.233:22-104.131.180.171:34888.service. Feb 13 01:48:25.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@192-139.178.94.233:22-104.131.180.171:34888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:48:25.152591 kernel: audit: type=1130 audit(1707788905.057:758): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@192-139.178.94.233:22-104.131.180.171:34888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:48:25.498570 sshd[2995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:48:25.497000 audit[2995]: USER_AUTH pid=2995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:48:25.598590 kernel: audit: type=1100 audit(1707788905.497:759): pid=2995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:48:27.156951 sshd[2995]: Failed password for root from 104.131.180.171 port 34888 ssh2 Feb 13 01:48:27.549443 sshd[2995]: Received disconnect from 104.131.180.171 port 34888:11: Bye Bye [preauth] Feb 13 01:48:27.549443 sshd[2995]: Disconnected from authenticating user root 104.131.180.171 port 34888 [preauth] Feb 13 01:48:27.551969 systemd[1]: sshd@192-139.178.94.233:22-104.131.180.171:34888.service: Deactivated successfully. Feb 13 01:48:27.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@192-139.178.94.233:22-104.131.180.171:34888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:48:27.646469 kernel: audit: type=1131 audit(1707788907.552:760): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@192-139.178.94.233:22-104.131.180.171:34888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:48:43.357380 systemd[1]: Started sshd@193-139.178.94.233:22-43.155.159.34:59646.service. Feb 13 01:48:43.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@193-139.178.94.233:22-43.155.159.34:59646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:48:43.451601 kernel: audit: type=1130 audit(1707788923.357:761): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@193-139.178.94.233:22-43.155.159.34:59646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:48:44.161048 sshd[3000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:48:44.160000 audit[3000]: USER_AUTH pid=3000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:48:44.254549 kernel: audit: type=1100 audit(1707788924.160:762): pid=3000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:48:45.759627 sshd[3000]: Failed password for root from 43.155.159.34 port 59646 ssh2 Feb 13 01:48:46.279678 sshd[3000]: Received disconnect from 43.155.159.34 port 59646:11: Bye Bye [preauth] Feb 13 01:48:46.279678 sshd[3000]: Disconnected from authenticating user root 43.155.159.34 port 59646 [preauth] Feb 13 01:48:46.282184 systemd[1]: sshd@193-139.178.94.233:22-43.155.159.34:59646.service: Deactivated successfully. Feb 13 01:48:46.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@193-139.178.94.233:22-43.155.159.34:59646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:48:46.376574 kernel: audit: type=1131 audit(1707788926.282:763): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@193-139.178.94.233:22-43.155.159.34:59646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:48:56.874559 systemd[1]: Started sshd@194-139.178.94.233:22-111.229.16.113:47800.service. Feb 13 01:48:56.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@194-139.178.94.233:22-111.229.16.113:47800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:48:56.967403 kernel: audit: type=1130 audit(1707788936.874:764): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@194-139.178.94.233:22-111.229.16.113:47800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:48:57.815206 sshd[3006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:48:57.815000 audit[3006]: USER_AUTH pid=3006 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:48:57.907579 kernel: audit: type=1100 audit(1707788937.815:765): pid=3006 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:48:59.865099 sshd[3006]: Failed password for root from 111.229.16.113 port 47800 ssh2 Feb 13 01:49:01.957423 sshd[3006]: Received disconnect from 111.229.16.113 port 47800:11: Bye Bye [preauth] Feb 13 01:49:01.957423 sshd[3006]: Disconnected from authenticating user root 111.229.16.113 port 47800 [preauth] Feb 13 01:49:01.959927 systemd[1]: sshd@194-139.178.94.233:22-111.229.16.113:47800.service: Deactivated successfully. Feb 13 01:49:01.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@194-139.178.94.233:22-111.229.16.113:47800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:49:02.054594 kernel: audit: type=1131 audit(1707788941.960:766): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@194-139.178.94.233:22-111.229.16.113:47800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:49:18.063101 systemd[1]: Started sshd@195-139.178.94.233:22-104.131.180.171:37660.service. Feb 13 01:49:18.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@195-139.178.94.233:22-104.131.180.171:37660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:49:18.156419 kernel: audit: type=1130 audit(1707788958.062:767): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@195-139.178.94.233:22-104.131.180.171:37660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:49:18.486028 sshd[3010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:49:18.485000 audit[3010]: USER_AUTH pid=3010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:49:18.585586 kernel: audit: type=1100 audit(1707788958.485:768): pid=3010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:49:20.752006 sshd[3010]: Failed password for root from 104.131.180.171 port 37660 ssh2 Feb 13 01:49:22.519029 sshd[3010]: Received disconnect from 104.131.180.171 port 37660:11: Bye Bye [preauth] Feb 13 01:49:22.519029 sshd[3010]: Disconnected from authenticating user root 104.131.180.171 port 37660 [preauth] Feb 13 01:49:22.521574 systemd[1]: sshd@195-139.178.94.233:22-104.131.180.171:37660.service: Deactivated successfully. Feb 13 01:49:22.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@195-139.178.94.233:22-104.131.180.171:37660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:49:22.615595 kernel: audit: type=1131 audit(1707788962.521:769): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@195-139.178.94.233:22-104.131.180.171:37660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:49:39.275411 systemd[1]: Started sshd@196-139.178.94.233:22-111.229.16.113:33690.service. Feb 13 01:49:39.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@196-139.178.94.233:22-111.229.16.113:33690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:49:39.368452 kernel: audit: type=1130 audit(1707788979.275:770): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@196-139.178.94.233:22-111.229.16.113:33690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:49:40.209322 sshd[3015]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.113 user=root Feb 13 01:49:40.209000 audit[3015]: USER_AUTH pid=3015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:49:40.303583 kernel: audit: type=1100 audit(1707788980.209:771): pid=3015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.229.16.113 addr=111.229.16.113 terminal=ssh res=failed' Feb 13 01:49:41.496435 sshd[3015]: Failed password for root from 111.229.16.113 port 33690 ssh2 Feb 13 01:49:42.350042 sshd[3015]: Received disconnect from 111.229.16.113 port 33690:11: Bye Bye [preauth] Feb 13 01:49:42.350042 sshd[3015]: Disconnected from authenticating user root 111.229.16.113 port 33690 [preauth] Feb 13 01:49:42.352605 systemd[1]: sshd@196-139.178.94.233:22-111.229.16.113:33690.service: Deactivated successfully. Feb 13 01:49:42.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@196-139.178.94.233:22-111.229.16.113:33690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:49:42.446508 kernel: audit: type=1131 audit(1707788982.352:772): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@196-139.178.94.233:22-111.229.16.113:33690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:49:44.933535 systemd[1]: Started sshd@197-139.178.94.233:22-43.155.159.34:50316.service. Feb 13 01:49:44.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@197-139.178.94.233:22-43.155.159.34:50316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:49:45.026410 kernel: audit: type=1130 audit(1707788984.933:773): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@197-139.178.94.233:22-43.155.159.34:50316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:49:45.741356 sshd[3020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:49:45.741000 audit[3020]: USER_AUTH pid=3020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:49:45.834488 kernel: audit: type=1100 audit(1707788985.741:774): pid=3020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:49:48.051705 sshd[3020]: Failed password for root from 43.155.159.34 port 50316 ssh2 Feb 13 01:49:49.843676 sshd[3020]: Received disconnect from 43.155.159.34 port 50316:11: Bye Bye [preauth] Feb 13 01:49:49.843676 sshd[3020]: Disconnected from authenticating user root 43.155.159.34 port 50316 [preauth] Feb 13 01:49:49.846172 systemd[1]: sshd@197-139.178.94.233:22-43.155.159.34:50316.service: Deactivated successfully. Feb 13 01:49:49.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@197-139.178.94.233:22-43.155.159.34:50316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:49:49.940475 kernel: audit: type=1131 audit(1707788989.846:775): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@197-139.178.94.233:22-43.155.159.34:50316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:50:12.529478 systemd[1]: Started sshd@198-139.178.94.233:22-104.131.180.171:36120.service. Feb 13 01:50:12.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@198-139.178.94.233:22-104.131.180.171:36120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:50:12.623600 kernel: audit: type=1130 audit(1707789012.529:776): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@198-139.178.94.233:22-104.131.180.171:36120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:50:12.969785 sshd[3024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:50:12.969000 audit[3024]: USER_AUTH pid=3024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:50:13.063649 kernel: audit: type=1100 audit(1707789012.969:777): pid=3024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:50:14.984266 sshd[3024]: Failed password for root from 104.131.180.171 port 36120 ssh2 Feb 13 01:50:17.003985 sshd[3024]: Received disconnect from 104.131.180.171 port 36120:11: Bye Bye [preauth] Feb 13 01:50:17.003985 sshd[3024]: Disconnected from authenticating user root 104.131.180.171 port 36120 [preauth] Feb 13 01:50:17.006488 systemd[1]: sshd@198-139.178.94.233:22-104.131.180.171:36120.service: Deactivated successfully. Feb 13 01:50:17.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@198-139.178.94.233:22-104.131.180.171:36120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:50:17.100595 kernel: audit: type=1131 audit(1707789017.006:778): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@198-139.178.94.233:22-104.131.180.171:36120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:50:47.281411 systemd[1]: Started sshd@199-139.178.94.233:22-43.155.159.34:40988.service. Feb 13 01:50:47.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@199-139.178.94.233:22-43.155.159.34:40988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:50:47.374453 kernel: audit: type=1130 audit(1707789047.280:779): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@199-139.178.94.233:22-43.155.159.34:40988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:50:48.092681 sshd[3029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:50:48.091000 audit[3029]: USER_AUTH pid=3029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:50:48.185593 kernel: audit: type=1100 audit(1707789048.091:780): pid=3029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:50:50.050689 sshd[3029]: Failed password for root from 43.155.159.34 port 40988 ssh2 Feb 13 01:50:50.215423 sshd[3029]: Received disconnect from 43.155.159.34 port 40988:11: Bye Bye [preauth] Feb 13 01:50:50.215423 sshd[3029]: Disconnected from authenticating user root 43.155.159.34 port 40988 [preauth] Feb 13 01:50:50.217932 systemd[1]: sshd@199-139.178.94.233:22-43.155.159.34:40988.service: Deactivated successfully. Feb 13 01:50:50.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@199-139.178.94.233:22-43.155.159.34:40988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:50:50.311454 kernel: audit: type=1131 audit(1707789050.217:781): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@199-139.178.94.233:22-43.155.159.34:40988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:51:08.068591 systemd[1]: Started sshd@200-139.178.94.233:22-104.131.180.171:53766.service. Feb 13 01:51:08.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@200-139.178.94.233:22-104.131.180.171:53766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:51:08.162467 kernel: audit: type=1130 audit(1707789068.067:782): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@200-139.178.94.233:22-104.131.180.171:53766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:51:08.506237 sshd[3033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:51:08.505000 audit[3033]: USER_AUTH pid=3033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:51:08.607588 kernel: audit: type=1100 audit(1707789068.505:783): pid=3033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:51:10.877014 sshd[3033]: Failed password for root from 104.131.180.171 port 53766 ssh2 Feb 13 01:51:12.542448 sshd[3033]: Received disconnect from 104.131.180.171 port 53766:11: Bye Bye [preauth] Feb 13 01:51:12.542448 sshd[3033]: Disconnected from authenticating user root 104.131.180.171 port 53766 [preauth] Feb 13 01:51:12.544949 systemd[1]: sshd@200-139.178.94.233:22-104.131.180.171:53766.service: Deactivated successfully. Feb 13 01:51:12.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@200-139.178.94.233:22-104.131.180.171:53766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:51:12.638462 kernel: audit: type=1131 audit(1707789072.544:784): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@200-139.178.94.233:22-104.131.180.171:53766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:51:37.821980 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:51:37.821Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":7475} Feb 13 01:51:37.825422 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:51:37.824Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":7475,"took":"2.827717ms"} Feb 13 01:51:51.475815 systemd[1]: Started sshd@201-139.178.94.233:22-43.155.159.34:59900.service. Feb 13 01:51:51.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@201-139.178.94.233:22-43.155.159.34:59900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:51:51.568610 kernel: audit: type=1130 audit(1707789111.474:785): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@201-139.178.94.233:22-43.155.159.34:59900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:51:52.281549 sshd[3041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:51:52.280000 audit[3041]: USER_AUTH pid=3041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:51:52.374570 kernel: audit: type=1100 audit(1707789112.280:786): pid=3041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:51:54.024794 sshd[3041]: Failed password for root from 43.155.159.34 port 59900 ssh2 Feb 13 01:51:54.402935 sshd[3041]: Received disconnect from 43.155.159.34 port 59900:11: Bye Bye [preauth] Feb 13 01:51:54.402935 sshd[3041]: Disconnected from authenticating user root 43.155.159.34 port 59900 [preauth] Feb 13 01:51:54.405347 systemd[1]: sshd@201-139.178.94.233:22-43.155.159.34:59900.service: Deactivated successfully. Feb 13 01:51:54.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@201-139.178.94.233:22-43.155.159.34:59900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:51:54.499596 kernel: audit: type=1131 audit(1707789114.404:787): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@201-139.178.94.233:22-43.155.159.34:59900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:52:05.165799 systemd[1]: Started sshd@202-139.178.94.233:22-104.131.180.171:34106.service. Feb 13 01:52:05.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@202-139.178.94.233:22-104.131.180.171:34106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:52:05.259403 kernel: audit: type=1130 audit(1707789125.164:788): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@202-139.178.94.233:22-104.131.180.171:34106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:52:05.590350 sshd[3045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.180.171 user=root Feb 13 01:52:05.589000 audit[3045]: ANOM_LOGIN_FAILURES pid=3045 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:52:05.590613 sshd[3045]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 01:52:05.589000 audit[3045]: USER_AUTH pid=3045 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:52:05.758419 kernel: audit: type=2100 audit(1707789125.589:789): pid=3045 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 01:52:05.758485 kernel: audit: type=1100 audit(1707789125.589:790): pid=3045 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.131.180.171 addr=104.131.180.171 terminal=ssh res=failed' Feb 13 01:52:07.454244 sshd[3045]: Failed password for root from 104.131.180.171 port 34106 ssh2 Feb 13 01:52:07.637338 sshd[3045]: Received disconnect from 104.131.180.171 port 34106:11: Bye Bye [preauth] Feb 13 01:52:07.637338 sshd[3045]: Disconnected from authenticating user root 104.131.180.171 port 34106 [preauth] Feb 13 01:52:07.639915 systemd[1]: sshd@202-139.178.94.233:22-104.131.180.171:34106.service: Deactivated successfully. Feb 13 01:52:07.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@202-139.178.94.233:22-104.131.180.171:34106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:52:07.733598 kernel: audit: type=1131 audit(1707789127.639:791): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@202-139.178.94.233:22-104.131.180.171:34106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:52:42.616155 systemd[1]: Started sshd@203-139.178.94.233:22-138.197.18.220:46918.service. Feb 13 01:52:42.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@203-139.178.94.233:22-138.197.18.220:46918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:52:42.709449 kernel: audit: type=1130 audit(1707789162.614:792): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@203-139.178.94.233:22-138.197.18.220:46918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:52:42.938147 sshd[3051]: Invalid user hadoop from 138.197.18.220 port 46918 Feb 13 01:52:43.016352 sshd[3051]: pam_faillock(sshd:auth): User unknown Feb 13 01:52:43.017460 sshd[3051]: pam_unix(sshd:auth): check pass; user unknown Feb 13 01:52:43.017555 sshd[3051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.18.220 Feb 13 01:52:43.018456 sshd[3051]: pam_faillock(sshd:auth): User unknown Feb 13 01:52:43.017000 audit[3051]: USER_AUTH pid=3051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hadoop" exe="/usr/sbin/sshd" hostname=138.197.18.220 addr=138.197.18.220 terminal=ssh res=failed' Feb 13 01:52:43.119598 kernel: audit: type=1100 audit(1707789163.017:793): pid=3051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hadoop" exe="/usr/sbin/sshd" hostname=138.197.18.220 addr=138.197.18.220 terminal=ssh res=failed' Feb 13 01:52:45.097826 sshd[3051]: Failed password for invalid user hadoop from 138.197.18.220 port 46918 ssh2 Feb 13 01:52:47.062545 sshd[3051]: Connection closed by invalid user hadoop 138.197.18.220 port 46918 [preauth] Feb 13 01:52:47.065093 systemd[1]: sshd@203-139.178.94.233:22-138.197.18.220:46918.service: Deactivated successfully. Feb 13 01:52:47.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@203-139.178.94.233:22-138.197.18.220:46918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:52:47.159598 kernel: audit: type=1131 audit(1707789167.064:794): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@203-139.178.94.233:22-138.197.18.220:46918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:53:00.591501 systemd[1]: Started sshd@204-139.178.94.233:22-43.155.159.34:50576.service. Feb 13 01:53:00.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@204-139.178.94.233:22-43.155.159.34:50576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:53:00.684403 kernel: audit: type=1130 audit(1707789180.590:795): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@204-139.178.94.233:22-43.155.159.34:50576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:53:01.397941 sshd[3057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:53:01.396000 audit[3057]: USER_AUTH pid=3057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:53:01.491588 kernel: audit: type=1100 audit(1707789181.396:796): pid=3057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:53:03.281681 sshd[3057]: Failed password for root from 43.155.159.34 port 50576 ssh2 Feb 13 01:53:03.518122 sshd[3057]: Received disconnect from 43.155.159.34 port 50576:11: Bye Bye [preauth] Feb 13 01:53:03.518122 sshd[3057]: Disconnected from authenticating user root 43.155.159.34 port 50576 [preauth] Feb 13 01:53:03.520741 systemd[1]: sshd@204-139.178.94.233:22-43.155.159.34:50576.service: Deactivated successfully. Feb 13 01:53:03.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@204-139.178.94.233:22-43.155.159.34:50576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:53:03.614448 kernel: audit: type=1131 audit(1707789183.519:797): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@204-139.178.94.233:22-43.155.159.34:50576 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:54:06.048463 systemd[1]: Started sshd@205-139.178.94.233:22-43.155.159.34:41248.service. Feb 13 01:54:06.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@205-139.178.94.233:22-43.155.159.34:41248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:54:06.142623 kernel: audit: type=1130 audit(1707789246.048:798): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@205-139.178.94.233:22-43.155.159.34:41248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:54:06.869281 sshd[3062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:54:06.869000 audit[3062]: USER_AUTH pid=3062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:54:06.962588 kernel: audit: type=1100 audit(1707789246.869:799): pid=3062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:54:08.673483 sshd[3062]: Failed password for root from 43.155.159.34 port 41248 ssh2 Feb 13 01:54:08.990568 sshd[3062]: Received disconnect from 43.155.159.34 port 41248:11: Bye Bye [preauth] Feb 13 01:54:08.990568 sshd[3062]: Disconnected from authenticating user root 43.155.159.34 port 41248 [preauth] Feb 13 01:54:08.993108 systemd[1]: sshd@205-139.178.94.233:22-43.155.159.34:41248.service: Deactivated successfully. Feb 13 01:54:08.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@205-139.178.94.233:22-43.155.159.34:41248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:54:09.087474 kernel: audit: type=1131 audit(1707789248.993:800): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@205-139.178.94.233:22-43.155.159.34:41248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:55:12.153414 systemd[1]: Started sshd@206-139.178.94.233:22-43.155.159.34:60164.service. Feb 13 01:55:12.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@206-139.178.94.233:22-43.155.159.34:60164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:55:12.247403 kernel: audit: type=1130 audit(1707789312.153:801): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@206-139.178.94.233:22-43.155.159.34:60164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:55:12.966789 sshd[3066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:55:12.966000 audit[3066]: USER_AUTH pid=3066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:55:13.060587 kernel: audit: type=1100 audit(1707789312.966:802): pid=3066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:55:15.167063 sshd[3066]: Failed password for root from 43.155.159.34 port 60164 ssh2 Feb 13 01:55:17.074096 sshd[3066]: Received disconnect from 43.155.159.34 port 60164:11: Bye Bye [preauth] Feb 13 01:55:17.074096 sshd[3066]: Disconnected from authenticating user root 43.155.159.34 port 60164 [preauth] Feb 13 01:55:17.076671 systemd[1]: sshd@206-139.178.94.233:22-43.155.159.34:60164.service: Deactivated successfully. Feb 13 01:55:17.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@206-139.178.94.233:22-43.155.159.34:60164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:55:17.170589 kernel: audit: type=1131 audit(1707789317.076:803): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@206-139.178.94.233:22-43.155.159.34:60164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:56:15.575750 systemd[1]: Started sshd@207-139.178.94.233:22-43.155.159.34:50836.service. Feb 13 01:56:15.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@207-139.178.94.233:22-43.155.159.34:50836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:56:15.670597 kernel: audit: type=1130 audit(1707789375.575:804): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@207-139.178.94.233:22-43.155.159.34:50836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:56:16.379936 sshd[3073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.155.159.34 user=root Feb 13 01:56:16.379000 audit[3073]: USER_AUTH pid=3073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:56:16.473591 kernel: audit: type=1100 audit(1707789376.379:805): pid=3073 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.159.34 addr=43.155.159.34 terminal=ssh res=failed' Feb 13 01:56:17.697323 sshd[3073]: Failed password for root from 43.155.159.34 port 50836 ssh2 Feb 13 01:56:18.503393 sshd[3073]: Received disconnect from 43.155.159.34 port 50836:11: Bye Bye [preauth] Feb 13 01:56:18.503393 sshd[3073]: Disconnected from authenticating user root 43.155.159.34 port 50836 [preauth] Feb 13 01:56:18.505973 systemd[1]: sshd@207-139.178.94.233:22-43.155.159.34:50836.service: Deactivated successfully. Feb 13 01:56:18.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@207-139.178.94.233:22-43.155.159.34:50836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:56:18.600598 kernel: audit: type=1131 audit(1707789378.506:806): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@207-139.178.94.233:22-43.155.159.34:50836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 01:56:37.838567 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:56:37.837Z","caller":"mvcc/index.go:214","msg":"compact tree index","revision":8012} Feb 13 01:56:37.841000 etcd-wrapper[1714]: {"level":"info","ts":"2024-02-13T01:56:37.840Z","caller":"mvcc/kvstore_compaction.go:57","msg":"finished scheduled compaction","compact-revision":8012,"took":"2.051889ms"}